text stringlengths 3 7.38M | source_data stringclasses 5 values | info stringlengths 83 12.5k |
|---|---|---|
Unrestricted dictionary
From: Brian Birtles <bbirtles@mozilla.com>
Date: Wed, 15 Aug 2012 09:43:00 +0900
Message-ID: <502AF094.3030501@mozilla.com>
To: public-script-coord@w3.org
Dear all,
I'd like to propose a kind of dictionary where the keys are unrestricted.
The use case is the Web Animations specification[1] where we are
considering providing an interface similar that that of the Raphaël
library[2]. Namely, like so:
var anim = new Anim(elem, { dur: 2, height: '100px' });
In this example, 'height' corresponds to a CSS property on elem which we
want to animate but could potentially be any animatable CSS property.
This is obviously a lot easier than splitting this out into a separate
property like so:
var anim = new Anim(elem, { dur: 2, prop: 'height', to: '100px' });
particularly when animating multiple CSS properties simultaneously.
I spoke with Cameron about this and it seems having a kind of
unrestricted dictionary-like thing would be useful for cases like this.
I'm afraid I'm still unfamiliar with the terminology of WebIDL but I
think roughly what is required is the ability to have a collection of
properties where the set of properties/keys is unrestricted and the type
of the values is also free. Obviously prose would be required to
describe how to interpret whatever members were found.
Does that make any sense?
Best regards,
[1] https://dvcs.w3.org/hg/FXTF/raw-file/tip/web-anim/index.html (see
section 5.1, 'the Anim interface', for where the use case in this email
[2] http://raphaeljs.com/
Received on Wednesday, 15 August 2012 00:43:31 UTC
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '26', 'language_id_whole_page_fasttext': "{'en': 0.8855934143066406}", 'metadata': "{'Content-Length': '8503', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LFBJVNMAXXLZY2WDIKGJU5MHALFMD5OD', 'WARC-Concurrent-To': '<urn:uuid:fb1a7667-abe8-425d-8221-f353141e05fd>', 'WARC-Date': datetime.datetime(2013, 12, 13, 9, 29, 1), 'WARC-IP-Address': '128.30.52.56', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WV6HCZRALBPUZRWHZJVSZPOKEPFRIFX4', 'WARC-Record-ID': '<urn:uuid:58d4c325-bb7b-4118-b947-1ef42279cba3>', 'WARC-Target-URI': 'http://lists.w3.org/Archives/Public/public-script-coord/2012JulSep/0100.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7db98a48-5ba4-44a9-916c-232615b7cec0>', 'WARC-Truncated': None}", 'previous_word_count': '248', 'url': 'http://lists.w3.org/Archives/Public/public-script-coord/2012JulSep/0100.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03518134355545044', 'original_id': '2cebfd422956994b0ff296120a6b16c66a101275c819e8c17b36bb2a828dfe2a'} |
Surfactant effect on the buoyancy-driven motion of bubbles and drops in a tube.
The effect of surfactants on the buoyancy-driven motion of bubbles and drops in a vertical tube is experimentally examined. The terminal velocities of fluid particles are measured and their steady shapes are quantitatively characterized in systems with various bulk-phase concentrations of surfactant. In the case of air bubbles, the presence of surfactant retards the motion of small bubbles due to the development of adverse Marangoni stresses, whereas it enhances the motion of large bubbles by allowing them to deform away from the tube wall more easily. For viscous drops, the surfactant-enhanced regime of particle motion becomes more pronounced in the sense that the terminal velocity becomes more sensitive to surfactant concentration, whereas the surfactant effect in the surfactant-retarded regime becomes weaker. | mini_pile | {'original_id': '940cd22c112534741b0dfee8c5189cb42486b7b56c754a921e96ac45c4d4b671'} |
Wednesday, February 20, 2013
NetGestalt for Data Visualization in the Context of Pathways
Many of you may be familiar with WebGestalt, a wonderful web utility developed by Bing Zhang at Vanderbilt for doing basic gene-set enrichment analyses. Last year, we invited Bing to speak at our annual retreat for the Vanderbilt Graduate Program in Human Genetics, and he did not disappoint! Bing walked us through his new tool called NetGestalt.
NetGestalt provides users with the ability to overlay large-scale experimental data onto biological networks. Data are loaded using continuous and binary tracks that can contain either single or multiple lines of data (called composite tracks). Continuous tracks could be gene expression intensities from microarray data or any other quantitative measure that can be mapped to the genome. Binary tracks are usually insertion/deletion regions, or called regions like ChIP peaks. NetGestalt extends many of the features of WebGestalt, including enrichment analysis for modules within a biological network, and provides easy ways to visualize the overlay of multiple tracks with Venn diagrams.
Netgestalt provides a very nice interface for interacting with data. Extensive documentation on how to use it can be found here. Bing and his colleagues also went the extra mile to create video tutorials on how to use their web tool, and walk you through an analysis of some tumor data.
Tuesday, February 12, 2013
"Document Design and Purpose, Not Mechanics"
If you ever write code for scientific computing (chances are you do if you're here), stop what you're doing and spend 8 minutes reading this open-access paper:
Wilson et al. Best Practices for Scientific Computing. arXiv:1210.0530 (2012). (Direct link to PDF).
The paper makes a number of good points regarding software as a tool just like any other lab equipment: it should be built, validated, and used as carefully as any other physical instrumentation. Yet most scientists who write software are self-taught, and haven't been properly trained in fundamental software development skills.
The paper outlines ten practices every computational biologist should adopt when writing code for research computing. Most of these are the usual suspects that you'd probably guess - using version control, workflow management, writing good documentation, modularizing code into functions, unit testing, agile development, etc. One that particularly jumped out at me was the recommendation to document design and purpose, not mechanics.
We all know that good comments and documentation is critical for code reproducibility and maintenance, but inline documentation that recapitulates the code is hardly useful. Instead, we should aim to document the underlying ideas, interface, and reasons, not the implementation.
For example, the following commentary is hardly useful:
# Increment the variable "i" by one.
i = i+1
The real recommendation here is that if your code requires such substantial documentation of the actual implementation to be understandable, it's better to spend the time rewriting the code rather than writing a lengthy description of what it does. I'm very guilty of doing this with R code, nesting multiple levels of functions and vector operations:
# It would take a paragraph to explain what this is doing.
# Better to break up into multiple lines of code.
sapply(data.frame(n=sapply(x, function(d) sum(, function(dd) mean(dd))
It would take much more time to properly document what this is doing than it would take to split the operation into manageable chunks over multiple lines such that the code no longer needs an explanation. We're not playing code golf here - using fewer lines doesn't make you a better programmer.
Creative Commons License | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '7', 'language_id_whole_page_fasttext': "{'en': 0.915189266204834}", 'metadata': "{'Content-Length': '91803', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QD7O4KIOEE5RN7RLEYB6RHVAFZNVDWFK', 'WARC-Concurrent-To': '<urn:uuid:29d55761-807c-4d10-89fc-3ec273abbeae>', 'WARC-Date': datetime.datetime(2017, 3, 25, 5, 59, 31), 'WARC-IP-Address': '172.217.7.179', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:U2Y2BG5QWETXEOMLSI3MAJYLWO73XFOP', 'WARC-Record-ID': '<urn:uuid:49b661b7-6294-49c9-9dc5-1d2a896c0e24>', 'WARC-Target-URI': 'http://www.gettinggeneticsdone.com/2013_02_01_archive.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:895e95ac-7812-485a-b39f-23351d565d48>', 'WARC-Truncated': None}", 'previous_word_count': '581', 'url': 'http://www.gettinggeneticsdone.com/2013_02_01_archive.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025990426540374756', 'original_id': '3a5bcd6e380f0cfdfcb0499c18fb3e48ce5a503ec300e734ede89b78ba373b25'} |
4 Hugues Ross - Blog: Space Douchebag! - 1 - Don't Panic
Hugues Ross
Space Douchebag! - 1 - Don't Panic
Please don't panic. I haven't stopped development on AMAZE or anything. I'm going to use this post to explain what's going on, and the next few will focus on actual development.
First, AMAZE is in a bit of a slow spot. I finished rewriting the import/export stuff, but now I need to add more to some of the files as well as making other various changes. The binary file stuff has only recently shown just how bad an idea it was, but I'm pretty much committed to getting it working now. Obviously, it sucks and makes me not want to work much, dragging on the process further.
Second, I've had my programming time seriously cut into by college. I knew it was going to happen, but I'd forgotten how dramatic a cut it was. I'm also teaching myself how to use Vim in the meantime, which is making me unproductive since I'm still not used to using it. I can feel sometimes how it'll help make me faster once I've used it for another month or two, but it's going to be a while until I can really make use of that latent power.
Finally, my Graphics Development class requires me to program one or more games in C# via XNA, so I figured I could post progress on that stuff during slow weeks. It's win-win. I don't have as much pressure to get work done, and you guys don't have to suffer through another year of boring apologetic updates.
Well, that's out of the way. It's pretty late, so I'll explain Space Douchebag! and get you all caught up on its' development in a later post, probably this weekend.
No comments: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9764302968978882}", 'metadata': "{'Content-Length': '77738', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RFEPNVHTQ2UN4A672UN6NURJWLZJPUOM', 'WARC-Concurrent-To': '<urn:uuid:dc1a3f8e-3d95-4edf-a1a1-34082d7200a8>', 'WARC-Date': datetime.datetime(2019, 2, 23, 18, 34, 1), 'WARC-IP-Address': '172.217.15.115', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:7I27C3EGKIFD73E262Z3U733RAYEQQIS', 'WARC-Record-ID': '<urn:uuid:e635fb9f-597d-46a8-be85-215dc59e2ab5>', 'WARC-Target-URI': 'http://blog.huguesross.net/2013/09/space-douchebag-1-dont-panic.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1ae45ffc-70b3-4046-ba90-46791b3650b2>', 'WARC-Truncated': None}", 'previous_word_count': '299', 'url': 'http://blog.huguesross.net/2013/09/space-douchebag-1-dont-panic.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-137-170-67.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17583686113357544', 'original_id': '67e4d2d1d45efd90395eb300f4e2f287b4cf7d1e1fbd0a27ccf094e8ff1473fe'} |
Q:
Setting size of viewController's view in UIView
UIView *view =[[UIView alloc] initWithFrame:CGRect(0,0,300,70)]; //--(View created)
someViewController *someViewControllerObject = [..]; //View Controller Object created.
[view addSubview:[someViewControllerObject.view]];
I want to fit the view controller's view in the UIView's object. The above code doesn't work correctly. Can you help me figure this out?
A:
The simplest would be to just set the frame of the controller view to the bounds of the outer view;
UIView *view =[[UIView alloc] initWithFrame:CGRect(0,0,300,70)]; //--(View created)
someViewController *someViewControllerObject = [..]; //View Controller Object created.
someViewController.view.frame = view.bounds;
[view addSubview:[someViewControllerObject.view]];
| mini_pile | {'original_id': 'b3d551b97f21c52101cb8cf19842ff9f53b0eff79c1d9a6b17d558224487da75'} |
<?xml version='1.0' encoding='utf-8'?>
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<title>Al Quran-ul-Kareem</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<link rel="stylesheet" type="text/css" href="../stylesheet.css"/>
<link rel="stylesheet" type="text/css" href="../page_styles.css"/>
</head>
<body class="calibre">
<p id="id_Top_of_part0043_html" class="block_1"><span class="text_1">আয়াত: ৯৮ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَمِنَ ٱلۡأَعۡرَابِ مَن يَتَّخِذُ مَا يُنفِقُ مَغۡرَمٗا وَيَتَرَبَّصُ بِكُمُ ٱلدَّوَآئِرَۚ عَلَيۡهِمۡ دَآئِرَةُ ٱلسَّوۡءِۗ وَٱللَّهُ سَمِيعٌ عَلِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">আর মরুবাসীদের কেউ কেউ, যা তারা আল্লাহ্র পথে ব্যয় করে তা জরিমানা গণ্য করে এবং তোমাদের বিপর্যয়ের প্রতীক্ষা করে। তাদের উপরই হোক নিকৃষ্টতম বিপর্যয় [১]। আর আল্লাহ্ সর্বশ্রোতা, সর্বজ্ঞ।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতেও এ সমস্ত বেদুঈনেরই একটি অবস্থা বর্ণনা করা হয়েছে। বলা হয়েছে যে, এরা যাকাত, জিহাদ প্রভৃতিতে যে অর্থ ব্যয় করে, তাকে এক প্রকার জরিমানা বলে মনে করে। তার কারণ, তাদের অন্তরে তো ঈমান নেই, শুধু নিজেদের কুফরীকে লুকানোর জন্য সালাতও পড়ে নেয় এবং ফরয যাকাতও দিয়ে দেয়। কিন্তু মনে এ কালিমা থেকেই যায় যে, এ অর্থ অনর্থক খরচ হয়ে গেল। আর সেজন্য অপেক্ষায় থাকে যে, কোনো রকমে মুসলিমদের উপর কোনো বিপদ নেমে আসুক এবং তারা পরাজিত হয়ে থাক; তাহলেই আমাদের এহেন অর্থদণ্ড থেকে মুক্তিলাভ হবে। আল্লাহ তা'আলা তাদের উত্তরে বলছেন, তাদেরই উপর মন্দ অবস্থা আসবে। আর এরা নিজেদের সেসব কাজ-কর্ম ও কথা-বার্তার কারণে অধিকতর অপমানিত। মুমিনদের জন্য রয়েছে তাদের শক্রদের বিপরীতে উত্তম ফলাফল। [দেখুন, আইসারুত তাফাসীর; সা’দী]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__99_6" class="block_1"><span class="text_1">আয়াত: ৯৯ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَمِنَ ٱلۡأَعۡرَابِ مَن يُؤۡمِنُ بِٱللَّهِ وَٱلۡيَوۡمِ ٱلۡأٓخِرِ وَيَتَّخِذُ مَا يُنفِقُ قُرُبَٰتٍ عِندَ ٱللَّهِ وَصَلَوَٰتِ ٱلرَّسُولِۚ أَلَآ إِنَّهَا قُرۡبَةٞ لَّهُمۡۚ سَيُدۡخِلُهُمُ ٱللَّهُ فِي رَحۡمَتِهِۦٓۚ إِنَّ ٱللَّهَ غَفُورٞ رَّحِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">আর মরুবাসীদের কেউ কেউ আল্লাহ্ ও শেষ দিনের উপর ঈমান রাখে এবং যা ব্যয় করে তাকে আল্লাহ্র সান্নিধ্য ও রাসূলের দো’আ লাভের উপায় গণ্য করে। জেনে রাখ, নিশ্চয় তা তাদের জন্য আল্লাহ্র সান্নিধ্য লাভের উপায়; অচিরেই আল্লাহ্ তাদেরকে নিজ রহমতে দাখিল করবেন [১]। নিশ্চয় আল্লাহ্ ক্ষমাশীল, পরম দয়ালু [২]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতে আল্লাহ্ তা'আলা সে সব বেদুঈনের আলোচনা সংগত মনে করেছেন যারা সত্যিকার ও পাকা মুসলিম। আর তা এজন্য যাতে একথা প্রতীয়মান হয়ে যায় যে, সব বেদুঈনই এক রকম নয়। তাদের মধ্যেও নিঃস্বার্থ, নিষ্ঠাবান ও জ্ঞানী লোক আছে। তাদের অবস্থা হল এই যে, তারা যে যাকাত-সদকা দেয়, তাকে তারা আল্লাহ তা'আলার নৈকট্য লাভের উপায় এবং রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম এর দোআ প্রাপ্তির আশায় দিয়ে থাকে। ইবন আব্বাস বলেন, এখানে (وَ صَلَوٰتِ الرَّسُوۡلِ) বলে রাসূল তাদের জন্য যে ক্ষমা প্রার্থনা করবেন সেটা বোঝানো হয়েছে। [তাবারী]। <br class="calibre1"/><br class="calibre1"/>[২] আলোচ্য আয়াত থেকে আমরা কয়েকটি গুরুত্বপূর্ণ দিক-নির্দেশনা পাই। এক. বেদুঈনরাও শহরবাসীর মতই। তাদের মধ্যেও ভালো-খারাপ উভয় ধরনের লোক রয়েছে। সুতরাং তারা বেদুঈন হয়েছে বলেই তাদের দুর্নাম করা হয়নি- বরং তারা আল্লাহর নির্দেশ না জানাটাই তাদের নিন্দার কারণ। দুই. কুফর ও নিফাক অবস্থাভেদে বেশী, কম, কঠোর ও হাল্কা হয়ে থাকে। তিন. এ আয়াত দ্বারা ইলমের সম্মান বুঝা যাচ্ছে। যার ইলম নেই সে ক্ষতির অধিক নিকটবর্তী সে লোকের তুলনায়, যার কাছে ইলম আছে। আর এজন্যই আল্লাহ তাদের নিন্দা করেছেন। চার. এ আয়াত থেকে আরও বুঝা যায় যে, উপকারী ইলম সেটাই যা মানুষের কাজে লাগে, যা থাকলে মানুষ আল্লাহর নির্ধারিত সীমারেখা জানতে পারে। যেমন, ঈমান, ইসলাম, ইহসান, তাকওয়া, সফলতা, আনুগত্য, সৎ, সুসম্পর্ক সম্পর্কে জ্ঞান। অনুরূপভাবে, কুফর, নিফাক, ফিসক, অবাধ্যতা, ব্যভিচার, মদ, সুদ ইত্যাদি সম্পর্কে জানা; কেননা এগুলো জানলে আল্লাহর নির্দেশগুলো মানা যায়, আর নিষেধকৃত বস্তুগুলো পরিত্যাগ করা যায়। পাঁচ. ঈমানদারের উচিত তার কর্তব্যকর্ম অত্যন্ত খুশীমনে আদায় করা। সে সবসময় খেয়াল রাখবে যে সে এগুলো করতে পেরে লাভবান, ক্ষতিগ্রস্ত নয়। [সা'দী] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__100_6" class="block_1"><span class="text_1">আয়াত: ১০০ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَٱلسَّـٰبِقُونَ ٱلۡأَوَّلُونَ مِنَ ٱلۡمُهَٰجِرِينَ وَٱلۡأَنصَارِ وَٱلَّذِينَ ٱتَّبَعُوهُم بِإِحۡسَٰنٖ رَّضِيَ ٱللَّهُ عَنۡهُمۡ وَرَضُواْ عَنۡهُ وَأَعَدَّ لَهُمۡ جَنَّـٰتٖ تَجۡرِي تَحۡتَهَا ٱلۡأَنۡهَٰرُ خَٰلِدِينَ فِيهَآ أَبَدٗاۚ ذَٰلِكَ ٱلۡفَوۡزُ ٱلۡعَظِيمُ </span></p>
<h2 class="block_4"><span class="text_1">আর মুহাজির ও আনসারদের মধ্যে যারা প্রথম অগ্রগামী [১] এবং যারা ইহসানের সাথে তাদের অনুসরণ করে [২] আল্লাহ্ তাদের প্রতি সন্তুষ্ট হয়েছেন এবং তারাও তাঁর উপর সন্তুষ্ট হয়েছেন [৩]। আর তিনি তাদের জন্য তৈরী করেছেন জান্নাত, যার নিচে নদী প্রবাহিত, সেখানে তারা চিরস্থায়ী হবে। এ তো মহাসাফল্য।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতে সাহাবীগণের প্রশংসায় আল্লাহ্ তা'আলা “সাবেকীন আওয়ালীন" বা ‘প্রথম অগ্রগামী’ শব্দদ্বয় ব্যবহার করেছেন। কিন্তু এ “সাবেকীন আওয়ালীন কারা তা নির্ধারণে বিভিন্ন মত পরিলক্ষিত হয়।<br class="calibre1"/><br class="calibre1"/>(ক) কোনো কোনো মুফাসসির বলেন, এ আয়াতে “সাবেকীন আওয়ালীন" এর পরে <br class="calibre1"/><br class="calibre1"/>(مِنَ الۡمُهٰجِرِیۡنَ وَ الۡاَنۡصَارِ) <br class="calibre1"/><br class="calibre1"/>বাক্যে ব্যবহৃত مِنْ অব্যয়টি কারো কারো মতে تبعيض বা কিছু সংখ্যক বুঝানোর জন্য ব্যবহার করা হয়েছে। এ তাফসীর অনুযায়ী সাহাবায়ে কেরামের দুটি শ্রেণী সাব্যস্ত হয়েছে। একটি হল সাবেকীনে আওয়ালীনের, আর দ্বিতীয়টি হচ্ছে, কেবলা পরিবর্তন কিংবা গাযওয়ায়ে বদর অথবা বাইআতে রেদওয়ান অথবা মক্কা বিজয়ের পরে যারা মুসলিম হয়েছে তারা সবাই। তখন সাহাবাগণ দু’শ্রেণীতে বিভক্ত হবেন, <br class="calibre1"/><br class="calibre1"/>এক) মুহাজেরীন ও আনসারদের মধ্যে যারা “সাবেকীন আওয়ালীন” বা ঈমান গ্রহণে ও হিজরতে অগ্রবর্তী। <br class="calibre1"/><br class="calibre1"/>দুই) অন্যান্য সাহাবায়ে কেরাম। এ তাফসীর অনুসারে সাহাবীগণের মধ্যে কারা “সাবেকীন আওয়ালীন” বলে গণ্য হবেন এ ব্যাপারে বেশ কয়েকটি মত রয়েছে: <br class="calibre1"/><br class="calibre1"/>১) কোনো কোনো মনীষী সাহাবায়ে কেরামদের মধ্যে "সাবেকীন আওয়ালীন” তাদেরকেই সাব্যস্ত করেছেন, যারা উভয় কেবল অর্থাৎ বায়তুল মুকাদ্দাস ও কাবার দিকে মুখ করে সালাত পড়েছেন। অর্থাৎ যারা কেবলা পরিবর্তনের পূর্বে মুসলিম হয়েছে তাদেরকে “সাবেকীন আওয়ালীন" গণ্য করেছেন। এমনটি হল সাঈদ ইবন মুসাইয়োব ও কাতাদাহ রাদিয়াল্লাহু আনহু— এর মত। [কুরতুবী] <br class="calibre1"/><br class="calibre1"/>২) আতা ইবন আবী রাবাহ বলেছেন যে, ‘সাবেকীনে আওয়ালীন’ হলেন সে সমস্ত সাহাবায়ে কেরাম যারা বদরের যুদ্ধে অংশগ্রহণ করেছেন। [কুরতুবী] <br class="calibre1"/><br class="calibre1"/>৩) ইমাম শা'বী রাহিমাহুল্লাহ এর মতে যেসব সাহাবী হুদায়বিয়ার বাইয়াতে রিদওয়ানে অংশগ্রহণ করেছিলেন, তারাই সাবেকীন আওয়ালীন। [কুরতুবী] লক্ষণীয় যে, সবার নিকটই যারা কিবলা পরিবর্তনের আগে হিজরত করেছেন তারা নিঃসন্দেহে ‘সাবেকীন আওয়ালীন’। আর যারাই বাই’আতে রিদওয়ান তথা হুদায়বিয়ার পরে হিজরত করেছেন তারা সবার মত অনুযায়ীই মুহাজির হোক বা আনসার সাবেকীনে আওয়ালীনের পর দ্বিতীয় শ্রেণীভুক্ত। তবে প্রাধান্যপ্রাপ্ত মত হচ্ছে যে, হুদাইবিয়ার সন্ধির আগে যারা হিজরত করেছে তারা সবাই ‘সাবেকীনে আওয়ালীন’। [ইবন তাইমিয়্যাহ, মিনহাজুস সুন্নাহ ১/১৫৪-১৫৫] <br class="calibre1"/><br class="calibre1"/>খ) কোনো কোনো মুফাসসির বলেন, এ আয়াতে مِنْ অব্যয়টি আংশিক বুঝানোর উদ্দেশ্যে ব্যবহৃত হয়নি বরং বিবরণের উদ্দেশ্যে ব্যবহৃত হয়েছে। তখন এর মর্ম হবে, সমস্ত সাহাবায়ে কেরাম অন্যান্য সমস্ত উম্মতের তুলনায় সাবেকীনে আওয়ালীন। এ তাফসীরের মর্ম হল, সাহাবায়ে কেরামই হলেন মুসলিমদের মধ্যে সাবেকীনে আওয়ালীন। কারণ, ঈমান আনার ক্ষেত্রে তাঁরাই সমগ্র উম্মতের অগ্রবর্তী ও প্রথম। পরবর্তী কিয়ামত পর্যন্ত সবাই তাবেয়ীন বা তাদের অনুসারী। [ফাতহুল কাদীর] <br class="calibre1"/><br class="calibre1"/>[২] অর্থাৎ যারা আমল ও চরিত্রের ক্ষেত্রে প্রথম পর্যায়ে অগ্রবর্তী মুসলিমদের অনুসরণ করেছে পরিপূর্ণভাবে। উপরোক্ত প্রথম তফসীর অনুযায়ী “যারা ইহসানের সাথে তাদের অনুসরণ করে” বলে হুদায়বিয়ার সন্ধি পরবতী সে সমস্ত সাহাবী এবং মুসলিম, যারা কেয়ামত অবধি ঈমান গ্রহণ, সৎকর্ম ও সচ্চরিত্রের ক্ষেত্রে সাহাবায়ে কেরামের আদর্শের উপর চলবে এবং পরিপূর্ণভাবে তাদের অনুসরণ করবে, তাদের সবাইকে বুঝানো হয়েছে। [কুরতুবী] আর উপরোক্ত দ্বিতীয় তফসীর অনুযায়ী এর দ্বারা সাহাবায়ে কেরামের পরবর্তী মুসলিমগণ অন্তর্ভুক্ত, যাদেরকে পারিভাষাগতভাবে তাবেয়ী' বলা হয়। এরপর পরিভাষাগত এই তাবেয়ীগণের পর কেয়ামত অবধি আগত সে সমস্ত মুসলিমও এর অন্তর্ভুক্ত যারা ঈমান ও সৎকর্মের ক্ষেত্রে পরিপূর্ণভাবে সাহাবায়ে কেরামের আনুগত্য ও অনুসরণ করবে। [ফাতহুল কাদীর]<br class="calibre1"/><br class="calibre1"/>[৩] সাহাবায়ে কেরাম আল্লাহর সন্তুষ্টিপ্রাপ্ত। যদি দুনিয়াতে তাদের কারো দ্বারা কোনো ক্রটি-বিচ্যুতি হয়েও থাকে তবুও। এর প্রমাণ হলো কুরআন কারীমের এ আয়াত। এতে শর্তহীনভাবে সমস্ত সাহাবা সম্পর্কেই বলা হয়েছে যে, <br class="calibre1"/><br class="calibre1"/>(رَّضِیَ اللّٰہُ عَنۡهُمۡ وَ رَضُوۡا عَنۡهُ) <br class="calibre1"/><br class="calibre1"/>অবশ্য তাবেয়ীনদের ব্যাপারে বলেছেন,<br class="calibre1"/><br class="calibre1"/>(وَ الَّذِیۡنَ اتَّبَعُوۡهُمۡ بِاِحۡسَانٍ) <br class="calibre1"/><br class="calibre1"/>“যারা সুন্দরভাবে তাদের অনুসরণ করেছে"। সুতরাং তাবেয়ীনদের ব্যাপারে পূর্ববর্তীদের পরিপূর্ণ সুন্দর অনুসরণের শর্ত আরোপ করা হয়েছে। এতে প্রতীয়মান হয় যে, সাহাবায়ে কেরামের সবাই কোনো রকম শর্ত ছাড়াই আল্লাহ তা'আলার সন্তুষ্টিধন্য। এ ব্যাপারে আরও প্রমাণ হলো, আল্লাহ্ তা’আলার বাণী: <br class="calibre1"/><br class="calibre1"/>(لَقَدۡ رَضِیَ اللّٰہُ عَنِ الۡمُؤۡمِنِیۡنَ اِذۡ یُبَایِعُوۡنَکَ تَحۡتَ الشَّجَرَۃِ) <br class="calibre1"/><br class="calibre1"/>“অবশ্যই আল্লাহ সন্তুষ্ট হয়েছেন মুমিনদের থেকে, যখন তারা গাছের নীচে আপনার হাতে বাই’আত হচ্ছিল।” [সূরা আল-ফাতহ ১৮] অনুরূপভাবে আল্লাহ্ তা'আলা সূরা মুজাদালাহর ২২ নং আয়াতেও সাহাবীগণের প্রশংসা করে তাদের উপর সন্তুষ্টির কথা ঘোষণা করেছেন। এছাড়াও সাহাবায়ে কেরামের জান্নাতী হওয়ার ব্যাপারে আরো স্পষ্ট দলীলের মধ্যে রুয়েছে, আল্লাহ্র বাণী:<br class="calibre1"/><br class="calibre1"/>( لَا یَسۡتَوِی الۡقٰعِدُوۡنَ مِنَ الۡمُؤۡمِنِیۡنَ غَیۡرُ اُولِی الضَّرَرِ وَ الۡمُجٰهِدُوۡنَ فِیۡ سَبِیۡلِ اللّٰہِ بِاَمۡوَالِهِمۡ وَ اَنۡفُسِهِمۡ ؕ فَضَّلَ اللّٰہُ الۡمُجٰهِدِیۡنَ بِاَمۡوَالِهِمۡ وَ اَنۡفُسِهِمۡ عَلَی الۡقٰعِدِیۡنَ دَرَجَةً ؕ وَ کُلًّا وَّعَدَ اللّٰہُ الۡحُسۡنٰی) <br class="calibre1"/><br class="calibre1"/>“মুমিনদের মধ্যে যারা অক্ষম নয় অথচ ঘরে বসে থাকে ও যারা আল্লাহর পথে স্বীয় ধন-প্রাণ দ্বারা জিহাদ করে তারা সমান নয়। যারা স্বীয় ধন-প্রাণ দ্বারা জিহাদ করে আল্লাহ তাদেরকে, যারা ঘরে বসে থাকে তাদের উপর মর্যাদা দিয়েছেন; তাদের প্রত্যেকের জন্য আল্লাহ হুসনা’ বা সবচেয়ে ভাল পরিণামের ওয়াদা করেছেন।” [সূরা আন-নিসা ৯৫] অনুরূপভাবে আল্লাহ্ তা'আলা অন্যত্র আরো বলেন, <br class="calibre1"/><br class="calibre1"/>(لَا یَسۡتَوِیۡ مِنۡکُمۡ مَّنۡ اَنۡفَقَ مِنۡ قَبۡلِ الۡفَتۡحِ وَ قٰتَلَ ؕ اُولٰٓئِکَ اَعۡظَمُ دَرَجَةً مِّنَ الَّذِیۡنَ اَنۡفَقُوۡا مِنۡۢ بَعۡدُ وَ قٰتَلُوۡا ؕ وَ کُلًّا وَّعَدَ اللّٰہُ الۡحُسۡنٰی) <br class="calibre1"/><br class="calibre1"/>“তোমাদের মধ্যে যারা ফাতহ তথা হুদায়বিয়ার সন্ধির আগে ব্যয় করেছে ও যুদ্ধ করেছে, তারা এবং পরবর্তীরা সমান নয়। তারা মর্যাদায় শ্রেষ্ঠ তাদের চেয়ে, যারা পরবর্তী কালে ব্যয় করেছে ও যুদ্ধ করেছে। তবে আল্লাহ উভয়ের জান্নাতের প্রতিশ্রুতি দিয়েছেন। [সূরা আল-হাদীদ ১০] এতে বিস্তারিত এভাবে বলে দেয়া হয়েছে যে, সাহাবায়ে কেরাম প্রাথমিক পর্যায়ের হোন কিংবা পরবতী পর্যায়ের, আল্লাহ্ তা'আলা তাঁদের সবার জন্যই জান্নাতের ওয়াদা করেছেন। </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__101_6" class="block_1"><span class="text_1">আয়াত: ১০১ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَمِمَّنۡ حَوۡلَكُم مِّنَ ٱلۡأَعۡرَابِ مُنَٰفِقُونَۖ وَمِنۡ أَهۡلِ ٱلۡمَدِينَةِ مَرَدُواْ عَلَى ٱلنِّفَاقِ لَا تَعۡلَمُهُمۡۖ نَحۡنُ نَعۡلَمُهُمۡۚ سَنُعَذِّبُهُم مَّرَّتَيۡنِ ثُمَّ يُرَدُّونَ إِلَىٰ عَذَابٍ عَظِيمٖ </span></p>
<h2 class="block_4"><span class="text_1">আর মরুবাসীদের মধ্যে যারা তোমাদের আশপাশে আছে তাদের কেউ কেউ মুনাফেক এবং মদীনাবাসীদের মধ্যেও কেউ কেউ, তারা মুনাফেকীতে চরমে পৌছে গেছে। আপনি তাদেরকে জানেন না [১]; আমরা তাদেরকে জানি। অচিরেই আমরা তাদেরকে দু’বার শাস্তি দেব তারপর তাদেরকে মহাশাস্তির দিকে প্রত্যাবর্তন করানো হবে।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] অন্য আয়াতে আল্লাহ বলেছেন যে, <br class="calibre1"/><br class="calibre1"/>(وَ لَوۡ نَشَآءُ لَاَرَیۡنٰکَهُمۡ فَلَعَرَفۡتَهُمۡ بِسِیۡمٰهُمۡ ؕ وَ لَتَعۡرِفَنَّهُمۡ فِیۡ لَحۡنِ الۡقَوۡلِ ) <br class="calibre1"/><br class="calibre1"/>“আর আমরা ইচ্ছে করলে আপনাকে তাদের পরিচয় দিতাম; ফলে আপনি তাদের লক্ষণ দেখে তাদেরকে চিনতে পারতেন। তবে আপনি অবশ্যই কথার ভংগিতে তাদেরকে চিনতে পারবেন।" [সূরা মুহাম্মাদ ৩০] এবং বিভিন্ন হাদীসে যে এসেছে, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম হুযইফা রাদিয়াল্লাহু আনহুকে ১৪ বা ১৫ জনের নাম জানিয়ে দিয়েছেন সেটার সাথে এ আয়াতের কোনো দ্বন্ধ নেই। কারণ, সূরা মুহাম্মাদের আয়াতে তাদের চিহ্ন বলে দেয়া উদ্দেশ্য, সবাইকে জানা নয়। অনুরূপভাবে হাদীসে রাসূলুল্লাহ্ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম হুযাইফা রাদিয়াল্লাহু আনহুকে যাদের নাম জানিয়েছেন তা দ্বারাও এটা সাব্যস্ত হচ্ছে না যে, তিনি সবার নাম ও পরিচয় পরিপূর্ণভাবে জানতেন। [ইবন কাসীর] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__102_6" class="block_1"><span class="text_1">আয়াত: ১০২ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَءَاخَرُونَ ٱعۡتَرَفُواْ بِذُنُوبِهِمۡ خَلَطُواْ عَمَلٗا صَٰلِحٗا وَءَاخَرَ سَيِّئًا عَسَى ٱللَّهُ أَن يَتُوبَ عَلَيۡهِمۡۚ إِنَّ ٱللَّهَ غَفُورٞ رَّحِيمٌ </span></p>
<h2 class="block_4"><span class="text_1">আর অপর কিছু লোক আছে নিজেদের অপরাধ স্বীকার করেছে, তারা এক সৎকাজের সাথে অন্য অসৎকাজ মিশিয়ে ফেলেছে; আল্লাহ্ হয়ত তাদেরকে ক্ষমা করবেন [১]; নিশ্চয় আল্লাহ্ ক্ষমাশীল, পরম দয়ালু।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] যে দশজন মুমিন বিনা ওযরে তাবুক যুদ্ধে অংশগ্রহণে বিরত ছিলেন তাঁদের সাত জন মসজিদের খুঁটির সাথে নিজেদের বেঁধে নিয়ে মনের অনুতাপ অনুশোচনার প্রকাশ ঘটিয়েছেন। এদের উল্লেখ রয়েছে এ আয়াতে। ইবন আব্বাস রাদিয়াল্লাহু আনহুমা এ আয়াতের তাফসীরে বলেন, দশজন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের সাথে তাবুকের যুদ্ধে অংশগ্রহণ করেনি। এদের মধ্যে সাতজন নিজেদেরকে মসজিদের খুঁটির সাথে বেঁধে রেখেছিল। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম মসজিদে এসে জিজ্ঞেস করলেন, এরা কারা, যারা নিজেদেরকে খুঁটির সাথে বেঁধেছে? সাহাবায়ে কিরাম বললেন, এরা আবু লুবাবা ও তার কিছু সার্থী। যারা আপনার সাথে যাওয়া থেকে পিছনে ছিল। তারা নিজেদেরকে নিজেরা বেঁধে নিয়েছে এ বলে যে, যে পর্যন্ত রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম নিজে আমাদের বাঁধন খুলে দিবেন এবং আমাদের ওযর কবুল করবেন, ততক্ষণ আমাদেরকে যেন কেউ না খুলে দেয়। তখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম বললেন, আমিও তাদের বাঁধন খুলব না, তাদের ওযর গ্রহণ করবো না, যতক্ষণ না আল্লাহ নিজেই তাদের ছেড়ে দেন বা ওযর গ্রহণ করেন। তারা আমার থেকে বিমুখ ছিল, মুসলিমদের সাথে যুদ্ধ করতে যায়নি। যখন তাদের কাছে এ কথা পৌছল তারাও বলল, আমরাও আল্লাহর শপথ নিজেদেরকে ছাড়িয়ে নেব না, যতক্ষণ পর্যন্ত আল্লাহ আমাদের ছাড়ানোর ব্যবস্থা না করেন। তখন এ আয়াত নাযিল হয়। তখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম তাদের কাছে লোক পাঠিয়ে তাদেরকে ছাড়িয়ে নেন। [আত-তাফসীরুস সহীহ] ঘটনা যদিও সুনির্দিষ্ট তথাপি এর দাবী ব্যাপক। যারাই ভাল ও মন্দ আমলের মধ্যে সংমিশ্রণ ঘটিয়েছে তাদের ক্ষেত্রেই এ আয়াত প্রযোজ্য। যেমন হাদীসে এসেছে, সামুরা ইবন জুনদুব রাদিয়াল্লাহু আনহু বলেন, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম আমাদেরকে বলেছেন, গত রাত্রে আমার কাছে দুজন এসেছেন, তারা আমাকে উঠালেন, তারপর আমাকে নিয়ে এমন এক নগরীতে নিয়ে গেলেন যার একটি ইট স্বর্ণের অপরটি রৌপ্যের। সেখানে আমরা কিছু লোক দেখলাম, যাদের শরীরের একাংশ এত সুন্দর যত সুন্দর তুমি মনে করতে পার। আর অপর অংশ এত বিশ্রী যত বিশ্রী তুমি মনে করতে পার। তারা দু'জন তাদেরকে বলল, তোমরা ঐ নালাতে গিয়ে পতিত হও। তারা সেখানে পড়ল। তারপর যখন তারা আমাদের কাছে আসল, দেখলাম যে, তাদের খারাপ অংশ চলে গেছে, অতঃপর ভীষণ সুন্দর হয়ে গেছে। তারা দু’জন আমাকে বলল, এটা হলো জান্নাতে আদন। আর ওখানেই আপনার স্থান। তারা দু’জন বলল, আর যাদেরকে আপনি অর্ধেক সুন্দর আর বাকী অর্ধেক বিশ্রী দেখেছেন, তারা হচ্ছেন, যারা এক সৎকাজের সাথে অন্য অসৎকাজ মিশিয়ে ফেলেছে।' [বুখারী ৪৬৭৪]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__103_6" class="block_1"><span class="text_1">আয়াত: ১০৩ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">خُذۡ مِنۡ أَمۡوَٰلِهِمۡ صَدَقَةٗ تُطَهِّرُهُمۡ وَتُزَكِّيهِم بِهَا وَصَلِّ عَلَيۡهِمۡۖ إِنَّ صَلَوٰتَكَ سَكَنٞ لَّهُمۡۗ وَٱللَّهُ سَمِيعٌ عَلِيمٌ </span></p>
<h2 class="block_4"><span class="text_1">আপনি তাদের সম্পদ থেকে ‘সদকা’ গ্রহন করুন [১]। এর দ্বারা আপনি তাদেরকে পবিত্র করবেন এবং পরিশোধিত করবেন। আর আপনি তেদের জন্য দো’আ করুন। আপনার দো’আ তো তোদের জন্য প্রশান্তি কর [২]। আর আল্লাহ্ সর্বশ্রোতা, সর্বজ্ঞ।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] মুফাসসিরগণ এ সাদকার প্রকৃতি নির্ধারণ নিয়ে দুটি মত দিয়েছেন। কারও কারও মতে, এ আয়াতে পূর্ববর্তী আয়াতে যাদের তাওবাহ কবুল করা হয়েছে তাদের সদকা গ্রহণ করতে বলা হয়েছে। সেটা ফরয বা নফল যে কোনো সদকা হতে পারে। [ফাতহুল কাদীর] এ মতের সমর্থনে ইবন আববাস রাদিয়াল্লাহু আনহুমা থেকে বর্ণিত আছে যে, যখন পূর্বোক্ত লোকদের তাওবা কবুল করা হয়, তখন তারা তাদের সম্পদ নিয়ে এসে বলল, হে আল্লাহর রাসূল! এগুলো আমাদের সম্পদ, এগুলো গ্রহণ করে আমাদের পক্ষ থেকে সদকা দিন এবং আমাদের জন্য ক্ষমার দো'আ করুন। তিনি বললেন, আমাকে এর নির্দেশ দেয়া হয়নি। তখন এ আয়াত নাযিল হয়। [আত-তাফসীরুস সহীহ] তবে অধিকাংশের মতে, নির্দেশটি ব্যাপক, সবার জন্যই প্রযোজ্য। তবে সেটা ফরয সদকা বা যাকাতের ক্ষেত্রে প্রযোজ্য। [ফাতহুল কাদীর] এ মতের সমর্থনে বেশ কিছু হাদীস রয়েছে, যাতে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম যাকাত প্রদানকারীদের জন্য দোআ করেছেন।<br class="calibre1"/><br class="calibre1"/>[২] রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম এ নির্দেশ মোতাবেক সাহাবীদের মধ্যে কেউ যাকাত নিয়ে আসলে তাদের পরিবারের জন্য দোআ করতেন। আবদুল্লাহ ইবন আবি আওফা বলেন, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের কাছে কোনো সম্প্রদায়ের লোকেরা যাকাত নিয়ে আসলে তিনি বলতেন, আল্লাহুম্মা সাল্লে আলা আলে ফুলান’। (হে আল্লাহ! অমুকের বংশধরের জন্য সালাত প্রেরণ করুন) অতঃপর আমার পিতা তার কাছে যাকাত নিয়ে আসলে তিনি দো'আ করলেন, আল্লাহুম্মা সাল্লে 'আলা আলে আবি আওফা"। (হে আল্লাহ! আবু আওফার বংশধরের জন্য সালাত প্রেরণ করুন) [বুখারী ১৪৯৭] অন্য বর্ণনায় এসেছে, জাবের রাদিয়াল্লাহু আনহু বলেন, এক মহিলা এসে বলল, হে আল্লাহর রাসূল, আপনি আমার ও আমার স্বামীর জন্য দোআ করুন। তখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম বললেন, সাল্লাল্লাহু আলাইকে ওয়া 'আলা যাওজিকে’। (আল্লাহ তোমার ও তোমার স্বামীর জন্য সালাত প্রেরণ করুন)। [আবু দাউদ ১৫৩৩]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__104_6" class="block_1"><span class="text_1">আয়াত: ১০৪ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">أَلَمۡ يَعۡلَمُوٓاْ أَنَّ ٱللَّهَ هُوَ يَقۡبَلُ ٱلتَّوۡبَةَ عَنۡ عِبَادِهِۦ وَيَأۡخُذُ ٱلصَّدَقَٰتِ وَأَنَّ ٱللَّهَ هُوَ ٱلتَّوَّابُ ٱلرَّحِيمُ </span></p>
<h2 class="block_4"><span class="text_1">তারা কি জানে না যে, নিশ্চয় আল্লাহ্ তাঁর বান্দাদের তাওবাহ্ কবুল করেন এবং ‘সদকা’ গ্রহণ করেন [১], আর নিশ্চয় আল্লাহ্ তাওবা কবুলকারী, পরম দয়ালু?</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] হাদীসে এসেছে, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম বলেছেন, ‘তোমাদের কেউ যখন তার সম্পূর্ণ পবিত্র সম্পদ থেকে কোনো একটি খেজুর সদকা করে তখন সেটি আল্লাহ নিজ ডান হাতে গ্রহণ করেন, তারপর সেটা আল্লাহর হাতে এমনভাবে বেড়ে উঠে যে পাহাড়ের মত প্রকাণ্ড হয়ে পড়ে।’ [মুসলিম ১০১৪]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__105_6" class="block_1"><span class="text_1">আয়াত: ১০৫ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَقُلِ ٱعۡمَلُواْ فَسَيَرَى ٱللَّهُ عَمَلَكُمۡ وَرَسُولُهُۥ وَٱلۡمُؤۡمِنُونَۖ وَسَتُرَدُّونَ إِلَىٰ عَٰلِمِ ٱلۡغَيۡبِ وَٱلشَّهَٰدَةِ فَيُنَبِّئُكُم بِمَا كُنتُمۡ تَعۡمَلُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর বলুন, ‘তোমরা কাজ করতে থাক, আল্লাহ্ তো তোমাদের কাজকর্ম দেখবেন এবং তাঁর রাসূল ও মুমিনগণও। আর অচিরেই তোমাদেরকে ফিরিয়ে নেয়া হবে গায়েব ও প্রকাশ্যের জ্ঞানীর নিকট, অতঃপর তিনি তোমরা যা করতে তা তোমাদেরকে জানিয়ে দেবেন।‘</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__106_6" class="block_1"><span class="text_1">আয়াত: ১০৬ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَءَاخَرُونَ مُرۡجَوۡنَ لِأَمۡرِ ٱللَّهِ إِمَّا يُعَذِّبُهُمۡ وَإِمَّا يَتُوبُ عَلَيۡهِمۡۗ وَٱللَّهُ عَلِيمٌ حَكِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">আর আল্লাহর আদেশের প্রতীক্ষায় অপর কিছু সংখ্যক সম্পর্কে সিদ্ধান্ত পিছিয়ে দেয়া হল--- তিনি তাদেরকে শাস্তি দেবেন, না ক্ষমা করবেন [১]। আর আল্লাহ্ সর্বজ্ঞ, প্রজ্ঞাময়।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এখানে পূর্বোল্লিখিত দশ জন সাহাবী যারা তাবুকের যুদ্ধে অংশ নেয়নি এবং মসজিদের স্তম্ভের সাথে নিজেদের বেঁধে নেয়নি এমন বাকী তিন জনের হুকুম রয়েছে। এ আয়াত নাযিল করে তাদের ব্যাপারে সিদ্ধান্ত পিছিয়ে দেয়া হয়েছিল। এক বছর পর্যন্ত তাদের এ অবস্থা ছিল। তাদেরকে কি শাস্তি দেয়া হবে, নাকি তাদের তাওবা কবুল করা হবে তা তারা জানে না। [আত-তাফসীরুস সহীহ] রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম তাঁদের সমাজচ্যুত করার, এমনকি তাঁদের সাথে সালাম-দোয়ার আদান প্রদান পর্যন্ত বন্ধ রাখার নির্দেশ দেন। এ ব্যবস্থা নেয়ার পর তাদের অবস্থা শোধরে যায় এবং তারা এখলাসের সাথে অপরাধ স্বীকার করে তাওবাহ করে নেন। ফলে তাদের জন্য ক্ষমার আদেশ দেয়া হয়, যার আলোচনা অচিরেই আসবে।</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__107_6" class="block_1"><span class="text_1">আয়াত: ১০৭ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَٱلَّذِينَ ٱتَّخَذُواْ مَسۡجِدٗا ضِرَارٗا وَكُفۡرٗا وَتَفۡرِيقَۢا بَيۡنَ ٱلۡمُؤۡمِنِينَ وَإِرۡصَادٗا لِّمَنۡ حَارَبَ ٱللَّهَ وَرَسُولَهُۥ مِن قَبۡلُۚ وَلَيَحۡلِفُنَّ إِنۡ أَرَدۡنَآ إِلَّا ٱلۡحُسۡنَىٰۖ وَٱللَّهُ يَشۡهَدُ إِنَّهُمۡ لَكَٰذِبُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর যারা মসজিদ নির্মাণ করেছে ক্ষতিসাধন [১], কুফরী ও মুমিনদের মধ্যে বিভেদ সৃষ্টির উদ্দেশ্যে এবং এর আগে আল্লাহ্ ও তাঁর রাসূলের বিরুদ্ধে যে লড়াই করেছে তার গোপন ঘাটিস্বরূপ ব্যবহারের উদ্দেশ্যে [২], আর তারা অবশই শপথ করবে, ‘আমরা কেবল ভালো চেয়েছি;’ আর আল্লাহ্ সাক্ষ্য দিচ্ছেন যে, অবশ্যই তারা মিথ্যাবাদী।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] মদীনায় আবু ‘আমের নামের এক ব্যক্তি জাহেলী যুগে নাসারা ধর্ম গ্রহণ করে আবু ’আমের পাদ্রী নামে খ্যাত হলো। তার পুত্র ছিলেন বিখ্যাত সাহাবী হানযালা রাদিয়াল্লাহু আনহু যার লাশকে ফেরেশতাগণ গোসল দিয়েছিলেন। কিন্তু পিতা নিজের গোমরাহী ও নাসারাদের দীনের উপরই ছিল। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম হিজরত করে মদীনায় উপস্থিত হলে আবু আমের তার কাছে উপস্থিত হয় এবং ইসলামের বিরুদ্ধে নানা অভিযোগ উত্থাপন করে। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম তার অভিযোগের জবাব দান করেন। কিন্তু তাতে সেই হতভাগার সান্তনা আসলো না। তদুপরি সে বলল, ‘আমাদের দু’জনের মধ্যে যে মিথ্যুক সে যেন অভিশপ্ত ও আত্মীয়-স্বজন থেকে বিচ্ছিন্ন হয়ে মৃত্যুবরণ করে। সে একথাও বলল যে, আপনার যে কোনো প্রতিপক্ষের সাহায্য আমি করে যাবো। সে মতে হুনাইন যুদ্ধ পর্যন্ত সকল রণাঙ্গনে সে মুসলিমদের বিপরীতে অংশ নেয়। হাওয়াযেনের মত সুবৃহৎ শক্তিশালী গোত্রও যখন মুসলিমদের কাছে পরাজিত হলো, তখন সে নিরাশ হয়ে সিরিয়ায় চলে গেল। [বাগভী] কারণ, তখন এটি ছিল নাসারাদের কেন্দ্রস্থল। <br class="calibre1"/><br class="calibre1"/>এ ষড়যন্ত্রের শুরুতে সে মদীনার পরিচিত মুনাফিকদের কাছে চিঠি লিখে যে, “রোম সম্রাট কর্তৃক মদীনা অভিযানের চেষ্টায় আমি আছি। কিন্তু যথা সময় সম্রাটের সাহায্য হয় এমন কোনো সম্মিলিত শক্তি তোমাদের থাকা চাই। এর পন্থা হলো এই যে, তোমরা মদীনায় মসজিদের নাম দিয়ে একটি গৃহ নিৰ্মাণ কর, যেন মুসলিমদের অন্তরে কোনো সন্দেহ না আসে। তারপর সে গৃহে নিজেদের সংগঠিত কর এবং যতটুকু সম্ভব যুদ্ধের সাজ-সরঞ্জাম সংগ্রহ করে সেখানে রাখ এবং পারস্পরিক আলোচনা ও পরামর্শের পর মুসলিমদের বিরুদ্ধে কর্মপন্থা গ্রহণ কর। তারপর আমি রোম সম্রাটকে নিয়ে এসে মুহাম্মাদ ও তার সাথীদের উৎখাত করব।” [তাবারী]<br class="calibre1"/><br class="calibre1"/>তার এ পত্রের ভিত্তিতে বার জন মুনাফিক মদীনার কুবা মহল্লায়, যেখানে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম হিজরত করে এসে অবস্থান নিয়েছিলেন এবং একটি মসজিদ নির্মাণ করেছিলেন- সেখানে সে মুনাফিকরা আরেকটি মসজিদের ভিত্তি রাখল। [ইবন হিশাম, কুরতুবী; ইবন কাসীর প্রমুখ ঐতিহাসিক ও মুফাসসিরগণ এ বার জনের নাম উল্লেখ করেছেন] তারপর তারা মুসলিমদের প্রতারিত করার উদ্দেশ্যে সিদ্ধান্ত নিল যে, স্বয়ং রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামের দ্বারা এক ওয়াক্ত সালাত সেখানে পড়াবে। এতে মুসলিমগণ নিশ্চিত হবে যে, পুর্বনির্মিত মসজিদের মত এটিও একটি মসজিদ। এ সিদ্ধান্ত মতে তাদের এক প্রতিনিধিদল রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামের দরবারে হাযির হয়ে আরয করে যে, কুবার বর্তমান মসজিদটি অনেক ব্যবধানে রয়েছে। দূর্বল ও অসুস্থ লোকদের সে পর্যন্ত যাওয়া দুষ্কর। এছাড়া মসজিদটি এমন প্রশস্তও নয় যে, এলাকার সকল লোকের সংকুলান হতে পারে। তাই আমরা দুর্বল লোকদের সুবিধার্থে অপর একটি মসজিদ নির্মাণ করেছি। আপনি যদি তাতে এক ওয়াক্ত সালাত আদায় করেন, তবে আমরা ধন্য হব। [বাগভী; ইবন কাসীর] <br class="calibre1"/><br class="calibre1"/>রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম তখন তাবুক যুদ্ধের প্রস্তুতিতে ব্যস্ত ছিলেন। তিনি প্রতিশ্রুতি দিলেন যে, এখন সফরের প্রস্তুতিতে আছি। ফিরে এসে সালাত আদায় করব। কিন্তু তাবুক যুদ্ধ থেকে ফেরার পথে যখন তিনি মদীনার নিকটবর্তী এক স্থানে বিশ্রাম নিচ্ছিলেন, তখন মসজিদে দ্বিরার সম্পর্কিত এই আয়াতগুলো নাযিল হয়। এতে মুনাফিকদের ষড়যন্ত্র ফাস করে দেয়া হল। আয়াতগুলো নাযিল হওয়ার পর রাসূলুল্লাহ্ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম কতিপয় সাহাবীকে এ হুকুম দিয়ে পাঠালেন যে, এক্ষুণি গিয়ে কথিত মসজিদটি ধ্বংস কর এবং আগুন লাগিয়ে এসো। আদেশমতে তারা গিয়ে মসজিদটি সমুলে ধ্বংস করে মাটিতে মিশিয়ে দিয়ে আসলেন। [বাগভী; সীরাতে ইবন হিশাম; ইবন কাসীর] <br class="calibre1"/><br class="calibre1"/>[২] এখানে এ মাসজিদ নির্মাণের মোট চারটি উদ্দেশ্য উল্লেখ করা হয়েছে, প্রথমতঃ মুসলিমদের ক্ষতিসাধন। দ্বিতীয়তঃ কুফরী করার জন্য। তৃতীয়তঃ মুসলিমদের মাঝে বিভক্তি সৃষ্টি করা। চতুর্থতঃ সেখানে আল্লাহ ও তাঁর রাসূলের শক্রদের আশ্রয় মিলবে যেন আবু আমের আর-রাহেব এবং তারা বসে বসে ষড়যন্ত্র পাকাতে পারে। [মুয়াসসার]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__108_6" class="block_1"><span class="text_1">আয়াত: ১০৮ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">لَا تَقُمۡ فِيهِ أَبَدٗاۚ لَّمَسۡجِدٌ أُسِّسَ عَلَى ٱلتَّقۡوَىٰ مِنۡ أَوَّلِ يَوۡمٍ أَحَقُّ أَن تَقُومَ فِيهِۚ فِيهِ رِجَالٞ يُحِبُّونَ أَن يَتَطَهَّرُواْۚ وَٱللَّهُ يُحِبُّ ٱلۡمُطَّهِّرِينَ </span></p>
<h2 class="block_4"><span class="text_1">আপনি তাতে কখনো সালাতের জন্য দাঁড়াবেন না [১]; যে মসজিদের ভিত্তি প্রথম দিন থেকেই স্থাপিত হয়েছে তাক্ওয়ার উপর [২], তাই আপনার সালাতের জন্য দাঁড়ানোর বেশী হকদার। সেখানে এমন লোক আছে যারা উত্তমরূপে পবিত্রতা অর্জন ভালবাসে, আর পবিত্রতা অর্জনকারীদেরকে আল্লাহ্ পছন্দ করেন[৩]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামকে সে মসজিদে দাঁড়াতে নিষেধ করা হয়েছে। এখানে দাঁড়ানো থেকে নিষেধ করার অর্থ, আপনি সে মসজিদে কখনো সালাত আদায় করবেন না। [ইবন কাসীর]<br class="calibre1"/><br class="calibre1"/>[২] প্রশংসিত সে মসজিদ কোনটি, তা নির্ণয়ে দু’টি মত রয়েছে: কোনো কোনো মুফাসসির আয়াতের বর্ণনাধারা থেকে সিদ্ধান্ত নিয়েছেন যে, তা হলো মসজিদে কুবা। [ইবন কাসীর; সা’দী] যেখানে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম নিজেও সালাত আদায় করতে আসতেন। [মুসলিম ১৩৯৯] যার কেবলা জিবরীল নির্ধারণ করে দিয়েছিলেন। [আবুদাউদ ৩৩; তিরমিযী ৩১০০; ইবন মাজাহ ৩৫৭] যেখানে সালাত আদায় করলে উমরার সওয়াব হবে বলে ঘোষণা করেছেন। [তিরমিযী ৩২৪; ইবন মাজাহ ১৪১১] হাদীসের কতিপয় বর্ণনা থেকেও এটিই যে তাকওয়ার ভিত্তিতে নির্মিত মসজিদ সে কথার সমর্থন পাওয়া যায়। আবার বিভিন্ন সহীহ হাদীসে এ মসজিদ বলে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামের মসজিদ উল্লেখ করা হয়েছে। [উদাহরণস্বরূপ দেখুন, মুসলিম ১৩৯৮; মুসনাদে আহমাদ ৫/৩৩১] বস্তুতঃ এ দু’য়ের মধ্যে কোনো বিরোধ নেই। কারণ, উভয় মাসজিদই তাকওয়ার উপর ভিত্তি করে প্রতিষ্ঠিত হয়েছে। [কুরতুবী; সা’দী] <br class="calibre1"/><br class="calibre1"/>[৩] এখানে সেই মসজিদকে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামের সালাতের অধিকতর হকদার বলে অভিহিত করা হয়, যার ভিত্তি শুরু থেকেই তাকওয়ার উপর রাখা হয়েছে। সে হিসেবে মসজিদে কুবা ও মসজিদে নববী উভয়টিই এ মর্যাদায় অভিষিক্ত। সে মসজিদেরই ফযীলত বর্ণনা প্রসঙ্গে বলা হয়েছে যে, তথাকার মুসল্লীগণ পাক-পবিত্রতা অর্জনে সবিশেষ যত্নবান। পাক-পবিত্রতা বলতে এখানে সাধারণ না-পাকী ও ময়লা থেকে পাক-পরিচ্ছন্ন হওয়া বুঝায়। আর মসজিদে নববীর মুসল্লীগণ সাধারণতঃ এসব গুণেই গুণান্বিত ছিলেন। এক হাদীসে এসেছে, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম কুবাবাসীদের বললেন, হে আনসার সম্প্রদায়! আল্লাহ পবিত্রতার ব্যাপারে তোমাদের প্রশংসা করেছেন। তোমরা কিভাবে পবিত্র হও? তারা বলল, আমরা সালাতের জন্য অযু করি, জানাবাত থেকে গোসল করি এবং পানি দিয়ে পায়খানা পরিষ্কার করি। [ইবন মাজাহ ৩৫৫]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__109_6" class="block_1"><span class="text_1">আয়াত: ১০৯ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">أَفَمَنۡ أَسَّسَ بُنۡيَٰنَهُۥ عَلَىٰ تَقۡوَىٰ مِنَ ٱللَّهِ وَرِضۡوَٰنٍ خَيۡرٌ أَم مَّنۡ أَسَّسَ بُنۡيَٰنَهُۥ عَلَىٰ شَفَا جُرُفٍ هَارٖ فَٱنۡهَارَ بِهِۦ فِي نَارِ جَهَنَّمَۗ وَٱللَّهُ لَا يَهۡدِي ٱلۡقَوۡمَ ٱلظَّـٰلِمِينَ </span></p>
<h2 class="block_4"><span class="text_1">যে ব্যাক্তি তার ঘরের ভিত্তি আল্লাহ্র তাকওয়া ও সন্তুষ্টির উপর স্থাপন করে সে উত্তম, না ঐ ব্যাক্তি উত্তম যে তার ঘরের ভিত্তি স্থাপন করে এক খাদের ধ্বংসোন্মুখ কিনারে, ফলে যা তাকেসহ জাহান্নামের আগুনে গিয়ে পড়ে? আর আল্লাহ্ যালিম সম্প্রদায়কে হেদায়াত দেন না।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__110_6" class="block_1"><span class="text_1">আয়াত: ১১০ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">لَا يَزَالُ بُنۡيَٰنُهُمُ ٱلَّذِي بَنَوۡاْ رِيبَةٗ فِي قُلُوبِهِمۡ إِلَّآ أَن تَقَطَّعَ قُلُوبُهُمۡۗ وَٱللَّهُ عَلِيمٌ حَكِيمٌ </span></p>
<h2 class="block_4"><span class="text_1">তাদের ঘর যা তারা নির্মাণ করেছে তা তাদের অন্তরে সন্দেহের কারণ হয়ে থাকবে- যে পর্যন্ত না তাদের অন্তর ছিন্ন-বিছিন্ন হয়ে যায়। আর আল্লাহ্ সর্বজ্ঞ, প্রজ্ঞাময়।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__111_6" class="block_1"><span class="text_1">আয়াত: ১১১ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">۞إِنَّ ٱللَّهَ ٱشۡتَرَىٰ مِنَ ٱلۡمُؤۡمِنِينَ أَنفُسَهُمۡ وَأَمۡوَٰلَهُم بِأَنَّ لَهُمُ ٱلۡجَنَّةَۚ يُقَٰتِلُونَ فِي سَبِيلِ ٱللَّهِ فَيَقۡتُلُونَ وَيُقۡتَلُونَۖ وَعۡدًا عَلَيۡهِ حَقّٗا فِي ٱلتَّوۡرَىٰةِ وَٱلۡإِنجِيلِ وَٱلۡقُرۡءَانِۚ وَمَنۡ أَوۡفَىٰ بِعَهۡدِهِۦ مِنَ ٱللَّهِۚ فَٱسۡتَبۡشِرُواْ بِبَيۡعِكُمُ ٱلَّذِي بَايَعۡتُم بِهِۦۚ وَذَٰلِكَ هُوَ ٱلۡفَوۡزُ ٱلۡعَظِيمُ </span></p>
<h2 class="block_4"><span class="text_1">নিশ্চয় আল্লাহ্ মুমিনদের কাছ থেকে তাদের জীবন ও সম্পদ কিনে নিয়েছেন (এর বিনিময়ে) যে, তাদের জন্য আছে জান্নাত। তারা আল্লাহ্র পথে যুদ্ধ করে, অতঃপর তারা মারে ও মরে। তাওরাত, ইনজীল ও কুরআনে এ সম্পর্কে তাদের হক ওয়াদা রয়েছে। আর নিজ প্রতিজ্ঞা পালনে আল্লাহর চেয়ে শ্রেষ্ঠতর কে আছে? সুতরাং তোমরা যে সওদা করেছ সে সওদার জন্য আনন্দিত হও। আর সেটাই তো মহাসাফল্য [১]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] আয়াতের শুরুতে ক্রয় শব্দের ব্যবহার করা হয়। মুসলিমদের বলা হচ্ছে যে, ক্রয় বিক্রয়ের এই সওদা তোমাদের জন্য লাভজনক ও বরকতময়। কেননা, এর দ্বারা অস্থায়ী জান-মালের বিনিময়ের স্থায়ী জান্নাত পাওয়া গেল। মালামাল হলো আল্লাহরই দান। মানুষ শূন্য হাতেই জন্ম নেয়। তারপর আল্লাহ তাকে অর্থ সম্পদের মালিক করেন এবং নিজের দেয়া সে অর্থের বিনিময়েই বান্দাকে জান্নাত দান করেন। তাই উমর রাদিয়াল্লাহু আনহু বলেন, 'এ এক অভিনব বেচা-কেনা, মাল ও মূল্য উভয়ই তোমাদেরকে দিয়ে দিলেন আল্লাহ।’ [বাগভী] হাসান বসরী বলেন, ‘লক্ষ্য কর, এ কেমন লাভজনক সওদা যা আল্লাহ সকল মুমিনের জন্য সুযোগ করে দিয়েছেন।’ [বাগভী; কুরতুবী; ইবন কাসীর] তিনি আরো বলেন, আল্লাহ তোমাদের যে সম্পদ দান করেছেন, তা থেকে কিছু ব্যয় করে জান্নাত ক্রয় করে নাও। [বাগভী] অন্য হাদীসে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম বলেছেন, ‘আল্লাহ ঐ ব্যক্তির জন্য জামিন হয়ে যান যিনি তাঁর রাস্তায় বের হয়। তাকে শুধুমাত্র আমার রাহে জিহাদই এবং আমার রাসূলের উপর বিশ্বাসই বের করেছে। আল্লাহ তার জন্য দায়িত্ব নিয়েছেন যে, যদি সে মারা যায় তবে তাকে জান্নাত দিবেন অথবা সে যা কিছু গনীমতের মাল পেয়েছে এবং সওয়াব পেয়েছে তা সহ তাকে তার সে ঘরে ফিরে পৌঁছিয়ে দিবেন যেখান থেকে বের হয়েছে’। [বুখারী ৩১২৩; মুসলিম ১৮৭৬]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__112_6" class="block_1"><span class="text_1">আয়াত: ১১২</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">ٱلتَّـٰٓئِبُونَ ٱلۡعَٰبِدُونَ ٱلۡحَٰمِدُونَ ٱلسَّـٰٓئِحُونَ ٱلرَّـٰكِعُونَ ٱلسَّـٰجِدُونَ ٱلۡأٓمِرُونَ بِٱلۡمَعۡرُوفِ وَٱلنَّاهُونَ عَنِ ٱلۡمُنكَرِ وَٱلۡحَٰفِظُونَ لِحُدُودِ ٱللَّهِۗ وَبَشِّرِ ٱلۡمُؤۡمِنِينَ </span></p>
<h2 class="block_4"><span class="text_1">তারা [১] তাওবাহকারী, ‘ইবাদাতকারী, আল্লাহ্র প্রশংসাকারী, সিয়াম পালনকারী [২], রুকূ’কারী, সিজদাকারী, সৎকাজের আদেশদাতা, অসৎকাজের নিষেধকারী এবং আল্লাহ্র নির্ধারিত সীমারেখা সংরক্ষণকারী [৩]; আর আপনি মুমিনদেরকে শুভ সংবাদ দিন।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ গুণাবলী হলো সেসব মুমিনের যাদের সম্পর্কে পূর্বের আয়াতে বলা হয়েছে- ‘আল্লাহ্ জান্নাতের বিনিময়ে তাদের জান-মাল খরিদ করে নিয়েছেন।’ আল্লাহ্র রাহে জিহাদকারী সবাই এ আয়াতের মর্মভুক্ত। তবে এখানে যে সমস্ত গুণাবলীর উল্লেখ হয়েছে, তা শর্তরূপে নয়। কারণ, আল্লাহর রাহে কেবল জিহাদের বিনিময়েই জান্নাতের প্রতিশ্রুতি দেয়া হয়েছে। তবে এ গুণাবলী উল্লেখের উদ্দেশ্য এই যে, যারা জান্নাতের উপযুক্ত, তারা এ সকল গুণের অধিকারী হয়। [কুরতুবী]<br class="calibre1"/><br class="calibre1"/>[২] অধিকাংশ মুফাসসিরের মতে আয়াতে উল্লিখিত السائحون দ্বারা উদ্দেশ্য সাওম পালনকারীগণ। [কুরতুবী; ইবন কাসীর] আব্দুল্লাহ ইবন মাসউদ ও আব্দুল্লাহ ইবন আব্বাস রাদিয়াল্লাহু আনহুম বলেন, কুরআন মাজীদে ব্যবহৃত سائحون শব্দের অর্থ সিয়ামপালনকারী। [বাগভী; কুরতুবী] তাছাড়া سائح বলে জিহাদকারীদেরকেও বুঝায়। তবে মূল শব্দটি سياحة যার অর্থ: দেশ ভ্রমণ। বিভিন্ন ধর্মের লোক দেশ ভ্রমণকে ইবাদাত মনে করতো। অর্থাৎ মানুষ পরিবার পরিজন ও ঘর-বাড়ী ত্যাগ করে ধর্ম প্রচার করার উদ্দেশ্যে দেশ দেশান্তরে ঘুরে বেড়াত। ইসলাম একে বৈরাগ্যবাদ বলে অভিহিত করে নিষিদ্ধ ঘোষণা করা হয়েছে। [ইবন কাসীর] এর পরিবর্তে সিয়াম পালনের ইবাদতকে এর স্থলাভিষিক্ত করা হয়েছে। আবার কতিপয় বর্ণনায় জিহাদকেও দেশ ভ্রমনের অনুরূপ বলা হয়। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম বলেন, ‘আমার উম্মতের দেশভ্রমণ হলো জিহাদ ফী সাবীলিল্লাহ।’ [আবুদাউদ ২৪৮৬]<br class="calibre1"/><br class="calibre1"/>[৩] আলোচ্য আয়াতে মুমিন মুজাহিদের আটটি গুণ উল্লেখ করে নবম গুণ হিসেবে বলা হয়েছে, “আর আল্লাহর দেয়া সীমারেখার হেফাযতকারী" মূলতঃ এতে রয়েছে উপরোক্ত সাতটি গুণের সমাবেশ অর্থাৎ সাতটি গুণের মধ্যে যে তাফসীল রয়েছে, তার সংক্ষিপ্ত সার হলো যে, এরা নিজেদের প্রতিটি কর্ম ও কথায় আল্লাহ কর্তৃক নির্ধারিত সীমা তথা শরী’আতের হুকুমের অনুগত ও তার হেফাযতকারী। [আত-তাহরীর ওয়াত তানওয়ীর] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__113_6" class="block_1"><span class="text_1">আয়াত: ১১৩ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">مَا كَانَ لِلنَّبِيِّ وَٱلَّذِينَ ءَامَنُوٓاْ أَن يَسۡتَغۡفِرُواْ لِلۡمُشۡرِكِينَ وَلَوۡ كَانُوٓاْ أُوْلِي قُرۡبَىٰ مِنۢ بَعۡدِ مَا تَبَيَّنَ لَهُمۡ أَنَّهُمۡ أَصۡحَٰبُ ٱلۡجَحِيمِ </span></p>
<h2 class="block_4"><span class="text_1">আত্মীয়-স্বজন হলেও মুশরিকদের জন্য ক্ষমা প্রার্থনা করা নবী ও যারা ঈমান এনেছে তাদের জন্য সংগত নয় যখন এটা সুস্পষ্ট হয়ে গেছে যে, নিশ্চিতই তারা প্রজ্বলিত আগুনের অধিবাসী [১]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] কোনো কোনো বর্ণনায় এসেছে এ আয়াত আবু তালেবের মৃত্যুর সাথে সম্পর্কযুক্ত। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম তার জন্য ক্ষমা প্রার্থনা করছিলেন। তখন এ আয়াত নাযিল হয়। [দেখুন, বুখারী ৪৬৭৫; মুসলিম ২৪] অন্য বর্ণনায় আলী রাদিয়াল্লাহু আনহু থেকে এসেছে, তিনি বলেন, এক লোককে তার পিতা-মাতার জন্য ক্ষমা চাইতে দেখলাম, অথচ তারা ছিল মুশরিক। আমি বললাম, তারা মুশরিক হওয়া সত্বেও তুমি কি তাদের জন্য ক্ষমা প্রার্থনা করছ? সে বলল, ইবরাহীম কি তার পিতার জন্য ক্ষমা প্রার্থনা করেন নি? তখন এ আয়াত নাযিল হয়। [তিরমিযী]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__114_6" class="block_1"><span class="text_1">আয়াত: ১১৪ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَمَا كَانَ ٱسۡتِغۡفَارُ إِبۡرَٰهِيمَ لِأَبِيهِ إِلَّا عَن مَّوۡعِدَةٖ وَعَدَهَآ إِيَّاهُ فَلَمَّا تَبَيَّنَ لَهُۥٓ أَنَّهُۥ عَدُوّٞ لِّلَّهِ تَبَرَّأَ مِنۡهُۚ إِنَّ إِبۡرَٰهِيمَ لَأَوَّـٰهٌ حَلِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">আর ইবরাহীম তাঁর পিতার জন্য ক্ষমা প্রার্থনা করেছিল, তাকে এর প্রতিশ্রুতি দিয়েছিল বলে; তারপর যখন এটা তার কাছে সুস্পষ্ট হল যে, সে আল্লাহ্র শত্রু তখন ইবরাহীম তার সম্পর্ক ছিন্ন করলেন। ইবরাহীম তো কোমল হৃদয় [১] ও সহনশীল।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] اواه শব্দটির অর্থ নির্ধারণে কয়েকটি মত এসেছে। ইবন মাসউদ ও উবাইদ ইবন উমায়রের মতে এর অর্থ, বেশী বেশী প্রার্থনাকারী। হাসান ও কাতাদা বলেন, এর অর্থ আল্লাহর বান্দাদের প্রতি বেশী দরদী। ইবন আব্বাস বলেন, এটি হাবশী ভাষায় মুমিনকে বোঝায়। কালবী বলেন, এর অর্থ যিনি জনমানবশূণ্য ভূমিতে আল্লাহকে আহবান করে। কারও কারও মতে, বেশী বেশী যিকিরকারী। কারও কারও মতে, ফকীহ। আবার কারও কারও মতে বিনয়ী ও বিনম্র। কারও কারও মতে, এর অর্থ এমন ব্যক্তি যে নিজের গোনাহের কথা স্মরণ হলেই ক্ষমা প্রার্থনা করতে থাকে। কারও কারও মতে এর অর্থ, যিনি আল্লাহ যা অপছন্দ করেন তা থেকে সর্বদা প্রত্যাবর্তন করতে থাকে। কারও কারও মতে এর অর্থ, যিনি কল্যাণের কথা মানুষদের শিক্ষা দেন। তবে এ শব্দটির মূল অর্থ যে বেশী বেশী আহ্ আহ্ বলে কোন গোনাহ হয়ে গেলে আফসোস করতে থাকে। মনে ব্যথা অনুভব হতে থাকে এবং এর জন্য তার মন থেকে আফসোসের শব্দ হতে থাকে। [ফাতহুল কাদীর] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__115_6" class="block_1"><span class="text_1">আয়াত: ১১৫ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَمَا كَانَ ٱللَّهُ لِيُضِلَّ قَوۡمَۢا بَعۡدَ إِذۡ هَدَىٰهُمۡ حَتَّىٰ يُبَيِّنَ لَهُم مَّا يَتَّقُونَۚ إِنَّ ٱللَّهَ بِكُلِّ شَيۡءٍ عَلِيمٌ </span></p>
<h2 class="block_4"><span class="text_1">আর আল্লাহ্ এমন নন যে, তিনি কোনো সম্প্রদায়কে হিদায়াত দানের পর তাদেরকে বিভ্রান্ত করবেন--- যতক্ষণ না তাদের জন্য সুস্পষ্টভাবে বর্ণনা করবেন, যা থেকে তারা তাক্ওয়া অবলম্বন করবে তা; নিশ্চয় আল্লাহ্ সবকিছু সম্পর্কে সর্বজ্ঞ।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__116_6" class="block_1"><span class="text_1">আয়াত: ১১৬ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">إِنَّ ٱللَّهَ لَهُۥ مُلۡكُ ٱلسَّمَٰوَٰتِ وَٱلۡأَرۡضِۖ يُحۡيِۦ وَيُمِيتُۚ وَمَا لَكُم مِّن دُونِ ٱللَّهِ مِن وَلِيّٖ وَلَا نَصِيرٖ </span></p>
<h2 class="block_4"><span class="text_1">নিশ্চয় আল্লাহ্, আসমান ও যমীনের মালিকানা তাঁরই; তিনি জীবন দান করেন এবং তিনি মৃত্যু ঘটান। আর আল্লাহ্ ছাড়া তোমাদের কোনো অভিভাবক নেই, সাহায্যকারীও নেই।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__117_6" class="block_1"><span class="text_1">আয়াত: ১১৭ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">لَّقَد تَّابَ ٱللَّهُ عَلَى ٱلنَّبِيِّ وَٱلۡمُهَٰجِرِينَ وَٱلۡأَنصَارِ ٱلَّذِينَ ٱتَّبَعُوهُ فِي سَاعَةِ ٱلۡعُسۡرَةِ مِنۢ بَعۡدِ مَا كَادَ يَزِيغُ قُلُوبُ فَرِيقٖ مِّنۡهُمۡ ثُمَّ تَابَ عَلَيۡهِمۡۚ إِنَّهُۥ بِهِمۡ رَءُوفٞ رَّحِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">আল্লাহ্ অবশ্যই নবী, মুহাজির ও আনসারদের তাওবা কবুল করলেন, যারা তার অনুসরণ করেছিল সংকটময় মুহূর্তে [১]- তাদের এক দলের হৃদয় সত্যচুত হওয়ার উপক্রম হবার পর। তারপর আল্লাহ্ তাদের তাওবা কবুল করলেন; নিশ্চয় তিনি তাদের প্রতি অতি স্নেহশীল, পরম দয়ালু।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] কুরআন মাজীদ তাবুক যুদ্ধের সময়টিকে ‘সঙ্কটকময় মুহুর্ত’ বলে অভিহিত করেছে। কারণ, সে সময় মুসলিমরা বড় অভাব-অনটনে ছিলেন। সে সময় তাদের পর্যাপ্ত বাহন ছিল না। দশ জনের জন্য ছিল একটি মাত্র বাহন, যার উপর পালা করে তাঁরা আরোহণ করতেন। তদুপরি সফরের সম্বলও ছিল অত্যন্ত অপ্রতুল। অন্যদিকে ছিল গ্রীষ্মকাল, পানিও ছিল পথের মাত্র কয়েকটি স্থানে এবং তাও অতি অল্প পরিমাণে। এমনকি কখনও কখনও একটি খেজুর দু’জনে ভাগ করে নিতেন। কখনও আবার খেজুর শুধু চুষে নিতেন। তাই আল্লাহ তাদের তাওবা কবুল করেছেন, তাদের ক্রটিসমূহ মার্জনা করেছেন। [ইবন কাসীর] এ যুদ্ধের অবস্থা সম্পর্কে ইবন আব্বাস উমর রাদিয়াল্লাহু আনহুকে জিজ্ঞেস করলে তিনি বলেন, আমরা প্রচণ্ড গরমের মধ্যে তাবুকের যুদ্ধে বের হলাম। আমরা এক স্থানে অবস্থান নিলাম। আমাদের পিপাসার বেগ প্রচণ্ড হল। এমনকি আমরা মনে করছিলাম যে, আমাদের ঘাড় ছিড়ে যাবে। এমনকি কোনো কোনো লোক পানির জন্য বের হয়ে ফিরে আসত, কিন্তু কিছুই পেত না। তখন পিপাসায় তার ঘাড় ছিড়ে যাওয়ার উপক্রম হতো। এমনকি কোনো কোনো লোক তার উট যবাই করে সেটার ভূড়ি নিংড়ে তা পান করত। আর কিছু বাকী থাকলে সেটা কলজের উপর বেঁধে রাখত। তখন আবু বকর রাদিয়াল্লাহু আনহু বললেন, হে আল্লাহর রাসূল! আমরা তো দেখেছি, আপনি আল্লাহর কাছে দোআ করলে কল্যাণ লাভ করি। সুতরাং আপনি আমাদের জন্য দোআ করুন। তিনি বললেন, তুমি কি তা চাও? আবু বকর বললেন, হ্যাঁ। তখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম তার দু' হাত উঠালেন। হাত গোটানোর আগেই একখণ্ড মেঘ আমাদের ছায়া দিল এবং সেখান থেকে বৃষ্টি পড়ল। সবাই তাদের সাথে যা ছিল তা পূর্ণ করে নিল। তারপর আমরা অবস্থা দেখতে গেলাম, দেখলাম যে, আমাদের সেনাবাহিনীর বাইরে আর কোনো বৃষ্টি নেই। [ইবন হিব্বান ১৩৮৩]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__118_6" class="block_1"><span class="text_1">আয়াত: ১১৮ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَعَلَى ٱلثَّلَٰثَةِ ٱلَّذِينَ خُلِّفُواْ حَتَّىٰٓ إِذَا ضَاقَتۡ عَلَيۡهِمُ ٱلۡأَرۡضُ بِمَا رَحُبَتۡ وَضَاقَتۡ عَلَيۡهِمۡ أَنفُسُهُمۡ وَظَنُّوٓاْ أَن لَّا مَلۡجَأَ مِنَ ٱللَّهِ إِلَّآ إِلَيۡهِ ثُمَّ تَابَ عَلَيۡهِمۡ لِيَتُوبُوٓاْۚ إِنَّ ٱللَّهَ هُوَ ٱلتَّوَّابُ ٱلرَّحِيمُ </span></p>
<h2 class="block_4"><span class="text_1">আর তিনি তাওবা কবুল করলেন অন্য তিনজনেরও [১], যাদের সম্পর্কে সিদ্ধান্ত স্থগিত রাখা হয়েছিল, যে পর্যন্ত না যমীন বিস্তৃত হওয়া সত্ত্বেও তাদের জন্য সেটা সংকুচিত হয়েছিল এবং তাদের জীবন তাদের জন্য দুর্বিষহ হয়েছিল আর তারা নিশ্চিত উপলব্ধি করেছিল যে, আল্লাহর পাকড়াও থেকে বাঁচার জন্য তিনি ছাড়া আর কোনো আশ্রয়স্থল নেই। তারপর তিনি তাদের তাওবাহ্ কবুল করলেন যাতে তারা তাওবায় স্থির থাকে। নিশ্চয় আল্লাহ্ অধিক তাওবা কবুলকারী, পরম দয়ালু।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এরা তিন জন হলেন কা'আব ইবন মালেক, মুরারা ইবন রবি এবং হেলাল ইবন উমাইয়া রাদিয়াল্লাহু আনহুম তাঁরা তিনজনই ছিলেন আনসারদের শ্রদ্ধাভাজন ব্যক্তি। যাঁরা ইতিপূর্বে বাই’আতে আকাবা ও রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামের সাথে বিভিন্ন জিহাদে শরীক হয়েছিলেন। কিন্তু এ সময় ঘটনাচক্রে তাঁদের বিচ্যুতি ঘটে যায়। অন্যদিকে যে মুনাফিকরা কপটতার দরুন এ যুদ্ধে শরীক হয়নি, তারা তাঁদের কু-পরামর্শ দিয়ে দুর্বল করে তুললো তারপর যখন রাসূল সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম জিহাদ থেকে ফিরে আসলেন, তখন মুনাফিকরা নানা অজুহাত দেখিয়ে ও মিথ্যা শপথ করে তাঁকে সন্তুষ্ট করতে চাইল আর রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামও তাদের গোপন অবস্থাকে আল্লাহর সোপর্দ করে তাদের মিথ্যা শপথেই আশ্বস্ত হলেন, ফলে তারা দিব্যি আরামে সময় অতিবাহিত করে চলে আর ঐ তিন সাহাবীকে পরামর্শ দিতে লাগল যে, আপনারাও মিথ্যা অজুহাত দেখিয়ে রাসূল সাল্লাল্লাহু আলাইহি ওয়াসাল্লামকে আশ্বস্ত করুন। কিন্তু তাঁদের বিবেক সায় দিল না। কারণ, প্রথম অপরাধ ছিল জিহাদ থেকে বিরত থাকা, দ্বিতীয় অপরাধ আল্লাহর নবীর সামনে মিথ্যা বলা, যা কিছুতেই সম্ভব নয়। তাই তাঁরা পরিস্কার ভাষায় তাদের অপরাধ স্বীকার করে নিলেন যে অপরাধের সাজা স্বরূপ তাদের সমাজচ্যুতির আদেশ দেয়া হয়। আর এদিকে কুরআন মাজীদ সকল গোপন রহস্য উদঘাটন এবং মিথ্যা শপথ করে অজুহাত সৃষ্টিকারীদের প্রকৃত অবস্থাও ফাস করে দেয়। অত্র সুরার ৯৪ থেকে ৯৮ আয়াত পর্যন্ত রয়েছে এদের অবস্থাও নির্মম পরিণতির বর্ণনা। কিন্তু যে তিন জন সাহাবী মিথ্যার আশ্রয় না নিয়ে অপরাধ স্বীকার করেছেন, এ আয়াতটি তাঁদের তাওবাহ কবুল হওয়ার ব্যাপারে নাযিল হয়। ফলে দীর্ঘ পঞ্চাশ দিন এহেন দুৰ্বিসহ অবস্থা ভোগের পর তারা আবার আনন্দিত মনে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম ও সাহাবায়ে কেরামের সাথে মিলিত হন। [এ ঘটনাটি বিস্তারিতভাবে তাবারী; বাগভী; ইবন কাসীর প্রমূখগণ বর্ণনা করেছেন]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__119_6" class="block_1"><span class="text_1">আয়াত: ১১৯ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">يَـٰٓأَيُّهَا ٱلَّذِينَ ءَامَنُواْ ٱتَّقُواْ ٱللَّهَ وَكُونُواْ مَعَ ٱلصَّـٰدِقِينَ </span></p>
<h2 class="block_4"><span class="text_1">হে ইমানদারগণ! তোমরা আল্লাহ্র তাকওয়া অবলম্বন কর এবং সত্যবাদীদের সাথে থাক [১]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] পূর্ববর্তী আয়াতসমূহে জিহাদ থেকে বিরত থাকায় যে ক্রটি কতিপয় নিষ্ঠাবান সাহাবীর দ্বারাও হয়ে গেল এবং পরে তাঁদের তাওবাহ কবুল হলো, এ ছিল তাঁদের তাকওয়ারই ফলশ্রুতি। তাই এ আয়াতের মাধ্যমে সমস্ত মুসলিমকে তাকওয়া অবলম্বনের নির্দেশ দেয়া হয়েছে। আর “তোমরা সবাই সত্যবাদীদের সাথে থাক” বাক্যে ইঙ্গিত করা হয়েছে যে, সত্যবাদীদের সাহচর্য এবং তাদের অনুরূপ আমলের মাধ্যমেই তাকওয়া লাভ হয়। আর এভাবেই কেউ ধ্বংস থেকে মুক্তি পেতে পারে। প্রতিটি বিপদ থেকে উদ্ধার হতে পারে। [ইবন কাসীর] হাদীসেও সত্যবাদিতার গুরুত্ব বর্ণিত হয়েছে। রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম বলেন, “তোমরা সত্যবাদিতা অবলম্বন কর; কেননা সত্যবাদিতা সৎকাজের দিকে নিয়ে যায়, আর সৎকাজ জান্নাতের পথনির্দেশ করে। মানুষ সত্য বলতে থাকে এবং সত্য বলতে চেষ্টা করতে থাকে শেষ পর্যন্ত আল্লাহর দরবারে তাকে সত্যবাদী হিসেবে লিখা হয়। আর তোমরা মিথ্যা থেকে বেঁচে থাক; কেননা মিথ্যা পাপের পথ দেখায়, আর পাপ জাহান্নামের দিকে নিয়ে যায়, আর একজন মানুষ মিথ্যা বলতে থাকে এবং মিথ্যা বলার চেষ্টায় থাকে শেষ পর্যন্ত তাকে মিথ্যাবাদী হিসেবে লিখা হয়।” [বুখারী ৬০৯৪; মুসলিম ২৬০৭]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__120_6" class="block_1"><span class="text_1">আয়াত: ১২০ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">مَا كَانَ لِأَهۡلِ ٱلۡمَدِينَةِ وَمَنۡ حَوۡلَهُم مِّنَ ٱلۡأَعۡرَابِ أَن يَتَخَلَّفُواْ عَن رَّسُولِ ٱللَّهِ وَلَا يَرۡغَبُواْ بِأَنفُسِهِمۡ عَن نَّفۡسِهِۦۚ ذَٰلِكَ بِأَنَّهُمۡ لَا يُصِيبُهُمۡ ظَمَأٞ وَلَا نَصَبٞ وَلَا مَخۡمَصَةٞ فِي سَبِيلِ ٱللَّهِ وَلَا يَطَـُٔونَ مَوۡطِئٗا يَغِيظُ ٱلۡكُفَّارَ وَلَا يَنَالُونَ مِنۡ عَدُوّٖ نَّيۡلًا إِلَّا كُتِبَ لَهُم بِهِۦ عَمَلٞ صَٰلِحٌۚ إِنَّ ٱللَّهَ لَا يُضِيعُ أَجۡرَ ٱلۡمُحۡسِنِينَ </span></p>
<h2 class="block_4"><span class="text_1">মদীনাবাসী ও তাদের পার্শ্ববর্তী মরুবাসীদের জন্য সংগত নয় যে তারা আল্লাহ্র রাসূলের সহগামী না হয়ে পিছনে রয়ে যাবে এবং তার জীবনের চেয়ে নিজেদের জীবনকে প্রিয় মনে করবে; কারণ আল্লাহর পথে তাদেরকে যে তৃষ্ণা, ক্লান্তি ও ক্ষুদা পেয়ে বসে এবং কাফেরদের ক্রোধ উদ্রেক করে তাদের এমন প্রতিটি পদক্ষেপ আর শত্রুদেরকে কোনো কষ্ট প্রদান করে [১], তা তাদের জন্য সৎকাজরূপে লিপিবদ্ধ করা হয়। নিশ্চয় আল্লাহ্ মুহসিনদের কাজের প্রতিফল নষ্ট করেন না।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] উপরোক্ত অনুবাদটিই অধিকাংশ মুফাসসির উল্লেখ করেছেন। তবে আবুস সাউদ তাফসীরকারের মতে এখানে আরেকটি অর্থ এও হতে পারে যে, শক্ৰদের পক্ষ থেকে তাদের উপর যে বিপদই অনুষ্ঠিত হোক না কেন তা তাদের জন্য সওয়াব হিসেবে লিখা হয়। [তাফসীর আবুস সাউদ]।</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__121_5" class="block_1"><span class="text_1">আয়াত: ১২১ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَلَا يُنفِقُونَ نَفَقَةٗ صَغِيرَةٗ وَلَا كَبِيرَةٗ وَلَا يَقۡطَعُونَ وَادِيًا إِلَّا كُتِبَ لَهُمۡ لِيَجۡزِيَهُمُ ٱللَّهُ أَحۡسَنَ مَا كَانُواْ يَعۡمَلُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর তারা ছোট বা বড় যা কিছুই ব্যয় করে এবং যে কোন প্রান্তরই অতিক্রম করে তা তাদের অনুকূলে লিপিবদ্ধ হয়--- যাতে তারা যা করে আল্লাহ্ তার উৎকৃষ্টতর পুরস্কার তাদেরকে দিতে পারেন।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__122_5" class="block_1"><span class="text_1">আয়াত: ১২২ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">۞وَمَا كَانَ ٱلۡمُؤۡمِنُونَ لِيَنفِرُواْ كَآفَّةٗۚ فَلَوۡلَا نَفَرَ مِن كُلِّ فِرۡقَةٖ مِّنۡهُمۡ طَآئِفَةٞ لِّيَتَفَقَّهُواْ فِي ٱلدِّينِ وَلِيُنذِرُواْ قَوۡمَهُمۡ إِذَا رَجَعُوٓاْ إِلَيۡهِمۡ لَعَلَّهُمۡ يَحۡذَرُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর মুমিনদের সকলের একসাথে অভিযানে বের হওয়া সংগত নয়। অতঃপর তাদের প্রত্যেক দলের এক অংশ কেন বের হয় না, যাতে তারা দীনের গভীর জ্ঞান অর্জন [১] করতে পারে [২] এবং তাদের সম্প্রদায়কে ভীতিপ্রদর্শন করতে পারে, যখন তারা তাদের কাছে ফিরে আসবে [৩], যাতে তারা সতর্ক হয়।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] বলা হয়েছে (لِّیَتَفَقَّهُوۡا فِی الدِّیۡنِ) “যাতে দীনের মধ্যে বিজ্ঞতা অর্জন করে" উদ্দেশ্যে হলো দীনকে অনুধাবন করা কিংবা তাতে বিজ্ঞতা অর্জন করা। تفقه শব্দের অর্থও তাই। এটি فقه থেকে উদ্ভুত। فقه অর্থ বুঝা, অনুধাবন করা, সুক্ষ্মভাবে বুঝা। <br class="calibre1"/><br class="calibre1"/>[২] এ আয়াতটি দীনের এলম হাসিলের মৌলিক দলীল। [কুরতুবী] তাছাড়া রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের হাদীসে এ ব্যাপারে আরও কিছু ফযীলত বর্ণিত হয়েছে। যেমন, এক হাদীসে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম বলেন, যে ব্যক্তি এলেম হাসিল করার উদ্দেশ্যে কোনো পথ দিয়ে চলে, আল্লাহ এই চলার সওয়াব হিসাবে তাঁর রাস্তাকে জান্নাতমুখী করে দেবেন। আল্লাহর ফেরেশতাগণ দীনী জ্ঞান আহরণকারীর জন্য নিজেদের পালক বিছিয়ে রাখেন। আলেমের জন্য আসমান-যমীনের সমস্ত সৃষ্টি এবং পানির মৎস্যকুল দো'আ ও মাগফেরাত কামনা করে। অধিকহারে নফল এবাতদকারী লোকের উপর আলেমের ফযীলত অপরাপর তারকারাজির উপর পূর্ণিমা চাঁদের অনুরূপ। আলেমসমাজ নবীগণের ওয়ারিশ। নবীগণ স্বর্ণ ও রূপার মীরাস রেখে যান না। তবে এলমের মীরাস রেখে যান। তাই যে ব্যক্তি এলমের মীরাস পায়, সে যেন মহাসম্পদ লাভ করল। [তিরমিযী ২৬৮২] অপর হাদীসে এসেছে, রাসূল সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম বলেছেন, মানুষের মৃত্যু হলে তার সমস্ত আমল বন্ধ হয়ে যায়, কিন্তু তিনটি আমলের সওয়াব মৃত্যুর পরেও অব্যাহত থাকে। সদকায়ে জারিয়া (যেমন, মসজিদ, মাদ্রাসা ও জনকল্যানমূলক প্রতিষ্ঠান)। এমন ইলম যার দ্বারা লোকেরা উপকৃত হয়। (যেমন, শাগরিদ রেখে গিয়ে এলমে দীনের চর্চা জারী রাখা বা কোনো কিতাব লিখে যাওয়া) নেককার সন্তান-যে তার পিতার জন্য দোআ করে। [মুসলিম ১৬৩১] অনুরূপভাবে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম বলেছেন, “প্রত্যেক মুসলিমের উপর ইলম শিক্ষা করা ফরয।” [ইবন মাজাহ ২২৪; ইবন আবদিল বার, জামেউ বায়ানিল ইলমি ওয়া ফাদলিহি ২৫, ২৬] বলাবাহুল্য, এ হাদীস ও উপরোক্ত অপরাপর হাদীসে উল্লিখিত ইলম’ শব্দের অর্থ দীনের ইলম। তবে অন্যান্য বিষয়ের মত দুনিয়াবী জ্ঞান-বিজ্ঞানও মানুষের জন্য জরুরী। কিন্তু হাদীসসমূহে সে সবের ফযীলত বর্ণিত হয়নি। কারণ, দীনী জ্ঞান অর্জন দু’ভাগে বিভক্ত। ফরযে আইন ও ফরযে কিফায়া। ফরযে আইন: শরীআত মানুষের উপর যেসব কাজ ফরয বা ওয়াজিব করে দিয়েছে, সেগুলোর হুকুম আহকাম ও মাসআলা মাসায়েল সম্পর্কে জ্ঞান হাসিল করা প্রত্যেক নর-নারীর জন্য ফরয। যেমন, ইসলামের বিশুদ্ধ আকীদাহসমূহের জ্ঞান, পবিত্রতা ও অপবিত্রতার হুকুম-আহকাম, সালাত, সাওম, যাকাত ইত্যাদি সম্পর্কে জ্ঞান। ফরযে কেফায়া: যেমন, অধিকার আদায় করা, হুদুদ প্রতিষ্ঠা করা, মানুষের মধ্যে বিবাদ নিরসন ইত্যাদি। কেননা সবার পক্ষে এটা করা সম্ভব নয়। প্রত্যেকে এটা করতে গেলে নিজেদের অবস্থাও খারাপ হবে, অন্যদেরও। নিজেদের জীবন-জীবিকা অসম্পূর্ণ হবে বা বাতিল হবে। তাই কাউকে না কাউকে সুনির্দিষ্ট করে এর জন্য থাকতে হবে। আল্লাহ যাকে এর জন্য সহজ করে দেন সে এটা করতে পারে। তিনি প্রতিটি মানুষকে পূর্বেই এমন কিছু যোগ্যতা দিয়েছেন যা অন্যদের দেননি। সে হিসেবে প্রত্যেকে তার জন্য যা সহজ হয় তা-ই বহন করবে। [কুরতুবী; বাগভী] <br class="calibre1"/><br class="calibre1"/>[৩] ইবন কাসীর বলেন, যখন আল্লাহ্ তা'আলার পক্ষ থেকে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের সাথে সবাইকে যুদ্ধে বের হওয়ার নির্দেশ দেয়া হলো, বলা হলো যে, “তোমরা হাল্কা ও ভারী সর্বাবস্থায় বেরিয়ে পড়।" [সূরা আত-তাওবাহ ৪১] এবং বলা হলো, “মদীনাবাসী ও তাদের পার্শ্ববতী মরুবাসীদের জন্য সংগত নয় যে, তারা আল্লাহর রাসূলের সহগামী না হয়ে পিছনে রয়ে যাবে এবং তার জীবনের চেয়ে নিজেদের জীবনকে প্রিয় মনে করবে।” [সূরা আত-তাওবাহ ১২০] তখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম কোনো যুদ্ধে বেরিয়ে পড়লে সবার উপরই বের হওয়া বাধ্যতামূলক ছিল। তারপর এ আয়াত নাযিল করে সে নির্দেশের ব্যাপকতা রহিত করা হয়। তবে রহিত না বলে এটাও বলা যেতে পারে যে, আগের যে সমস্ত আয়াতে যুদ্ধে বেরিয়ে যাওয়ার নির্দেশ দেয়া হয়েছিল এ আয়াতে সে নির্দেশের বর্ণনা দেয়া হয়েছে যে, এর দ্বারা প্রতিটি গোত্রের সবাই বের হওয়ার অর্থ, প্রতি গোত্র থেকে সবার বের না হতে পারলে তাদের মধ্য থেকে কিছু লোক বের হবে, যারা রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের সাথে থেকে তার উপর যে সমস্ত ওহী নাযিল হয় সেটা গভীরভাবে জানবে, অনুধাবন করবে, তারপর তারা যখন তাদের গোত্রের কাছে ফিরে যাবে তখন তাদেরকে শক্ৰদের অবস্থা ও কর্মকাণ্ড সম্পর্কে অবহিত করবে। এভাবে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের সাথে সুনির্দিষ্টভাবে যুদ্ধে বের হওয়া দ্বারা তাদের দুটি কাজই পূর্ণ হবে। (রাসূলের কাছে অবস্থান করে ওহীর জ্ঞান অর্জন ও সেখান থেকে এসে নিজের জাতিকে শক্রদের অবস্থা সম্পর্কে জানানো।) তবে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের মৃত্যুর পরে যারাই গোত্র থেকে এভাবে যুদ্ধে বের হবে, তারা দু’টি সুবিধা পাবে না। তারা হয় ওহীর জ্ঞান অর্জনের জন্য, না হয় জিহাদের জন্য বের হবে। কেননা রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লামের মৃত্যুর পর এভাবে যুদ্ধের জন্য বের হওয়া ফরযে কিফায়া। [ইবন কাসীর] ইবন আব্বাস বলেন, আয়াতের অর্থ, মুমিনদের উচিত নয় যে, তারা সবাই যুদ্ধের জন্য বের হয়ে যাবে, আর রাসূলকে একা রেখে যাবে। যাতে করে তাদের মধ্যে যারা রাসূলের নির্দেশ ও অনুমতি নিয়ে বের হবে, তারা যখন ফিরে আসবে, তখন এ সময়ে রাসূলের কাছে যারা অবশিষ্ট ছিল তারা কুরআনের যা নাযিল হয়েছে তা যারা যুদ্ধে গেছে তাদেরকে জানাবে। তারা বলবে যে, তোমাদের যুদ্ধে যাওয়ার পরে আল্লাহ তোমাদের নবীর উপর কুরআনের যা নাযিল করেছেন তা আমরা শিখেছি। এভাবে যারা বের হয়েছিল তারা অবস্থান করে তাদের যাওয়ার পরে যা নাযিল হয়েছে তা শিখে নেবে। আর অন্য দল তখন যুদ্ধের জন্য বের হবে। আর এটাই হচ্ছে “যাতে তারা দীনের গভীর জ্ঞান অর্জন করতে পারে” এর অর্থ। অর্থাৎ যাতে করে নবীর কাছে যা নাযিল হয়েছে অবস্থান কারীরা তা জেনে নেয় এবং যারা অভিযানে গেছে তারা ফেরৎ আসলে সেটা অবস্থানকারীদের কাছ থেকে জেনে নিতে পারে। এভাবে তারা সাবধান হতে পারে। [ইবন কাসীর] <br class="calibre1"/><br class="calibre1"/>ইবন আব্বাস থেকে অন্য বর্ণনায় এসেছে যে, এ আয়াত জিহাদের ব্যাপারে নয়, বরং যখন রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম মুদার বংশের উপর দুর্ভিক্ষের বদ-দোআ করেন, তখন তাদের দেশে দুর্ভিক্ষ দেখা দেয়। তখন পুরো গোত্রই মদীনায় আসা আরম্ভ করে দিল এবং তারা মুসলিম বলে মিথ্যা দাবী করতে লাগল। এভাবে তারা মদীনার খাবার ও পানীয়ের সংকট সৃষ্টি করে সাহাবীদের কষ্ট দিতে আরম্ভ করল। তখন আল্লাহ তা'আলা আয়াত নাযিল করে জানিয়ে দিলেন যে, তারা মুমিন নয়। ফলে রাসূলুল্লাহ্ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম তাদেরকে তাদের পরিবার-স্বজনদের নিকট ফিরিয়ে দিলেন এবং তাদের কাওমকে এরকম করা থেকে সাবধান করে দিলেন। তখন আয়াতের অর্থ হবে, তারা সবাই যেন নবীর কাছে চলে না আসে। তাদের প্রত্যেক গোত্র থেকে কিছু লোক দীন শেখার জন্য আসতে পারে। অতঃপর তারা যখন তাদের সম্পপ্রদায়ের কাছে ফিরে যাবে তখন তাদের সম্প্রদায়কে সাবধান করতে পারে। [ইবন কাসীর] <br class="calibre1"/><br class="calibre1"/>হাসান বসরী বলেন, এ আয়াতে দীনের গভীর জ্ঞান ও সাবধান করা’র যে কথা বলা হয়েছে এ উভয় কাজটিই যারা অভিযানে বের হয়েছে তাদের জন্য নির্দিষ্ট। তখন অর্থ হবে, কেন একটি দল দীনের গভীর জ্ঞান অর্জন করতে বের হয় না। অর্থাৎ তারা দেখবে ও শিক্ষা নিবে যে, কিভাবে আল্লাহ্ তা'আলা মুশরিকদের উপর তাদেরকে বিজয় দিয়েছেন, আর কিভাবে আল্লাহ তার দীনের সাহায্য করেছেন। আর তারা যখন তাদের কাওমের কাছে ফিরে যাবে তখন তারা তাদের কাওমের কাফিরদেরকে সেটা দ্বারা সাবধান করবে, তাদেরকে জানাবে, কিভাবে আল্লাহ তার রাসূল ও মুমিনদের সাহায্য করে থাকেন। ফলে তারা রাসূলের বিরোধিতা থেকে দুরে থাকবে। [বাগভী] <br class="calibre1"/><br class="calibre1"/>মুজাহিদ বলেন, এর অর্থ, সবাই একসাথে দাওয়াতের জন্য বের হবে না। বরং প্রতিটি বড় দল থেকে কোন ছোট একটি গ্রুপ দীন শেখা এবং তাদের যাওয়ার পরে যা নাযিল হয়েছে তা জানার জন্য জ্ঞানীর কাছে যাবে। তারা জানার পর তাদের সম্প্রদায়ের সবাইকে সাবধান করবে এবং তাদেরকে আল্লাহর দিকে আহবান জানাবে, যাতে তারা আল্লাহর ভয় ও শাস্তি থেকে সাবধান হয়। আর তখনও একটি গ্রুপ কল্যাণের কথা জানার জন্য বসে থাকবে। [বাগভী] <br class="calibre1"/></span><span class="text_">মূলতঃ </span><span class="text_2">ফিকহ হচ্ছে, দীনের আহকাম জানা। [বাগভী] এ ব্যাপারে রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম বলেছেন, “আল্লাহ যার কল্যাণ চান তাকে তিনি দীনের ফিকহ প্রদান করেন।" [বুখারী ৭১; মুসলিম ১০৩৭] অন্য হাদীসে এসেছে, “মানুষ যেন গুপ্তধন, স্বর্ণ ও রৌপ্যের গুপ্তধনের মত। তাদের মধ্যে যারা জাহেলিয়াতে উত্তম তারা ইসলামেও উত্তম, যদি তারা দীন সম্পর্কে সঠিক জ্ঞান অর্জন করে।" [বুখারী ৩৪৯৩; মুসলিম ২৫২৬] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__123_5" class="block_1"><span class="text_1">আয়াত: ১২৩ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">يَـٰٓأَيُّهَا ٱلَّذِينَ ءَامَنُواْ قَٰتِلُواْ ٱلَّذِينَ يَلُونَكُم مِّنَ ٱلۡكُفَّارِ وَلۡيَجِدُواْ فِيكُمۡ غِلۡظَةٗۚ وَٱعۡلَمُوٓاْ أَنَّ ٱللَّهَ مَعَ ٱلۡمُتَّقِينَ </span></p>
<h2 class="block_4"><span class="text_1">হে ঈমানদারগণ! কাফেরদের মধ্যে যারা তোমাদের কাছাকাছি তাদের সাথে যুদ্ধ কর [১] এবং তারা যেন তোমাদের মধ্যে কঠোরতা [২] দেখতে পায়। আর জেনে রাখ, নিশ্চয় আল্লাহ্ মুত্তাকীদের সাথে আছেন।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতসমূহে কোন নিয়মে কাফেরদের সাথে জিহাদ করা হবে তা জানিয়ে দেয়া হচ্ছে, আয়াতে বলা হচ্ছে যে, কাফেরদের মধ্যে যারা তোমাদের নিকটবর্তী, প্রথমে তাদের সাথে জিহাদ করবে। এখানে নিকট বলে নিকটবর্তী অবস্থান ও নিকট সম্পর্ক এ দু'রকমের হতে পারে। [বাগভী] (এক) অবস্থানের দিক দিয়ে অর্থাৎ যারা তোমাদের নিকটে অবস্থানকারী, প্রথমে তাদের সাথে জিহাদ কর। [ইবন কাসীর] (দুই) গোত্র, আতীয়তা ও সম্পর্কের দিক দিয়ে যারা নিকটবতী অন্যান্যদের আগে তাদের সাথে জিহাদ চালিয়ে যাও। [বাগভী] যেমন, আল্লাহ তা'আলা রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লামকে আদেশ দিয়ে বলেন, “হে রাসূল, নিজের নিকটআত্মীয়গণকে আল্লাহর আযাবের ভয়প্রদর্শন করুন।" [সূরা আশ-শু'আরা ২১৪] তাই তিনি এ আদেশ পালনে সর্বাগ্রে স্বগোত্রীয়দের সমবেত করে আল্লাহর বাণী শুনিয়ে দেন। অনুরূপ, তিনি স্থান হিসাবে প্রথমে মদীনার আশ-পাশের কাফের তথা বনু কোরাইযা, বনু নদীর ও খায়বরবাসীদের সাথে বুঝাপড়া করেন। তারপর পূর্ববতী লোকদের সাথে জিহাদ করেন এবং সবশেষে রোমানদের সাথে জিহাদের আদেশ আসে, যার ফলে তাবুক যুদ্ধ সংঘটিত হয়। [ইবন কাসীর]<br class="calibre1"/><br class="calibre1"/>[২] غلظة শব্দের অর্থ: কঠোরতা। [ফাতহুল কাদীর, ইবন কাসীর] কারণ, প্রকৃত মুমিন সেই ব্যক্তি যে, ঈমানদারদের সাথে নরম ব্যবহার করে, আর কাফেরদের সাথে থাকে কঠোর। [ইবন কাসীর] সুতরাং তাদের সাথে এমন ব্যবহার কর, যাতে তোমাদের কোন দুর্বলতা তাদের চোখে ধরা না পড়ে। অন্য আয়াতেও আল্লাহ তা'আলা এ নির্দেশটি দিয়েছেন। তিনি বলেন, “হে মুমিনগণ! তোমাদের মধ্যে কেউ দীন থেকে ফিরে গেলে নিশ্চয়ই আল্লাহ এমন এক সম্প্রদায় আনবেন যাদেরকে তিনি ভালবাসবেন এবং যারা তাঁকে ভালবাসবে; তারা মুমিনদের প্রতি কোমল ও কাফেরদের প্রতি কঠোর হবে।" [সূরা আল-মায়েদাহ ৫৪] আরও বলেন, "মুহাম্মদ আল্লাহর রাসূল; তার সহচরগণ কাফেরদের প্রতি কঠোর এবং নিজেদের মধ্যে পরস্পরের প্রতি সহানুভূতিশীল।” [সূরা আল-ফাতহ ২৯] আরও বলেন, “হে নবী! কাফির ও মুনাফিকদের বিরুদ্ধে জিহাদ করুন এবং তাদের প্রতি কঠোর হোন।" [সূরা আত-তাওবাহ ৭৩. আততাহরীম ৯] </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__124_5" class="block_1"><span class="text_1">আয়াত: ১২৪ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَإِذَا مَآ أُنزِلَتۡ سُورَةٞ فَمِنۡهُم مَّن يَقُولُ أَيُّكُمۡ زَادَتۡهُ هَٰذِهِۦٓ إِيمَٰنٗاۚ فَأَمَّا ٱلَّذِينَ ءَامَنُواْ فَزَادَتۡهُمۡ إِيمَٰنٗا وَهُمۡ يَسۡتَبۡشِرُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর যখনই কোনো সূরা নাযিল হয়। তখন তাদের কেউ কেউ বলে, ‘এটা তোমাদের মধ্যে কার ঈমান বৃদ্ধি করল [১]? অতঃপর যারা মুমিন এটা তাদেরই ঈমান বৃদ্ধি করে এবং তারাই আনন্দিত হয়।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] আয়াত থেকে বুঝা যায় যে, কুরআনের আয়াতের তেলাওয়াত, চিন্তা-ভাবনা এবং সে অনুযায়ী আমল করার ফলে ঈমান বৃদ্ধি পায়। তার উন্নতি ও প্রবৃদ্ধি ঘটে। ঈমানের নূর ও আস্বাদ বৃদ্ধি পায়। ফলে আল্লাহর ও তাঁর রাসূলের আনুগত্য করা সহজ হয়ে উঠে। ইবাদাতে স্বাদ পায়, গুনাহের প্রতি স্বাভাবিক ঘৃণা জন্মে ও কষ্টবোধ হয়। আলী রাদিয়াল্লাহু আনহু বলেন, ঈমান যখন অন্তরে প্রবেশ করে, তখন এটি নূরের শ্বেতবিন্দুর মত দেখায়। তারপর যতই ঈমানের উন্নতি হয়, সেই শ্বেতবিন্দু সম্প্রসারিত হয়ে উঠে। এমনকি শেষ পর্যন্ত গোটা অন্তর নূরে ভরপুর হয়ে যায়। তেমনি গোনাহ ও মুনাফিকীর ফলে প্রথমে অন্তরে একটি কাল দাগ পড়ে। তারপর পাপাচার ও কুফরীর তীব্রতার সাথে সাথে সে কাল দাগটিও বাড়তে থাকে এবং শেষ পর্যন্ত গোটা অন্তর কালো হয়ে যায়। [বাগভী] এজন্য সাহাবায়ে কেরাম একে অন্যকে বলতেন আস, কিছুক্ষণ একত্রে বসি এবং দীন ও পরকাল সম্পর্কে আলোচনা করি, যাতে আমাদের ঈমান বৃদ্ধি পায়। [বুখারী]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__125_5" class="block_1"><span class="text_1">আয়াত: ১২৫ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَأَمَّا ٱلَّذِينَ فِي قُلُوبِهِم مَّرَضٞ فَزَادَتۡهُمۡ رِجۡسًا إِلَىٰ رِجۡسِهِمۡ وَمَاتُواْ وَهُمۡ كَٰفِرُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর যাদের অন্তরে ব্যাধি আছে, এটা তাদের কলুষের সাথে আরো কলুষ যুক্ত করে। আর তাদের মৃত্যু ঘটে কাফের অবস্থায়।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__126_5" class="block_1"><span class="text_1">আয়াত: ১২৬ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">أَوَلَا يَرَوۡنَ أَنَّهُمۡ يُفۡتَنُونَ فِي كُلِّ عَامٖ مَّرَّةً أَوۡ مَرَّتَيۡنِ ثُمَّ لَا يَتُوبُونَ وَلَا هُمۡ يَذَّكَّرُونَ </span></p>
<h2 class="block_4"><span class="text_1">তারা কি দেখে না যে, ‘তাদেরকে প্রতিবছর একবার বা দু’বার বিপর্যস্ত করা হয় [১]?’ এর পরও তারা তাওবাহ্ করে না এবং উপদেশ গ্রহন করে না।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এখানে মুনাফিকদের সতর্ক করা হয়েছে যে, তাদের কপটতা ও প্রতিশ্রুতি ভঙ্গ প্রভৃতি অপরাধের পরিণতিতে প্রতিবছরই তারা কখনো একবার, কখনো দু’বার নানা ধরনের বিপদে বা পরীক্ষায় নিপতিত হয়। মুজাহিদ বলেন, তারা দুর্ভিক্ষ ও ক্ষুধায় পতিত হয়। [আত-তাফসীরুস সহীহ] অথবা রোগ-শোকে। হাসান বসরী বলেন, রাসূলের সাথে যুদ্ধ ও জিহাদে অংশগ্রহণের মাধ্যমে। [কুরতুবী] তাছাড়া কখনো তাদের কাফের মিত্ররা পরাজিত হয়, কখনো তাদের গোপন অভিসন্ধি ফাঁস হয়ে যাওয়ার ফলে তারা দিবানিশি... মর্মপীড়া ভোগ করে। [বাগভী]</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__127_5" class="block_1"><span class="text_1">আয়াত: ১২৭ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">وَإِذَا مَآ أُنزِلَتۡ سُورَةٞ نَّظَرَ بَعۡضُهُمۡ إِلَىٰ بَعۡضٍ هَلۡ يَرَىٰكُم مِّنۡ أَحَدٖ ثُمَّ ٱنصَرَفُواْۚ صَرَفَ ٱللَّهُ قُلُوبَهُم بِأَنَّهُمۡ قَوۡمٞ لَّا يَفۡقَهُونَ </span></p>
<h2 class="block_4"><span class="text_1">আর যখনই কোন সূরা নাযিল হয়, তখন তারা একে অপরের দিকে তাকায় এবং জিজ্ঞেস করে, ‘তোমাদেরকে কেউ লক্ষ্য করছে কি?’ তারপর তারা সরে পড়ে। আল্লাহ্ তাদের হৃদয়কে সত্যবিমুখ করে দেন। কারণ, তারা এমন এক সম্প্রদায় যারা ভালভাবে বোঝে না।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__128_5" class="block_1"><span class="text_1">আয়াত: ১২৮ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">لَقَدۡ جَآءَكُمۡ رَسُولٞ مِّنۡ أَنفُسِكُمۡ عَزِيزٌ عَلَيۡهِ مَا عَنِتُّمۡ حَرِيصٌ عَلَيۡكُم بِٱلۡمُؤۡمِنِينَ رَءُوفٞ رَّحِيمٞ </span></p>
<h2 class="block_4"><span class="text_1">অবশ্যই তোমাদের নিকট তোমাদের মধ্য হতেই একজন রাসূল এসেছেন, তোমাদের যে দুঃখ-কষ্ট হয়ে থাকে তা তার জন্য বড়ই বেদনাদায়ক। তিনি তোমাদের মঙ্গলকামী, মুমিনদের প্রতি তিনি করুণাশীল ও অতি দয়ালু [১]।</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] এ আয়াতে আল্লাহ তা'আলা মুমিনদের উপর তার ইহসানের কিছু বর্ণনা দিয়েছেন। তিনি বলেন, তিনি তাদের মধ্যে তাদেরই সমগোত্রীয় এবং তাদেরই সমভাষার লোককে প্রেরণ করেছেন। [ইবন কাসীর] এ কথাটিই রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়া সাল্লাম সম্পর্কে জাফর ইবন আবি তালিব নাজ্জাসীর দরবারে বলেছিলেন। তিনি বলেছিলেন, "আল্লাহ আমাদের মধ্যে আমাদেরই একজনকে রাসূলরুপে পাঠিয়েছেন যাকে আমরা চিনি, তার বংশ ও গুণাবলি সম্পর্কেও আমরা অবহিত। তার ভিতর ও বাহির সম্পর্কে, সত্যবাদিতা, আমানতদারী সম্পর্কেও আমরা জ্ঞাত। [মুসনাদে আহমাদ ১/২০১] আরও বলেছেন, রাসূলুল্লাহ সাল্লাল্লাহু আলাইহি ওয়াসাল্লাম সকল সৃষ্টির উপর, বিশেষতঃ মুমিনদের উপর বড় দয়াবান ও স্নেহশীল।</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p id="id_aay_aat__129_5" class="block_1"><span class="text_1">আয়াত: ১২৯ </span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_3"><span class="text_1">فَإِن تَوَلَّوۡاْ فَقُلۡ حَسۡبِيَ ٱللَّهُ لَآ إِلَٰهَ إِلَّا هُوَۖ عَلَيۡهِ تَوَكَّلۡتُۖ وَهُوَ رَبُّ ٱلۡعَرۡشِ ٱلۡعَظِيمِ </span></p>
<h2 class="block_4"><span class="text_1">অতঃপর তারা যদি মুখ ফিরিয়ে নেয় তবে আপনি বলুন, ‘আমার জন্য আল্লাহ্ই যথেষ্ট, তিনি ছাড়া কোনো সত্য ইলাহ্ নেই [১]। আমি তাঁরই উপর নির্ভর করি এবং তিনি মহা’আরশের [২] রব।‘</span></h2>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_2"><span class="text_2">[১] অর্থাৎ আপনার যাবতীয় চেষ্টা-তদবীরের পরও যদি কিছু লোক ঈমান গ্রহণে বিরত থাকে, তবে ধৈর্য ধরুন এবং আল্লাহর উপর ভরসা রাখুন। কারণ নবীগণের সমস্ত কাজ হল স্নেহ-মমতা ও হামদর্দির সাথে আল্লাহর পথে মানুষকে ডাকা, তাদের পক্ষ থেকে অবজ্ঞা ও যাতনার সম্মুখীন হলে, তা আল্লাহর প্রতি সোপর্দ করা এবং তাঁরই উপর ভরসা রাখা।<br class="calibre1"/><br class="calibre1"/>[২] আরশ সম্পর্কে আলোচনা সূরা আল-আ’রাফের ৫৪ নং আয়াতে চলে গেছে।</span></p>
<p class="block_2"><span class="text_2"><br class="calibre1"/> </span></p>
<p class="block_5"></p>
<p class="block_11"><span class="text_2"></span></p>
</body>
</html>
| the_stack | {'hexsha': '0ebb2dabc56cd647b5e3c7b5cf572fe9b50e65cc', 'size': '67233', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'Al Quran-ul-Kareem-EPUB/text/part0043.html', 'max_stars_repo_name': 'SajjadBinSamad/Al-Quran-ul-Kareem-Ebook', 'max_stars_repo_head_hexsha': 'befba6d733a6c6afc0ffb1f98238161065c25fe9', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '2', 'max_stars_repo_stars_event_min_datetime': '2022-02-06T06:24:26.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-02T06:36:33.000Z', 'max_issues_repo_path': 'Al Quran-ul-Kareem-EPUB/text/part0043.html', 'max_issues_repo_name': 'SajjadBinSamad/Al-Quran-ul-Kareem-Ebook', 'max_issues_repo_head_hexsha': 'befba6d733a6c6afc0ffb1f98238161065c25fe9', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Al Quran-ul-Kareem-EPUB/text/part0043.html', 'max_forks_repo_name': 'SajjadBinSamad/Al-Quran-ul-Kareem-Ebook', 'max_forks_repo_head_hexsha': 'befba6d733a6c6afc0ffb1f98238161065c25fe9', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '3', 'max_forks_repo_forks_event_min_datetime': '2022-01-12T09:13:23.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-02T06:36:43.000Z', 'avg_line_length': '296.1806167401', 'max_line_length': '7534', 'alphanum_fraction': '0.5359570449', 'original_id': 'c747bd37bccb3bcc457089c9aa64e9b0c9b2ebb60b775731481f4a78e1919492'} |
\section{Greatest Element is Terminal Object}
Tags: Poset Categories, Order Categories
\begin{theorem}
Let $\mathbf P$ be an order category.
Let $p$ be the greatest element of the objects $\mathbf P_0$ of $\mathbf P$, considered as a ordered set.
Then $p$ is a terminal object of $\mathbf P$.
\end{theorem}
\begin{proof}
Since $p$ is the greatest element of $\mathbf P_0$, we have:
:$\forall q \in \mathbf P_0: q \le p$
that is, for every object $q$ of $\mathbf P$ there is a unique morphism $q \to p$.
That is, $p$ is terminal.
{{qed}}
\end{proof}
| math_pile | {'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': 'e239c7d80b57fb28aa5066fc093c9956b419307947559dccbeb038672b4f23cb'} |
9 Safety Tips for Kids Flying Alone
Plan ahead for your child's safe and worry-free flight.
Many parents get nervous at the thought of their child flying alone -- and with good reason. But taking some safety precautions can help make your child's trip smoother and easier, and ease some of your fears. Here are some helpful hints for the child flying solo:
1. Book a nonstop flight whenever possible. Having a child change planes greatly increases the risk of his getting lost. If your child must change planes, make arrangements for him to be escorted between gates. This usually costs extra, but it's required by the Federal Aviation Administration for children ages 5 to 8 and is recommended for older children.
2. Request appropriate seating. When you make a reservation, ask that your child be given a seat away from the aisle and with at least one empty seat between her and the next passenger.
3. Review the airline's policies on children traveling alone. Every airline has a slightly different policy on how it accommodates and supervises unaccompanied children. Take special note of policies on escorting children at connection airports and on flights that are delayed or diverted. Make sure you're aware of the airline's contingency plan for a child whose flight gets canceled, or who is forced to spend the night in a strange city.
4. Communicate with the person picking up your child. Make sure that your child's caregiver knows all the relevant details of the trip, including flight number, departure city, estimated arrival time, and any connecting flight information. The person meeting her should go to the gate and have identification that exactly matches the information that you are required to provide the airline.
5. Prepare your child for the flight. Children feel more at ease when they know what to expect. Make sure your child knows exactly what will happen during the flight, where in the plane he will sit, how long the flight will be, and who will pick him up when he arrives.
6. Discuss behavior and safety issues with your child. Make sure your child knows to keep her seat belt on at all times and to remain in her seat and out of the aisles. Teach her to contact the flight attendant when she needs to use the bathroom. Also explain that other passengers may be trying to sleep, so she should keep the noise levels low.
7. Spend extra time at the airport. Plan on coming to the airport early and staying for a while after departure. If there are last-minute changes before the flight's scheduled departure, being present gives you a better opportunity to deal with the situation.
8. Identify the head flight attendant. Make sure the head flight attendant is aware that there is an unaccompanied child on the plane. Introduce your child to the flight attendant who will be directly responsible for taking care of him.
9. If possible, escort your child to her seat. Only some airports and airlines allow it, but escorting your child to her seat gives you an opportunity to check the area around the seat for hazards, such as heavy carry-on items in the overhead storage bins. If there is anything about the seating situations that does not meet your approval, contact the head flight attendant or a gate agent and demand a change.
Source: Airsafe.com
Parents Are Talking
Add a Comment | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '71', 'language_id_whole_page_fasttext': "{'en': 0.9458189606666564}", 'metadata': "{'Content-Length': '62929', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:M5VT2FMZI5HH7WX5L4YMN24TDO7V4WLM', 'WARC-Concurrent-To': '<urn:uuid:aa4b6c66-878f-40b7-bd9f-208e2bee3258>', 'WARC-Date': datetime.datetime(2013, 12, 12, 13, 23, 6), 'WARC-IP-Address': '198.186.175.84', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:6IO6A7JYUDCPK4U53PO7ILITTMYGGPXQ', 'WARC-Record-ID': '<urn:uuid:bc2740c0-0d4d-4d3b-bdf5-99504d33cc27>', 'WARC-Target-URI': 'http://www.parents.com/fun/vacation/safety/9-safety-tips-for-kids-flying-alone/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:36510126-2430-4605-9771-8886da0b004a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '635', 'url': 'http://www.parents.com/fun/vacation/safety/9-safety-tips-for-kids-flying-alone/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12032818794250488', 'original_id': 'e29fcf0a79bf7d669d85a0f6e67b563adc33f689254e667c5d6ffa2817397e32'} |
Last updated: Release 21.0.1
Lava is commonly found in Lava Fissures, which are located in the Godlands, and The Abyss of Demons. Lava Fissures are the setpiece where Red Demon spawn and makes it harder for attacking players to circle around the Red Demon due to the lava behind the monster, thus making it more difficult to kill. Although, some players have turned to standing in the lava fissures as a method of suicide. In The Abyss of Demons, lava surrounds the boss room and also surrounds very narrow paths that must be navigated in order to reach to boss room. Despite the difficult enemies that inhabit the dungeon, the deaths of many players are due to the lava that fills the dungeon.
Lava Blend is a lava variant which is spawned by the Abyss Idol in the Abyss of Demons and Pyyr the Crimson Dragon/Wicked in the Lair of Draconis. It is functionally identical to regular lava but has a different visual blend priority with surrounding tiles to prevent aesthetic glitches.
• Many players gather to look in shock at the gravestones of maxed characters in the lava fissure left after a mass suicide.
• 2 players carefully navigating through a maze of narrow paths while avoiding the lava that surround them in The Abyss of Demons.
• Back to top
Lava does 45 armor piercing damage and damages twice per every second you are in lava which gradually decreases your health and can cause death if you stand in it long enough. It also slows down movement speed, which can allow the lava to do a bit more damage to a character before they can escape the lava.
With enough healing abilities, some players are able to walk indefinitely on lava.
Back to top | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9542335867881776}", 'metadata': "{'Content-Length': '13681', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:A33TZO3UE3Z22SULGSFKCHVSKL7MZHXR', 'WARC-Concurrent-To': '<urn:uuid:51d73a46-103c-4179-b61e-33775960d187>', 'WARC-Date': datetime.datetime(2018, 4, 19, 9, 47, 51), 'WARC-IP-Address': '88.99.161.223', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P22YPADP74RFUGIFUK3RNNNBVNUI3S7S', 'WARC-Record-ID': '<urn:uuid:c853538b-0c10-476b-ad6b-70edc1c3b4f9>', 'WARC-Target-URI': 'https://www.realmeye.com/wiki/lava', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1912a644-95f4-473c-9705-798219403005>', 'WARC-Truncated': None}", 'previous_word_count': '298', 'url': 'https://www.realmeye.com/wiki/lava', 'warcinfo': 'robots: classic\r\nhostname: ip-10-152-23-81.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-17\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for April 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030169904232025146', 'original_id': '6de8851c8fe9e2fa1c3e71ed167675088f51a3862ede81846fd16562d958edba'} |
Representing the ClaML-based ICD10 in LexGrid terminology model.
As part of the International Classification of Disease (ICD) revision platform development tasks, the representation of the ICD10 in a formal terminology model is required. The ICD10 is originally rendered by the World Health Organization (WHO) in the Classification Markup Language (CLaML) format which is a European Standard for representing the content of medical classification systems. In this study, we explored representing the CLaML-based ICD10 in the LexGrid terminology model, a community based proposal for standard storage of controlled vocabularies and ontologies. The decision we made for mapping between two models and the merits for utilizing the LexGrid terminology model and service are discussed. | mini_pile | {'original_id': '54f31bb475e1d6910d2c60d601a7738400792797222d36e89ec0ca47b1f2f4b8'} |
Page 1 | Page 2 | Page 3
Smooth Skin - viewed 886,836 times
Page 1 / 2
During the course of this Photoshop I'm going to show you how to make skin look smooth.
The Photoshop technique itself is not complicated, but does require you to be patient and work slow and accurate. If you can meet these requirements, then it's not going to be very difficult to see good results.
1. Remove blemishes
We're going to use the following image for this Photoshop tutorial:
Original Image
Areas that contain blemishes
The tool that we're going to use to remove blemishes is the Healing Brush Tool Clone Stamp Tool which can be found in the tool bar:
Healing Brush in tool bar
Let's first add a new layer by clicking on the Create a New Layer icon New Layer in the layers palette. Rename this layer by double clicking on its name in the layers palette and name it Blemishes.
Options Bar for Healing Brush
On the left we can see a black dot with a sharp edge; it means that the brush is going to have a hard edge (also called 100% hardness). Underneath we can see the size of the brush which is 19. More to the right we notice the selected Blending Mode for this brush. For this tutorial we're only going to use Normal mode. If you want to know more about blending modes then you might consider to look at this very detailed article by Jay Arraich: Blend Modes
Sampled means that we're going to use our image as our source.
Pattern means that we're going to use an existing pattern as our source.
In most cases you will use the Sampled option, because quite often we want the new area to have the same texture as the area surrounding it. Pattern can be useful if you don't have any descent area in your image that you would like to use as your texture.
We are going to use Sampled.
The Aligned option allows us to have a source area that follows our mouse cursor. Look at the following screenshot:
Option 'Aligned'
In this example the user has selected area C as the source (later we will learn how to set the source). The first moment the user presses the mouse button to remove a blemish (in this case at A), Photoshop will remember the distance and angle between A and C. So if the user now decides to remove a blemish at B, then the source will be D (same angle, same distance).
So you could say that after the user starts to use the Healing Brush that both cursor and source are 'glued' together as shown in this little animation:
Animation: Aligned
The advantage of the option Aligned is that we always stay close to the area that needs to be corrected and that the texture resembles the texture we want to use for our correction.
Notice that the option Use All Layer is selected. This means that the source area doesn't have to be on the same layer, in our case the Blemishes layer. It also means that the result of using the Healing Brush Tool will be placed on the active layer, which is in our case the Blemishes layer. The Healing Brush however only uses those pixels that are visible in our document window, but like I said, it doesn't matter on which layer they are.
If you return to the screenshot of the options bar you'll notice that I have placed the letter A beside a little black triangle. Click with the mouse on this little triangle and a new window will pop up:
Brush Options
We're going to use a small brush size for our Healing Brush Tool so we select a value of about 20 px. We also want to have soft edges to avoid that our corrections are noticeable in the final image and that's why we're going to select a value of 0% for Hardness. The other settings have Photoshop's default values and don't need to be changed. If these values are different in your case then change them according to the values of the screenshot of the options bar.
The last thing we have to do before we start removing some blemishes is setting the source area. Move your mouse cursor close to an area that needs to be fixed (the source area and the area that needs to be fixed shouldn't overlap) and hold down the Alt key (option key on the Mac) and press your left mouse button; this will mark the source area. With the source area set you can start by removing blemishes by using your mouse cursor as if it were some magic brush.
Note: sometimes it's necessary to change the source area of the Healing brush Tool. You can do this at any time by following the same steps that we used to set the initial source area.
Page 1 / 2
Partner Sites
W3C XHTMLW3C CSSExplorerFirefoxOperaRSSRSS Valid | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '95', 'language_id_whole_page_fasttext': "{'en': 0.9308781027793884}", 'metadata': "{'Content-Length': '18940', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GKYHRATXOXZSKLVB22QOTWCNRQAMEUKZ', 'WARC-Concurrent-To': '<urn:uuid:bd6ca7d2-cdd0-471f-a422-54bd4be0645f>', 'WARC-Date': datetime.datetime(2014, 10, 31, 13, 22, 28), 'WARC-IP-Address': '67.222.1.35', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WOGAB2MJ5MNP4S3JHHPU2BMNNX3WKHA6', 'WARC-Record-ID': '<urn:uuid:1fc5da96-dcb5-496f-9932-fa93a13e4a2a>', 'WARC-Target-URI': 'http://www.lunacore.com/photoshop/tutorials/tut020.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b030565c-1603-443e-a54d-00d2385b8917>', 'WARC-Truncated': 'length'}", 'previous_word_count': '940', 'url': 'http://www.lunacore.com/photoshop/tutorials/tut020.htm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-16-133-185.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-42\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for October 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.033304810523986816', 'original_id': 'e4bd97aabf440ea3e8cf5346702e062f2084eda0d15519e3145360fcba6bd333'} |
100 Cookies! No, not one hundred baked cookies, but cookies with the name 100 cookies. I don’t really know where the name comes from. After you see the ingredient list, they should be called 1 cookies, or 1 cup cookies. Anyway, I remember this cookie recipe because my Mom and Grandma made these when I was younger. When I phoned my Mom to get the recipe, she said it was actually from another person from Sawyer, who is a great cook – so no wonder I remember these tasty treats.
This is the last of my coconut recipes for now. I promise. I will say that of all of these recipes I posted with coconut in them are good, even if you don’t care for coconut too much.
Oh hey! Pet picture time! FeistyCat was just chilling in the kitchen watching me bake. She is a really cute little cat. Since it has warmed up, she has tried to escape the house no less the one million times.
100 CookiesRecipe via my Mom, via Janice Schmidt
1 cup sugar
1 cup brown sugar
1 cup butter
1 cup oil
1 egg
1 tsp vanilla
1 cup rice krispy cereal
1 cup coconut
1 cup oatmeal
3/4 tsp salt
3 1/2 cups flour
1 tsp soda
1 tsp cream of tartar
Cream together the sugars and butter. Add oil, egg, vanilla and mix together. Sift together the salt, four, soda and cream of tartar. Add by 1/3’s to the wet mixture. Lastly, gently stir in the cereal, coconut and oatmeal. Bake at 350 for 11-12 minutes. Yield 5 dozen. Note about them getting hard: they can get hard if you let them sit for too long. If you like a crispy cookie, then this is fine. If you want to soften them up, just place a piece of bread in your cookie container. I am not a scientist and don’t know what effect is taking place there, but it works with pretty much any cookie.
This is my favorite little spatula. I’m not sure if you can see in this photo above, but there are small part missing from the end of the spatula. Who knows where they are? Maybe in another batch of cookies or cupcakes? Maybe I licked the spatula too forcefully? Hard to say! Maybe I should get a new one?
OK, here is the other thing. I don’t have a proper sifter either. What kind of self respecting baker doesn’t have some of these simple things? Some other things I don’t have I can think of would be a TEASPOON measuring spoon (WHY?? Luckily, I have a set on order from my Pampered Chef friend) or a cookie scoop. By the way, this strainer works just fine as a sifter!
Little pieces of coconut get toasted and the krispy rice makes for a really unique textured cookie. These are keepers!
Crispy and chewy.
Make and share with friends. Mr. FeistyEats says I bake too much (poor guy, right?!?), so I made these cookies with intentions of keeping one dozen and giving the others away. Here is a story of how dumb I am. The day I made these, it was a sunny, 70+ degree day. So, I got my bike out, put a few dozen cookies in my backpack and rode my bike about 8-9 miles around Hazen looking for someone I knew. It was so nice out, I would surely run into some people I knew. Ummm, nope. I just rode 9 miles with cookies in my backpack for nothing! I still ended up being able to share them with friends though. Enjoy! | mini_pile | {'original_id': 'f69ca1fb8410ae925ae91c96ae49c2d16b2263183e5b7486c5afd7ee2305fbc0'} |
@article{10.1167/iovs.19-27979, author = {Foote, Katharina G. and Rinella, Nicholas and Tang, Janette and Bensaid, Nicolas and Zhou, Hao and Zhang, Qinqin and Wang, Ruikang K. and Porco, Travis C. and Roorda, Austin and Duncan, Jacque L.}, title = "{Cone Structure Persists Beyond Margins of Short-Wavelength Autofluorescence in Choroideremia}", journal = {Investigative Ophthalmology & Visual Science}, volume = {60}, number = {14}, pages = {4931-4942}, year = {2019}, month = {11}, abstract = "{ We studied the relationship between structure and function of the choriocapillaris (CC), retinal pigment epithelium (RPE), and photoreceptors in patients with choroideremia (CHM). Six CHM patients (12 eyes) and four normal subjects (six eyes) were studied with fundus-guided microperimetry, confocal and nonconfocal adaptive optics scanning laser ophthalmoscopy (AOSLO), near-infrared and color fundus photos, short wavelength fundus autofluorescence (SW-AF), and swept-source optical coherence tomography (SS-OCT) and angiography (SS-OCTA) images. Cone spacing was represented using Z-scores (standard deviations from the mean at that eccentricity). CC flow voids were defined using a threshold of 1 SD below the normal mean. Cone spacing Z-scores were not significantly correlated with distance from the borders of preserved RPE, determined using either the SS-OCT or SW-AF scans. Cone spacing Z-scores were significantly correlated with CC flow voids and retinal sensitivity. Flow voids were abnormal in regions of preserved RPE and increased progressively from within −2° of the preserved area to +2° beyond the border. Visual sensitivity decreased as CC flow voids increased approaching and beyond the border of preserved structure. In CHM, cone spacing Z-scores correlated with CC flow voids, and were negatively correlated with retinal sensitivity, suggesting cone degeneration accompanied reduced CC perfusion. Functional cones were found outside the presumed borders of preserved outer-retina/RPE as defined by SW-AF, but not outside the borders determined by SS-OCT. The use of SW-AF to identify the border of preserved structures may underestimate regions with cells that may be amenable to treatment. }", issn = {1552-5783}, doi = {10.1167/iovs.19-27979}, url = {https://doi.org/10.1167/iovs.19-27979}, eprint = {https://arvojournals.org/arvo/content\_public/journal/iovs/938247/i1552-5783-60-14-4931.pdf}, } | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '35', 'language_id_whole_page_fasttext': "{'en': 0.9092604517936708}", 'metadata': "{'Content-Length': '3471', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TFIY6NVQ2DGVILWPMFCEPG63JH62Q3UV', 'WARC-Concurrent-To': '<urn:uuid:eb616e60-ffee-4052-ab00-5e45a167d659>', 'WARC-Date': datetime.datetime(2021, 6, 23, 0, 18, 15), 'WARC-IP-Address': '52.191.96.132', 'WARC-Identified-Payload-Type': 'application/x-bibtex-text-file', 'WARC-Payload-Digest': 'sha1:LO27NEWPCUQJSTPL55KMTP3KCGYX7JQ2', 'WARC-Record-ID': '<urn:uuid:d5055048-4dc8-40fb-bcdf-2474a89fb33d>', 'WARC-Target-URI': 'https://iovs.arvojournals.org/Citation/Download?resourceId=2756155&resourceType=3&citationFormat=2', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c4af8dfe-201d-45f8-add9-702b55ffe354>', 'WARC-Truncated': None}", 'previous_word_count': '287', 'url': 'https://iovs.arvojournals.org/Citation/Download?resourceId=2756155&resourceType=3&citationFormat=2', 'warcinfo': 'isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-187.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05993068218231201', 'original_id': '3e2eae64fb8161488dc3710096c073fb93662f35b45f4855fed2d16bfa0e238d'} |
\section{Analytic Continuations of Riemann Zeta Function to Right Half-Plane}
Tags: Riemann Zeta Function
\begin{theorem}
The Riemann zeta function has a unique analytic continuation to $\set {s \in \C : \map \Re s > 0} \setminus \set 1$, the half-plane $\map \Re s > 0$ minus the point $s = 1$.
\end{theorem}
\begin{proof}
Note that by Riemann Zeta Function is Analytic, $\map \zeta s$ is indeed analytic for $\map \Re s > 1$.
By Complex Half-Plane minus Point is Connected, $\set {\sigma > 0} \setminus \set 1$ is connected.
By Uniqueness of Analytic Continuation, there is at most one analytic continuation of $\zeta$ to $\set {\sigma > 0} \setminus \set 1$.
By either:
* Analytic Continuation of Riemann Zeta Function using Dirichlet Eta Function
* Analytic Continuation of Riemann Zeta Function using Mellin Transform of Fractional Part
* Analytic Continuation of Riemann Zeta Function using Jacobi Theta Function
there exists one.
{{qed}}
\end{proof}
| math_pile | {'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '1ef997d22f97b84e96eb694651af032f602b559eef9dbb217e764d54f6846203'} |
Brownies and onion dip
Pages
Sunday, February 8, 2015
This weekend was stake conference (church meetings where multiple congregations come together). Last night was the adult session. As I pulled into the parking lot, I saw multiple couples walking in holding hands. I was instantly very aware of my single status. It's unusual for me to struggle with this at all. I'm very happy with my life. Last night, though, I felt like an outsider walking into that chapel. I saw the neighborhood grandpa and his wife, and they made room for me to sit. I mentioned the single-status-reminder to him, and bless his heart, he reached out and held my hand for a second. We had a good laugh about it. After the meeting, two couples decided to go out for pie and invited me. I declined, because I needed to do more homework, but it was nice of them to make me feel included.
Lesson learned: I'm only alone if I choose to be. I have a great support system.
Today I had a headache and I had to force myself to go to stake conference, because it's always worth it. The stake president said how great it was to see everyone there with their families, and my immediate response was positive. I realized that yes, I was there as a family! Either as a family of one or with my ward family.
I heard so many things that touched my heart this weekend, both spoken words and thoughts that came as a result of being in the right place at the right time. It would have been so easy to turn around and leave last night, or to stay in bed today, but I was blessed as a result of making the right choice.
2. Spotify. I like Pandora (with Chrome blocking the ads) but I'm really starting to dig Spotify. Currently enjoying Premium access for 3 months for only 99 cents. Even better!
3. Nostril waxing. Sounds nuts, but I think many men and some women would benefit from it. My friend told me about it and I tried it a couple months ago. You barely notice any pain - definitely the easiest area I've ever had waxed. And if you're in the Salt Lake area and have any waxing needs, I love Carly at Wax Me Too.
Sunday, January 4, 2015
I had a change in my church calling (assignment) effective today. I've been serving with the ward young women for almost five years, and now I'm going to be serving as the secretary for the stake young women presidency instead. I found out last Sunday and it's been an odd week, trying to ease out of my responsibilities but not knowing my new ones. Today was an emotional day for me. I shared my testimony with the girls and then went to the stake offices to get set apart. Then we had two meetings in a row. I've immediately been put to work, for which I'm grateful.
I've never before spent this long in the same calling. This is not the hardest time I've had getting released, probably because I'll still be around the girls to some degree, but it is an adjustment. I'm hopeful that I'll have more Tuesday nights available for dancing (yay!) but it will certainly be work in different ways.
I'm grateful for this new opportunity to serve and grow. I'm grateful for the gospel and the organization of the Church. I am incredibly blessed and I hope I remember to recognize my gratitude for all that I have.
Saturday, December 27, 2014
It was a fantastic Christmas season. Festival of Trees, a live nativity (with a camel!), California with family, sewing, baking, Messiah sing-along, looking at lights, ice skating, dates, helping with missionary care packages, a party with the young women at church, etc.
I've already put photos on Facebook or Instagram, and I get so focused on enjoying family that I slack at taking pictures while I'm with them. I did take some baking pictures and I'll share recipe links in a later post. Here's a blurry picture with my sister and mom.
For the last year or so, I've been asking my grandma questions in order to write her life story. On this visit, I did some of the interviewing as a video. It increasingly hits me that I don't know how much longer I'll have, and I want to remember her voice.
Saturday, November 29, 2014
I'm stressing over the end of the semester, but I'm starting to plan Christmas baking. This is my favorite source of recipes for Christmas cookies. It's the most adorable book (as all Gooseberry Patch books are) with cute ideas and cutouts for cookie exchanges.
I always completely skip over this chapter, because cut-out cookies are too much hassle for me.
Tuesday, November 25, 2014
It's November and I love posting one thing each day for which I am thankful, but I have friends on Facebook who hate it. I'm going to update this blog post every few days instead.
I'm thankful for...
1: The beauty of God's earth. There are so many amazing places to explore within a reasonable traveling distance.
2: Getting home safely even though we drove through rain and snow storms and lost traction a few times. Time to replace my tires!
3: People who let me into their lives.
4: How fluffy my carpet feels after vacuuming with the vacuum I just bought.
5: Knowing exactly where to turn for peace when dating brings disappointments.
6: Scoring 86 on my last exam! Way higher than the first two!
7: The peace and inspiration I find in the temple.
8: Beautiful fall weather.
9: Laughter. I laughed my way to tears several times today.
10: Rain on my birthday. I love it.
11: My sweet sister doing yard work for me. It's ready for winter!
12: My parents' 32nd anniversary. I'm grateful they stuck it out on this go-round.
13: Sweet friends who make me sweet birthday treats.
14: New tires and the $ to purchase them, so I can drive safely this winter.
15: The empowering feeling that comes from repairing things in my home.
16: Heat. Baby, it's cold outside. (There's ice inside my windows.)
17: The flexible schedule of my new job position. I love the reduced stress.
18: The talents and accomplishments of the lovely young (and not-so-young) women at church and their willingness to share.
19: The semester being almost over! Only one more new concept to learn and then it's all review and assignments!
20: The repair to my water heater being simple and inexpensive (and my banging pipes being fixed as a side benefit).
21: The opportunity to appreciate good music with a fellow music-lover.
22: Men who act as gentlemen on dates.
23: Sisters who remain dear to my heart across the miles and through divorce.
24: Living in a city where I feel safe. (Praying for those in rioting areas.)
25: The beautiful view of lights across the valley from my dining room.
26: The healing power of the Atonement.
27: Peace.
28: The Christmas season.
29: Leaves to rake - just the right amount to keep it enjoyable!
30: The opportunity to learn by preparing a talk for church.
About Me
Yes, I like brownies with onion dip. I pretty much love dip of any kind - it makes me happy. I also love the sound of my windchimes blowing, the feel of the fairly constant breeze, and walking through crunchy leaves. I'm on a bread hiatus right now, but if you're wondering why I was baking so much, read this. | mini_pile | {'original_id': 'd6f30e94cdf5e4f327b57f4a0b85ba81b1f30cd2592514271465bfb818c0250e'} |
To be extra accurate, you will be actually capable to hack your android phone by simply installing certain applications that are accessible online for free of charge. In order to receive the finest video game hacker without root treatment on your phone, you are going to possess to pay a small rate for it. brawl stars how to get a brawler hack
Because of the limitless in-app acquisitions it supplies, the main factor why numerous folks will prefer to acquire the greatest game cyberpunk android app is. The valid sites will certainly let you install the application totally free. After you have installed it, you are going to be able to enjoy the in-app purchases, video games and other costs solutions for your phone along with the limitless in-app investments possibility. house of fun cheats no survey
Playing offline games is extremely enjoyable. Regrettably, you may certainly not regularly play these games on an android phone as they carry out certainly not function effectively with the equipment of the tool. Lots of people perform not such as offline video games as they find them mundane. Nonetheless, it must be actually taken note that the majority of these applications are just a duplicate of the original activities as well as for that reason job fine. To bring in the activity much more preferred and exciting, it is highly recommended that you set up the android game hack resource on your phone. how to hack battle cats ios 10
There are actually 2 techniques to get the most current android activity cyberpunk devices. Many of these apps are going to work great if you are not originated your phone. Prior to you download and install the app, make certain that it will certainly work on your tool.
The android game hack device may additionally be secured with various other techniques such as exploring on the web for these apps. If the resource is actually understood and also checked through a lot of folks, the plan is going to most perhaps be legal and secure to make use of on your phone.
If you are thinking about how this operates, the android game hack resource allows you to install video games without possessing to purchase them. If you simply have one totally free application with which to participate in, you are going to definitely wish to possess numerous added lifestyles so you can easily possess a chance to try all the brand-new ones that are actually being launched by the game designers.
Through this android video game hack device, you will certainly be able to enjoy yourself with all your beloved games without investing a singular cent. Merely make certain to utilize this app in a safe as well as legal method. By doing this you are going to never ever enter trouble for any sort of illegal downloads. This are going to ensure that you will always have an undisturbed device to use for all your downloading needs without worrying about your lawful civil rights. You can install as a lot of your beloved activities as you really want, for just as long as you possess your relationship and also money to pay for it.
Listed here is an illustration of what it is all approximately if you are still certainly not sure regarding what an android hack is actually. Primarily, an “unpacked” rom is a hack or even a Trojan that allows somebody to mount their very own function on your phone’s moment without your authorization. To utilize this treatment, you will must install a malicious android patcher on your unit through a USB wire. From certainly there, you are going to have full root access to all the apps, which are going to enable you to mount your preferred android video games without worrying about your data.
If you are trying to find a brand new technique to increase your discounts with applications, you need to look at downloading and install an android game cyberpunk app. When a certain application functions faultlessly as well as then begins plunging our phones, numerous of our team presently understand just how frustrating it is actually. That’s why these applications were developed in the first place. These hacks permit customers to have a good time along with the countless apps presently readily available on the Play Establishment.
What produces an android activity hacker app unique is actually that it enables you to bypass safety and security steps put in place to always keep harmful software program out. Bypassing these measures means that you can install applications and activities on your phone that have actually certainly not been actually examined by their creators. The protection steps in place to shield your phone are actually phoned “breakout”. This basically means that an exclusive plan is actually mounted on your phone which can easily allow you to put in programs/roms which you would not commonly have the ability to.
A ton of individuals use these apps since they desire to have additional downtime on their phone. We’ve all found out about the unrestricted in-app acquisitions that a lot of well-liked apps offer. This implies that customers can virtually spend so long as they prefer on their favored applications without investing any sort of amount of money in any way. Several of these applications are video games which empty your phone’s resources. You may assist your own self to delight in even more activities on your phone through downloading an android video game cyberpunk resource.
One example of an android activity hack tool that is actually commonly made use of is actually the app called “Cyanide”. This is actually certainly not unrestricted in-app purchases, nor is it embeded on any kind of downloads. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9674950838088988}", 'metadata': "{'Content-Length': '27967', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SS4UKCFSZNWUBGHH7FXBDFMKRVW6E67G', 'WARC-Concurrent-To': '<urn:uuid:55b4f28f-7fa5-4485-8201-4dafaff20e66>', 'WARC-Date': datetime.datetime(2021, 1, 23, 17, 54, 32), 'WARC-IP-Address': '208.123.119.90', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4JYCNODEOAYVBBKUQUJMVUVCQ45FQSG7', 'WARC-Record-ID': '<urn:uuid:75f64de7-0747-449e-b889-5c173c6395cb>', 'WARC-Target-URI': 'http://www.fartstable.com/2021/01/11/exactly-how-to-possess-a-wonderful-android-video-game-hack-device-with-marginal-investing/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:eca1c727-2198-4a8a-af08-d6f6880224e4>', 'WARC-Truncated': None}", 'previous_word_count': '952', 'url': 'http://www.fartstable.com/2021/01/11/exactly-how-to-possess-a-wonderful-android-video-game-hack-device-with-marginal-investing/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-246.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02185589075088501', 'original_id': '6e328e64a6623be74785cb334a96c06d5e7b5974ab5fc9d67b31b6ca08bf91f2'} |
View Full Version : Rendering components in grids
15 Apr 2009, 1:15 AM
we are currently on the verge of defining and implementing a generic description mechanism for UI controls. The render implementation uses mainly GXT components.
For table like components we want to use Grid elements. But we don't want to be restricted to only rendering strings but also want to render components (or more generic: widgets).
I know from other older posts that the use of the Table components is encouraged when rendering widgets, on the other hand the Table seems to be old and getting deprecated.
So we started with a solution (with a button as an example widget) that does the following:
// in the GridCellRenderer:
public String render(GwtCellData cellData, String property, ColumnData config, int rowIndex, int colIndex, ListStore<GwtCellData> store) {
final Widget widget = forwardToRender(cellData.getValue());
Element div = DOM.createDiv();
if (widget instanceof Component) {
Component component = (Component) widget;
String htmlcode = div.getInnerHTML();
return htmlcode;
public Widget forwardToRender(String value) {
final Button button = new Button(value);
DeferredCommand.addCommand(new Command() {
* {@inheritDoc}
public void execute() {
Element element = DOM.getElementById(button.getId());
Element buttonEl = (Element) element.getElementsByTagName("button").getItem(0);
DOM.sinkEvents(buttonEl, Event.ONCLICK);
DOM.setEventListener(buttonEl, new EventListener() {
* {@inheritDoc}
public void onBrowserEvent(Event event) {
BaseEvent base = new ComponentEvent(button);
button.fireEvent(Event.ONCLICK, base);
return button;
The code is a merge of several classes and reduced to the essentials.
The key point is that we generate the HTML of a widget and return it to the renderer as a string. We then add listeners for the basic events via a deffered command to the component that should be part of the DOM at that time.
This of course depends on the DOM implementation of the component and requires to bind all required events manually.
Our questions are:
Is there a better solution?
Can we be sure that this solution doesn't run into memory leaks?
Thanks for any help,
21 Apr 2009, 10:20 PM
Hi again,
is there anybody who could help us with this issue?
Kind regards,
27 Apr 2009, 1:47 PM
You will run into memory leaks as you setup eventlistener and dont remove them.
27 Apr 2009, 10:29 PM
Thanks, Sven.
Do you know how we can prevent them? How can we release the event capturing/remove the event listener? I didn't find a suitable method in the DOM class API.
29 Apr 2009, 12:20 PM
Event listeners should be set on attach, and removed on detach. Look at Widget.onAttach and Widget.onDetach for an example. This ensures listeners are only set while the widget is part of the DOM. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.7805200815200806}", 'metadata': "{'Content-Length': '7913', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:X2VTMX25U4WLTV3UMZPMK63DM6ERLBYK', 'WARC-Concurrent-To': '<urn:uuid:9256f727-724f-47ac-a836-ac95c8f2b13a>', 'WARC-Date': datetime.datetime(2014, 8, 1, 22, 36), 'WARC-IP-Address': '50.19.85.59', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:X6BKVBZT6YZWORM6KRT2VRJSNWBMUMBM', 'WARC-Record-ID': '<urn:uuid:70e6dc0b-aa74-4208-af21-4b7f87282c2a>', 'WARC-Target-URI': 'http://www.sencha.com/forum/archive/index.php/t-65568.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ec6ab89d-fc42-4329-9608-251ac3ad1cd6>', 'WARC-Truncated': None}", 'previous_word_count': '424', 'url': 'http://www.sencha.com/forum/archive/index.php/t-65568.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024546504020690918', 'original_id': 'dd3498f80ba128c0dc59032f91169d7557221ef67ad6b1f787d5761aeb969b2d'} |
Borates for Metal Recovery and Recycling: Adding Sustainability to the Metals Mix
:: Thursday, August 13, 2020 :: Posted By Maryam Moravej
For thousands of years, humans have refined and worked metals into objects of utility and beauty. Through the application of heat—and select additional components—metals lend their strength and flexibility to an infinite variety of uses.
One of the most wonderful things about metals is that once they have served a lifetime of use in one form, they can be transformed again, making them a practical go-to material for everything from heavy industry and construction to electronics, batteries, household products, and even art.
Borates are key to metal recovery and recycling processes that help to ensure more efficient and environmentally sustainable metal use across industries. As a major global supplier of borates for metal producers and recyclers, U.S. Borax offers both a variety of borate products and the expertise and technical knowledge to ensure metal recyclers and producers have access to the right borates for their applications and processes.
Metal recovery and recycling: Essential in manufacturing supply chains
Recycling and recovery are two sides of the same coin. Recycling is reprocessing scrap or waste metal into new products. Recovery is the process that extracts the purified metal from the scrap. Recycling and recovery of metals such as brass, bronze, copper, lead, zinc, and aluminum can come from scrap or from slag that is left over from a primary smelting operation. Metal can be recycled repeatedly without degrading its desirable properties.
Recycling and recovery of metals provide significant benefits for industry and for the environment:
• Recovered and recycled metals are available at a fraction of the cost of virgin metals
• Scrap provides a continuous source of material
• Energy consumption for recovery and recycling is dramatically less than purifying metal ore: Recycling aluminum and copper, for example, uses 90-94% less energy than producing new metal
• Manufacturers can source recycled metals closer to home, through local or regional scrap sources
Scrap metal is not waste, it’s a resource. And for many manufacturers, it’s an essential key to their supply chain optimization.
The power of borates in metal recovery and recycling
Producing a pure metal product requires removing all oxides and extraneous impurities. Borates help by acting as fluxes during melting, combining with metallic oxides at relatively low temperatures to bring them to the surface of the melt as a slag that can be decanted or skimmed off.
The flux effect is different for different metals—and in different processes. For example, in aluminum production, boron in the form of fluoboric acid (HBF4) is used as flux for aluminum reduction. During aluminum production, boric oxide added to the pot lining has shown to be a suitable reactant to decrease the formation of cyanide, a hazardous waste. Boron is also a grain refiner and hardening agent for aluminum.
Borates are not the only flux agent that can facilitate metal recovery processes. Other fluxes include lead carbonate, soda ash, silica, scrap iron, or combinations of multiple fluxes. However, borates offer marked advantages over other flux agents. Borates:
• Produce a high-solvent action on metal oxides and siliceous materials, resulting in a purer metal product
• Reduce liquidus temperature, enabling formation of highly fluid slags and the extraction of more metal from the slag
• Enable easier thickening and skimming of slags depending on metal chemistry
• Reduce manufacturer’s energy costs because a lower melting point is required in the furnace
• Reduce the leaching effect of lead sulfate from slag in lead recovery, which enables improvements in the cooled, more solidified slag
• Are easy and safe to handle
• Are non-combustible and have minimal fuming tendency
Your choice of borates for metal recovery and recycling matters
Given the nature of a fluxing agent in metal recovery, it might seem that any borate could do the job. Any superfluous materials would simply be carried away in the slag, right? However, the type of borate product you choose for your process can influence the safety of people, equipment, and the environment.
For example, 20 Mule Team® Borax Neobor® (a hydrated borate) is the most common form of sodium borate used in industry. It might seem like a simple choice for a smelting operation, too. And in many operations, it is an excellent choice. However, the effects of Neobor and Dehybor® in a smelting process are quite different.
As Neobor’s sodium borate heats up, it dehydrates slowly and forms a melt that tends to bubble and sputter as it loses additional moisture. In smelting operations, anhydrous borates such as Dehybor help to avoid sputtering—and even potential steam explosions—making them a safer choice.
In metal recovery smelting, Dehybor improves both process quality and safety. It is an excellent solvent for metallic oxides at high temperatures. In addition:
• Hydrated borates may be more corrosive to refractory brick because of the water they emit.
• Because Dehybor is already dehydrated, less product is required per ton of recycled material, which may deliver cost savings to manufacturers.
• As a refined borate, Dehybor (like other U.S. Borax products) contains the lowest possible amount of toxic elements such as arsenic. As a result, Dehybor releases fewer toxins into the environment during smelting.
• In gold recovery, the formation, purity, and consistent granulometry of borates are important. Dehybor’s consistency makes it the ideal product for preventing “spit and crackle” problems and facilitating the proper melt.
The know-how you need to select the right borate
For scrap metal recyclers, U.S. Borax is a reliable and experienced partner. Whether your facility is a small manufacturing operation or a large distributor, we enable on-time delivery through our established logistics operations and global warehouse network.
But we go beyond the sale, offering technical support to help ensure the right product and right use for your application. Turn to us for guidance on the function of borates in your process, samples for testing, and recommendations for formulations based on our extensive research and experience.
Together, we can ensure the efficient use of metals—and solve one of the significant challenges of modern living.
Copyright © 2021 Rio Tinto. All Rights Reserved. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '70', 'language_id_whole_page_fasttext': "{'en': 0.9158711433410645}", 'metadata': "{'Content-Length': '69341', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SFCDLB5PG22M6LD2NDGDSTCSUTSWTJXN', 'WARC-Concurrent-To': '<urn:uuid:6d1c8c93-60c5-484b-83d7-58569bb12879>', 'WARC-Date': datetime.datetime(2021, 9, 20, 6, 23, 33), 'WARC-IP-Address': '45.60.196.134', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TTBRIWVMP5VMVUYN43LF7MGKJHJ4BS7G', 'WARC-Record-ID': '<urn:uuid:e500843b-2b86-4d9c-81f9-675fdf167d6e>', 'WARC-Target-URI': 'https://www.borax.com/news-events/august-2020/borates-for-metal-recovery-recycling', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1b54a619-e7b2-4789-baeb-16c94b1dd5a9>', 'WARC-Truncated': None}", 'previous_word_count': '1070', 'url': 'https://www.borax.com/news-events/august-2020/borates-for-metal-recovery-recycling', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-22\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018609941005706787', 'original_id': 'b3bcc74b760fd047734c98ba37f210aacb4aa07af7eec3ff9c7cf8a32b6ce380'} |
ios8,nsarray , Shuffle NSArray
Shuffle NSArray
Tag: ios8,nsarray
I got an NSMutableArray with a rather small number of objects that varies from 1 to max 20.
When user taps a button I want to select one random object and display it. I've tried shuffling the array:
for (NSInteger x = 0; x < [array count]; x++) {
NSInteger randInt = (random() % ([array count] - x)) + x;
[array exchangeObjectAtIndex:x withObjectAtIndex:randInt];
And then select a random index using arc4random() but I get many repetitions. I do not want to removeObjectAtIndex as this would only reduce my array to zero and then crash. Is there a way to repopulate the array with the same objects once reached zero and start over again?
I managed to "solve" my issue by doing the following: It maybe messy but I would like some input on this.
NSUInteger randomIndex = arc4random()% [_someArray count];
if (array.count == 0) { //check if array is empty and add the randomIndex
[array addObject:@(randomIndex)];
randomTitle = [[_someArray objectAtIndex:randomIndex] myText];
// NSLog(@"array is empty");
// NSLog(@"my array content %@", array);
else if (array.count > 0 && array.count < _someArray.count) {//check if array has already an object and check if this is unique and add it to the array. if not run the loop again.
NSLog(@"array is betwen 0 and _someArray.count");
if([array indexOfObject:@(randomIndex)] == NSNotFound) {
[array addObject:@(randomIndex)];
randomTitle = [[_someArray objectAtIndex:randomIndex] myText];
// NSLog(@"unique number in array");
else {
[self loopBackTheAction];
// NSLog(@"number is alreday in array");
else if (array.count == _someArray.count) {//check if the array is full and empty it. run the loop again.
[array removeAllObjects];
[self loopBackTheAction];
// NSLog(@"array is full running again the loop");
How to i create new arrays using swift?
I'm not exactly sure what I am looking for, so I'm just going to give you an example... Inside App Lets say I am making a shopping list app. In the app, you can create as many shopping lists as you like, and in those shopping lists, you can add...
iOS 8 simulators not visible in XCode 7 beta
I'm using the XCode 7 beta that Apple released during WWDC2015, and it looks like iOS8 simulators are not there in it. I tried downloading them using the Xcode > Preferences > Downloads > Components, but it doesn't list the simulators. I have Xcode 6.3.2 also on the mac, and... Framework Sort Date Next Birthday
Need to sort on iOS by date using but I need to order them based on the next birthday for a specific person. I tried to add the day and month with the current or next year and that helped but that will be a manual process, any recommendations...
Set Images Randomly for buttons from array and take button's cgrect's from aray
I have 42 buttons in my storyboard and I have take array of images. In this array there are total 7 images. NSArray *arrimg=[NSArray arrayWithObjects:@"book.png", @"lock.png", @"Exclamation.png", @"game.png", @"Music.png", @"Videos.png", @"Camera32.png", nil]; So how could I take random images every time on button? Should I take button collection or do...
Cannot invoke 'canEvaluatePolicy' with an argument list of type '(LAPolicy)' Swift2.0 Xcode 7
I have a problem with canEvaluatePolicy function. I have declared this function like this : func canEvaluatePolicy(policy: LAPolicy) { do { try authenticationObject.canEvaluatePolicy(.DeviceOwnerAuthenticationWithBiometrics) } catch let error as NSError { print("Error: \(error.domain)") } } But when I want to use it like this: if authenticationObject.canEvaluatePolicy(LAPolicy.DeviceOwnerAuthenticationWithBiometrics) { I have an error:...
Wikitude does not work. Poi do not change the position on phone position change
I am trying to integrate AR poi view with Wikitude in my app. As html I used a file from the example 4_PointOfInterest_4_SelectingPois. It should render a few point around my location. It does it, but all points stay in the same position all the time, although I changed my...
Core Data and a UIActivityViewController
I have my app that is using core data to persist data. I have a UIActivityViewController setup on my main VC. Everything is working as I expect it to. My question is when you go to grab items from a core data model, how do you have it give you...
Move UIToolbar with keyboard iOS8
I have a UIToolbar at the bottom of my ViewController that is inherited from the self.navigationController. I show it in my ViewController in the viewWillAppear: method using this code: [self.navigationController setToolbarHidden:NO animated:NO]; self.navigationController.toolbar.backgroundColor = [UIColor blackColor]; self.navigationController.toolbar.tintColor = [UIColor blackColor]; self.navigationController.toolbar.barStyle = UIBarStyleBlackOpaque; After that, my ViewController has both programmatically...
UISearchController: show results even when search bar is empty
As I understand, the default behaviour of UISearchController is: On tapping search bar, background is dimmed and 'cancel' button is shown. SearchResultsController is not shown till this point. SearchResultsController is displayed only if search bar is not empty. I want to display SearchResultsController even when search bar is empty but...
Why does didUpdateLocations: only have one location after locationManagerDidResumeLocationUpdates:
I have location services working in iOS8. It is set for kCLLocationAccuracyBest using startMonitoringSignificantLocationChanges to restart when in the background and startUpdatingLocation for accuracy. When I set pausesLocationUpdatesAutomatically = YES, the location services get paused and resumed as expected. However, the following call to didUpdateLocations: only has one location in...
Test-Flight App beta testing time limitations
I need to submit my binary files over the air without pushing app to app-store. one solution is using enterprise program, Test-Flight App Beta Testing we can send binary files to external users to limit of 1000. My Questions is : will apple take beta review (following apple guidelines) of...
iOS 8 Autolayout - Visual Format Language how to add constraint to superview's edge
Can I pin my view to my superView's edge instead of its layout margin through VFL? Can I be even flexible to toggle "Relative to margin" on myView as well? NO VFL (this is what I want to achieve with Visual Format Language): var constraintLeft = NSLayoutConstraint(item: myView, attribute: NSLayoutAttribute.Left,...
Restrict app for iPhone devices lower than iPhone 5 with iOS 8 or 7 in AppStore
I planned to develop application with targeted devices iPhone 5/5S, iPhone 6/6+ . I don't want my application to be runnable on iPhone 4S. Can i able to achieve that? I googled some sites , they were mentioned that we can restrict older version mobiles like iPhone 3GS using front...
NSArray? doesn't have member named “Generator”
I am getting a weird error from this segment of the code: let path = NSBundle.mainBundle().pathForResource("SampleData", ofType: "plist") let dataArray = NSArray(contentsOfFile: path!) for dict: AnyObject in dataArray{ ...} ...
Passing String array to a function
Autolayout works great on iOS 8, crashes on iOS 7
UITableview with more than One Custom Cells with Swift
As absolute beginner I have to ask those questions: I want to use a UItableview with different custom TableviewCells. One Cell should have an image and a label. Another cell should have two label. A third cell should have a dayPicker. I don't have to create Tage cell in the...
Why is boundingRectWithSize wrong when using UIFont preferredFontForTextStyle?
I have found that a call to boundingRectWithSize is extremely incorrect, missing an entire additional line, when called with NSFontAttributeName : [UIFont preferredFontForTextStyle:UIFontTextStyleBody]. However, using the font [UIFont fontWithName:@"Helvetica Neue" size:17.f], it is just fine. Here is test code showing the bug: - (void)viewDidLoad { [super viewDidLoad]; NSString *measureText =...
UILabel text isn't updated when modal re-appears
I've created a reusable modal UIView as a singleton object, but am having trouble changing the text of a label it contains. When the modal appears a second time, the new text appears over the old text. I'm guessing this is due to the fact that the label is only...
Sort NSArray to a particular sequence using an NSComparisonResult
I'm trying to sort my arrays with a particular sequence using an NSComparisonResult. I'm unable to figure out how to achieve the sequence I'm wanting. I'm trying to weight Emojis towards the top (sequence of Emojis doesn't matter), followed by A-Z letters with giving a weight towards lowercase before uppercase,...
Using the device simulator for iOS 8 with Xcode 7
I thinking about port my App to Swift 2 and Xcode 7. But the device simulator only targets iOS 9 and I see no way to download iOS 8. I have parallel Xcode 6.3 installed. Is there any way to test and debug my app under iOS 8 with the...
A Plugin to view PDF document in iOS cordova based application
Can please suggest a working plugin to view PDF in iOS Cordova based application. I have tried many of PDF related plugins: but of no use..My application stopped at loading. Lastly with I have tried with pebois/phonegap-plugin-PDFViewer: I have installed using : "cordova plugin add com.lesfrancschatons.cordova.plugins.pdfreader" In index.html:...
Bluemix authentication ios8 with google and facebook
Parsing JSON into a usable format
I'm currently downloading data from a server and I'm not sure how to get the response that I'm getting back into the format that's expected by the method that I'm working with. Could someone guide me on what I would need to do to get all of the items in...
Cannot subscript a value of type [CLPlacemark] with an index type int
I would like to retrieve the current location. I work with on swift Xcode 7. I looked PLUSIEUR tutorials, but every time they use the same method. Here is my code and my error: ! Error : Cannot subscript a value of type [CLPlacemark] with an index type int import...
Remove “heightForRowAtIndexPath” for iOS8
Fatal error when unwrapping CLLocation Location Coordinate
I currently have a test application to teach myself Core Location. It is an app with a button which will either show your location when you press a button, or an alert when location services are off. I get a fatal error (unexpectedly found nil when unwrapping option value) When...
Switch between views using a Tabbar
I have an iOS application with a Tab Bar, and two subview. My first view is a Table View. So, I want to switch to the second view when I click on a cell of the first view, and keep the TabBar visible. When I do that using "Show" segue...
View set as inputAccessoryView throws exception when added back into normal view
I have a text view, some decorations etc. in a view and I want that view to dock on keyboard, just like any other messaging app. When I'm about to display my text view, here is how I attach my view to the keyboard: -(BOOL)textViewShouldBeginEditing:(UITextView *)textView{ UIView *inputView = self.textInputView;...
Swipe up to show button in UITableView?
I'd like to place a button at the top of a UITableView or UICollectionView, but only shown when swiped up beyond the first row. Usually you see scroll to refresh or a search bar there, but I'd like to put a button there for another functionality. How can I do...
NSPredicate with bitmask for filtering NSArray
I'm trying to test whether some particular asset collections contain only one media type/subtype using an NSPredicate. The: testForPhotosPredicate works just fine, however when trying to use the testForPanoramasPredicate it fails with the message: Unable to parse the format string "mediaSubtypes & %i" How can I use a bitmask in...
Error after update to Swift 1.2
I updated shortly to Swift 1.2 which comes with Xcode 6.3.2 and wrote a few lines of code: let originView:UIView! override init() { super.init() } init(sourceView:UIView, menuItems:Array<String>){ super.init() originView = sourceView } This code runs perfect till I updated the new version of Xcode (6.3.2). Now I get the following...
Objective C - How do I convert this NSArray to an NSDictionary so I can look up city names by zip code?
I use Parse as my backend, and have a cloud function (written in javascript) that just returns an array var providerZIPToCity = [ {zip:"48393", city:"WIXOM, MI"},{zip:"48116", city:"48116, MI"},{zip:"48114", city:"BRIGHTON, MI"},{zip:"48189", city:"WHITEMORE LAKE, MI"},{zip:"48178", city:"SOUTH LYON, MI"},{zip:"48168", city:"NORTHVILLE, MI"},{zip:"48167", city:"NORTHVILLE, MI"},{zip:"48375", city:"NOVI, MI"},{zip:"48374", city:"NOVI, MI"},{zip:"48165", city:"NEW HUDSON, MI"},{zip:"48377", city:"NOVI, MI"},{zip:"48390", city:"WALLED...
NSObject class conforms to protocol contained in NSArray with Swift
I would like to create a method in Swift that returns an array of NSObject objects that conform to a protocol. I've tried something like this: func createManagers() -> [Manager] { let result = NSMutableArray(capacity: self.classes.count) (self.classes as NSArray).enumerateObjectsUsingBlock { (object: AnyObject!, idx: Int, stop: UnsafeMutablePointer<ObjCBool>) -> Void in //...
Core Location and UITableView performance issues in iOS 8
I have a view controller that contains two views: a map view using the Google Maps API and a UITableView. The view controller fetches a list of location objects from Google Maps within a certain radius of a particular location and plots them on the map view as markers and...
Auto Rotation iOS 8 Navigation Controller
I have certain viewControllers which are managed by a UINavigationController (push and pop). I want to restrict different viewControllers to different orientations like the first one should be only in Portrait, second in portrait, third in landscape and fourth can be portrait and landscape both. I set a ViewController on...
Blur Effect on TableViewCell when scroll
Right now I'm using LBBlurredImage to blur an image, but I want to change to iOS8's UIVisualEffectView to blur instead. I'm having a hard time implementing, any ideas? Implemented with LBBLurredImage: - (void)updateData { // Set up Screen self.screenHeight = [UIScreen mainScreen].bounds.size.height; //UIImage *background = [UIImage imageNamed:@"gray"]; UIImage *background =...
NSMutableArray adds same NSDictionary multiple times
I am looping through an array, getting two items and putting them in a dictionary, and then add them to an array, but it keeps adding the last item of the array for the number objects in the array, even though when I log the dictionary inside the loop it...
Check if array contains part of a string in Swift?
I have an array containing a number of strings. I have used contains() (see below) to check if a certain string exists in the array however I would like to check if part of a string is in the array? itemsArray = ["Google, Goodbye, Go, Hello"] searchToSearch = "go" if...
Overwriting NSMutableArray loaded from NSUserDefaults
So I'm having real problems overwriting an array stored in NSUSerDefaults. Basically I have a checklist of 100 items (defined by bools in an array(which are actually strings at the moment)) and I need to save if each item is checked so when the app loads, the checklist remains as...
Pass data from one view controller to the next WITHOUT a segue in swift
So I have an app that where you choose a button in the first screen it will bring you to another screen depending on which one you chose on the first one. Because I have these possible different layouts I can't just use a segue from one button to the...
canEvaluatePolicy Extra argument 'error' in call Swift Xcode 7
I work with Xcode 7 with swift and I would use the Touch Id. Only I have a error when I use canEvaluatePolicy. I understand my error, I call an argument too. Only if I do not call, it makes me a error because I did not manage my error...
Parsing a Dictionary of Arrays from a Plist file
I am trying to work with a specific data layout. We use a plist file which is setup in the following way: Root (Dictionary): - 1.1 (Array) -- Item 0 (Dictionary) --- Title --- Icon -- Item 1 (Dictionary) --- Title --- Icon - 1.2 (Array) -- Item 0 (Dictionary)...
When creating new tableView entry the constraints don't work
I have a Master-Detail application that uses CoreData. Everything is hooked up fine and works as expected. There is just one problem with the display when adding a new entry. On the left is the Master's TableView with the entries and on the right is the Detail's View, where the...
Getting error in Adjust library, Integrated with Pods
I am getting this error: ld: library not found for -lPods-Adjust clang: error: linker command failed with exit code 1 (use -v to see invocation) I added this to my Podfile: pod 'Adjust', :git => 'git://', :tag => 'v4.2.5' I have installed pods successfully, but still get the above error....
iOS 8 Swift 1.2 and Parse - Attempt to present UIAlertController on ViewController whose view is not in the window hierarchy
There are many questions on Stack concerning this issue, but none of them seem to solve the issue I'm having. I am using ParseUI for the login and signup portion of my application. What I would like to have happen is for a UIAlertController to be presented when a user...
How to get a specific object from data structure based on Index
I am creating a custom UIPageViewController which uses a custom setup. The data structure that I have is parsed into the following format: { "1.0" = ( { detail = "Detail 0"; icon = "Pull to Refresh"; title = "Item 0"; }, { detail = "More easily refresh a subscription...
Opening and closing form animation
Is this animation possible in iOS, any third party API's for that? ... | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '338', 'language_id_whole_page_fasttext': "{'en': 0.8187754154205322}", 'metadata': "{'Content-Length': '47192', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YMWTW67G73SKHW6W5MVXWIHFJMSXVBEZ', 'WARC-Concurrent-To': '<urn:uuid:90aca1d1-ca5a-461d-a111-ea026eb35094>', 'WARC-Date': datetime.datetime(2018, 10, 16, 22, 25, 34), 'WARC-IP-Address': '104.28.3.238', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OIMX6GBTELOVAVKGTR3BBDNAGJV55XIL', 'WARC-Record-ID': '<urn:uuid:cfb5e2b3-945c-403c-bfe6-b371c7abfdc9>', 'WARC-Target-URI': 'http://databasefaq.com/index.php/answer/27171/ios8-nsarray-shuffle-nsarray', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:238a9b96-f1c1-4b8e-b949-fdfe7ee390dc>', 'WARC-Truncated': None}", 'previous_word_count': '3017', 'url': 'http://databasefaq.com/index.php/answer/27171/ios8-nsarray-shuffle-nsarray', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-45-10-135.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06582969427108765', 'original_id': '98606871cacbac97cd54a234146a349743800d262ec775b889b9f24c0ec1d2a6'} |
A long time in coming, the next version of Windows may get something people in the NIX world have been taking for granted for a long time: symlinks. Technically this is SMB2.0 and NTFS that we are talking about, which is part of the Vista/Longhorn Server package. This may not seem like a big deal to most, but in reality it is a big deal. In any shared computing environment where you have multiple people accessing a single system, symlinks can make administration of a server and individual user data vastly less complex than having to manage hundreds of shares. Although details aren't completely available yet, from the way it sounds, symlinks for Windows will behave the same way they do in Linux, a transparent way of accessing another file or filesystem object from anywhere. Likely this same functionality will carry over to WinFS, when it is released. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9305561780929564}", 'metadata': "{'Content-Length': '32287', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5XCHNPLGX6MX2BJLLI2JK7WLEEE4LKRT', 'WARC-Concurrent-To': '<urn:uuid:72aa5c39-56a3-4b7c-8c9e-ce1706aa59b7>', 'WARC-Date': datetime.datetime(2017, 9, 21, 10, 34, 55), 'WARC-IP-Address': '184.173.241.66', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:U2MMBMVUMLMQWTN7IM4B3VI4NPDLFVLO', 'WARC-Record-ID': '<urn:uuid:219f0195-e862-4288-8472-14d06ebf6bbd>', 'WARC-Target-URI': 'https://www.techspot.com/news/19251-vista-to-get-symlinks.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b5c273e4-c4c0-4b73-b516-571eb5532804>', 'WARC-Truncated': 'length'}", 'previous_word_count': '148', 'url': 'https://www.techspot.com/news/19251-vista-to-get-symlinks.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-218-190-154.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12580597400665283', 'original_id': '347066fb8c13d08a813553d03fefac5e8c49819fa96ff5fbce2d6826fe2dca0d'} |
Reigning world champion Jorge Lorenzo put his latest wet race disappointment behind him by returning to the top of the MotoGP timesheets during testing at Brno.
But unlike team-mate Valentino Rossi, the Spaniard did not try the new Yamaha chassis, which the Italian now hopes to race 'as soon as possible'.
Lorenzo was quick to extinguish speculation that he may have been 'denied' the parts due to his forthcoming switch to Ducati.
"No, I don't think that was the meaning," he said.
The #99 revealed that he and Rossi already use different types of chassis design - as is also the case for Repsol Honda team-mates Marc Marquez and Dani Pedrosa - and that the new development is even further away from Lorenzo's preferred frame.
"Theoretically, [Rossi] prefers... We have a different direction in chassis. I understood that he tried another step, in his direction, with this new chassis. So Yamaha have no meaning for me to try this chassis. That's why I didn't try.
"I didn't like the previous step, so theoretically another step would be even worse [for me]. Theoretically. You never know because you don't try. But for [Yamaha] have no meaning. So I don't care so much."
The explanation made sense, but perhaps also indicates that Yamaha will not be building any more chassis in Lorenzo's direction...
The Spaniard was coy about what he did test during his 43 laps, the best of which put him 0.371s ahead of Rossi, but admitted to finding something 'positive'.
"My programme was to try many things and see if they give us benefit. Some of them did. Some didn't. We are positive because we found something that can give us more speed and we can be more competitive in the next races."
Like Rossi, the 29-year-old felt the development 2017 Michelin front tyres were a clear improvement and believes it will be 'better for everyone' if their introduction can be brought forward to this season.
"If they can it will be positive," he said. "The new tyres have a little more absorption over the bumps and slightly more grip on the edge in the centre of the corner. With throttle. They will be better for everyone I think."
Lorenzo's 17th place on Sunday, after front tyre woes on the drying track, means he dropped 59 points from Honda's Marc Marquez and lost second in the world championship to Rossi.
CLICK HERE for full results. | mini_pile | {'original_id': 'df6cb4895b554abbaddb22be5013de4f464792d961b7c5c5147225e859376974'} |
They Are Known As The Borinqueneers…And They Are Finally Getting Some Recognition!
They came from Puerto Rico, they fought for the United States, and they served their country proudly in Korea.
Now over 60 years after the valor of this 65th Infantry regiment, nicknamed the Borinqueneers, was recognized with a Congressional Gold Medal.
Over 250 Borinqueneers traveled to Washinngton, D.C. to take part in the ceremony, where President Barack Obama spoke. He brought up the fact that, like the Tuskeegee Airmen or Navajo Code Talkers, the Borinqueneers’ 65th Regiment “experienced segregation that set them apart from their fellow soldiers, but their courage made them legendary,” Obama said.
Governor Malloy and Lt. Governor Wyman presented members of the 65th Infantry Regiment “Borinqueneers” with a proclamation at a ceremony in Hartford, Conn.
The veterans that spoke at the ceremony shared stories of camaraderie, bravery, and even bouts of PTSD, but they all made it known that they served their country proudly.
“We had a lot in common. We could talk about baseball, about the music of Puerto Rico,” Raul Cardona, a corporal during the Korean War, remembered.
“We was as a brother, as a family,” said former Cpl. Bishop Tomas Lozada. “When something happened, when something happened to one of them, it’s like it happened to us, to me.”
Their name comes from a Taino indigenous and Puerto Rico’s former name, Borinquen. Puerto Rican soldiers have fought for the U.S. Army as Borinqueneers in the 65th since 1899, but not until 2012 did Puerto Rican West Point graduate and U.S. Army Captain Frank Medina form the Borinqueneers Congressional Gold Medal Alliance to honor the regiment. Since being awarded with the Congressional Gold Medal, Medina’s organization has evolved into the Borinqueneers website and the Congressional Gold Medal Ceremony National Committee.
The Borinqueneer Soldiers from the 1/65th Puerto Rico National Guard deployed in 2009 to support efforts in Uganda.
An hour-long film about the Borinqueneers was made by El Pozo Productions in 2007. It won several awards, and since then has been translated into Spanish and broadcast on Puerto Rico’s public broadcasting network, as well as to more than 850,000 U.S. troops overseas.
The Borinqueneers have served as American soldiers in many wars, not all of which are remembered fondly. The longest running war in American history, the Vietnam War, claimed the lives of 58,000 soldiers and yet veterans from that war still struggle. By signing this petition, you can help honor their service.
Support Veterans
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.9682585597038268}", 'metadata': "{'Content-Length': '51937', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UXWE6PN5XGWY54KP2IRX4PILAMDU35FK', 'WARC-Concurrent-To': '<urn:uuid:89bc9302-d8df-494c-9074-383cbc91d2b9>', 'WARC-Date': datetime.datetime(2021, 1, 23, 2, 34, 21), 'WARC-IP-Address': '104.198.103.120', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:735E6UEGCTAZFHO5OHL2ETQENWTIJCHJ', 'WARC-Record-ID': '<urn:uuid:47a43fec-8563-4544-ba39-31fa7ea5a8f8>', 'WARC-Target-URI': 'https://blog.theveteranssite.greatergood.com/borinqueneers/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:96ce32b4-d1b4-4a6d-a4ea-5a5e5ab3fef1>', 'WARC-Truncated': None}", 'previous_word_count': '438', 'url': 'https://blog.theveteranssite.greatergood.com/borinqueneers/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-226.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02202773094177246', 'original_id': '340223d21de08478f913b0f8b7a792da771980a2776a0b45cde7f7d05a4df1c0'} |
Dadun Collection: 2019-06-20T17:15:33Z 2019-06-20T17:15:33Z Participation of SCM Strategy in the definition of Business Strategy and its further conditions for operationalization. The status of SCM in LATAM 2018-10-30T13:15:58Z 2018-10-30T00:00:00Z Title: Participation of SCM Strategy in the definition of Business Strategy and its further conditions for operationalization. The status of SCM in LATAM Abstract: Supply Chain Management (SCM) is a discipline of management that can be seen in different ways. However, only a strategic approach of SCM derived into subsequent tactical decisions and an operational implementation will provide the benefit that promises. SCM decisions must be considered at the strategic level; this is because the decisions in SCM contain several edges that necessarily involve the coordination of multiple areas of the company and therefore their guidelines must be defined to the highest managerial level. In this thesis is emphasize the strategic nature of SCM and the importance of being considered this way. Most research on SCM focuses on the relationship among organizations within the supply chain; but scarce literature exists that addresses the issue of internal conditions that allow proper management of the supply chain out of the borders of the organization. The purpose of this paper is to explore how SCM strategy is taken into account when the organization delineates the business strategy and how those conditions have to be met internally within the organization to be successfully implemented at the tactical and operational levels. This research is centered in Latin America where SCM’s development from the strategic point of view is scarce, more than this, SCM’s development in this region is wrongly oriented. While not considering at the strategic level, any effort organizations want to make in the area of SCM will hardly get satisfactory results in the medium and long term. In order to get this, a set of constructs was explored, proposed and defined as critical, to be considered as the first steps for a successful implementation of a SCM strategy. As it will be developed through this work, seven constructs were conisdered: Degree of participation of SCM strategy in the business strategy; Parameters to guide segmentation of providers and customers; Culture of the organization; Distribution of benefits along the chain’s criteria; Internal alignment of all the firm’s areas that participate in the SCM strategy; Coherence between strategic SCM'S alignement and Incentive program for managers; SCM manager’s role and profile Through two qualitative field studies (a Delphi panel of experts, the first and a case study the second) conducted in Latin America, the aim was to demonstrate the status of SCM in the region and how, through a correct application of the constructs, the organizations can raise their SCM strategy and from there achieve a correct operationalization. 2018-10-30T00:00:00Z Consequences of terrorism on oil and tourism industry through frequency and time frequency domain 2019-03-01T10:20:08Z 2018-07-25T00:00:00Z Title: Consequences of terrorism on oil and tourism industry through frequency and time frequency domain 2018-07-25T00:00:00Z Three essays on credit unions financial stability 2018-07-09T08:25:17Z 2018-07-09T00:00:00Z Title: Three essays on credit unions financial stability Abstract: The credit union sector has grown quite significantly in recent years. Among other strategies, this growth has been achieved via expansion of the portfolio of services (mostly, the types of loans) that credit unions offer, an activity which has been heavily regulated. This regulatory emphasis seems to stem from two considerations. First, growth strategies based on expanding the range of services were thought to lead to significant increases in asset risk, since credit unions were considered to be at a special disadvantage in the selection and management of assets other than personal loans; second, the regulation tried to protect credit union member (shareholders) who probably did not recognize these risks and would not exercise explicit monitoring or disciplining on the credit union. We look at these two issues in the context of the particular example of credit union growth via expansion into member business loans. Using data from the universe of US credit unions we first provide evidence that indeed expanding the business loan portfolio increases the risk profile of the asset side of the credit union. We then show, however, that credit union members exercise significant monitoring of the credit union, in general, and of business loans, in particular. We offer both descriptive and quasi-experimental evidence which suggests that credit union members understand the risk characteristics of business loans and penalize the credit union by withdrawing deposits when business loans increase significantly. Our results have broad implications in that they suggest that risky growth strategies of even the “less sophisticated” financial institutions are subject to significant discipline mechanisms from their main stakeholders. 2018-07-09T00:00:00Z The role of Business Associations as drivers of strategic management of innovation 2018-01-30T17:32:43Z 2018-01-30T00:00:00Z Title: The role of Business Associations as drivers of strategic management of innovation Abstract: Traditionally, business associations have been representatives of the interests of companies. Additionally, they have become coordinators of business activity and facilitators of the flow of information in the industry. Currently, the associations go further, they are developing a new role as innovation intermediaries for their affiliated companies. This work, although very valuable is not evident, therefore, they suffer from invisibility for business and academic organizations. Consequently, this doctoral thesis aims to deepen the study of the role of associations as key agents of the processes of open and collaborative innovation in business ecosystems, that is denominated innovation intermediation. In order to meet this challenge, we developed an Action Research project with three phases that comprise the articulation of a theoretical framework, and two fieldworks with a group of associations from the community of Navarra (northern Spain). In the first phase, we present a robust theoretical framework on the strategic, innovation and creativity aspects that surround the dynamics of associations as innovation intermediaries. Likewise, we clarify the fundamental concepts of associations as organizations of a social and economic nature. Finally, we describe their new role as facilitators of the strategic innovation of companies in the industrial sectors. In the second phase, we designed and applied a survey of 21 business associations, which allowed us to define their innovation intermediation functions, the types of innovation they tend to promote among their companies, and their dynamic capacities for innovation intermediation. Subsequently, we performed a cluster analysis to propose a typology of business associations. Finally, as a result of the previous findings, in the third phase we carried out an interactive and participative work with managers from 16 associations that allowed us to propose a Maturity Model of Innovation Intermediation Capacity, and also to propose the concept of business associations as Communities of Collaborative Innovation. 2018-01-30T00:00:00Z Frequency and time frequency domain methods in the Oil market analysis 2019-03-01T11:32:51Z 2017-12-05T00:00:00Z Title: Frequency and time frequency domain methods in the Oil market analysis Abstract: Los cuatro trabajos de investigación redactados en esta tesis doctoral intentan comprender mejor el comportamiento del mercado petrolero. En el primer capítulo de la tesis, el objetivo y enfoque ha sido analizar primero las propiedades estadísticas de los precios reales del petróleo utilizando las raíces unitarias y los métodos de integración fraccional y luego entender el comportamiento de los precios del petróleo antes y después de conflictos militares y eventos geopolíticos producidos desde la Segunda Guerra Mundial. En el segundo y tercer trabajo, contribuyo a la literatura sobre el comportamiento del precio del petróleo crudo y examino cómo este afecta a las fusiones y adquisiciones en la industria petrolera en los Estados Unidos. Analizamos la relación de estas dos series estudiando su dinámica en el tiempo utilizando datos de enero de 1980 a junio de 2012, respectivamente. En el segundo trabajo, empleamos metodologías basadas en la integración fraccional y la cointegración. El tercer trabajo, emplea una metodología basada en la transformada wavelet. El cuarto capítulo analiza la relación entre la producción total de petróleo crudo de los Estados Unidos (incluida la producción de petróleo de esquisto) y los precios del crudo WTI mediante el estudio en el dominio de tiempo-frecuencia utilizando una metodología basada en la transformada wavelet. 2017-12-05T00:00:00Z Essays in Development Economics: On Civil Conflict in Nigeria 2017-11-17T02:28:22Z 2017-11-14T00:00:00Z Title: Essays in Development Economics: On Civil Conflict in Nigeria Abstract: The three essays in this dissertation explore the cause and consequences of civil conflict in Nigeria. The first chapter examines the effect of international oil prices on civil conflict in Nigeria. The analysis uses time variation in global oil prices and cross-sectional variation based on the initial distribution of oil production across Nigerian districts. According to our estimates, an increase in oil price increases the risk of civil conflicts in districts that produce oil by 50 percent. Using data on intergovernmental transfers, public attitude surveys, labor outcomes and pollution, we test for popular theoretical mechanisms of the resource curse and show that positive oil price shocks affect conflict through rising competition for resource rents and through a reduction in social capital. We do not find evidence in favor of mechanisms related to changes in the opportunity cost of engaging in conflict or grievances about pollution and its implications.The second chapter in this dissertation explores the effect of terrorism on child health. We exploit geographical variation in terror attacks of Boko Haram in Nigeria to show that prenatal exposure to fatalities from terror attacks lead to 0.23 percentage point difference in birth weight between exposed and unexposed cohorts. These effects are stronger for mothers with less education. In addition, we find evidence that parents compensate for exposure to terror during pregnancy by increasing investment in postnatal health care. The final paper in the dissertation examines the impact of violent conflict on household risk coping strategies by estimating the two-fold effect of conflict victimization and income shock on household consumption in Nigeria. Using panel data, we find that shocks reduce food consumption by 17 percent for victimized households but have little effect on nonvictimized households. We test for the mechanisms of consumption smoothing and show that victimized households receive more remittances and invest more in informal support groups. Our results are robust to using a sharp increase in local violence as an event study 2017-11-14T00:00:00Z The Mendicant Preachers and The Merchant's Soul: the civilization of commerce in the late-middle ages and Renaissance Italy (1275-1425) 2017-01-19T14:13:56Z 2016-01-01T00:00:00Z Title: The Mendicant Preachers and The Merchant's Soul: the civilization of commerce in the late-middle ages and Renaissance Italy (1275-1425) Abstract: ... 2016-01-01T00:00:00Z Integrating Strategy & Finance through Strategic Alliances: Organizational Learning & Valuation Perspectives 2017-01-19T14:20:23Z 2014-01-01T00:00:00Z Title: Integrating Strategy & Finance through Strategic Alliances: Organizational Learning & Valuation Perspectives Abstract: This dissertation presents three papers that aim to bridge the fields of finance and strategy through strategic alliances as the focal subject. In respect for their proper research traditions, the second and third papers each contribute specifically to one of the fields although they are of interest to both. In Paper One, I review the literature of both fields, taking organizational learning and financial valuation perspectives. I then identify two sets of research gaps which form the focus of the next two papers. Paper Two aims to fill a gap in the strategy literature that concerns cross-organizational form learning effects. Specifically, I examine how organizational experience in one governance form (alliances) affects performance in another form (acquisitions). I identify two alliance learning mechanisms that draw on firms’ prior alliance experiences and show, based on US manufacturing sector data, that they have significant positive interaction effects on focal firms’ acquisition performance. Paper Three aims to fill a gap in the finance literature about how alliances affect debt investors. I analogously apply the theories of coinsurance that describe how bond investors are affected by the asset combinations in mergers to describe how they are affected by the asset combinations in alliances. I test my hypotheses on a data set of corporate bonds of firms in the US industrial sector and find that not only do allying firms’ bond investors benefit significantly from alliance announcements, but that those with below investment grade credit ratings benefit more than those rated investment grade.; Esta tesis se compone de tres artículos cuyo objetivo es acercar los campos de las finanzas y la estrategia, centrándose en las alianzas estratégicas como punto de conexión. En el primer artículo se hace una revisión de la literatura desde la perspectiva del aprendizaje organizacional y de los métodos de valoración financiera. En el segundo artículo se colma el vacío existente en la literatura de estrategia en relación con los efectos del aprendizaje entre organizaciones. Se examina el impacto de la experiencia organizacional en una de las forma de gobierno (alianzas) en el rendimiento de otra de las formas de gobierno (adquisiciones). Se identifican dos mecanismos de aprendizaje de alianzas basados en experiencias anteriores, que demuestran importantes efectos de interacción positiva en el desempeño de la adquisición de las compañías objeto de estudio. El tercer artículo cubre la literatura de finanzas sobre cómo las alianzas afectan a los inversores de deuda. Se aplican análogamente las teorías de coaseguro que describen cómo los inversores de bonos están afectados por las combinaciones de activos en fusiones, para describir la forma en que están afectados por las combinaciones de activos en alianzas. Contrastando estas hipótesis mediante bonos corporativos del sector industrial de Estados Unidos se observa que los inversores de bonos de empresas que forman una alianza se benefician significativamente de los anuncios de la alianza. También se demuestra que las empresas con crédito valorado por debajo del grado de inversión se benefician en mayor medida que las calificadas como grado de inversión. 2014-01-01T00:00:00Z | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.751529335975647}", 'metadata': "{'Content-Length': '18728', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UYC7MZTJUKM6ZTDRANF3IKOGIZ275UV4', 'WARC-Concurrent-To': '<urn:uuid:8b6e8ac1-646b-4374-a75a-d6b76f486bae>', 'WARC-Date': datetime.datetime(2019, 6, 20, 17, 15, 33), 'WARC-IP-Address': '159.237.156.6', 'WARC-Identified-Payload-Type': 'application/atom+xml', 'WARC-Payload-Digest': 'sha1:RIR3H4UTJLQSZ562EWKSZMIBDJ3Y2QMK', 'WARC-Record-ID': '<urn:uuid:a8e3c7f3-19b8-4490-bbf9-edd431e5a0bd>', 'WARC-Target-URI': 'http://dadun.unav.edu/feed/atom_1.0/10171/5045', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8259aec9-a2df-4bf2-b5c7-17a52cc256a8>', 'WARC-Truncated': None}", 'previous_word_count': '2227', 'url': 'http://dadun.unav.edu/feed/atom_1.0/10171/5045', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-144-182-216.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01822817325592041', 'original_id': '62fe9c20fc3513f51e26723d5f6717ce599c45e213d5887cee7370b8feb5879a'} |
http://blogs.nature.com/actionpotential,Action Potential,https://github.com/analyticalmonk/awesome-neuroscience#readme,Neuroscience error: <HTTPError 500: 'Internal Server Error'> | reason: Internal Server Error
https://www.mcb80x.org/,The Fundamentals of Neuroscience | Harvard & edX,https://github.com/analyticalmonk/awesome-neuroscience#readme,Neuroscience error: URLError(gaierror(8, 'nodename nor servname provided, or not known')) | reason: [Errno 8] nodename nor servname provided, or not known
https://grey.colorado.edu/CompCogNeuro/index.php/CCNBook/Main,Computational Cognitive Neuroscience,https://github.com/analyticalmonk/awesome-neuroscience#readme,Neuroscience error: URLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1123)')) | reason: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1123) | the_stack | {'hexsha': '95f266e453b069c0a24771486b2eac88e5faa2fc', 'size': '959', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'extension/data/broken-urls/awesome/Neuroscience.txt', 'max_stars_repo_name': 'basharovV/StumbleUponRevived', 'max_stars_repo_head_hexsha': 'a7485e5f442afd1b324b524776e2571c8c5b924a', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'extension/data/broken-urls/awesome/Neuroscience.txt', 'max_issues_repo_name': 'basharovV/StumbleUponRevived', 'max_issues_repo_head_hexsha': 'a7485e5f442afd1b324b524776e2571c8c5b924a', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'extension/data/broken-urls/awesome/Neuroscience.txt', 'max_forks_repo_name': 'basharovV/StumbleUponRevived', 'max_forks_repo_head_hexsha': 'a7485e5f442afd1b324b524776e2571c8c5b924a', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '319.6666666667', 'max_line_length': '457', 'alphanum_fraction': '0.8164754953', 'original_id': '305f8040b5a4e8196274c851afb3af8bd8bd04c3a9eaccb8cc9bc20021a0b8b1'} |
How to write a generic function in C++ that takes as arguments both integers and strings and modifies them?
I'm trying to write a function that takes as an input argument a string, three output arguments that can be of varying types (at least that's the idea) and a char that is a delimiter.
The input string is delimited by the specified char and the function assigns each char-terminated field to each of the output arguments in order (at the moment it takes care of input strings such as "a;bb;ccc" and is limited to three output arguments only but that's not the problem).
For example with an input such as 10;200;3000 I'd get 10, 200 and 3000 for the first, second and third output arguments respectively
The output arguments need to be of either string or integer types, but due to my limited knowledge of C++ (and in particular generic programming) I'm having trouble writing a generic function that doesn't care about that.
I have the following code:
template <typename T>
void parse_string (std::string &input, T &out1, T &out2, T &out3, const char delimiter)
{
while (out3 == "")
{
std::string temp = input.substr(0, input.find(delimiter));
input = input.substr(input.find(delimiter) +1);
if (out1 == "") { out1 = temp;}
else if (out2 == "") { out2 = temp;}
else { out3 = temp;}
}
}
and it works fine for strings but obviously not for integers.
I suspect I'm going wrong in the bits where I check if the argument is empty (among other parts I don't know about).
Could you please help me improve it?
Also, I would welcome any ideas on improving the logic itself (perhaps I'd need to go with the variadic templates to make the number of arguments flexible, but
I'd have to check with our technical lead if C++11 standards are okay).
Ideally I'd like to avoid the situation where I have the exact same function twice but with a different signature for each of the types (one for strings and
one for ints).
Many thanks in advance!
I would go with splitting the string into strings (as you do) and then converting them to required type.
You can use boost::lexical_cast for that, or std::stringstream
template <typename To, typename From>
To cast(const From &arg)
{
std::stringstream s;
s << arg;
To res;
s >> res;
if (s.fail())
{
//throw some_exception();
}
return res;
}
In any case if you have boost available it is the right way to go
lexical_cast is something like this with more error checking. Main thing is that you can return res uninitialized here, if the value of arg doesn't parse when written and then read.
#include <algorithm>
#include <string>
#include <sstream>
template <typename T1, typename T2, typename T3>
void parse_string(const std::string& input, T1& out1, T2& out2,
T3& out3, char delimeter)
{
std::istringstream is1(input);
std::string field;
for (int i = 0; std::getline(is1, field, delimeter) && i < 3; ++i)
{
std::istringstream is2(field);
switch (i)
{
case 0: is2 >> out1; break;
case 1: is2 >> out2; break;
case 2: is2 >> out3; break;
}
if (is2.fail())
{
// do something about invalid type conversion?
}
}
// up to you to decide what to do if the string has too
// many or too few fields
}
lexical_cast would be safer tho!
| common_corpus | {'identifier': 'https://stackoverflow.com/questions/12723713', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2012.0', 'title': 'Stack Exchange', 'creator': 'Steve Jessop, https://stackoverflow.com/users/13005', 'language': 'English', 'language_type': 'Spoken', 'word_count': '549', 'token_count': '938', '__index_level_0__': '44378', 'original_id': 'a77b45055288229f3d5db13989b5f05e07ca1670768ae94decd10826e3496c95'} |
XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
http://la-bellevie.net/1298.html20%Monthly2020-09-11 23:27
http://la-bellevie.net/1294.html20%Monthly2020-09-05 06:37
http://la-bellevie.net/1290.html20%Monthly2020-08-30 03:53 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '29', 'language_id_whole_page_fasttext': "{'en': 0.6673950552940369}", 'metadata': "{'Content-Length': '3886', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NWEPGRHXRIEBWY4FNWYNACG26KPHMERY', 'WARC-Concurrent-To': '<urn:uuid:30fc81c0-a1d7-40d7-8620-3578a7f9811a>', 'WARC-Date': datetime.datetime(2021, 1, 28, 9, 25, 1), 'WARC-IP-Address': '157.7.107.29', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:YD3NLIRB5WQ2YRCS5ZPKFEQMPOU3NBI4', 'WARC-Record-ID': '<urn:uuid:2dea5463-874f-4568-b987-fcb37e518a37>', 'WARC-Target-URI': 'http://la-bellevie.net/sitemap-pt-post-2020-09.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:56c2b433-6814-4433-bfb3-04749d021716>', 'WARC-Truncated': None}", 'previous_word_count': '69', 'url': 'http://la-bellevie.net/sitemap-pt-post-2020-09.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-99.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025763511657714844', 'original_id': 'b2060092f8a01aa184398b8a74bc760e9442244b9a4798ff9b44079c35fdd230'} |
Erdos Number
The Hungarian mathematician PaulErdos wrote a lot of joint papers. One's Erdos Number is defined as the length of the shortest path between you and Erdos via peer-reviewed papers. Hence Erdős Erdős number was 0, if you are one of his co-authors then your Erdős number is 1. If you aren't, but you co-wrote a paper with one of them, then your Erdős number is 2. And so on. If there is no such path then the convention is to say that your ErdosNumber is infinity, whether you give a flying fsck about mathematics or not.
Lamentably, it is no longer possible for the number of people with Erdős number 1 to increase.
The canonical reference for this concept is the ErdosNumberProject, where JerryGrossman offers long lists of people with an Erdős number of up to 2. If you've published a peer-reviewed paper, your number may be lower than you think.
Some people, with a sense of fun, play the same game using any publicly accessible joint authorship. This rapidly becomes pretty pointless, especially taking wiki pages into consideration. Others suggest that it is disrespectful of Erdős to pretend that there is meaning in a non-mathematical version of this, and suggest using a different "root node", such as Ward (WardNumber) or DonKnuth.
Film fans have a similar concept relating to KevinBacon. Erdős numbers were there first (and were the inspiration for Bacon numbers).
Erdős himself has a Bacon number of 4: It is unlikely that Kevin Bacon has an Erdős number.
Since college, I've only known one 'real' Mathematician socially. I checked the list today and he has a ErdosNumber of 2. Either it's a SmallWorld or I just got lucky.
So whom do you know?
Here is a map of Erdős' 500-something collaborators...
Decreased ErdosNumber for sale!
BillTozier has an ErdosNumber of 4 and is offering to collaborate (for a fee) on a paper with anyone seeking an ErdosNumber of 5.
Given the large number of folks with ErdosNumbers of 4 or less, this "service" seems to not be worth much.
I think it's pretty funny. But no, to get an EN of 5 isn't worth much, which is why it hasn't been bid sky high. It would be headline material if it were for an EN of 2, and the bidding would, I predict, be fierce.
Heck, I just did some poking around, and discovered I have an ErdosNumber of 4. Details to be posted soon on my HomePage. -- ScottJohnson
There's more going on in BillTozier's auction than meets the eye. So says him, at least. He's posted an addendum to the text, and is blogging the auction dynamics. -- Bill (in ThirdPerson)
I know someone with an ErdosNumber of 2, who was bemused when I told him about the auction. If anyone wants to make an offer.... :-)
I have an ErdosNumber of 2, and I'm slightly saddened by the episode. Still, if the resulting work is legitimate then I have no grounds for complaint.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9648597836494446}", 'metadata': "{'Content-Length': '5121', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:52LJN2IPTKHDJI47TTKZX5W2LXYV5CJI', 'WARC-Concurrent-To': '<urn:uuid:0378544b-7e3f-4fe1-9027-89914376befb>', 'WARC-Date': datetime.datetime(2016, 6, 30, 6, 3, 5), 'WARC-IP-Address': '69.168.54.22', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:HHHZFACMB2ET6QAMPMYJ26IKDJ7A6G3V', 'WARC-Record-ID': '<urn:uuid:21ce940b-afad-44ca-b42b-de9318c40dac>', 'WARC-Target-URI': 'http://c2.com/cgi-bin/wiki?ErdosNumber', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f0b50f8e-94df-4f1b-8973-4c088414f06f>', 'WARC-Truncated': 'length'}", 'previous_word_count': '505', 'url': 'http://c2.com/cgi-bin/wiki?ErdosNumber', 'warcinfo': 'robots: classic\r\nhostname: ip-10-164-35-72.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-26\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for June 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.7700419425964355', 'original_id': 'b7775d414a11947fae8700bb09b12402869966f094eebd26534118579ba7f764'} |
Dynamic Variation:
Choose Language
Search & Book Sponsored Links
• Hôtels
Scandic Hotels – dans toutes les principales villes du nord au sud
Nordic Choice Hotels – l’hôtellerie autrement
Thon Hotels – avec un fantastique petit-déjeuner
Radisson Blu Hotels – réservez un hôtel en Norvège
• Se déplacer
Widerøe – la plus grande compagnie aérienne régionale de Scandinavie
AutoEurope – location de voiture en toute sécurité
Vy express – voyager vert devient facile en autocar
DFDS – ferry tout confort de Copenhague à Oslo
Rent-A-Wreck – la location de voiture intelligemment
Arctic Campers – location de fourgon aménagé en Norvège
NOR-WAY Bussekspress – voyagez vert avec les bus express
Vy – voyager vert, ça devrait être facile
Cabin Campers – votre chalet sur quatre roues
SJ NORD – l'aventure commence à bord de nos trains
• Circuits et excursions
Hurtigruten – « Le plus beau voyage en mer du monde »
Authentic Scandinavia – des voyages pleins d'aventures en Norvège
Up Norway – des séjours sur mesure
Norrøna Hvitserk – expéditions et voyages d'aventure
Discover Norway – des circuits ski, cyclo et rando en Norvège
Secret Atlas – l'approche authentique pour explorer le Svalbard
• Chalets et maisons
DanCenter – votre spécialiste pour les maisons de vacances en Norvège
Norgesbooking – réservez le parfait séjour en chalet en Norvège
• Stations de montagne
Beitostølen – aventure et enchantement tout au long de l'année
• Offers
or search all of Norway
Eastern Norway Vestfold og Telemark NOME
Gea Norvegica
• Lannavegen 5, Nome
• +47 35574000
• / km From You
Gea Norvegica Geopark is Scandinavia's first UNESCO recognized geopark.
Gea Norvegica Geopark is Scandinavia's first UNESCO recognized geopark. The geopark's purpose is to spread knowledge about our geological inheritance as well as the connections between geological processes and our human existence. Visit our website for more information!
The geologically unique area we call Fensfeltet is located in the Nome municipality southeast of Ulefos. 580 million years ago there was very unusual volcanic activity here. Today most of the volcano has been worn away, but we still find remnants of the volcano's magma conduit as well as other traces of volcanic activity in the area, such as near Kragerø.
The continent "Baltica", of which Norway was a part, was at that time low and flat and is now known by geologists as "the sub-Cambrian peneplain." This level country is can still be found in many places in Norway, such as on the Hardangervidda. But like so many times throughout the earth's history, conditions changed and the ocean flooded the flat landscape, which happened in conjunction with movement under the earth's surface at one of Baltica's collision zones. Rises in temperature caused the crust to melt around where Ulefos is today, perhaps in conjunction with a so-called hot spot, and the Fen volcano was the result.
But what is so special about this volcano? Well, the rocks we find today are very atypical for a volcano. Already in 1921, one of Norway's famous geologists, W.C. Brøgger, asserted the volcanic origins of limestone found at Ulefoss. He named the rocks carbonatites but didn't have a large audience for his theory since everyone knew that limestone is sedimentary and not igneous. Volcanic rocks are typically basalt or porphyry, for example. It wasn't until 1960 that an English geologist was able to prove the existence of lime-containing lava coming from active volcanoes in the African rift. In other words, Brøgger was right after all. The rocks he described from Nome he named after farms in the area, such as søvitt, melteigitt, vipetoitt, fenitt, and rauhaugitt. Damkjernitt is named after Damtjern (Brøgger spelled it incorrectly). All rocks have been accurately and precisely described and Fensfeltet has become an important reference point for volcanic limestone. Carbonatites are still today a geological word for this group of rock. Carbonatites on Fen have magmatic origin (i.e. they originate as a molten mass). Damkjernitt has been raised to the surface from deep underground through volcanic explosions. Molten carbonatites pushed through the older mountainous rocks and the result was rock containing mixtures of alkali feldspar, sodium rich amphibole, nepheline, aegirine, and phlogopite. Other minerals also occur, such as titanite and apatite. Volcanic activity led to breaks in the earth's crust and in these breaks flowed warm watey solutions.
These processes led to the oxidation of iron, such as is found in carbonatites, and this led to the red color of rocks containing iron. The red color has been named "redrock," and it is redrock which was mined in the 1650s. The iron from Fen was then sent to the Ulefos Ironworks. There are even more chemically unusual qualities in carbonatites. After WWII, the rare metal niobium was mined, and the presence of thorium also made Fensfeltet well-known in Norway.
Gea Norvegica Geopark is an intermunicipal company which is owned by the municipalities of Bamble, Kragerø, Lardal, Larvik, Nome, Porsgrunn, Siljan, and Skein in addition to the Telemark and Vestfold counties. The Board is the top authority and is comprised of 12 elected members, one from each municipality and two from each county.
• Last Updated:
• Source: Visit Bø
Statens Kartverk, Geovekst og kommuner - Geodata AS
TripAdvisor Reviews
Traveler Reviews in partnership with TripAdvisor
Your Recently Viewed Pages | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '65', 'language_id_whole_page_fasttext': "{'en': 0.672499418258667}", 'metadata': "{'Content-Length': '180176', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GAVFI572NFUYJBWKW24GS3UCFHCW2CWL', 'WARC-Concurrent-To': '<urn:uuid:9dab0a32-6d4f-475f-b8e1-e1a338460469>', 'WARC-Date': datetime.datetime(2021, 9, 25, 20, 8, 53), 'WARC-IP-Address': '192.229.210.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:UUZ564MN5PW7U4LKOBNGYEIU7N5FFRRO', 'WARC-Record-ID': '<urn:uuid:f3620b3e-59f8-4ad7-a2c4-cfecabec1c3c>', 'WARC-Target-URI': 'https://www.visitnorway.fr/listings/gea-norvegica/5315/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:42d97d84-a7bd-4347-91b6-0d49cfa756cc>', 'WARC-Truncated': None}", 'previous_word_count': '945', 'url': 'https://www.visitnorway.fr/listings/gea-norvegica/5315/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-156\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04379594326019287', 'original_id': 'c6c2b8d570ff147818f32e4362c0d526d570c0b0e5e08e7ec2d19b528d3ab9a5'} |
# Fostex TH-X00 Mahogany (serial number 1927)
See [usage instructions](https://github.com/jaakkopasanen/AutoEq#usage) for more options and info.
### Parametric EQs
In case of using parametric equalizer, apply preamp of **-5.4dB** and build filters manually
with these parameters. The first 5 filters can be used independently.
When using independent subset of filters, apply preamp of **-5.4dB**.
| Type | Fc | Q | Gain |
|:--------|:---------|:-----|:--------|
| Peaking | 98 Hz | 0.33 | -2.6 dB |
| Peaking | 3945 Hz | 1.42 | 5.7 dB |
| Peaking | 5744 Hz | 3.58 | -4.7 dB |
| Peaking | 8687 Hz | 2.61 | 8.0 dB |
| Peaking | 13965 Hz | 0.51 | -6.2 dB |
| Peaking | 64 Hz | 3.05 | 1.0 dB |
| Peaking | 200 Hz | 1.44 | -1.2 dB |
| Peaking | 410 Hz | 1.05 | 1.3 dB |
| Peaking | 1175 Hz | 1.23 | -1.3 dB |
| Peaking | 2096 Hz | 2.32 | 0.6 dB |
### Fixed Band EQs
In case of using fixed band (also called graphic) equalizer, apply preamp of **-3.9dB**
(if available) and set gains manually with these parameters.
| Type | Fc | Q | Gain |
|:--------|:---------|:-----|:--------|
| Peaking | 31 Hz | 1.41 | -1.8 dB |
| Peaking | 62 Hz | 1.41 | -0.8 dB |
| Peaking | 125 Hz | 1.41 | -2.7 dB |
| Peaking | 250 Hz | 1.41 | -1.8 dB |
| Peaking | 500 Hz | 1.41 | 1.0 dB |
| Peaking | 1000 Hz | 1.41 | -1.5 dB |
| Peaking | 2000 Hz | 1.41 | 0.8 dB |
| Peaking | 4000 Hz | 1.41 | 3.2 dB |
| Peaking | 8000 Hz | 1.41 | 0.9 dB |
| Peaking | 16000 Hz | 1.41 | -7.8 dB |
### Graphs
.png) | mini_pile | {'original_id': '26bb4143288364b59d8d587e4875e9c1f991080c406c9975577f7ded9fb089e5'} |
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Introduction to Limbo</title>
<meta name="apple-mobile-web-app-capable" content="yes" />
<meta name="apple-mobile-web-app-status-bar-style" content="black-translucent" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no, minimal-ui">
<link rel="stylesheet" href="css/reveal.css">
<link rel="stylesheet" href="css/theme/black.css" id="theme">
<!-- Code syntax highlighting -->
<link rel="stylesheet" href="lib/css/zenburn.css">
<!-- Printing and PDF exports -->
<script>
var link = document.createElement( 'link' );
link.rel = 'stylesheet';
link.type = 'text/css';
link.href = window.location.search.match( /print-pdf/gi ) ? 'css/print/pdf.css' : 'css/print/paper.css';
document.getElementsByTagName( 'head' )[0].appendChild( link );
</script>
<!--[if lt IE 9]>
<script src="lib/js/html5shiv.js"></script>
<![endif]-->
<!-- Custom styles -->
<style media="screen">
.no-border {border: 0!important; box-shadow: none!important;}
.no-background {background: transparent!important;}
.negligible {color: #888;}
small {vertical-align: baseline!important;}
</style>
</head>
<body>
<div class="reveal">
<!-- Any section element inside of this container is displayed as a slide -->
<div class="slides">
<section>
<h1>Introduction to Limbo</h1>
<h3>Viadeo node.js webapp</h3>
</section>
<section>
<h2>Plan</h2>
<ul>
<li>NodeJS pre-requisites</li>
<li>General structure</li>
<li>Server-side code</li>
<li>Build tasks</li>
<li>Sanity checks</li>
<li class="negligible">Client-side code</li>
<li class="negligible">i18n</li>
<li class="negligible">Navigation tests</li>
<li class="negligible">Git rules</li>
</ul>
</section>
<section>
<section>
<h2>NodeJS pre-requisites</h2>
</section>
<section>
<h3>Single-threaded...</h3>
<p>
...kind of
</p>
</section>
<section data-background-color="#fff">
<img src="images/event-loop.png" alt="" class="no-border no-background" />
</section>
<section>
<h3>Middleware</h3>
</section>
<section data-background-color="#fff">
<img src="images/middleware-mess.png" alt="" class="no-border no-background" />
<pre><code class="javascript">
function middleware_A (req, res, next){
// do stuff on req, res
next();
}
function middleware_B (req, res, next){
// do stuff on req, res
next();
}
</code></pre>
</section>
<section data-background-color="#fff">
<img src="images/middleware-use.png" alt="" class="no-border no-background" />
<pre><code class="javascript">
// declaration order is followed
app.use(middleware_A);
app.use(middleware_B);
app.use(middleware_C);
app.use(middleware_D);
app.use(middleware_E);
</code></pre>
</section>
<section>
<h4>Error middleware</h4>
<pre><code class="javascript">
app.use(function onerror(err, req, res, next) {
// an error occurred!
});
</code></pre>
<p>Always the last one</p>
</section>
<section>
<h3>Modules</h3>
</section>
<section>
<ul>
<li>Globals</li>
<li>AMD</li>
<li>commonJS</li>
<li>ES6</li>
</ul>
</section>
<section>
<h4>commonJS</h4>
<pre><code class="javascript">
// myLib.js
module.exports = {
run : function(){ ... }
};
</code></pre>
<pre><code class="javascript">
var myLib = require('./myLib');
myLib.run();
</code></pre>
<p>node.js standard</p>
</section>
<section>
<h4>commonJS</h4>
<pre><code class="javascript">
// myLib.js
export default function () { ... };
</code></pre>
<pre><code class="javascript">
import myLib from 'myLib';
</code></pre>
<p>Used in client-side code</p>
</section>
</section>
<section>
<section>
<h2>General structure</h2>
</section>
<section>
<pre><code class="vim">
viadeo-webapp/
├─ app/*
├─ config/*
├─ docs/
├─ tasks/*
└─ tests/*
</code></pre>
</section>
<section>
<h3>Web application files</h3>
<pre><code class="vim">
app/
├─ assets/
├─ controllers/
├─ filters/
├─ lang/
├─ services/
└─ views/
</code></pre>
</section>
<section>
<h3>Runtime configuration files</h3>
<pre><code class="vim">
config/
├─ boot/
├─ convict/
├─ environnements/*
├─ initializers/*
├─ middleware/
|
├─ routes.js
|
├─ assets.json
├─ smartAds.json
├─ urlAliases.json
├─ urlCSRF.json
|
├─ (npm-shrinkwrap.json)
└─ (requirejs/)
</code></pre>
</section>
<section>
<h3>Server start scripts</h3>
<pre><code class="vim">
initializers/
├─ 00_loggersInit.js
├─ 10_config.js
├─ 20_i18n.js
├─ 30_templating.js
├─ 40_server.js
├─ 50_controller.js
├─ 60_urlGenerator.js
└─ 70_listeners.js
</code></pre>
</section>
<section>
<h3>Middleware sequence description</h3>
<pre><code class="vim">
environnements/
├─ all/
├─ development/
└─ preprod/
</code></pre>
</section>
<section>
<h3>Build tasks (dev & prod)</h3>
<pre><code class="vim">
tasks/
├─ config/
|
├─ coverage/
├─ missing-tests.sh
├─ hooks/
|
├─ options/
├─ packaging/
|
├─ rollout/
├─ kasperDependenciesCheck/
├─ stress.sh
|
└─ translation/
</code></pre>
</section>
<section>
<h3>Root config files</h3>
<pre><code class="vim">
viadeo-webapp/
├─ app.js
|
├─ .bowerrc
├─ .jsbeautifyrc
├─ .jshintrc
├─ .node.jshintrc
|
├─ Gruntfile.js
|
├─ circle.yml
├─ newrelic.js
|
├─ bower.json
└─ package.json
</code></pre>
</section>
</section>
<section>
<section>
<h2>Server-side code</h2>
<ul>
<li>Frameworks & main dependencies</li>
<li>Boot phase</li>
<li>Routing</li>
<li>Data aggregation</li>
<li>Filters</li>
<li>Unit tests</li>
<li>View rendering</li>
</ul>
</section>
<section data-background-color="#fff">
<h3>Frameworks</h3>
<img src="images/node-stack.png" alt="" class="no-border no-background" />
<ul>
<li>node.js : http.Server</li>
<li>Express : routing, middleware</li>
<li>Maglev : ror-like conventions, autodiscovery</li>
</ul>
</section>
<section>
<h3>Main dependencies</h3>
<table>
<tr>
<td>
viadeo modules
</td>
<td>
open-source
</td>
</tr>
<tr>
<td>
<ul>
<li>platform (kasper client)</li>
<li>urn resolver</li>
<li>thumbor</li>
<li>url generation</li>
<li>memcached</li>
<li>logger</li>
<li>utils (e.g. Promises)</li>
</ul>
</td>
<td style="vertical-align: top;">
<ul>
<li>handlebars</li>
<li>i18next</li>
<li>express</li>
<li>maglev (locomotive fork)</li>
</ul>
</td>
</tr>
</table>
</section>
<section>
<h2>Boot phase</h2>
<ul>
<li>config loading</li>
<li>initializers</li>
</ul>
</section>
<section>
<h2>Routing</h2>
<ul>
<li>Maglev conventions</li>
<li>special middleware</li>
</ul>
<p><br /><code>config/route.js</code></p>
</section>
<section>
<h2>Data aggregation & composition</h2>
<ul>
<li>controllers</li>
<li>services</li>
</ul>
</section>
<section>
<h3>Service responsibilities</h3>
<ul>
<li>aggregate data from backend</li>
<li>format data</li>
<li>resiliently handles errors</li>
</ul>
</section>
<section>
<h3>Controllers responsibilities</h3>
<ul>
<li>handle actions</li>
<li>handle authorizations</li>
<li>address one service per action</li>
<li>handles service errors</li>
<li>triggers rendering</li>
</ul>
</section>
<section>
<h2>Filters <small>& base filters</small></h2>
<p>= middleware called on specific routes</p>
</section>
<section data-background-color="#fff">
<img src="images/request-treatment.png" alt="" class="no-border no-background" />
</section>
<section>
<h2>Unit tests</h2>
</section>
<section>
<h3>rewire</h3>
</section>
<section>
<h2>View rendering</h2>
<ul>
<li>performed by Express</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Build tasks</h2>
</section>
<section>
<img src="images/grunt-logo.png" alt="" class="no-border no-background" />
</section>
<section>
<h3>Grunt</h3>
<ul>
<li>Tasks written in JS</li>
<li><em>de facto</em> standard 2 years ago</li>
<li>based on configurations</li>
</ul>
<p>sass, less, es6, jsx, client-side modules</p>
</section>
</section>
<section>
<section>
<h2>Sanity checks</h2>
</section>
<section>
<ul>
<li>jshint</li>
<li>js syntax style</li>
<li>coverage threshold</li>
<li>cyclomatic complexity</li>
<li>... they all block commit or push</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Client-side code</h2>
<ul>
<li>Frameworks & main dependencies</li>
<li>Stylesheets</li>
<li>JS modules</li>
<li>Hashing tasks</li>
</ul>
</section>
</section>
<section>
<section>
<h2>i18n</h2>
</section>
</section>
<section>
<section>
<h2>Navigation tests</h2>
</section>
</section>
<section>
<section>
<h2>Git rules</h2>
</section>
</section>
</div>
</div>
<script src="lib/js/head.min.js"></script>
<script src="js/reveal.js"></script>
<script>
// Full list of configuration options available at:
// https://github.com/hakimel/reveal.js#configuration
Reveal.initialize({
controls: true,
progress: true,
history: true,
center: true,
transition: 'slide', // none/fade/slide/convex/concave/zoom
// Optional reveal.js plugins
dependencies: [
{ src: 'lib/js/classList.js', condition: function() { return !document.body.classList; } },
{ src: 'plugin/markdown/marked.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/markdown/markdown.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/highlight/highlight.js', async: true, condition: function() { return !!document.querySelector( 'pre code' ); }, callback: function() { hljs.configure({ tabReplace: ' ' }); hljs.initHighlightingOnLoad(); } },
{ src: 'plugin/zoom-js/zoom.js', async: true },
{ src: 'plugin/notes/notes.js', async: true }
]
});
</script>
</body>
</html>
| the_stack | {'hexsha': '600b9f5309a0e873e28bf3c338614d5a8adcecb3', 'size': '11424', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'index.html', 'max_stars_repo_name': 'slyg/introduction-to-limbo', 'max_stars_repo_head_hexsha': '3da310c6fad98ba99fcff7e66179ff72593102a2', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'index.html', 'max_issues_repo_name': 'slyg/introduction-to-limbo', 'max_issues_repo_head_hexsha': '3da310c6fad98ba99fcff7e66179ff72593102a2', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'index.html', 'max_forks_repo_name': 'slyg/introduction-to-limbo', 'max_forks_repo_head_hexsha': '3da310c6fad98ba99fcff7e66179ff72593102a2', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '22.1825242718', 'max_line_length': '228', 'alphanum_fraction': '0.5505952381', 'original_id': '4fc27c0b1b7cef913c400b4c9f607c8919299df38ab5ea2812af9118dc01e1b5'} |
fuck boy woman in jaual
fuck boy woman in jaual, iwank tv mom vs boy, kaverikiss
fuck boy woman in jaual
She gave him a big hug, which seemed to me stunned him. carnival sex party video fuck boy woman in jaual
Can I stay under here? she asked, but her shaky voice made even that simple question sound pathetic. smollb girls xxx video erectile dysfunction pills over the counter
iwank tv mom vs boy He was putting his keys in his pocket clearly having just come from the room where the door had closed. kaverikiss
l-lick each other. zeenetaman fuking fotos
rawnxxx After lunch we sat in the family room watching a football game. mulheres enfiando rola imensa no cuzinho pelo buraco da parede raveena tandon ka sexy photo hdxxx
iwank tv mom vs boy
YES PLEASE....I NEED TO CUMMMMM! I yell feeling tears fall from my face mulheres enfiando rola imensa no cuzinho pelo buraco da parede
Now it was her turn to look into the carpet. raveena tandon ka sexy photo hdxxx flomax otc
zeenetaman fuking fotos Cum in my pup, become a wolf.
smollb girls xxx video I said: Yes, I do. carnival sex party video
I nodded and filled my cup and sat back, Tell me all you can about these missing girls. meki di lahap
Alright, give me a few seconds… There was the sound of hurried footsteps as Sharpe went somewhere. buy viagra online without prescription
dogwithgirlsexxx Her face was cold and pale, like weathered stone, but in my mind, it was warm and tan, and she was smiling with happiness and love.
desi bhojpuri bhabhi in blouse I have to go.
www indiaxxxsexvodeo Well, partially disappointed. srabonti 9xsex in
He responded. cock sewing
Momo would be chewing on the bacon strips like lengths of jerky. via gra
mean girls nude Well, time to rectify that, I smiled, before adding, Go try it on. rawnxxx
tudung puas main Why should Brynn have to teach himself with a dildo? Why can't your older guy see if he knows someone, you know, to train him? short pant pussy
Most made of gold or jade but in shapes of beings Luke could only have described in his wildest of dreams. wet pussy and wet booty
raveena tandon ka sexy photo hdxxx
I was pretty pissed as I so wanted to send her home with her pussy full of my cum but I resigned myself that I'd have to wait! But knowing Kelly it wouldn't be too long...... black man fuck black bbw
I don't regret it at all. best ed pill
nude indians They shared my cum once again until they both swallowed what was in their mouths.
www xxx photo full hd Me too, I concurred. kristen stewart xxx hot sex hard
Another fisherman wandered nearby and stood watching for several seconds before Jak turned and glared at him. hot sex hard kristen stewart xxx | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '45', 'language_id_whole_page_fasttext': "{'en': 0.9513494968414308}", 'metadata': "{'Content-Length': '10472', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KSPUHJBQYAHJZTL4KQPU42XZLJEEQMRZ', 'WARC-Concurrent-To': '<urn:uuid:e07b1a55-49dc-4bce-9d25-09dcca2482e1>', 'WARC-Date': datetime.datetime(2019, 11, 16, 2, 21, 29), 'WARC-IP-Address': '104.27.145.26', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VPVRYGDVTSRWRIGEXNXVMXSUV3KAUQIZ', 'WARC-Record-ID': '<urn:uuid:9abcd86b-d027-4193-98aa-4ba9ea32c833>', 'WARC-Target-URI': 'https://utrader-otzyvy.ru/index.php?n=25&id=229336', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b17b925e-732d-4cca-b30c-ca8cdd3c7939>', 'WARC-Truncated': None}", 'previous_word_count': '505', 'url': 'https://utrader-otzyvy.ru/index.php?n=25&id=229336', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-223.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10964089632034302', 'original_id': 'a92972eb7eb99196869936b8bcf0b578af527a2c22d9440f8700f52fb2a7bc8f'} |
unset BASH_ENV # avoid recursively running this script
export LC_CTYPE="en_US.UTF-8"
set +u # avoid warning when we use unset variables (if user had ‘set -u’ in his profile)
PATH="$PATH:$TM_APP_PATH/Contents/MacOS"
if [[ -d "$TM_SUPPORT_PATH/bin" ]]; then
PATH="$PATH:$TM_SUPPORT_PATH/bin"
fi
if [[ -d "$TM_BUNDLE_SUPPORT" && -d "$TM_BUNDLE_SUPPORT/bin" ]]; then
PATH="$TM_BUNDLE_SUPPORT/bin:$PATH"
fi
export PATH
: ${TM_BASH_INIT:=$HOME/Library/Application Support/Vico/bash_init.sh}
if [[ -f "$TM_BASH_INIT" ]]; then
. "$TM_BASH_INIT"
fi
export RUBYLIB="${RUBYLIB:+$RUBYLIB:}$TM_SUPPORT_PATH/lib"
# an abstract way to change the output option of the running command
exit_discard () { echo -n "$1"; exit 200; }
exit_replace_text () { echo -n "$1"; exit 201; }
exit_replace_document () { echo -n "$1"; exit 202; }
exit_insert_text () { echo -n "$1"; exit 203; }
exit_insert_snippet () { echo -n "$1"; exit 204; }
exit_show_html () { echo -n "$1"; exit 205; }
exit_show_tool_tip () { echo -n "$1"; exit 206; }
exit_create_new_document () { echo -n "$1"; exit 207; }
# force TM to refresh current file and project drawer
rescan_project () {
$TM_APP_PATH/Contents/MacOS/vicotool -e "((current-explorer) rescan:nil)"
}
# use this as a filter (|pre) when you want
# raw output to show as such in the HTML output
pre () {
echo -n '<pre style="word-wrap: break-word;">'
perl -pe '$| = 1; s/&/&/g; s/</</g; s/>/>/g; s/$\\n/<br>/'
echo '</pre>'
}
# this will check for the presence of a command and
# prints an (HTML) error + exit if it's not there
require_cmd () {
if ! type -p "$1" >/dev/null; then
cat <<HTML
<h3 class="error">Couldn't find $1</h3>
${2:+<p>$2</p>}
<p>Locations searched:</p>
<p><pre>
${PATH//:/
}
</pre></p>
HTML
exit_show_html;
fi
}
| mini_pile | {'original_id': '590adcfdc7b6d0fec49b16997bfe9305b6e139321eb9e3900ed07f9d4ae38593'} |
Forgot your password?
Comment: Re:Poor Math Education Hits Close To Home (Score 1) 680
by frogzilla (#34643152) Attached to: Mathematics As the Most Misunderstood Subject
I believe you should be careful about this gifted label. It alters expectations and can lead to difficulty. I think you need to worry less about which box your child fits into and more about how to keep him interested and engaged, healthy and happy -- though, a little rain, a few cloudy days, some bumps and scrapes, seem to be important as well. School can be a bit mind numbing for some people but the alternative, presumably home education, has issues as well. I recommend continuing to engage his mind, when he shows interest, at home. At school talk to the teacher about additional opportunities. Perhaps he can be a peer tutor though it might be a bit early for that. Perhaps he can skip some math classes to do some other activity that engages his attention. Also, remember that at his age, six or seven years presumably, he has a lot of development yet remaining. The difference between six years old and, say, twelve or sixteen years old, is quite substantial. Try some music lessons and, say, soccer but don't over schedule. Don't ever forget that labels really are not necessarily meaningful. Don't allow the label to separate him too much from others. That's not healthy either. I think that there should be less emphasis on labeling and more cherishing and nurturing the _child_. Don't forget to leave him alone sometimes to just let him play.
I have no training in child education or anything like that. I am, however, field certified in child care having helped to raise two such creatures to the ages of nineteen and sixteen. So far they are still alive, mostly unharmed by injuries along the way, mostly sane and stable, and on their way to self-sufficiency, which is, ultimately, the goal of all of this crazy parenting stuff.
Finally, LEGO is the best toy ever.*
*Applies to some children only.
Comment: Re:Permanently modified? (Score 1) 426
by frogzilla (#34225862) Attached to: Windows Phone Permanently Modifies MicroSD Cards, Warns Samsung
As far as I can tell everyone else uses acronym for true acronyms and for initialisms like SD. Then they write "a SD card" or some similar variant. Though it hurts you just have to let it go. It's not worth even pointing it out. Just make sure that you use the terms correctly. Maybe that way you can have a positive impact.
Comment: Re:Serious question? Here's a serious answer (Score 1, Redundant) 582
by frogzilla (#34026224) Attached to: Global Warming's Silver Lining For the Arctic Rim
One example: raise the temperature, and you get more water vapor. More water vapor yields more clouds, which have a *massive* cooling effect. In short: it is entirely possible that CO2 has a negligible effect on the temperature.
Some clouds warm and some cool. Clouds are complicated.
Set the temperature question aside for a moment: is a higher CO2 level a bad thing? CO2's primary effect on the planet is "plant food". Commercial greenhouses deliberately increase CO2 in order to increase their crop yields. If we could magically reduce CO2 to 19th century levels, we would see crop yields fall substantially.
You're forgetting that plants need water, nutrients and light as well. Not enough water? Extra CO2 makes no difference. And so on.
Back to temperature. If the earth's temperature does rise, is this a bad thing? Historically, warmer periods have been times of prosperity. Most of the earth is in the temperate zone, and warmer temperatures improve the climate, lengthen growing seasons, etc. Imagine frozen Siberia as the bread basket of Asia. It is not clear that a warmer earth is bad.
Warming temperatures means that the distribution of temperatures is shifting higher. If the width of the distribution doesn't change at all it will mean more extreme temperatures and therefore more stress on people and places. If the width also changes, say it gets wider, we could have more cold events and more even warmer events.
Finally, how do we measure the temperature of the earth? There are many temperature stations scattered about, but the majority of them do not comply with the guidelines set up to ensure accurate measurement. Many are at airports (lots of tarmac), others - especially in very cold climates - are placed conveniently near buildings. These and other siting issues make the temperature measurements inaccurate. Satellite measurements have their own difficulties. The more you read about these issues, the clearer it becomes that we do not currently have reliable temperature measurements.
This is baloney. Instruments work fine. Collectively, and processed thoughtfully and methodically, the data sets from historical and current instruments is, on the whole, extremely reliable and damning. The Earth is warming. Ocean based instruments confirm it. Atmospheric instruments confirm it. Tree rings confirm it. Radio isotopes confirm it. Seriously, the data is consistent across a wide variety of disciplines.
So: on the basis of inaccurate temperature data and ineffective models, what should we do? Should we commit trillions of dollars to drastic policies based on questionable science? Or should we, maybe, invest in a decent network of weather stations, invest in climate science, and *understand* what is going on?
We have done this and are continuing to do this.
Climate is complex, and the one thing certain about all of the climate models developed to date is that they fail to model climate. If a model is to be useful, it must make falsifiable predictions of future events. To date, no model has done better than a random-number generator. Tropical storms were supposed to increase, but did not. Sea level was supposed to rise faster that ever. In fact, the sea level has been rising steadily since the last ice age,, but the rise has actually slowed in recent times. If one thing is clear, it is that our understanding of climate is woefully inadequate.
Do you actually know anything about this? What do you suppose climate models model? Models are complex and computing resources are limited. Models are doing a great job of simulating changes in climate since the industrial revolution. Really. Forecasting is difficult work. Obviously we can't tell precisely what the future climate will look like until we are there looking back at the record.
Comment: Re:People use Bing? (Score 1) 297
by frogzilla (#33910624) Attached to: Facebook, Microsoft Team Up Against Google
I didn't know about this but just tried it. The interface change faked me out for a moment but it does indeed have good images from different points of view for the area around my house. These are several years old (2005 I think) aerial photos that are also available from a local government mapping site.
Comment: Re:It's always refreshing (Score 3, Informative) 1090
by frogzilla (#33442782) Attached to: Armed Man Takes Hostages At Discovery Channel HQ
See Jonathan Swift's "A Modest Proposal" written in 1729.
Clearly this is an old idea. What's the delay in getting this wholesome food into the grocery stores?
Comment: Re:Charge for support (Score 1) 635
by frogzilla (#33342800) Attached to: National Park Service Says Tech Is Enabling Stupidity
In British Columbia people are always surprised to find out that they have to pay for a ride in the ambulance. The fee is $80. At first it bugged me (we have called for help once late at night) but after a bit of thought I decided it was OK. When my wife had to be sent from one hospital to another during a series of tests they used a taxi and the "system" paid for it. That was nice.
Comment: A database ... (Score 1) 235
by frogzilla (#33257476) Attached to: How Do You Organize Your Experimental Data?
You need to start using a database. You don't have to actually put the data in a database but all of the meta data needs to go into one. Store your data files in one file system using whatever naming scheme you want and never move the files again. At the same time record the file system location along with all other meta data that is relevant. Then some simple database queries, e.g. embedded in some web pages can retrieve the location and even the data. You can of course also store the data in a database as well if you wish. I personally find it more practical to do it this way.
Comment: I got sucked in by the hype ... (Score 1) 196
by frogzilla (#33037986) Attached to: Behind the Special Effects of <em>Inception</em>
"You tweachewous miscweant!" -- Elmer Fudd | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '121', 'language_id_whole_page_fasttext': "{'en': 0.9599786996841432}", 'metadata': "{'Content-Length': '93870', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WNE63LY2N3Y4ZSUVPERS6KAAWR7YOT4E', 'WARC-Concurrent-To': '<urn:uuid:21e0707c-2612-42d0-8408-a20b570d4ff2>', 'WARC-Date': datetime.datetime(2014, 7, 30, 3, 49, 14), 'WARC-IP-Address': '216.34.181.45', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:2W7V4D332Y6B6WFAO5RNCM3D7GEFZROR', 'WARC-Record-ID': '<urn:uuid:6b26ae13-2c94-476f-999d-faf4cee0f59c>', 'WARC-Target-URI': 'http://slashdot.org/~frogzilla', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:80e41f0d-cb5a-4917-8dd7-35d7aa53af7a>', 'WARC-Truncated': None}", 'previous_word_count': '1559', 'url': 'http://slashdot.org/~frogzilla', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07569175958633423', 'original_id': '0782b7f5e80aa86bf825c6ad1ee9b3c340c5725b9d0311d53deb02a38fbe33c1'} |
some text Ron Hart
Back when I was in college, a "rager" was a wild party. Now the only "ragers" college kids have is when a speaker they disagree with comes to campus. They manufacture rage, all at the expense of the First Amendment. With such rage on its campus, a $70,000-per-year Middlebury College degree just went down in value — again.
The Cliff Notes version of the latest college "snowflake" movement happened at leafy Middlebury in Vermont. Well-respected author and academic Charles Murray was set to speak. The kids wanted no part of him, and a spineless administration would not take a stand for free speech. The rage was so bad, the mob assaulted a woman faculty member who was escorting Murray on campus; she had to be hospitalized.
To celebrate their accomplishment, I suppose the students then went into the campus quad and played hacky sack (with helmets, for safety) because it just felt right. I never trust a college that doesn't have a real football team.
A friend's daughter has a liberal arts degree from Middlebury, which means she is a receptionist at her dad's friend's law firm in New York.
The First Amendment has died a slow death on college campuses, strangled over time by their left-wing bureaucracies. If our founders were around today (after visiting the Times Square theater district to catch the musical "Hamilton"), they would be appalled by what happened at Middlebury College.
Colleges, which I have long said have priced themselves out as a value proposition for many, are the front lines of the war on free speech. College professors were supposedly tenured so as to protect their speech and ideas that might be controversial, but they are the ones who are diminishing the First Amendment for others.
Parents, students and employers must continue to ask themselves if taking on so much student loan debt for such lame "educations" is smart or dumb. Sadly, the middle-class is hurt most by such prohibitive costs.
The left, represented by its perpetually enraged leaders, including Elizabeth "Pocahontas" Warren, owns the education system. This is a woman who got a job at Harvard by pretending to be Native American. She made $429,981 per year and taught one class — and then somehow blamed others for the high cost of college.
The sad fact is that, in a recent poll, 41 percent of millennials said there should be limitations to free speech if it is viewed by them as "hateful" or might offend someone. Hey snowflakes, that is what free speech is. Speech we don't agree with. How badly has the education system failed us that 41 percent of those kids do not understand that?
This weak millennial generation grew up receiving participation trophies, expecting us to applaud and positively reinforce what little they do. Jugglers, street mimes and community theater actors need applause — real leaders don't. I cannot imagine Gen. George Patton or Gen. Dwight Eisenhower putting up with this. I just hope this generation does not have to go to war.
Russia is taking over other countries, ISIS is marauding and killing, we have an unsustainable $20 trillion in debt, and we spend our time fretting over PC silliness. We may look weak and feckless as a world power these days, but we are still the world's undisputed superpower when it comes to televised singing and dancing contests.
Even Yale's Calhoun College has been embroiled in a PC-led name-change battle because Sen. John C. Calhoun owned slaves around 1800. Shocker! I'd suggest they change the name to Trump University; that name became available recently. Bet they won't.
Contact Ron Hart, a syndicated op-ed humorist and TV/radio commentator, at, Twitter @RonaldHart or visit | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '104', 'language_id_whole_page_fasttext': "{'en': 0.9783978462219238}", 'metadata': "{'Content-Length': '38470', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:D5HYEROK4PVBEUULH3ARJHFKO4UZDEQP', 'WARC-Concurrent-To': '<urn:uuid:9623d5f5-9bfa-4985-92df-dd22badba33f>', 'WARC-Date': datetime.datetime(2019, 11, 22, 20, 4, 19), 'WARC-IP-Address': '35.231.196.193', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AX6WSJ7HW2YHGUUL4GRPHQIKTPQBEX3S', 'WARC-Record-ID': '<urn:uuid:46c71ea8-1dee-4ad8-83ac-d5819094125e>', 'WARC-Target-URI': 'https://www.timesfreepress.com/news/opinion/columns/story/2017/mar/17/hart-isolated-real-world-liberal-colleges-con/418064/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e7c6c91c-2f00-4b54-9699-0216970fc309>', 'WARC-Truncated': None}", 'previous_word_count': '693', 'url': 'https://www.timesfreepress.com/news/opinion/columns/story/2017/mar/17/hart-isolated-real-world-liberal-colleges-con/418064/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-133.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.066334068775177', 'original_id': '18b7ee779a4005b076683c5487a8ad5a561a602c77931d8689c7bdf52deca98f'} |
All Activity
This stream auto-updates
1. Past hour
2. Yes, it is now my gut reaction. The big changes for me occurred when I did volunteer work with alcoholics, drug addicts, criminals and psychiatric patients. People that were suffering immensely. They had been abused and now harming others. For some the pain was so bad they tried to kill themselves. Many didn’t want to leave the psych ward because they were afraid they may harm others again. Often, their children were taken away from them by child protection services. They loved their child dearly, yet felt like an evil monster and didn’t know how to make it stop. I had never seen this side of abuse and trauma before. It was gut-wrenching. I’m quite empathic and I internalized a lot of it. I started having nightmares and insomnia. At times I had harm anxiety - afraid I might harm someone. It was like I was living a piece of their world. After this, I saw it very differently. As a cycle of abuse. A cycle of suffering. One movie that had a big impact on me was “Little Children”. Yet it was really intense for me. It’s a story of a cycle of abuse in which most of the characters are both abused and abusing.
3. So is it normal after meditating for so long and practicing living a conscious life one forgets how to lie? Even in situations where a little white lie that would benefit everyone, I can't even think of a lie, I'll pause for a second and then say the truth. Then afterwards I regret knowing it wasn't the best response.
4. Ego Personas Shadow Archetypes Synchronicity Etc.
5. No, it would actually make you more meditative and focused. Modafinil quiets the mind, but simultaneously makes it hyper-creative. Thoughts slow down but become more powerful and intuitive. Similar to a mild psychedelic.
6. You mean a good way for Yellow to bang some Green
7. Study businesss and marketing. I suggest Eben Pagan as a good resource. Study, learn, go to farmers and literally pitch them your idea. Ask them what their wants and needs are. Get practical and theoretical. If you don’t increase everybody’s woke points to 100,000 in 5 years with your invention you’ve failed. GO
8. @Key Elements Works well for weight loss accountability. Can’t wait to see what it does for awakenings. Let me know when it’s done so I can check it out! I’ll help spread the word.
9. Mothafucka when are WE going to do that?! Get your ass down to SF.
10. An occasional hippie music festival can be a fun way for Yellow to get a shot of Green without losing independence.
11. @bobbyward No, I don’t. I understand your perspective though. The crazy thing......just watch. People eating blueberries will arise in your experience. Next couple days.
12. Is that your gut reaction? How do I get to that level? I feel like meditation is not enough. Absolutely crazy. Imagine killing someone for their life experiences they could not control. And life in prison is basicly ruining someones life for a tiny stroke to the ego of the victims.
13. I'm going for a non-duality app with scaling features. B2B. Spreading the peace through smartphone downloads.
14. So I toootally meditated again, 10 minutes this time. Realised I'm in a state of overwhelm, and headed for a caffeine-fuelled burnout. It doesn't take much for me. The signs are there: Unable to relax my body, it's twitching and tensing up in weird places Avoiding sleep and relaxation Doing extra work at late unpaid hours for my employer Checking github right after waking up (used to be Tinder) Increase in irritability and painbody attacks So I shall quit coffee again and compile an overview of stuff to do, so I feel less overwhelmed and don't use work as an escape
15. Just hit the town with me and @kieranperez , you will be balls deep in poon tang in no time
16. That is a big expansion of love. When I see abuse, I feel compassion for both abuser and abused. They are both suffering and acting out conditioning. There is plenty of delusion. I would also want to stop anymore abuse and then try to help both of them. Stopping the abuse may involve temporarily removing the abuser from society. Hopefully, we could help that person get better. Similarly, when I see a religious person indoctrinating others, I see someone acting out their own indoctrination. I would support bringing awareness to the indoctrination to reduce harm. Yet I wouldn’t hate on someone acting out their own indoctrination. I was hard-core indoctrinated into a religion as a child. It’s really hard to work through. I’m still deconstructing some of that crap - 30 years later. . . And yes, the prison system here in America is messed up.
17. @Genghis Khan Yes, magick/occult is very real. It is the western path to enlightenment. I have found that all the traditions have their strengths and weaknesses. After studying Buddhism and Yoga very intensely for several years, my "inner guru" led me to realize that my next step of spiritual evolution was going to involve energy work. Yoga has very powerful energy work (magick) but one is not going to learn very much unless they follow a guru. If you do follow a guru, you may find out many years later that energy work is not his strength and learn very little. Taoism is very powerful magic but is more limited in its uses and difficult for a westerner to fully grasp and master. The occult is energy work on steroids. I dont think any traditions can touch it in that arena. A lot of people would disagree but that is simply because there is a weird bias in the west that true spirituality can only be found in the east. The philosophy is a bit different than Buddhism or Yoga. Rather than claiming the physical world is "unspiritual" and that one should just dissolve the self and wait for death/liberation, Occultists believe that the physical world is created by the divine and should be mastered and engaged in like all the other realms in a process of eternal spiritual evolution. I would highly suggest just sticking to High Magick, which is for the purpose to become one with the divine. I also do some rituals for health and prosperity because both can be used to help meet my spiritual goals. Despite what many say, there is nothing spiritual about weakness, poverty and sickness. With that said, be VERY careful with using the occult for prosperity. That can very easily solidify and inflate the ego. Keep your intentions based in love and that will guide you. Personally, I have combined what I have learned from Buddhism, Yoga and the Occult. For me, it is a complete spiritual practice. My significant other doubted whether magic was real. We did a ritual to summon an arch angel and the angel appeared. Im not going to go into too much detail about what happened but it was an extremely powerful and beautiful experience. Lets just say my significant other is now totally on board with magick. Magick is a tool. It can be used for "good" or "bad". Whatever you use it for, it amplifies it greatly.
18. Then that’s a shitty situation. But we still have to enforce the law or society is going to end pretty fast. It’s not for their sake. They should get some mental help like they do in my country and get a job and some friends. Or whatever they need. We still need a society after all.
19. Well I should refrace that. I hate the act of abuse. Not the people doing them. I support compassion. I live in Norway. I think we may have the nicest prisonsystems in the world. People are doing a lot better out of the system than in America.
20. @Nahm That's so weird. I've been eating blueberries everyday but I thought I was doing it for my third eye chakra.
21. And what if they don’t have the resources to do so? What if their brain and body has been messed up? What if nobody loves them? What if people hate them? How on earth can such a person heal and get better? I volunteered in a psychiatric ward of a hospital for years. Many abused people never had the chance to heal. They were never loved, They were treated like shit their whole life.
22. There's both the psychological component of scarcity which you can see value from scarcity all over the economy causing a sense of need and the more raw chemical component of a dopamine rush which also is used as compensation for say being bored and what not.
23. They are not at odds with one another. Those "crazy" spiritual experiences facilitate the ego's dissolution. Besides which, the ego's dissolution is not the only game in town. If you hold the "sober" state as more real than a "crazy" high state, that's an anchor point which needs deconstructing. The value of shifting states is that it helps to free oneself of states. But also keep in mind that whatever state you are in, that state is defining and limiting your understanding of reality. There are things you can understanding in a crazy high state which you cannot understand in a sober state. So to put a sober state as superior or more "natural" than a high state is incorrect. It's a bias. This is not to say one should get attached to high states either. The point is to be open to experiencing life from various kinds of states without demonizing them. People get trapped chasing states. But people also get trapped demonizing states and proclaiming that their state is the best and that other states are useless.
24. That is a different issue. You just bypassed the compassion issue. We can temporarily remove a person if they are abusing others - so this person does not abuse others. Yet we can do so while loving this person and with compassion. We can try to help this abused person heal. You originally said you hate the people doing the abuse. That is a different issue.
1. Load more activity | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9715542793273926}", 'metadata': "{'Content-Length': '103934', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:REYRDA6TNUTENOJOHSFKAL25TYVCWWSX', 'WARC-Concurrent-To': '<urn:uuid:f7f08914-9dfd-4b53-9b0d-adfbea4d4c26>', 'WARC-Date': datetime.datetime(2019, 4, 19, 1, 27, 58), 'WARC-IP-Address': '173.254.206.250', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CKXR2GV2FTTJ26MJYXBT76X3PNMJOC5H', 'WARC-Record-ID': '<urn:uuid:ea1ce514-0bbc-4f13-809d-3bb9d5fea25d>', 'WARC-Target-URI': 'https://www.actualized.org/forum/index.php?app=core&module=system&section=notifications&do=followers&follow_app=forums&follow_area=topic&follow_id=27518', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c7b8bcab-99f5-456a-aee3-ea0852cf81d5>', 'WARC-Truncated': None}", 'previous_word_count': '1710', 'url': 'https://www.actualized.org/forum/index.php?app=core&module=system&section=notifications&do=followers&follow_app=forums&follow_area=topic&follow_id=27518', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2540987730026245', 'original_id': 'e9bd239d6f63e063020f22f5d6e02e6e8cff054ec022f722370fea5bb74308cd'} |
Building Pd externals in XCode (part 1)
//XCode Project Setup// NB: This tutorial uses XCode 3.2
1. Start a new project in XCode
2. Select “BSD C Library”
3. Name your project (add a ~ to the end of the name if it is a signal object)
4. Under the Targets menu, select your target, then press cmnd+I (or right click, get info)
5. In the linking section, go to “Other Linker Flags” and change the field to
“ –undefined dynamic_lookup”
6. In the packaging section, change Executable Extension to “pd_darwin”
7. Delete the Executable Prefix “lib” and leave it blank
8. Close the target window
9. Right click on the Pd icon in your “applications” directory
10. Navigate to the “src” directory
11. Locate the file “m_pd.h” and drag-and-drop it to the “Source” folder icon in XCode
12. Create a new file in XCode by:
File… New File… C File…
13. Deselect “untitled.h”
14. Make sure this file has the same name as your object (as in <objectname>.c)
15. Hit “Finish”
16. Program your external…
The rest of this tutorial is forthcoming. For the time-being, I have found this tutorial extremely useful…
any questions or comments can be sent to | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.7644452452659607}", 'metadata': "{'Content-Length': '17385', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DK5YRTUVB4UI7UCQAVHMH4WQZFTKUCWZ', 'WARC-Concurrent-To': '<urn:uuid:b9ee2c97-354c-427c-92af-d2d76e3ad204>', 'WARC-Date': datetime.datetime(2018, 10, 17, 1, 48, 26), 'WARC-IP-Address': '198.71.233.41', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VMOSOAQLRVUJETLPJFRRDM3Z55QTG7CJ', 'WARC-Record-ID': '<urn:uuid:501dafcc-4fa9-4e2d-89b0-952fae4f42c9>', 'WARC-Target-URI': 'https://colinzyskowski.com/?page_id=515', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:909ed258-b36d-4171-b0fd-0d4f9f40f398>', 'WARC-Truncated': None}", 'previous_word_count': '182', 'url': 'https://colinzyskowski.com/?page_id=515', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-102-177-5.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.45628732442855835', 'original_id': '9d1a8d40913a6088ad4c4e60733fadb0f159c6085e7be57012b6a3f7fb32ed86'} |
<section>
<h2>Customisation</h2>
<p>There are two main ways in which Illuminate can be customised. The primary way would be to override the
pre-existing CSS variables with a <code>"overrides.css"</code> file. This can be cleanly modify many existing
component properties, as well as allow for easy implementation of custom themes.
</p>
<article class="d-flex flex-col p-none m-none mt-15">
<section class="m-20">
<!-- Custom CSS Section -->
<p>— Unimplemented</p>
<!-- END Custom CSS Section -->
</section>
</article>
</section> | the_stack | {'hexsha': 'e79b17e52c5618e64e1531eeabaa1905a2348156', 'size': '624', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'examples/snippets/customisation.html', 'max_stars_repo_name': 'rroessler/illuminate', 'max_stars_repo_head_hexsha': '7c8bb2e5c551d0f8b1c71b312476b0a42b3ccbd9', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'examples/snippets/customisation.html', 'max_issues_repo_name': 'rroessler/illuminate', 'max_issues_repo_head_hexsha': '7c8bb2e5c551d0f8b1c71b312476b0a42b3ccbd9', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'examples/snippets/customisation.html', 'max_forks_repo_name': 'rroessler/illuminate', 'max_forks_repo_head_hexsha': '7c8bb2e5c551d0f8b1c71b312476b0a42b3ccbd9', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '39.0', 'max_line_length': '117', 'alphanum_fraction': '0.6282051282', 'original_id': '16bfaf3b0169ca04f2a6561c8b552d2de8829f8bbaba5abddf33a8c7f7e877d0'} |
Joseph Nii Laryea Afotey-Agbo ( Hon.)
Name Laryea Afotey-Agbo
Other NamesJoseph Nii
Date of Birth1967-07-31
Place Katamanso-Nungua
Detailed Biography
Photo None
Hon. Joseph Nii Laryea Afotey-Agbo (NDC) (Kpone-Katamanso)
He comes from Katamanso-Nungua in the Greater Accra Region and was born on July 31, 1967. He holds RSA Stage II, 1987. Hon. Afotey-Agbo is a farmer and was the MD, JNL Afotey-Agbo ventures before winnng 20,709 votes out of the 32,893 valid votes cast = 63.0% in the last elections to become an MP.
He is a member of the majority in parliament thus the National Democratic Congress and a Christian (Presbyterian) who is married with four children. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9374378323554992}", 'metadata': "{'Content-Length': '28467', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:22I3RGREDWQGZDQCTRC3UAHEXCRDUQ63', 'WARC-Concurrent-To': '<urn:uuid:1217b50d-577f-441d-914b-5d567d55c9f7>', 'WARC-Date': datetime.datetime(2019, 4, 20, 15, 12, 10), 'WARC-IP-Address': '104.17.200.96', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XGY6NXNI7PA2DBVRFH6DTZHVTV7LPL3O', 'WARC-Record-ID': '<urn:uuid:a8de3830-d22d-493e-8ca0-9c90f6a2b44c>', 'WARC-Target-URI': 'https://mobile.ghanaweb.com/GhanaHomePage/people/person.php?ID=1225', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1db2a022-605e-43b3-9acf-ed162fb772af>', 'WARC-Truncated': None}", 'previous_word_count': '102', 'url': 'https://mobile.ghanaweb.com/GhanaHomePage/people/person.php?ID=1225', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1959989070892334', 'original_id': '5e9df5c0b5967040a810746348bd5b980ba8ceb4f7a38a5ad2500f104c45ee5f'} |
M Menu
b 0 Items s
What scale is my model train? What is 00 Gauge? How big is N Gauge?
With such a wide variety of scales and gauges available to railway modellers it can become difficult to decide which product is right for you. This guide explains the differences between some of the most commonly used model rail scales and gauges.
Firstly it is important to understand the difference between scale and gauge. Scale refers to the physical size of the model in relation to the real world, for example a 1:76 scale model is 1/76th the size of its real world counterpart. As a rough guide, the larger the scale number the smaller the model.
Gauge refers to the distance between the rails - different gauge models and track have a standard measurement for that gauge between the wheels and rails. However, this is where the difference between scale and gauge becomes important - different scale models can run on the same track if the gauge is the same.
00 Gauge
scale 1:76 gauge 16.5mm
The most popular model rail scale in the UK. As 00 and H0 have the same gauge track, 00 models can run on a H0 layout and vice-versa.
Brands: Hornby
H0 Gauge
scale 1:87 gauge 16.5mm
H0 Gauge is the most widely used gauge outside the UK. As H0 and 00 have the same gauge track, H0 models can run on a 00 layout and vice-versa.
Brands: Electrotren, Lima, Jouef, Rivarossi
TT Gauge
scale 1:120 gauge 12 mm
TT, or Table Top is approximately half way in size between H0 and N, popular in Eastern Europe and Russia.
Brands: Arnold TT
N Gauge
scale 1:160 (Europe/US) gauge 9mm
The most popular gauge for small-scale rail modelling, N Gauge differs slightly depending on the region of manufacture (UK brands are generally 1:148). However, as with H0 and 00, both have the same gauge.
Brands: Arnold N
Membership Restricted Product | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9322152733802797}", 'metadata': "{'Content-Length': '161191', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JMSIVLM4QBORB5V5XMCIH6KTTWDQ4L7S', 'WARC-Concurrent-To': '<urn:uuid:52632e59-97e1-4325-81d7-fb4b2c0d9426>', 'WARC-Date': datetime.datetime(2018, 12, 13, 13, 6, 45), 'WARC-IP-Address': '107.154.133.62', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:K7COO4IVWXQCYUYW7ZMQCCENQSXAQDQK', 'WARC-Record-ID': '<urn:uuid:6678f017-a04e-46a0-a551-184dac17637e>', 'WARC-Target-URI': 'https://www.hornby.com/us-en/scales-and-gauges', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:09c7394e-88b1-4772-b67d-087f213ea395>', 'WARC-Truncated': None}", 'previous_word_count': '322', 'url': 'https://www.hornby.com/us-en/scales-and-gauges', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-168-82-48.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.35070133209228516', 'original_id': 'e984e3c297a1e7a2bd5b10b19223ce1ce70bed5ad1dab47cf9d6721b7a01bd37'} |
This price has not been verified as correct yet, please contact sales to confirm pricing
This price is confirmed correct by Perkal - Pricing is for 1 unit and will be discounted as quantity increases
Please note that Perkal does not supply to individuals purchasing for themselves. We only supply to companies. Please note, any company - whether buying for their own use or for resale - can purchase from us (This includes corporates, churches, organisations, non profits, schools and the like) . If you are purchasing on behalf of a company/organisation please contact sales@perkalgifts.co.za or call 0861744387 for assistance
Please note: Perkal is closed from 10 AM 14 Dec 2018 to 9AM 7 Jan 2019. You are welcome to contact us during this time, however we will only be able to respond when we re-open. | mini_pile | {'original_id': '19cfd67bc1cc5666f10d000dc693b923f1d69dddb96545727ffe16a9ce600d32'} |
"use strict"
// global key for user preferred registration
var REGISTRATION_KEY = '@@any-promise/REGISTRATION',
// Prior registration (preferred or detected)
registered = null
/**
* Registers the given implementation. An implementation must
* be registered prior to any call to `require("any-promise")`,
* typically on application load.
*
* If called with no arguments, will return registration in
* following priority:
*
* For Node.js:
*
* 1. Previous registration
* 2. global.Promise if node.js version >= 0.12
* 3. Auto detected promise based on first sucessful require of
* known promise libraries. Note this is a last resort, as the
* loaded library is non-deterministic. node.js >= 0.12 will
* always use global.Promise over this priority list.
* 4. Throws error.
*
* For Browser:
*
* 1. Previous registration
* 2. window.Promise
* 3. Throws error.
*
* Options:
*
* Promise: Desired Promise constructor
* global: Boolean - Should the registration be cached in a global variable to
* allow cross dependency/bundle registration? (default true)
*/
module.exports = function(root, loadImplementation){
return function register(implementation, opts){
implementation = implementation || null
opts = opts || {}
// global registration unless explicitly {global: false} in options (default true)
var registerGlobal = opts.global !== false;
// load any previous global registration
if(registered === null && registerGlobal){
registered = root[REGISTRATION_KEY] || null
}
if(registered !== null
&& implementation !== null
&& registered.implementation !== implementation){
// Throw error if attempting to redefine implementation
throw new Error('any-promise already defined as "'+registered.implementation+
'". You can only register an implementation before the first '+
' call to require("any-promise") and an implementation cannot be changed')
}
if(registered === null){
// use provided implementation
if(implementation !== null && typeof opts.Promise !== 'undefined'){
registered = {
Promise: opts.Promise,
implementation: implementation
}
} else {
// require implementation if implementation is specified but not provided
registered = loadImplementation(implementation)
}
if(registerGlobal){
// register preference globally in case multiple installations
root[REGISTRATION_KEY] = registered
}
}
return registered
}
}
| mini_pile | {'original_id': 'bfd7249e699debfecb3d2038cfd87aba7cbb470113ebf5114b529659b506af28'} |
Wednesday, October 7, 2009
The Ogden Nature Center
One of the fun things that we have been doing through the summer until now is going to volunteer at the Ogden Nature Center. We get to feed, and take care of some of the animals that are there. It is something that the kids love and makes them feel pretty cool. We use to go every week, but now that school started we just go every other Wednesday.
All of the animals there are in cages and have been injured somehow. The kids get to feed snakes, tarantula, owls, lizards, toads, a pelican and tortoises. Tyler's favorites are the snakes and the tarantula's. He loves to dangle a dead mouse in front of the snake until the snake strikes and bites it. He did not get that from me! I am in the corner of the room breaking out in cold sweats just watching him feed the snakes. Yuck!
He also loves the tarantulas. Here he is holding it today. They are actually very gentle creatures. Don't you love his face. (SIDE NOTE-The other set of hands you see is a trained professional. I promise I don't go around encouraging my kids to hold tarantulas!!!).
I have learned a lot about these animals and have faced some fears (snakes) doing it, so it has been good all around. Kylee's favorite thing is feeding the birds. She puts dead mice on their perch and also changes their newspaper and gives them fresh water.
Here's Malia peaking at the tortoise.
Kari said...
A Mazing. I. Can't. Believe. That. Tyler will not be staying at my house on your visit next time. Nope. People who play with spiders are not allowed.
Charlotte said...
Just seeing him hold that spider gives me the creeps!
Tausha and James Hansen said...
I am so use to seeing and taking care of that spider that I forget how creepy it really is. I went back to look at the picture and it is crazy. You are all probably thinking what a bad Mom I am for letting my son hold that!!! They really are gentle and if they bite it is just like a bee sting. Not poisonous. I know...CRAZY
Charlotte said...
Are you kidding? You should see what my kids bring for me to see. I always shudder and then try to hide it so they can enjoy exploring without thinking it is creepy.
Anna and Justin said...
That is such a great idea. your kids have no fear. no way could i do that.
Rae Lynne said...
What a great mom you are to encourage their love and curiosity for animals in such creative ways! You really do the coolest things with your kids! | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.971471071243286}", 'metadata': "{'Content-Length': '136196', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:L6TDP6W4D55Z4HUNYHIGHJGV2RNTNYEV', 'WARC-Concurrent-To': '<urn:uuid:d095696d-ff61-403d-800b-35aa23d5d07f>', 'WARC-Date': datetime.datetime(2017, 5, 23, 10, 56, 13), 'WARC-IP-Address': '172.217.7.193', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ZDKVQQ45XIPVPSYFV7AGUYFMJIYTZJIX', 'WARC-Record-ID': '<urn:uuid:1659823c-1180-47e3-a7c8-84ede044acba>', 'WARC-Target-URI': 'http://all6ofus-hansenfam.blogspot.com/2009/10/ogden-nature-center.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a3bc4cdb-7660-4c5a-b1cc-f58128eb9199>', 'WARC-Truncated': None}", 'previous_word_count': '458', 'url': 'http://all6ofus-hansenfam.blogspot.com/2009/10/ogden-nature-center.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04065704345703125', 'original_id': '3a54341e865e4d563cf9e79239337e201681438359b8f074987e5163cb50e0fb'} |
公司 (0)
There are several insurance companies that offer health insurance policies. But which one should you choose? They all offer different benefits and each have unique selling points and value-added aspects. The fine print is often hard to properly unpack and the prizes differ significantly as well. That’s why we made an overview of all the companies that provide health insurance policies, where customers can leave their reviews and insights. Any experience, opinion or complaint you want to share? Feel free to leave your own review.
所有的 Health 公司 (0)
更多信息 Health 公司
It can quite unclear which insurance companies offer dental care and which of these companies is the best and the cheapest. Of course you can compare different dental insurances to see which of them is the cheapest in your situation. But being the best does not always go hand in hand with being the best. And best for you, does not always mean best for everyone. What are the real problems you encounter while going to the dentist? A good dental insurance can help you with that. Therefore, we made an overview of many insurances that provide dental care. Via reviews, opinions and experiences of other customers, you can make the right choice.
While driving a vehicle,, an accident can happen before you know it. Chances are that your passenger or passengers get hurt, injured or even worse. In these cases, it might be a (small) comfort to know that you at least have a decent insurance policy. What happens in case your passenger becomes invalid or even dies? What are the pros and cons of each insurance company and what policies do they offer? Read reviews by fellow clients who were involved in an accident and what they tell about the way their insurance company handled things. Do you have an opinion or experience of your own that you’d like to share? We’re happy to see your review! | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9651268124580384}", 'metadata': "{'Content-Length': '36210', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:T7ZCIC67Z46MOCB6AIRIHGI7ZLZ33KXO', 'WARC-Concurrent-To': '<urn:uuid:12ece3e1-f7e9-4dda-97f9-545fbd934e09>', 'WARC-Date': datetime.datetime(2019, 12, 16, 11, 26, 4), 'WARC-IP-Address': '3.120.10.208', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ERFCAVFDOS5SDK7ET6NB5OF56J6E6G6K', 'WARC-Record-ID': '<urn:uuid:50330fc0-fc9c-4673-9d51-5ac2d00f5e1f>', 'WARC-Target-URI': 'https://haopinglun.cn/pinglun/insurance/health-insurance-reviews-opinions-experiences-complaints', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:11ac7f0d-2ade-4766-a0af-80b3df7e7f14>', 'WARC-Truncated': None}", 'previous_word_count': '320', 'url': 'https://haopinglun.cn/pinglun/insurance/health-insurance-reviews-opinions-experiences-complaints', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-201.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.049815595149993896', 'original_id': '80e1115eb11ff55fc2f59e4023e0a46b72dfd12dc97d7cb026913ac14a5a79ca'} |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<link rel="stylesheet" href="./node_modules/bootstrap/dist/css/bootstrap.css" />
<link rel="stylesheet" href="./styles/styles.css" />
<script src="./node_modules/jquery/dist/jquery.min.js"></script>
<script src="./node_modules/handlebars/dist/handlebars.min.js"></script>
<script src="./node_modules/bootstrap/dist/js/bootstrap.min.js"></script>
<script src="./node_modules/sammy/lib/min/sammy-0.7.6.min.js"></script>
<script src="./node_modules/sammy/lib/plugins/sammy.handlebars.js"></script>
<!-- <script type="module" src="scripts/requester.js"></script> -->
<script type="module" src="scripts/app.js"></script>
<title>CookUni</title>
</head>
<body>
<div id="rooter" class="cover-container w-100 d-flex h-100 p-3 mx-auto flex-column">
<header class="masthead mb-auto">
<div class="inner">
<h3 class="masthead-brand">CookUni</h3>
<nav class="nav nav-masthead justify-content-center">
<a class="nav-link" href="/">Home</a>
<a class="nav-link" href="/login">Login</a>
<a class="nav-link" href="/register">Register</a>
</nav>
</div>
</header>
<div id="notifications">
<div id="successBox" class="alert alert-success" role="alert">{Success Message...}</div>
<div id="loadingBox" class="alert alert-info" role="alert">Loading...</div>
<div id="errorBox" class="alert alert-danger" role="alert">{Error Message...}</div>
</div>
<main role="main" class="inner cover mt-5">
<h1 class="cover-heading">Coooooking University</h1>
<p class="lead">They say that food passes through the stomach, we say that food passes through CookUni...
</p>
</main>
<footer class="mastfoot mt-5 text-center text-light">
<div class="inner">
<p>Made with ♥ by <a href="/home">CookUni</a>.</p>
</div>
<i class="fa fa-heart"></i>
</footer>
</div>
</body>
<!-- Libraries -->
<!-- <script src="./node_modules/jquery/dist/jquery.js"></script>
<script src="./node_modules/bootstrap/dist/js/bootstrap.js"></script>
<script src="./node_modules/handlebars/dist/handlebars.js"></script>
<script src="./node_modules/sammy/lib/sammy.js"></script>
<script src="./node_modules/sammy/lib/plugins/sammy.handlebars.js"></script> -->
<!--My Libraries -->
<!--????-->
<!--????-->
<!--????-->
</html> | the_stack | {'hexsha': '88ca31a86cbea908bfbae0e2c1d8b777d3a75166', 'size': '2735', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'examPrep1/CookUni_Resources/index.html', 'max_stars_repo_name': 'allsi89/jsApps-SoftUni', 'max_stars_repo_head_hexsha': '62ca354ebc29765636b033292ea181e7e8c7ebe7', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'examPrep1/CookUni_Resources/index.html', 'max_issues_repo_name': 'allsi89/jsApps-SoftUni', 'max_issues_repo_head_hexsha': '62ca354ebc29765636b033292ea181e7e8c7ebe7', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'examPrep1/CookUni_Resources/index.html', 'max_forks_repo_name': 'allsi89/jsApps-SoftUni', 'max_forks_repo_head_hexsha': '62ca354ebc29765636b033292ea181e7e8c7ebe7', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '41.4393939394', 'max_line_length': '117', 'alphanum_fraction': '0.5919561243', 'original_id': 'e503f0b14f917450e0c3f61fe428a98fabdcc8229a7c59a8afdda90d8cc42d0b'} |
// #Conformance #DeclarationElements #Attributes #Import
// Ignore "Uses of this construct may result in the generation of unverifiable .NET IL code..."
#nowarn "9"
open System.Runtime.InteropServices
open Microsoft.FSharp.Math
[<Struct>]
[<StructLayout(LayoutKind.Explicit)>] // As per FSHARP1.0:5931, LayoutKind.Sequential (=default) does not allow FieldOffset
type Align16 =
[<FieldOffset(0)>]
val mutable x0 : System.DateTime
[<FieldOffset(8)>]
val x1 : System.DateTime
// Verify no runtime asserts...
let mutable test1 = new Align16()
test1.x0 <- new System.DateTime()
exit 0
| mini_pile | {'original_id': '4b04505b2de08648eb3c5ceb10693aec8ef3e6691b3db180aa4dddac795a61e5'} |
“a little love larger than the sea.”
mermaid 1
once i decided on the icon shapes i wanted to use in the background pattern, i start tracing them to fill in the background around the mermaid’s tail.
mermaid 2
here’s the full background pattern once all the icons have been traced– ready to transfer to illustration board!
mermaid 3
once the pattern is transferred to illustration board, the first paint colour i mix is the background colour– which typically informs the colour scheme of the whole piece. so here you see me starting to paint in sea blue around all those icon shapes!
mermaid 4
background has been painted in & i’m starting to fill in the icons– once colour and shape at a time! (obsessed with those peach octopi!)
mermaid 5
once the background was finished, i started painting the little mermaid’s tail. layers and layers of green to make the scales… so much fun!
mermaid 6
again with the details on the fin scales. added some red to make the deeper greens and shadows pop, too. woohoo for colour theory!
mermaid 7
there are lots of icons that allude to andersen’s tale and not the disney version– the pillow she slept on outside the prince’s door, the pearls from her grandmother, and, um, yeah, that dagger…. :/
“a little love larger than the sea.”
this faerie tale feet painting is based on hans christian anderen’s classic “the little mermaid.” the original story is a bit more complicated and tragic than the fine 1989 disney animated film, but the point remains: love can transcend an ocean, the land, and the air itself.
i invite you to read the original. it’s not just the little mermaid (sorry, she’s never given the name “ariel,” but it is a pretty name!)’s love for the prince that makes her want to become human, but her overwhelming fascination with and desire for an immortal soul like humans have. when each of the little mermaid’s sisters turn fifteen, they are allowed to visit the surface on their birthdays. when it’s finally the little mermaid’s turn (she has five older sisters), she sees fireworks and a tremendous shipwreck. carrying the handsome prince to shore, it is a girl at the convent that gets the credit for saving the prince’s life.
the little mermaid eventually discovers where the prince’s kingdom is, visits the sea witch, who cuts out her tongue and gives her a magic potion that will give her legs. while she will be the most graceful human, every time the little mermaid takes a step on land, it will feel to her as if she’s walking on shards of glass.
i’m giving the whole story away… but i will say this: the little mermaid dances for the prince and is allowed to sleep on a silk pillow outside his bedroom door as a reward. the prince goes to another kingdom to visit a princess his dad wants him to marry and it turns out to be convent girl, so they get married. the little mermaid’s sisters cut off their hair so the sea witch gives them a dagger that the little mermaid can kill the prince before the sun rises the day after his wedding so she can turn back into a mermaid. otherwise she’s become sea foam (what happens to all merpeople after they turn 400 years old). because she loves the prince too much to kill him, she throws the dagger into the sea as the sun rises. instead of becoming sea foam, for her selfless act she is granted immortality, but as an element of the air, and she watches over the prince and his new bride ever after.
stinks for her, but i guess the prince is happy…? anyway, i loved painting her luxe fin in layers and layers of gouache. and the background icons allude to both life under the sea (you’re singing that song in your head now, aren’t you?!), the clam shells and pearls her grandmother adorned her with when it was her turn to visit the surface for her birthday, the red flowers the little mermaid planted in her sea garden in the shape of the sun, a treble clef for she was the best singer in the ocean (and above land if she could have sung then), the silk pillow she slept on outside the prince’s door, the potion that made her human, her other sisters, the dagger that cut off her sisters’ hair and that could have killed the prince, the useless anchor of a ship at sea in a storm…. and hopefully the aura of living life, in any form, to LOVE.
signed, limited edition prints available here on my etsy site: http://etsy.me/1NCmqRs
greeting card available here: http://etsy.me/1KCJlXB
front reads
“It looked as if all the stars of the heavens
were falling down on top of her.”
(a quote from the fireworks scene in hans christian andersen’s “the little mermaid.”) | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.934173345565796}", 'metadata': "{'Content-Length': '66567', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OYC5YUGM6NVXVJMCXZWS7TXL53YC2PYQ', 'WARC-Concurrent-To': '<urn:uuid:e0fa8de2-317c-4c76-8e83-c446ac66bb78>', 'WARC-Date': datetime.datetime(2018, 8, 19, 0, 46, 14), 'WARC-IP-Address': '192.0.78.12', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:GKHXBV5CCGH2JXG7VD6DCIAVUYXYMOMX', 'WARC-Record-ID': '<urn:uuid:4911b100-19fa-4446-bb69-73024a0aa877>', 'WARC-Target-URI': 'https://halthegal.wordpress.com/2014/04/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae942653-387d-4c01-955d-02fab678ebe4>', 'WARC-Truncated': None}", 'previous_word_count': '809', 'url': 'https://halthegal.wordpress.com/2014/04/', 'warcinfo': 'isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-113-243-226.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05698651075363159', 'original_id': '70e7e6ae5d6c46b44888c9d354d07aee7f0fa6e43be4c245aab740577e028bd1'} |
Exclusive information portal
Siberian pine: strength, health, longevity
Ecology of Siberian pines: its role and significance in human life
Who doesn’t like cedar nuts? Sweet, tasty and very nutritious. Everyone likes them: people, animals, birds. A lot has been said about dietary and nutrient properties of these seeds. However, few people know that commonplace cedar nuts don’t actually grow on cedars. Those delicious nuts we’ve eaten since childhood are harvested from Siberian pines.
True cedars are coniferous thermophilic evergreens. Presently, there are very few cedar forests in the world. These colossal trees grow on Mediterranean shores, in the Himalayas, in the Northern Africa and Middle Asia. Their glossy cones of light chocolate color are very beautiful. The cones are barrel-shaped and can grow up to 17 centimeters long. The nuts aren’t edible: enormous concentration of sap makes cedar kernels bitter.
A cedar in Lebanon, photo WEB
A cedar in Lebanon, photo WEB
In Russia, Siberian pines are widely spread in taiga forests of Siberia. Ussuri taiga, Transbaikal, the Altai and the Sayans are favorite growing areas of these pines. They also can be seen in the European North of Russia. For example, the Koryazhma pine grove is a well-known landmark of Arkhangelsk region.
The Koryazhma pine grove is a famous natural reserve, photo WEB
The Koryazhma pine grove is a famous natural reserve, photo WEB
For the first time this unique forest area was mentioned in chronicles written under the rule of Ivan the Terrible. First pines of the Koryazhma grove appeared in 1660 thanks to monks of the Nikolo-Koryazhemsky Monastery. It’s widely accepted that from this place Siberian pines started to spread along the Northern Dvina banks. By the 1930s, there were about 400 fully grown trees in the grove.
Первые кедры Коряжемской рощи появились благодаря монахам Николо-Коряжемского монастыря
First pines of the Koryazhma grove appeared thanks to Nikolo-Koryazhemsky monastery monks, photo WEB
The construction of the Kotlas Pulp and Paper Mill and rapid development of the Arkhangelsk region industrial complex in the Soviet era put the grove on the brink of extinction. More than 350 pines died within the 50 years. Only in 1979, when the Koryazhma grove was declared a natural monument, it became possible to stop the extinction.
Today, the Koryazhma Siberian pine grove occupies an area of slightly more than 17.5 square kilometers of vibrant pine and larch copses. It is a significant object of natural conservation now.
Воздух в кедровой роще обладает уникальными свойствами
Air of the pine grove has unique properties, photo WEB
Pine groves are mighty and magnificent. The air here is imbued with unique properties: it is saturated with negatively charged ions and phytoncides. These substances exhibit potent bactericidal action. They facilitate air purification and kill microbes. The aroma wafting from these trees is beneficial – it calms down and heals.
Siberian pines are resistant towards the aggressive impact of industrialized environment. In contrast to many other forest trees, pines endure smoke and soot of urban areas with ease. Moreover, Siberian pine plantations improve urban ecology through effective purification of polluted air. They also improve aesthetic properties of cities.
As of today, restoration of pine forests is a federal-level ecological issue
As of today, restoration of pine forests is a federal-level ecological issue, photo WEB
Pine wood is a versatile construction material. It is a valuable natural resource characterized by appealing texture, high durability and longevity. At that, it can be processed easily. This material is widely used in construction and furniture manufacturing.
Over a number of years pine forests were mercilessly felled without a second thought. The deforestation rate was incomparable with natural regrowth of trees. Siberian pine groves serve as habitats for numerous animals and birds. Certain species disappeared irreversibly when their homes were gone. That is why, restoration of pine forests is currently a federal-level ecological issue.
Pine nuts are healthy and nutritious, photo WEB
Pine nuts are healthy and nutritious, photo WEB
Siberian pines act as a food reserve not only for taiga animals and birds. Pine nuts are healthy and nutritious ― they are the number one source of proteins, amino acids, vitamins and micronutrients, essential for the human body.
Shelled kernels are an extremely valuable dietary product. They are indispensable in infant and teenager diet. They are recommended for pregnant women. If consumed in sufficient amounts, they influence the immune system positively.
Pine nut oil features a unique balance of components. It contains 95% of fatty amino acids ― a foundation of human energy reserves. It includes a complex of macro- and micronutrients, which ensure normal vital functions of the consumer.
Pine nut oil features uniquely balanced contents, photo WEB
Pine nut oil features uniquely balanced contents, photo WEB
Pine needles and nut shells can be used to make infusions, balms and ointments for ingestion, applications or rinsing.
For as long as anyone can remember, pine sap has been considered a genuine health potion. This remedy is actively used in folk medicine due to its bactericidal and wound-healing properties. In chemical industry pine sap serves as a raw material for turpentine and colophony, camphor and immersion oil.
Oksana Vlaskina, Saint Petersburg, Russia
More from Ecology | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '3', 'language_id_whole_page_fasttext': "{'en': 0.9208720326423644}", 'metadata': "{'Content-Length': '22320', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NMP64MTPBPSOLNJU5IVXYBLAPJE2DCDC', 'WARC-Concurrent-To': '<urn:uuid:15344cff-827f-4bfd-8eab-004f9e4678c6>', 'WARC-Date': datetime.datetime(2020, 9, 27, 9, 48, 12), 'WARC-IP-Address': '217.26.51.10', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:EKQPAKCP3IAO6O25EY2DUETCDANQXRX6', 'WARC-Record-ID': '<urn:uuid:db65fe7a-3e24-419b-b301-48a7e0f44a3b>', 'WARC-Target-URI': 'https://vlv-mag.com/en/rubriki/ekologiya/ekologiya-kedra-rol-i-znachenie-v-zhizni-cheloveka', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3a9af39b-489f-4d42-b966-62c698a33da6>', 'WARC-Truncated': None}", 'previous_word_count': '851', 'url': 'https://vlv-mag.com/en/rubriki/ekologiya/ekologiya-kedra-rol-i-znachenie-v-zhizni-cheloveka', 'warcinfo': 'isPartOf: CC-MAIN-2020-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-11.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03766900300979614', 'original_id': '520bddb8330a15bc59201e7d4a5e9b4aea8de5ed96b9fc53c3107e022e5f7486'} |
The present disclosure relates generally to a radioisotope elution system and tools for use therewith.
Nuclear medicine uses radioactive material for diagnostic and therapeutic purposes by injecting a patient with a dose of the radioactive material, which concentrates in certain organs or biological regions of the patient. Radioactive materials typically used for nuclear medicine include Technetium-99m, Indium-111, and Thallium-201 among others. Some chemical forms of radioactive materials naturally concentrate in a particular tissue, for example, radioiodine (I-131) concentrates in the thyroid. Radioactive materials are often combined with a tagging or organ-seeking agent, which targets the radioactive material for the desired organ or biologic region of the patient. These radioactive materials alone or in combination with a tagging agent are typically referred to as radiopharmaceuticals in the field of nuclear medicine. At relatively low doses of radiation from a radiopharmaceutical, a radiation imaging system (e.g., a gamma camera) may be utilized to provide an image of the organ or biological region in which the radiopharmaceutical localizes. Irregularities in the image are often indicative of a pathology, such as cancer. Higher doses of a radiopharmaceutical may be used to deliver a therapeutic dose of radiation directly to the pathologic tissue, such as cancer cells.
A variety of systems are used to generate, enclose, transport, dispense, and administer radiopharmaceuticals. One such system includes a radiopharmaceutical generator, including an elution column, and an input connector (e.g., an input needle) and an output connector (e.g., an output needle) in fluid communication with the elution column. Typically, a radiopharmacist or technician fluidly connects an eluant vial (e.g., a vial containing saline) to the input connector and fluidly connects an empty elution vial (e.g., a vial having at least a partial internal vacuum) to the output connector. The vacuum in the empty elution vial draws the eluant (e.g., saline) from the eluant vial through the elution column, and into the elution vial. The saline elutes radioisotopes as its flows through the elution column so that radioisotope-containing saline fills the elution vial. The elution vial is typically housed in its own radiation shielding container, sometimes referred to as pharmacy shield or an elution shield.
This Background section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art. | mini_pile | {'original_id': '84e210a56ea3f40f6f603be0456f83cf7feb8552e49f6373d9ca1e327265f8eb'} |
D[EFINITIONS]{.smallcaps} {#sec1-1}
=========================
The term "equipoise," defined as "a state of equilibrium," is a noun as well as a verb.\[[@ref1]\] Clinical (or community) equipoise, which implies that there is uncertainty among the medical fraternity regarding the benefit, or otherwise, of a clinical intervention, provides the basis for conducting clinical trials.\[[@ref2]\] Equipoise is also used as a guiding tool for patient--physician interactions, which involve shared decision-making.\[[@ref3]\] Such interaction is possible only if equipoise is achieved in information and knowledge: we term this "communication equipoise."
Theoretical equipoise is a separate concept related to evidence-based medicine.\[[@ref4]\] This describes the state of uncertainty that exists in a medical professional regarding a particular diagnostic interventional tool. A similar term is personal equipoise, which alludes to the personal opinion of an investigator, if she or he feels that there is difference between two opposing modes of therapy.\[[@ref5]\] Although criticism has been leveled against these concepts,\[[@ref6]\] clinical, communication, theoretical, and personal equipoise are salient features to be considered while planning randomized controlled trials. Clinical and theoretical equipoise are of equal relevance to all fields of medicine; communication equipoise relates to studies involving education, counseling, and support; while personal equipoise must be addressed in trials of surgical procedures and manual maneuvers.
C[ARDIOVASCULAR]{.smallcaps} O[UTCOME]{.smallcaps} T[RIALS IN]{.smallcaps} P[ERSPECTIVE]{.smallcaps} {#sec1-2}
====================================================================================================
Recent years have seen the design, conduct, and publication of various cardiovascular outcome trials (CVOTs) in diabetes. These trials have been necessitated by the need to assure long-term vascular safety of glucose-lowering therapies.\[[@ref7]\] Recently, three trials have reported cardiovascular benefit, as opposed to safety, of glucose-lowering drugs. These include the Empagliflozin Cardiovascular Outcomes, and Mortality in Type 2 Diabetes (EMPA-REG) Liraglutide Effect and Action in Diabetes: Evaluation of Cardiovascular Outcome Results (LEADER) and Trial to Evaluate Cardiovascular and Other Long-term Outcomes with Semaglutide in Subjects with Type 2 Diabetes (SUSTAIN 6) trials, which studied empagliflozin, liraglutide and semaglutide, respectively.\[[@ref8][@ref9][@ref10]\] Extensive discussion has followed the publication of these trial results, attempting to explain the positive benefits reported by the authors.\[[@ref11][@ref12]\]
G[LYCEMIC]{.smallcaps} E[QUIPOISE]{.smallcaps} {#sec1-3}
==============================================
A characteristic, highlighted by some, is the lack of glycemic equipoise between various arms of these trials. This is proposed both as a limiting factor of the study and as an explanation of the cardiovascular benefits of empagliflozin and liraglutide. The glycemic equipoise hypothesis or theory states that two opposing arms in a CVOT of an antidiabetic drug should maintain and achieve similar glycemic levels during and at the end of the trial. This will allow the assessment of whether the drug can achieve cardiovascular safety/benefit, independent of its glucose-lowering efficacy.\[[@ref13]\]
C[ARDIOVASCULAR]{.smallcaps} O[UTCOME]{.smallcaps} T[RIAL]{.smallcaps} D[ESIGN]{.smallcaps} {#sec1-4}
===========================================================================================
Modern CVOTs are designed as per guidance from the United States Food and Drug Administration.\[[@ref14]\] This guidance does not mention the concept of glycemic equipoise as a desired strategy or outcome of CVOT. The aim of such CVOT is neither to demonstrate glucose-lowering efficacy nor to assess the risk of hypoglycemia or extent of glycemic variability. Thus, ideally one should not consider the degree of glucose control achieved by study drugs in CVOT. Modern antidiabetic drugs are efficient in controlling glucose, but they also have pleiotropic effects which contribute to their overall benefit. Therefore, it becomes difficult to assess the impact of these effects in isolation.
M[ECHANISMS OF]{.smallcaps} A[CTION]{.smallcaps} {#sec1-5}
================================================
The cardiovascular safety or benefit of a particular molecule is mediated through the modulation of multiple pathophysiologic processes, which are intricately linked with each other. Analysis of these separate processes does make sense from a mechanistic or biochemical viewpoint, but may not be feasible (or desirable) from a clinical standpoint. This is because the primary and secondary end points laid down in CVOT (major adverse cardiovascular events) are more relevant, for both patient and prescriber.
P[REVIOUS]{.smallcaps} T[RIALS AND]{.smallcaps} L[ACK OF]{.smallcaps} E[QUIPOISE]{.smallcaps} {#sec1-6}
=============================================================================================
There are a number of other CVOTs in high-risk cohorts of patients with type 2 diabetes, in which similar magnitude effects on glycemic control have been shown, without significant benefits with respect to rates of cardiovascular events or death. Detailed analysis\[[@ref15]\] reveals that glycemic equipoise could not be achieved in major CVOT, including those on saxagliptin, alogliptin, and sitagliptin. Yet, their results, when compared, show significant differences\[[@ref15]\] which do not seem to be linked to the degree of glycated hemoglobin (HbA1c) reduction.
T[HE]{.smallcaps} LEADER R[ESULTS AND]{.smallcaps} E[QUIPOISE]{.smallcaps} {#sec1-7}
==========================================================================
In the LEADER trial, cardiovascular benefit was noted after 12--18 months of therapy with liraglutide.\[[@ref9]\] In contrast, reduction in HbA1c was evident 3 months after the onset of therapy. Simultaneously, a reduction in insulin dose requirement was noted within the first few months' treatment. Therefore, it makes it highly unlikely that cardiovascular benefits could be directly attributed to the glucose-lowering efficacy of liraglutide.
In the current diabetes treatment scenario, it would be virtually impossible to have a treat to target design superimposed upon a long-term CVOT framework, An exception, the Trial Comparing Cardiovascular Safety of Insulin Degludec vs Insulin Glargine in Patients with Type 2 Diabetes at High Risk of Cardiovascular Events (DEVOTE) trial protocol provided an algorithm for basal insulin titration to achieve prespecified glycemic targets, which could be reassessed during the duration of the trial. Titration adequacy was monitored centrally and feedback was provided to encourage adherence to the protocol.\[[@ref16]\]
Fifty percent of LEADER participants were on concomitant sulfonylurea therapy, 45% on insulin, and 75% on metformin. The LEADER study protocol suggested broad guidelines of targets to be achieved, and no specific guidelines other than uptitration of liraglutide were proposed. Adjusting the doses of multiple drugs, based on rigid self-titration regimens, over such a long period of time, is unrealistic.
At the same time, the minor improvement in glycemic control (0.4%), if compared with the differences noted in the UKPDS trial,\[[@ref17]\] cannot explain the significant vascular benefits noted with liraglutide, semaglutide, or empagliflozin \[[Table 1](#T1){ref-type="table"}\].
######
Degree of glycemic control and cardiovascular benefit

T[HE]{.smallcaps} LEADER R[ESULTS AND]{.smallcaps} L[EGACY]{.smallcaps} {#sec1-8}
=======================================================================
There is a case for glycemic legacy as a contributor to cardiovascular benefit. In other trials where this term has been used, the duration of follow-up was much longer, and the initial improvement noted in glycemia was not sustained.\[[@ref18]\] The same is true in trials documenting vascular legacy, where initial blood pressure control helped achieve long-term cardiovascular protection, even though differences in blood pressure were not sustained over time.\[[@ref19]\] In LEADER, glucose control was maintained over the entire duration of the study, and this negates the legacy theory, at least during the duration of the study.
T[HE]{.smallcaps} LEADER R[ESULTS AND]{.smallcaps} W[EIGHT]{.smallcaps} {#sec1-9}
=======================================================================
Loss of weight, a documented pleiotropic effect of the molecule, was noted within 6 months of treatment and persisted till the end of the trial. If glycemic control can be defended as a mechanism of action for cardiovascular benefit to liraglutide, so can weight reduction. Weight loss, however, was unable to achieve a significant improvement in cardiovascular outcomes in the LOOK AHEAD (Action for Health in Diabetes) trial.\[[@ref20]\] This implies that other, or multiple, factors played in role in improving cardiovascular health.
A[LL-ROUND]{.smallcaps} L[IRAGLUTIDE]{.smallcaps} E[FFECT AND]{.smallcaps} A[CTION IN]{.smallcaps} D[IABETES]{.smallcaps}: E[VALUATION OF]{.smallcaps} C[ARDIOVASCULAR]{.smallcaps} O[UTCOME]{.smallcaps} R[ESULTS]{.smallcaps} {#sec1-10}
===============================================================================================================================================================================================================================
The multiple beneficial effects of liraglutide seen to have worked simultaneously, in conjunction with each other, to achieve stabilization of atherosclerotic plaques and halt the progression of atherosclerotic coronary vascular disease. This, rather than "lack of glucose-lowering equipoise," explains the positive results of LEADER.
| mini_pile | {'original_id': '5959fd2543f6be5df4254e37838611b90daf2b7da8b26bb427ca392ad3cc94ee'} |
Take control of your network configuration
Automated Network Configuration Change Management
Network Configuration Manager is a multi vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management.
Businesses today face huge losses due to network disasters. The most common causes of network disasters are faulty configuration changes, compliance violations and configuration conflicts. Such mishaps can be reverted and also avoided if network admins have enhanced visibility into their network and control over the change workflow.
Using Network Configuration Manager's user activity tracking, change management and configuration backup, you can make your network disaster-proof. Check out this video to learn how you can manage configurations, change and compliance using Network Configuration Manager. | mini_pile | {'original_id': 'ebc279b3af034f6e6af69b6c190316ed87e8a370765d69a1f165803b2a24e29d'} |
We use cookies to customise content for your subscription and for analytics.If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
The Situation: From 1 July 2017, the withholding rate that a buyer must pay to the Australian Tax Office on purchase of real estate assets from a foreign resident seller increased from 10 percent to 12.5 percent. The threshold values at which the laws apply have also reduced from $2 million to $750,000.
The Result: Sellers of real property or shares in companies holding real property will need to apply for a clearance, variation or make a declaration ahead of completing a transaction if they do not wish the buyer to withhold the payment.
Looking Ahead: The law is expected to improve compliance by foreign residents with Australian tax obligations and to reduce pressure on housing affordability.
The Australian Commonwealth Government first introduced foreign resident capital gains withholding payments in July 2016 at a rate of 10 percent, in response to issues in collecting tax from foreign resident sellers and political pressures concerning foreign investors and housing affordability in Australia. The issue was highlighted in 2011 in a high-profile case involving the Australian Tax Office's ("ATO") claim for tax on profits made by a foreign private equity fund following an initial public offering of shares in department store Myer.
The laws require a buyer of real property from a foreign resident seller to pay an amount to the ATO equivalent to 12.5 percent of the "first element of the cost base of the CGT [capital gains tax] asset's cost base just after the acquisition", minus, in the case of the exercise of an option, any amount/property paid or given for the option. The first element of the CGT asset's cost base is usually equivalent to the consideration paid for the asset (but not always).
The buyer's payment of the withholding to the ATO is a discharge of its obligation to the seller to pay that amount to the seller.
When Do the Laws Apply?
The laws apply to transactions involving real property, such as a direct transaction for the sale and purchase of real property with a market value in excess of $750,000 or an indirect transaction for sale and purchase of real property. An indirect sale includes: (i) a "company title" transaction of real property with a market value in excess of $750,000 (i.e., transfer of ownership of shares in a company that owns real property and that confers rights to occupy a specified area of the real property; or (ii) a "membership interest", generally a transfer of more than 10 percent interest in shares or units in a company, trust or fund that has more than 50 percent of its asset value in real property (regardless of the market value of that property).
The laws also apply to any option or right to acquire any of the above.
Direct real property transactions or company title transactions with a market value of less than $750,000;
Transactions through an approved stock exchange or crossing system;
Transactions subject to another withholding obligation;
Securities lending arrangements (as there is no CGT liability triggered);
Transactions in which the foreign seller is in external administration (or similar under foreign law);
Transactions arising from administration, bankruptcy or similar; and
Portfolio interests in a company, trust or fund.
What to Do—Clearance Certificate, Declaration or Variation?
The options depend on whether the seller is foreign or Australian and the nature of the interest being transferred.
Obtain a Clearance Certificate. Available to Australian sellers of a direct interest in real property. The Australian seller needs to obtain a "clearance certificate" from the ATO, stating that it is an Australian resident. The clearance certificate can be obtained online, is not property specific and lasts 12 months. Companies that regularly deal in property will probably wish to have one at hand permanently.
Obtain a Variation. Available to foreign sellers when the ultimate tax payable will be less than the 12.5 percent rate or nil (e.g., because there has been no gain or because there are carry-forward tax losses). An application can be made to the ATO to vary the amount the buyer must withhold (including a reduction to nil). Variations are also available in other situations—for example, if there is a mortgage over the property and there will not be enough funds after payment of the mortgage to withhold the payment, or if a creditor acquires title as a result of a foreclosure and its security would be further diminished. There is no prescribed timeframe for issuance of a variation, but at least 10 days should be allowed, possibly more if the situation is complex. Forms for a variation application are available on the ATO website.
Seller Makes a Declaration. Available to Australian and foreign resident sellers on indirect transfer of real property (shares, units, fund interest). The seller can declare either that it is an Australian resident or that the interests are "not an indirect real property interest".
The declaration is valid for six months, and the buyer is entitled to rely on it unless it knows it to be false. There is no specific form for the declarations required, but templates for the declarations are available on the ATO website.
Buyer Pays the Tax at the Full Rate. Applies to foreign resident sellers that do not obtain a variation and are not eligible to make a declaration.
What is the Penalty for Not Complying?
The penalty for a buyer not complying with these obligations is an amount equal to the payment that should have been withheld. There are also penalties for the seller giving false or misleading declarations (the severity depends on whether the conduct was knowing, reckless or a failing to take reasonable care).
Points to Consider
There are a number of points that might arise in a transaction that will require careful consideration.
Conditions Precedent for clearance, variation or declaration. If applicable, the contract should provide for the obtaining of the variation, clearance or giving of the declaration in the conditions precedent and in the completion mechanics.
Purchase price adjustment. The contract should provide for adjustment of the purchase price on completion for any amount the buyer is obliged to pay to the ATO.
Warranties / indemnity. If you are a buyer with a seller giving a declaration, consider including a warranty and indemnity as to the accuracy of the seller's declaration so there is a contractual remedy if the declaration is incorrect.
Timing. clearance certificates and variations may take some time to receive from the ATO so build that timing into the transaction timetable.
Multiple sellers. If there are multiple sellers, some of whom are Australian resident and some of whom are foreign resident, consider the different treatments that might apply to the purchase price.
Multiple purchasers. If there are multiple purchasers, the obligation to withhold will apply pro rata to the entitlement to the purchase price.
Difference in cost base and cash consideration. If there is a difference between the cash consideration that will be received and the value of the cost base, consider the cash flow impact for the buyer.
Seller tax return. The buyer's payment to the ATO is a non-final amount paid on account of the tax the seller is obliged to pay; the seller will need to submit a tax return for a final assessment.
Three Key Takeaways
Changes to Australia's withholding rates on real estate purchases from a foreign resident seller apply to both direct and indirect transactions for the sale and purchase of real property. "Real property" is broadly defined and includes both freehold and leasehold interests and residential, commercial and mining interests.
There are exceptions, including for transactions via an approved stock exchange, for portfolio interests, in situations when the seller is bankrupt or similar and, in some cases, when the market value of the real estate exceeds $750,000.
"Clearance certificates" are available to Australian sellers of real property, as are "variations" for foreign sellers, if the tax ultimately owed will be less than 12.5 percent. Otherwise, sellers can also make a "declaration" if the transaction does not involve a real property interest. | mini_pile | {'original_id': 'fbe310306de1a32e6f3dd59c9c95312b589eafe7b9a85a221636812a526dc7a8'} |
Blackberry Z10 Repair
Welcome to the only source where you can from one and only expert who is the king of the blackberry z10 repair and any other model and the name is K m a s t e r and you can can easily visit the store front at and call them at 905-781-1209 the company not only fixes on the spot but also provide any software solution such as tune up and virus removal on any smartphone. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.953784704208374}", 'metadata': "{'Content-Length': '16396', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7ASET5ZOA6OWRCYVXZ526S73J73QILEV', 'WARC-Concurrent-To': '<urn:uuid:6bbccbce-1904-4805-8ab4-1f4288f8ca49>', 'WARC-Date': datetime.datetime(2019, 8, 25, 23, 0, 35), 'WARC-IP-Address': '176.32.230.51', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JU32TORP6OXYTGM47ZUG7ZANLAUVPT6K', 'WARC-Record-ID': '<urn:uuid:410d9991-2b1d-4669-982b-6750a544fe58>', 'WARC-Target-URI': 'http://www.blackberryrepairmississauga.ca/blackberry-z10-repair/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d49770d2-11c3-4fb8-adea-b13c0834d7c3>', 'WARC-Truncated': None}", 'previous_word_count': '79', 'url': 'http://www.blackberryrepairmississauga.ca/blackberry-z10-repair/', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-238.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02047950029373169', 'original_id': '9d93e34dea1a8c3a754d930f3ddd6e2880fc0b09fa4fb2dcfd55547a7fca4194'} |
Pressure- and work-limited neuroadaptive control for mechanical ventilation of critical care patients.
In this paper, we develop a neuroadaptive control architecture to control lung volume and minute ventilation with input pressure constraints that also accounts for spontaneous breathing by the patient. Specifically, we develop a pressure - and work-limited neuroadaptive controller for mechanical ventilation based on a nonlinear multicompartmental lung model. The control framework does not rely on any averaged data and is designed to automatically adjust the input pressure to the patient's physiological characteristics capturing lung resistance and compliance modeling uncertainty. Moreover, the controller accounts for input pressure constraints as well as work of breathing constraints. Finally, the effect of spontaneous breathing is incorporated within the lung model and the control framework. | mini_pile | {'original_id': '05f729fc43d59d72c60c67d8bde86c8cd597c216f91aeaf4b8e4f3bfc7f72a81'} |
Mystery of the Coral Castle
The wonders of the Coral Castle and the mysterious Edward Leedskalnin
The Coral Castle is an amazing garden in Florida built of giant blocks of coral by a 5 ft tall, 110 pound man named Edward Leedskalnin. The mystery is in how he built this castle made of these huge coral blocks weighing 5 to 30 tons each. How did a man of his stature quarry, transport, and erect 1,100 tons of rock all by himself with no modern machinery?
The story goes, Leedskalnin worked alone and would let nobody see him when he really worked. No one except for a couple of kids passing by ever saw him building his masterpiece. Engineers for decades have tried to understand how this smallish man was able to accomplish so much.
Mystery of the Coral Castle
Brief History of Edward Leedskalnin
Born in January 1887 in what was then the Russian Empire, Edward Leedskalnin was a slightly-built, off-beat kind of guy. He dropped out of school in the fourth grade because it bored him, yet he had a passion for learning. Upon the night before his wedding, he was rejected by his teenage bride-to-be and was heartbroken. He would eventually contract tuberculosis which incited his move to Florida, where the warmer climate would aid in his disease. Miracles appear to abound by Edward, as he was somehow cured of his disease. His claim to cure was magnetism.
In 1951, Leedskalnin fell ill. He left a sign for visitors that simply read “Going to Hospital.” 28 days later his secrets would be gone.
When people asked how he had moved all of the stone he said, “I understand the laws of weight and leverage and I know the secrets of the people who built the pyramids (being those at the site at Giza in Egypt).” He claimed to use a “perpetual motion holder” as one of his tools which adds to the mystery. Modern science argues that magnetism or levers may have aided in his work, but there is a lot of mystery to this day as Edward passed away before he could reveal his secrets.
Highlights of Coral Castle
The most remarkable feature of the park is the nearly 9-ton revolving “Rock Gate.” The gate is carved to fit the walls within a quarter of an inch and is perfectly balanced so a child could push it open. Leedskalnin accomplished this by drilling a hole through the precise center of balance of the rectangular stone and inserting a steel rod as an axis. Edward was able to make the gate swing around with mystical ease. This video of Coral Castle from the 1930s shows a small child manipulating the giant stone as well as many of the castle’s features.
Other remarkable pieces of sculpture at the Coral Castle include:
• A coral table in the shape of a heart
• A sundial said to be accurate to within two minutes
• 25 surprisingly comfortable stone rocking chairs
• Several stone beds
• A coral bathtub
• A table in the shape of the state of Florida
How did Edward lift the stones into place?
Edward Leedskalnin was only five feet tall and weighed 100 pounds, so we can probably assume he didn’t use brute force. We know that he moved the stones and built the monuments without any help from anybody else. He always worked in complete secrecy, always by himself, always at night by the light of a single lantern. He only used hand tools.
Edward claimed to have unraveled the secrets of the pyramids and learned how the ancient builders in Egypt, Peru, Asia and Yucatan erected mighty structures using tons of stone and primitive tools. In his pamphlet, “Magnetic Current,” Edward explains that he was able to reverse the magnetic forces of the objects. This effect countered the forces of gravity and made the heavy objects lighter and easier to move.
The Coral Castle’s mystery remains
How did he really do it? Did he have supernatural powers? Did he have help, and if so, from whom? Aliens from outer space? Did he get help from the angels, or were they more sinister beings from the spirit realm mwahahahaaha? Does the layout of the individual monuments have a hidden meaning?
Looking at the above, you might think it is an extra-large garden ornament section of a nursery. Did Edward arrange the ornaments according to a plan? Was he sending a message? Some of the structures, such as the heart-shaped table and the two stone beds, are what you might expect from a lovelorn fellow. Is it all an extravagant monument to love, or is it something more? Was Edward a deranged crackpot, unlucky in love, or was he a rare genius, also unlucky in love?
Visit Coral Castle. Can you solve the mysteries? Were you paying attention in school the day they taught you the properties and science of magnetism?
Leave a Reply | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '23', 'language_id_whole_page_fasttext': "{'en': 0.9638898372650146}", 'metadata': "{'Content-Length': '104429', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7YNEPW55UQOGTH7OSMVRXMZ776Y7K7RJ', 'WARC-Concurrent-To': '<urn:uuid:357bf9c6-33d9-43ce-b294-ecb7a894adf9>', 'WARC-Date': datetime.datetime(2021, 6, 22, 11, 48, 41), 'WARC-IP-Address': '172.67.192.187', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:IGUVYWLOJVS35ZVGYW2QOURV2773BKCH', 'WARC-Record-ID': '<urn:uuid:2ba6776a-31b3-42b4-8ac2-3cce10c05a6c>', 'WARC-Target-URI': 'https://frightfind.com/mystery-of-the-coral-castle/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2bd39607-c0be-4d4c-a04b-fef442808a8b>', 'WARC-Truncated': None}", 'previous_word_count': '801', 'url': 'https://frightfind.com/mystery-of-the-coral-castle/', 'warcinfo': 'isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-242.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.4262293577194214', 'original_id': 'dcca8a7e3af1180c6ac53e3a28b5e8ba9e92b2e5e1bbc8edb4c34a67615d49ae'} |
Krishna's book - the Bhagavad-gita
The Bhagavad-gita ("song of God")—the famous conversation between the warrior Arjuna and the Supreme Being, Krishna—posing as Arjuna’s charioteer—at the onset of the battle of Kurukshetra, circa 3200 B.C.
Krishna explains all the essential spiritual truths: the difference between the soul and the body, the difference between the soul and the Supreme Soul (God), the science of reincarnation, the nature of time, the ultimate goal of yoga, why different kinds of religion appeal to different kinds of people, and the ultimate purpose of human life.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '87', 'language_id_whole_page_fasttext': "{'en': 0.9272890090942384}", 'metadata': "{'Content-Length': '41131', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:A44H7TFOWWPQJLRIVMADTJ4KPVAEMBGJ', 'WARC-Concurrent-To': '<urn:uuid:c1a81c9e-ccab-4299-85fd-fa040d2ac82f>', 'WARC-Date': datetime.datetime(2015, 2, 28, 17, 34, 38), 'WARC-IP-Address': '198.16.6.83', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:74XJOOSRTOILFNH5GF4WCW5CZRQKNCF6', 'WARC-Record-ID': '<urn:uuid:ed035df6-42d8-4230-89d9-5354572f27c4>', 'WARC-Target-URI': 'http://www.krishna.com/Krishnas-book-bhagavad-gita', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0186e92d-6e60-4ab9-a38e-1aee90374fe4>', 'WARC-Truncated': None}", 'previous_word_count': '200', 'url': 'http://www.krishna.com/Krishnas-book-bhagavad-gita', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9952786564826965', 'original_id': 'e9cbcd9931b788af214c085221180d5f0f11ca10f18e1f28750eba6e03f77a29'} |
SocialMediaLegislationThere are various legal problems and pitfalls when using social media in organizations that can arise both in the use of images and in the wording, or even in the terms of use of the social network. The spectrum ranges from competition law to copyright and data protection.
Companies should consider the following when using social media:
• Appointing a social media manager
• Establishing social media guidelines
• Making sure that the social media monitoring fulfills the requirements of the General Data Protection Regulation (GDPR)
Implementing comprehensive site terms of use that prohibit uploading of infringing, defamatory, obscene, or otherwise unlawful or offensive content is recommended, as well as paying particular attention to defamation laws and prohibitions on unfair or deceptive acts such as false advertising. Do not engage in or permit unethical marketing practices, including posting fake blogs, fake positive reviews, or fake negative reviews of competitors.
To stay legally correct when using social media, just ask yourself questions like the following:
• What are the terms of use in the selected social network? To what extent does the network get rights granted to the content that I created?
• Did I understand how the different social media platforms work (by reading their terms and conditions) and know how each distributes information?
• Does the name of the social media account violate third-party brand or name rights?
• Is there an easy-to-find imprint? Are correct company details given there?
• Has a link to the website's data protection declaration been set? Is there an explanation of the social media networks in the website’s data protection declaration?
• Are only verifiable facts published in the account?
• Is only image, video or sound material used that belongs to the company or that the author has given permission to use? Do license agreements have to be considered when posting images or graphics?
• Does content link to illegal websites?
• Are articles about competitors' products or brands correctly written in terms of competition law? Etc.
By MediaBUZZ | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.89803546667099}", 'metadata': "{'Content-Length': '96027', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WRA4NPL7MDH5SKF3KUHBZPSYXYP2RTZO', 'WARC-Concurrent-To': '<urn:uuid:49751601-2485-4810-ac1d-2d5ccd305fdf>', 'WARC-Date': datetime.datetime(2021, 9, 28, 9, 47, 37), 'WARC-IP-Address': '192.124.249.2', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NNK3PARNH5U3LLSCCPRF64KGIZTRUMUG', 'WARC-Record-ID': '<urn:uuid:dfc39f68-3c23-4b13-b10e-dd97989a36bf>', 'WARC-Target-URI': 'https://mediabuzz.com.sg/archive/2015/january/393-asian-e-marketing/june-2021-social-media-influencer-marketing/4222-legally-compliant-use-of-social-media', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e4b09848-4b49-4c8a-857c-870041289b6f>', 'WARC-Truncated': None}", 'previous_word_count': '323', 'url': 'https://mediabuzz.com.sg/archive/2015/january/393-asian-e-marketing/june-2021-social-media-influencer-marketing/4222-legally-compliant-use-of-social-media', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-130\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08673280477523804', 'original_id': 'dae760ae363e1a2e5a036a596e23c997a125d7ff54eb2a2c5342a9f82189cb2d'} |
Property News
New homes for Galway
May 18, 2017
Twenty happy families got the keys to their new homes this week as part of a joint venture to deliver 300 units between Co-Operative Housing Ireland and Galway City Council. Residents will become shareholders in their local co-op and will have a say in the management of their community.
Congratulations to all involved in this great initiative for new homes. | mini_pile | {'original_id': '46f155a7bef8caabaedb4c56414c992032132e623cf5ed70d99af11aec7fcbb4'} |
Gatton Park & Gatton Hall
Gatton existed as far back as Saxon times, and it was still a manor when the Normans recorded it (as “Gatone”) in the Domesday Book some centuries later. There has been a house in Gatton Park since 1086 when it was owned by Bishop Odo of Bayeux, half-brother of William the Conquerer. The original building was an important manor house in 1220 and was also recorded as having a deer park in 1278.
Gatton was given parliamentary borough status in 1450 when the Duke of Norfolk was looking to improve his bargaining position during the Wars of the Roses.
As a ‘rotten borough’, Gatton was described by William Cobbett in 1830 as a “very rascally spot of earth”. It was a typical pocket borough used by its owning family as part of the trappings of the influential classes. In 1553, widowed Lady Copley actually voted centuries before women were legally entitled to vote.
Between 1751 and 1830 (when Lord Monson bought the Park) there were 5 owners. The most significant for the Park was Sir George Colebrooke. From 1762 to 1766 he commissioned Lancelot ‘Capability’ Brown to transform whatever formal gardens had existed before, into a classic English ‘natural’ landscape garden. Brown swept away the formal landscape that had been there before and replaced it with informal naturalistic plantings which accentuated the rolling landscape of the park. The main lake at Gatton Park was greatly expanded and the tributary lakes reshaped to include one of his trademark serpentine canals. The work at Gatton Park was completed in 1768 at a total cost of £3055, this commission was within the top 25% of Brown’s commissions in terms of value.
In 1765 Sir George Colebrooke added the so called ‘Town Hall’ that can still be seen today. This cast-iron Doric Temple and voting urn was a tribute to Gatton’s status as a parliamentary borough and was used to announce the election results.
The house fell into disrepair and was partly demolished by John Petrie (owner) some time between 1796-1808. The estate was sold to in 1808 to Mark Wood who had recently retired from service in India on grounds of ill-health and who was later created a baronet. He completed the demolition of the old manor and started rebuilding it in 1808 in an Italianate-style.
The Monson family owned the estate from 1830 to 1888 and Lord Monson made huge changes to St Andrew’s Church, the estate and parish church. Alterations were made to Gatton Hall from 1830 to 1841 Lord Monson employed the architect Sextus Dyball to complete the work. The house was now to become famous for the magnificent Marble Hall which had been originally designed for Charles IV of Spain which had been purchased by the fifth Baron on a trip to Rome in 1830 for the huge sum of £10,000 (approx. £620,000). The Marble Hall was a near replica of the Corsini Chapel in Leterano at Rome and built using the finest Italian marble and was renowned for its beauty.
The last person to own Gatton Park outright was Sir Jeremiah Colman from the family of successful food manufacturers and financiers based on the production of the famous Colman’s Mustard at Norwich. Gatton Park was owned by the Colman family from 1888 to 1948. Jeremiah Colman added the portico and columns in 1891. Colman was attracted to the Park due to its proximity to London and good communications, as well as the several hundred acres of land with game for hunting.
In 1934 disaster struck. A fire, starting in the cellar completely gutted and destroyed the famous house and Marble Hall along with many of its irreplaceable treasures. Sir Jeremiah Colman was abroad at the time but a great rescue operation took place. Mr Jones, a chauffeur, risked his life to assist in the salvage when a coping stone crashed through the roof and narrowly missed a number of firemen. A police constable was knocked unconscious in an explosion during the fire.
After the fire the Colmans continued to live on the estate and Gatton Hall as you see it today was rebuilt between 1934 and 1936 designed by Sir Edwin Cooper.
During the Second World War the Park was requisitioned and occupied by the Canadian Army and the British Military Police.
The core of the estate of Gatton Park today is home to the Royal Alexandra and Albert School, a voluntary aided boarding and day school. Gatton Park was bought in 1948 as the site for the merger of two charitable schools that were amalgamated by Act of Parliament as the Royal Alexandra and Albert School.
Part of the original estate not owned by the School was acquired by the National Trust in 1952. The site, leading up to Reigate Hill, is accessible by public footpaths. The former stone quarries can still be seen where Reigate stone was quarried along with chalk, for use in many local buildings.
The Royal Alexandra & Albert School
The school can trace its origins back to 1758 when a group of city gentlemen met and decided to collect up enough money to create a boarding school for twenty orphan boys. This opened in 1760 and twenty girls joined the School a couple of years later.
Gatton Park with its three lakes, serpentine and 260 acres of parkland provides the ideal setting for our school. Our purpose-built classrooms provide first class facilities for study. Purpose-build boarding houses provide comfortable, modern accommodation for Primary, Lower Secondary, and upper Secondary pupils.
Predominantly a boarding school, we provide continuity of education from seven to eighteen years. Unusually, we are able to provide the very best of boarding education at reasonable fees. As a state school, we are only able to admit children from UK or EU families.
Girls & boys
Aged 7-18
1000 pupils
450 boarders
80 funded
Provide a safe place to learn
Offer multiple extra curricular activities
Give children a great start in life
Foster happy, confident individuals | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '121', 'language_id_whole_page_fasttext': "{'en': 0.9809147715568542}", 'metadata': "{'Content-Length': '16479', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DGHPA4PUIKX3VACX57LOZ5RCRGPLPN4F', 'WARC-Concurrent-To': '<urn:uuid:32fa4ed6-bf33-4585-af61-d9100516aa0a>', 'WARC-Date': datetime.datetime(2018, 12, 10, 18, 14, 41), 'WARC-IP-Address': '88.208.252.137', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XSSBGCMW7NX3YHVIXM7ULXEFZES63RIL', 'WARC-Record-ID': '<urn:uuid:1573af0e-2345-4320-b453-ec0aed52d53b>', 'WARC-Target-URI': 'http://gattonfoundation.org.uk/gatton-park-hall.asp', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:914bade3-1b79-4cca-888f-6cf25eb8ac9b>', 'WARC-Truncated': None}", 'previous_word_count': '981', 'url': 'http://gattonfoundation.org.uk/gatton-park-hall.asp', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-180-67-225.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05666840076446533', 'original_id': '1d021550a0384798ba3a5698d0ed27681a1eed558a620b5fe6ae5c1dc5ecc38e'} |
Login Sign up
Ninchanese is the best way to learn Chinese.
Try it for free.
Sign me up
径赛 (徑賽)
jìng sài
1. track events (athletics competition)
Character Decomposition
Oh noes!
An error occured, please reload the page.
Don't hesitate to report a feedback if you have internet!
You are disconnected!
We have not been able to load the page.
Please check your internet connection and retry. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.7786527276039124}", 'metadata': "{'Content-Length': '28015', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NTDH2JWI7DKREEXLIN3PZEKIPD7JMZKY', 'WARC-Concurrent-To': '<urn:uuid:85da3fec-b83f-453d-acb2-a28dfcfe57fb>', 'WARC-Date': datetime.datetime(2021, 2, 27, 10, 45), 'WARC-IP-Address': '104.156.227.253', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TQ4WYXPV5CISNBGU2IWNI2QB77XTXWLO', 'WARC-Record-ID': '<urn:uuid:32e5811c-7599-4cfa-83ab-36f20e32d48f>', 'WARC-Target-URI': 'https://app.ninchanese.com/word/simplified/155043/%E5%BE%84%E8%B5%9B', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6c1a1b33-0e7d-42c1-87f4-a489c0d2c4b8>', 'WARC-Truncated': None}", 'previous_word_count': '68', 'url': 'https://app.ninchanese.com/word/simplified/155043/%E5%BE%84%E8%B5%9B', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-210.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.21875864267349243', 'original_id': '11c9222704d3014ccf7c5a0c1f704e5eb10608c34dfaeb64601bef5f1fcd7b2b'} |
Menu
Ionomy News
News, Updates, & Opinions
Introducing Sharenodes Sharenodes are tradable assets that facilitate fractional ownership of pooled masternodes. Sharenodes are a “win-win” feature of the new ionomy platform. Traditionally, masternodes have » | mini_pile | {'original_id': 'f8599238fca2674a0c76e2c11be2343a8c54ec26f8d83c6b4e992ed8f4fc8d11'} |
Invader fan 'bent it like Beckham'
Jordan Dunn runs on to the pitch during the Barclays Premier League match at Upton Park.
First published in National News © by
A football fan "bent it like Beckham" when he ran onto the pitch and took a free kick during a Premier League match, a judge said today.
Jordan Dunn, 22, from Dover in Kent, became an internet sensation after he kicked the ball towards the goal West Ham United were defending at Upton Park against Tottenham Hotspur last month.
His shot was saved by West Ham's Spanish goalkeeper Adrian San Miguel del Castillo while the fan was chased by a steward amid cheers from the crowd on August 16.
Today he apologised for a "moment of madness" as he pleaded guilty to a charge under Section 4 of the Football Offences Act 1991, which states that it is an offence to go onto the playing area without lawful authority or excuse.
He was fined a total of £305 but spared a ban from attending future matches.
Passing sentence at Thames Magistrates' Court in East London, District Judge Gareth Branston said: "On the afternoon of August 16 about 35,000 football fans sat down at Upton Park to watch 22 men in shorts and football boots kick a football around for 90 minutes.
"Those 22 men were paid for that, to entertain.
"Some time into that game a young man ... ran onto the pitch. That was you. You weren't paid to do that."
The judge said he proceeded to run "some 70 yards" across the pitch, chased by stewards - one of whom fell over - before arriving at the spot where Tottenham were lining up a free kick.
The judge said: "You took it for them. To be frank you were probably a little tired by the time you got to the ball.
"It was a longer run than was strictly necessary.
"You had consumed alcohol and your stride pattern was a bit out of kilter but to borrow a phrase you did bend it like Beckham.
"Regrettably it was about 30mph slower than Beckham."
The judge said the effort was "easily" saved by the West Ham goalkeeper but referred to Christian Eriksen's subsequent effort after play restarted, saying: "I understand that the professional footballer who followed you did not do any better."
Judge Branston said the shot drew "the cheers of the crowd" before he was tackled "in the customary manner" by stewards.
He also said it was a "small mercy" that Dunn had "decided to remain fully clothed".
Dunn, who smiled as the judge compared his effort to the former England captain, told police it had been a dream of his to play at the home of his favourite team West Ham from a young age.
The judge said: "You told the police and you tell this court that having achieved your childhood ambition you won't be doing it again.
"Others need to be deterred from attempting to do what you did otherwise football matches would become very tedious affairs if everyone was allowed to run onto the pitch."
The judge said a greater risk was that "drunken hooligans" may invade the pitch and attack players though he said he accepted that Dunn had "no violent motivation".
He said he could not condone the offence but must also put it into perspective.
The judge declined to impose a football banning order called for by the prosecution, saying he was taking into account Dunn's previous good character, his "motivations" on the day, the remorse he expressed and the fact that "you will not want disappoint your young son" by repeating the stunt.
Dunn told police in interview he had been a West Ham fan since he was a little boy and it had always been one of his dreams to "run on the pitch and kick the ball", the court heard.
Ben Edwards, prosecuting, added: "Now he could say he had done it. He also said now he had done what he wanted to do he is not going to do it again."
Earlier Dunn told the judge he was "sorry" for committing the offence and admitted he had drunk around six beers before the match but denied being a "hooligan", "thug" or "yob".
Asked what was going through his mind, Dunn said: "Nothing really - it was just a moment of madness. It was a spur of the moment thing. I just went."
The judge said he had seen footage of the incident on YouTube and asked: "Were you intending to take the free kick?"
Dunn replied: "No. All I was going to do was run and as I was running I just saw the ball there so I thought I would just kick it."
Dunn, who works as a receptionist at a hotel, said he has a ten-month old little boy.
Referring to the prospect of a banning order, he said: "I was a bit concerned that when my little boy grows up I want to take him to watch the football."
The judge asked if his mother had "expressed disapproval".
Dunn, who represented himself, said: "At first she was concerned because she didn't know the consequences but when she saw the YouTube video she saw the funny side but she has had a go at me, as a mother would."
He declined to comment after the hearing.
The pitch invasion provoked amusement on social media, with one fan saying the effort was better than Spurs star Eriksen's free kick once play had resumed.
He wrote on Twitter: "Fair play to that pitch invader at West Ham v Spurs.. He got the Free kick on target when Eriksen couldn't."
Send us your news, pictures and videos
Most read stories
Local Info
Enter your postcode, town or place name
About cookies
I agree | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '36', 'language_id_whole_page_fasttext': "{'en': 0.990422785282135}", 'metadata': "{'Content-Length': '59014', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VFUCIT26TTU3YC4SV7LL6AW7CFQWK2EW', 'WARC-Concurrent-To': '<urn:uuid:b51a4c05-a081-4d15-b5f9-4fa3613c02d6>', 'WARC-Date': datetime.datetime(2015, 3, 1, 4, 31, 32), 'WARC-IP-Address': '62.233.114.118', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:D4ADQOFBGM3UMCLSIQYYCYOL3FNYQ6RE', 'WARC-Record-ID': '<urn:uuid:bba2ef5c-7728-44a7-9da3-f09273be7a72>', 'WARC-Target-URI': 'http://www.bucksfreepress.co.uk/news/national/11444637.Invader_fan__bent_it_like_Beckham_/?ref=var_0', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:66cc967a-904d-43e2-b94e-68346cab902c>', 'WARC-Truncated': None}", 'previous_word_count': '987', 'url': 'http://www.bucksfreepress.co.uk/news/national/11444637.Invader_fan__bent_it_like_Beckham_/?ref=var_0', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018224716186523438', 'original_id': 'f2d33468e71591620e57f9e45de01e7efda8a66af9f087afb3af98f80e9b2e04'} |
On Wednesday, the Pentagon announced it will be deploying armored brigade combat teams to Europe starting February for nine-month rotations, where they will perform military exercises in Estonia, Latvia, Lithuania, Poland, Romania, Bulgaria, and Hungary. The deployment will reportedly be in response to Russian aggression in Ukraine.
Meanwhile, Ukrainian President Petro Poroshenko is in Washington, D.C. lobbying for more aid and support for his troubled government. U.S. state media reports that Poroshenko told people at a seminar in D.C. that U.S. sanctions on Russia should remain until Crimea is under Kiev’s control—an event unlikely to ever occur as Crimea has been formally absorbed into the Russian Federation.
How long Poroshenko’s government will remain standing appears to be a much more urgent question. President Poroshenko himself acknowledges how tenuous the situation in Kiev is tweeting,”One may consider the latest governmental crisis a challenge. But I consider it a chance. We have to come out of it more resilient!”
The possibility of that more resilient outcome appears increasingly unlikely. The government in Kiev is in total disarray, as oligarchs, self-proclaimed reformers, and neo-fascist militias pull at the seams. Fights have broken out during cabinet meetings between government officials as leaders of the neo-fascist/neo-Nazi militias openly threaten to violently overthrow the Poroshenko government like they overthrew the previous Yanukovych government.
Poroshenko’s government has already drawn some criticism from Congress when a ban was proposed to prevent a neo-Nazi milita, the Azov Battalion, from training with U.S. forces. The ban was quietly killed after lobbying from the Pentagon, but Washington’s unease with the far-right militias backing the government in Kiev was clear enough.
The optics have only gotten worse for post-coup Ukraine’s liberal backers. A gay rights festival in the city of Lviv in western Ukraine was told by the government they would not be protected which allowed neo-fascists to surround the hotel where gays rights activists were staying and terrorize the activists into canceling the festival. Despite the promise of the Maidan coup (self-branded as the “Revolution of Dignity”), for the LGBT community, the new Ukraine looks a lot like the old one.
And they’re not alone. Few see any real progress being made in Kiev by the Poroshenko government. Even with the war in the east now only simmering, the central government cannot stabilize the economy and root out corruption, one of the main drivers of public discontent.
The reason the government has failed is not surprising. Many government officials and supporters Poroshenko needs to maintain a governing coalition in Kiev are the same corrupt oligarchs looting the country. Like Ukraine itself, President Poroshenko is well pinned on both ends.
Dan Wright
Dan Wright
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '9', 'language_id_whole_page_fasttext': "{'en': 0.9608022570610046}", 'metadata': "{'Content-Length': '114963', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AZ4IMXYRNUN6PRDKRQATLCJRGMTXOD2H', 'WARC-Concurrent-To': '<urn:uuid:b867157c-33a6-4cc4-a99a-4347af04fe29>', 'WARC-Date': datetime.datetime(2022, 12, 8, 9, 19, 10), 'WARC-IP-Address': '141.193.213.10', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:T53M5ARBWJDO7SX6AN6DOKL7LZWWIKVN', 'WARC-Record-ID': '<urn:uuid:d9815597-ee96-4c1d-a69e-8e7612bdb766>', 'WARC-Target-URI': 'https://shadowproof.com/2016/03/31/us-sends-more-forces-to-europe-as-poroshenko-lobbies-in-dc/?noamp=mobile', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c49a41ba-bb16-4256-84c6-a468c46a4783>', 'WARC-Truncated': None}", 'previous_word_count': '458', 'url': 'https://shadowproof.com/2016/03/31/us-sends-more-forces-to-europe-as-poroshenko-lobbies-in-dc/?noamp=mobile', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-111\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17794889211654663', 'original_id': 'b64cf2ba559106d10705213f5826395864ec43c560ec4acb54f96cfee17a76b1'} |
Method of Molding Polymeric Materials to Impart a Desired Texture Thereto
ABSTRACT
A method of molding a polymeric material to create a desired texture therein using an alumina mold having a plurality of cylindrical pores disposed therein, the method comprising the steps of: a) providing a porous alumina master having a plurality of cylindrical pores dispersed therein, said plurality of cylindrical pores corresponding to projections to be imparted to a surface of a film; disposing a polymeric material between a film and the porous alumina master; and c) applying mechanical pressure to roll the porous alumina master into the polymeric material, wherein the texture imparted to the polymeric molding material comprises projections corresponding to the cylindrical pores of the porous alumina master. A release agent is applied to the porous alumina master prior to disposing the polymeric molding material between the porous alumina master and the film.
FIELD OF THE INVENTION
The present invention relates generally to methods of molding polymeric materials to impart a desired texture thereto and compositions for improving the release properties of alumina masters used to create the molds.
BACKGROUND OF THE INVENTION
Polymer molding materials are widely used to make a wide variety of materials, including for example various display devices. It is often desirable and/or necessary to provide an anti-reflective layer or textured surface on such display devices to inhibit reflected light to ensure satisfactory visibility. Various methods have been suggested for producing such anti-reflective layers, including, for example, using vacuum deposition or sputtering to provide a multi-layered film composed of dielectrics having different refractive indices.
It has also been suggested to use a porous alumina master having an arrangement of depressions or pores corresponding to projections to be imparted to the surface of the polymer molding material to create an anti-reflective layer in polymeric molding materials.
The depressions or pores formed in the porous alumina master for forming corresponding projections on the surface of the polymer molding material typically have an extremely low period as compared with the wavelength of light, and for example, may have a depth of about ¼ the wavelength to adequately attenuate reflectance in the visible light range.
U.S. Patent Publication No. 2007/0289874 to Masuda et al., the subject matter of which is herein incorporated by reference in its entirety describes a method of producing a non-reflective polymer film by repeating anodic oxidation at about the same formation voltage and pore diameter enlargement treatment, and using anodic oxidized porous alumina, to which a tapered shape has been, imparted in which pore diameter continuously changes, as a mold. The anodized porous alumina surface is used as a mold, or a stamper for imparting projections to the surface of a polymeric molding material to create an anti-reflective layer therein.
After carrying out anodic oxidation for a predetermined amount of time to form pores having a desired depth, pore diameter enlargement treatment is carried out by immersing the mold in a suitable acidic solution. Subsequently, by carrying out anodic oxidation at a formation voltage approximately equal to that of the anodic oxidation previously carried out, pores having a smaller diameter as compared with the first stage are formed. Subsequently, when anodic oxidation and pore diameter enlargement treatment are repeated, as a result of carrying out anodic oxidation at about the same formation voltage as the previous anodic oxidation, the pores to be formed are formed perpendicular to the direction of film thickness, thereby making it possible to form pores having a regular tapered shape. By repeating this procedure, an oxidized porous alumina substrate having pores with a tapered shape can be obtained.
The inventors of the present invention have determined that cylindrical pores, i.e., those have straight sides versus tapered, provide just as good a result as tapered pores for optical performance. One of the reasons that tapered pores have been preferred to cylindrical pores is that they have been significantly easer to obtain release from in standard pattern transfer processes.
Based thereon, the present invention relates in part to an anti-reflective layer (anti-reflective film) formed on the surface of a polymer molding material which reduces reflection in the visible light range and a production method thereof. In addition, the present invention relates generally to a master, preferably of alumina, having cylindrical pores disposed therein for forming a desired texture in the surface of the polymeric molding material, such as an anti-reflective layer and a production method thereof.
The present invention also relates generally to the production of porous alumina molds having cylindrical pores disposed therein utilizing a series of electrochemical steps, wherein the porous alumina mold is treated with a release coating to facilitate removal of polymer molding material from the porous alumina mold.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a method of producing a porous alumina master that is capable of imparting a desired texture to a polymeric molding material.
It is an object of the present invention to provide a method of producing a porous master, preferably of alumina (comprising aluminum), that is capable of imparting an antireflective layer to a polymeric molding material.
It is another object of the present invention to provide a method producing a porous master, preferably of alumina, having cylindrical pores disposed therein.
It is another object of the present invention to provide a porous master, preferably of alumina, having a release coating disposed thereon to facilitate removal of the polymeric molding material from the porous master.
It is an object of the present invention to provide a method for producing an anti-reflective layer which is able to form a desired anti-reflective layer on the surface of a polymer molding material from the porous master.
To that end, in one embodiment, the present invention relates generally to a method of molding a polymeric material to create a desired texture therein using a mold, preferably of alumina, having a plurality of cylindrical pores disposed therein, the method comprising the steps of
a) providing a porous master having a plurality of cylindrical pores dispersed therein, said plurality of cylindrical pores corresponding to projections to be imparted to a surface of the polymeric molding material;
b) disposing a polymeric molding material between a transparent film and the porous master; and
c) applying mechanical pressure to roll the porous master into the polymeric molding material,
wherein the texture imparted to the polymeric molding material comprises projections corresponding to the cylindrical pores of the porous master.
In another preferred embodiment, a release agent is applied to the porous master prior to disposing the polymeric molding material between the porous master and the transparent film.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows % transmission for the film produced using this invention as compared with a polyethylene terephthalate film coated with the same photosensitive resin but cast against a smooth chrome roller surface to give a planar surface.
FIG. 2 shows an SEM image of a nanostructuring having spacing of 100 nm and depth of 180 nm which was created with this invention.
FIG. 3 shows a transmission spectrum of a further sample created with this invention as compared to a planar coating of photosensitive resin.
FIG. 4 shows an SEM image of a further sample created with this invention showing a nanostructure of spacing 230 nm and depth 380 nm.
FIG. 5 shows an SEM image of a resulting structured photosensitive resin when the porous alumina is treated with APA prior to replication.
FIG. 6 shows an SEM image of the resulting structured photosensitive resin when the porous alumina is not treated prior to replication.
FIG. 7 shows an SEM image of resulting resin structure after perfluorodecyltrichlorosilane treatment of the porous alumina master prior to replication.
FIG. 8 shows a cross-sectional SEM image of resulting resin structure after perfluorodecyltrichlorosilane treatment of porous alumina master is applied prior to replication.
FIG. 9 shows an SEM image of the resulting resin structure after Fluorolink F10 treatment of the porous alumina master prior to replication
FIG. 10 is a plot that depicts angle dependent % reflection averaged over the 400 to 750 nm wavelength range, for a variety of structures.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention relates generally to a method of molding a polymeric material to, create a desired texture therein using a mold, preferably of alumina, having a plurality of cylindrical pores disposed therein, the method comprising the steps of
a) providing a porous master having a plurality of cylindrical pores dispersed therein, said plurality of cylindrical pores corresponding to projections to be imparted to a surface of the polymeric molding material;
b) disposing a polymeric molding material between a film and the porous master; and
c) applying mechanical pressure to roll the porous master into the polymeric molding material,
wherein the texture imparted to the polymeric molding material comprises projections corresponding to the cylindrical pores of the porous master. The porous master preferably comprises alumina and is preferably cylindrical in shape. The film is preferably transparent or translucent. The polymeric molding material is preferably photosensitive resin which can be cured using radiation, preferably by exposing the photosensitive resin through the film.
In another preferred embodiment, a release agent is applied to the porous master prior to disposing the polymeric molding material between the porous master and the film.
In one embodiment, the process described herein uses a treatment agent in the replicating polymeric molding material which enables consistent high quality release on many replications. Therefore, the invention described herein does not gain any benefit from the use of tapered pores. What is meant by “cylindrical pores” as described herein is pores that have substantially the same diameter along the depth of the pore and that do not appreciably taper in diameter from a surface of the porous master along the depth of the pore created therein.
A number of steps are required for anodizing an aluminum surface to obtain a porous alumina texture with an appropriate surface chemistry for use as a mold or mold master (porous master) for replication of a photosensitive resin or other polymeric mold material into film. These steps include:
1) First stage anodization;
2) Oxide etching;
3) Second stage anodization; and
4) Pore widening.
These steps, as described in detail herein, produce a porous alumina surface having cylindrical pores which can then be used for molding material such as photosensitive resins or other polymeric mold materials to produce antireflective coatings and other similar materials. The inventors of the present invention have found that cylindrical pores provide better optical and structural performance than the tapered pores of the prior art.
However, in order to satisfactorily obtain release of the polymeric mold material from the alumina mold having cylindrical pores, it is generally necessary to perform a release treatment step on the porous alumina surface after the pore widening step has been completed as discussed in greater detail herein.
In the first stage anodization step, the aluminum surface is immersed in an electrolyte and anodized under controlled conditions of voltage, current and temperature. The distance between the aluminum surface (anode) and the containing chamber lining (cathode) is not critical, but typically needs to be sufficient to allow a good flow of electrolyte. The thickness of the cathode is also not critical and a suitable material is stainless steel. Other materials usable as the cathode include carbon, lead and nickel, by way of example and not limitation.
The solution typically needs to be agitated during electrolysis to maintain a homogeneous composition. For example, if the electrolyte is continuously pumped through the electrolytic chamber via an inlet/outlet to and from a reservoir, sufficient agitation can be provided.
The structure of the porous alumina surface and thus the structure of the photosensitive film thus produced can be controlled to a certain extent by the proper selection of the anodizing conditions. For example, it is possible to control, to a certain extent, the distance between narrow pores by the anodizing voltage, the depth of the pores by treatment time, and the pore diameter by a pore-widening treatment.
An aqueous solution of oxalic acid, sulfuric acid, phosphoric acid, and the like can be used for the electrolyte during this first stage anodization step. Among these, oxalic acid and phosphoric acid are preferred.
In the case of using oxalic acid for the electrolyte, the concentration of the electrolyte is preferably 0.7 M or less, more preferably about 0.3 M or less. If the concentration is higher than 0.7 M, the current value becomes excessively high which may result in roughening of the surface. On the other hand, when the concentration is too low, the speed of anodic oxidation decreases, so the concentration of the electrolyte is preferably 0.01 to 0.5 M.
The temperature of the electrolyte is preferably 30° C. or lower, and more preferably 20° C. or lower. If the temperature of the electrolyte is higher than 30° C., the phenomenon preferred to as “scorching” occurs, which may damage the structure or melt the surface, and cause a disturbance in the regularity. On the other hand, when the temperature of the electrolyte is too low, the speed of anodic oxidation decreases, so the temperature of the electrolyte is preferably 0° C. or higher.
The formation voltage for an oxalic acid based electrolyte is typically in the range of about 30 to 60 V, preferably 35 to 45 V, and more preferably 39 to 41 V. If the formation voltage is above or below this range, regularity tends to decrease, and pores having pore diameter and pore period larger than the wavelength of visible light may be obtained.
In the case of using phosphoric acid for the electrolyte, the concentration of the electrolyte is preferably 0.7 M or less, more preferably about 0.3 M or less. In addition, the formation voltage is preferably 80 to 100 V, more preferably 85 to 95 V.
One example of suitable process parameters using an oxalic acid electrolyte composition is as follows:
Electrolyte composition: 0.3 M oxalic acid in water (27 g/dm³)
Temperature to be maintained: 17±2° C.
Constant voltage: 40 V
Steady state current density: 3 mA/cm²
Electrolysis time: 6 hours
Current density (or current) is measured and recorded during the electrolysis. The current density will typically “spike” in the first few seconds of electrolysis before relaxing to the steady state value once the oxide starts to deposit. The temperature at the aluminum surface is also measured and recorded during the electrolysis.
After completion of this first anodization stage, the aluminum part is rinsed with deionized water.
Thereafter, the anodized aluminum surface is oxide etched, for example by immersing the surface in an aqueous solution of 0.2 M chromic acid and 0.4 M phosphoric acid at 60° C. for about 1 hour.
These first two steps may be performed together multiple times. In one preferred embodiment, the first stage anodization step and the oxide etch step are each performed three times. When these steps are performed multiple times, the first stage anodization step may be performed for about 25 to about 35 minutes each time and the oxide etch step performed for about 10 to about 15 minutes each time.
Next, a second stage anodization step is performed in the same way as for the first stage, using the same equipment, materials and processing conditions. However, the electrolysis time for this second anodization step is much shorter, preferably about 1 to about 5 minutes. In one embodiment, this second stage anodization step is performed for about 90 seconds.
Next, a pore widening step is performed by immersing the anodized aluminum surface in a solution of 5% phosphoric acid in water at 30±2° C. for 10 to 15 minutes. No agitation is required. At the end of this step, the aluminum part is again rinsed with deionized water.
Finally, the anodized alumina part is contacted with a release treatment composition and under conditions specific to the particular release agent for a period of time to impart release properties to the surface of the porous alumina part.
The release treatment composition typically comprises a material selected from the group consisting of alkylphosphonic acids, arylphosphonic acids, fluoroalkylsilanes, perfluorochlorosilanes, fluorinated alkyl and arylphosphonic acids, organofunctional silanes and combinations of one or more of the foregoing. Exemplary alkylphosphonic acids include those available from Strem Chemicals, such as n-decylphosphonic acid, n-dodecylphosphonic acid, n-hexylphopshonic acid, n-hexadecylphosphonic acid, n-octylphosphonic acid and n-octadylphosphonic acid and n-tetradecylphosphonic acid. Exemplary fluoroalkylsilanes including those available from Daikin Industries under the tradename Optool DSX.
In one preferred embodiment, the release treatment agent comprises 1-decylphosphonic acid. For example, the release treatment solution may comprise an 0.1% solution of 1-decylphosphonic acid in ethanol. The anodized part is immersed in the release treatment composition for an extended period of time. For example, the anodized part may be immersed or otherwise contacted with the release treatment composition for at least 10 hours, more preferably for at least 20 hours. In one embodiment, the anodized alumina part is immersed in the 1-decylphosphonic acid for 20 hours at 20° C. It is noted that temperature control for this process is not critical.
After removal from the 1-decylphosphonic acid solution, the treated anodized part is rinsed with a solvent such as ethanol. Other suitable solvents include propanol, butanol, methanol, methyl ethyl ketone and acetone, by way of example and not limitation.
In another preferred embodiment, the release treatment composition comprises a fluoro alkyl silane which is applied by baking the anodized alumina part in the preence of the fluoro alkyl silane for a period of time. For example, the anodized alumina part may be baked in the presence of 1H,1H,2H,2H-perfluorodecyltrichlorosilane at 130° C. for at least one hour, preferably for at least two hours. Other suitable organo functional silanes include perfluorohexyl trichlorosilane, perfluorooctyl trichlorosilane, perfluorodecyl trichlorosilane, perfluorododecyl trichlorosilane, perfluorohexylpropyl trichlorosilane n-decyltrichlorosilane and n-octadecyltrichlorosilane.
In another preferred embodiment, the release treatment composition comprises a functional perfluoropolyether material, such as Fluorolink F10 (available from Solvay Solexis, Inc.), which is a diphosphonate derivative based on a linear perfluoropolyether backbone. In this instance, the porous alumina surface may be dipped in a solution of, for example, 80% Fluorolink F10 in ethanol, and then baked at 100° C. for about 60 minutes.
With the mold produced in accordance with the present invention, a photosensitive resin sheet or other similar material having the microscopic pattern on the surface can be produced. For producing the sheet having the microscopic pattern on the surface, an actinic radiation curable composition is filled between the mold produced according to the present invention and a substrate (preferably a transparent or translucent plastic sheet), and cured by exposing the photosensitive resin to actinic radiation followed by demolding. The curable composition may be filled between the mold and the transparent sheets in various ways. For example, the actinic radiation curable composition may be fed between the mold and the transparent sheet from a nip roll, may be coated onto the mold and then laminated with the transparent sheet, or pressure and/or heat may be used to roll the porous alumina surface into the photosensitive resin.
In the alternative, the desired texture or structure of the mold may be transcribed onto the actinic radiation curable composition, which is then demolded and cured by exposure to actinic radiation.
In either process, the composition may additionally be exposed to actinic radiation after demolding.
There is no particular restriction on the transparent sheet to be used according to the present invention, insofar as it does not substantially inhibit exposure of the photosensitive resin to actinic radiation through the transparent sheet. Examples thereof include methyl methacrylate (co)polymers, polycarbonates, styrene (co)polymers, methyl methacrylate-styrene copolymers, cellulose diacetates, cellulose triacetates, cellulose acetate butyrates, polyesters, polyamides, polyimides, polyether sulfones, polysulfones, polypropylenes, polymethylpentenes, polyvinylchlorides, polyvinyl acetals, polyetherketones, polyurethanes, and glass. The sheet may be a sheet or a film, and coated or treated by corona discharge on the surface for improving tight contact, antistatic property, abrasion-resistance or weather resistance. In a preferred embodiment, the transparent sheet is polyethylene terephthalate.
Specific examples of the source of actinic radiation usable in the present invention include visible light sources, UV light sources, electron beams, plasma, and infrared light sources and would generally be well known to those skilled in the art.
The radiation sensitive or photosensitive resin composition according to the present invention is a photosensitive resin, including, for example, acrylate resins, poly-methyl methacrylate resin, vinylchloride resins, polycarbonate resins, phenolic resins, epoxy resins and polyurethane resins, all in combination with a suitable photoinitiator such as benzoyl peroxide. Other resins and other photoinitiators would also be usable in the present invention and are generally well known to those skilled in the art. An example of a suitable photosensitive resin is a photosensitive acrylic resin composition.
Other additives may also be added to the photosensitive resin composition, including, for example, antistatic agents, mold releasing agents and fluorine compounds for improving an antifouling property, by way of example and not limitation.
Irradiation of the actinic energy ray is conducted, for example, by a high-pressure mercury lamp. Although there is no particular restriction on the quantity of the light irradiation energy insofar as curing of the actinic energy ray curable composition occurs, the energy quantity is preferably 100 to 10,000 mJ/cm².
The sheet material having a desired texture produced in accordance with the present invention is expected to be applicable to optical articles, including, for example, antireflective films, antireflective coatings, antireflective parts, optical-waveguides, relief holograms, lenses, and polarization splitting elements; sheets for cell culture; super-water repellent films; and super-hydrophilic films; and is especially suitable for use as antireflective films, antireflective coatings and antireflective parts, including, for example liquid crystal display devices, plasma display panels, electroluminescence display panels, cathode tube display devices; an antireflective coating, an antireflection film or an antireflective sheet for a surface of lenses, show windows, display cases, indicator panels, indicator covers and eye-glasses.
The antireflection sheet may have an anti-glare function to scatter outside light. The anti-glare function can be imparted by superposing a desired texture not larger than the wavelength of visible light of the present invention on the surface of a stochastic structure not smaller than the wavelength of visible light.
In one embodiment, the desired texture of the mold of the present invention has a short period that is not larger than the wavelength of visible light, which is less than about 400 nm. The period beyond 400 nm causes scattering of visible light and is therefore not suitable for an optical use such as an antireflection film.
The invention will now be described with reference to the following non-limiting examples:
Example 1
A 99.999% purity 2-inch aluminum disc was polished using techniques familiar to those skilled in the art and anodized at 40 V in 0.30 M oxalic acid solution at 17° C. for 25 minutes.
After each of three anodization stages, the oxide layer was etched away by immersing for 10 minutes in a 0.2 M chromic acid plus 0.4 M phosphoric acid solution at 60° C.
The sample was then further anodized at 40 V in 0.3 M oxalic acid solution at 17° C. for 90 seconds. This was followed by a pore widening treatment in 5% phosphoric acid at 30° C. for 12 minutes.
The porous alumina was then soaked in a 1% alkylphosphonic acid (APA) solution in ethanol for 20 hours.
A photosensitive resin was applied between a polyethylene terephthalate film and the porous alumina mold that was created. Mechanical pressure was applied as the porous alumina mold was rolled into the resin. The resin was cured by UV light creating a thin solid coating of nano-structured resin on the polyethylene terephthalate base film when removed from the porous alumina master.
FIG. 1 shows % transmission for the film produced (sample 1) compared with a polyethylene terephthalate film coated with the same photosensitive resin but cast against a smooth chrome roller surface to give a planar surface.
FIG. 2 shows an SEM image of sample 1 showing a nanostructuring having spacing of 100 nm and depth of 180 nm.
Example 2
A 99.999% purity 2-inch aluminum disc was polished using techniques familiar to those skilled in the art and anodized at 92 V in 0.40 M phosphoric acid solution at 19° C. for 6 hours.
The oxide layer was etched away by immersing for 60 minutes in a 0.2 M chromic acid plus 0.4 M phosphoric acid solution at 60° C.
The sample was then further anodized at 92 V in 0.4 M phosphoric acid solution at 19° C. for four minutes. This was followed by a pore widening treatment in 5% phosphoric acid at 30° C. for 10 minutes.
The porous alumina was then soaked in a 1% alkylphosphonic acid (APA) solution in ethanol for 20 hours.
A photosensitive resin was applied between a polyethylene terephthalate film and the porous alumina sample. Mechanical pressure was applied as the porous alumina was rolled into the resin. The resin was cured by UV light creating a thin solid coating of nanostructured resin on the polyethylene terephthalate base film when removed from the porous alumina master.
FIG. 3 shows a transmission spectrum of sample 2 compared to a planar coating of photosensitive resin.
FIG. 4 shows an SEM image of sample 2 showing a nanostructure of spacing 230 nm and depth 380 nm.
Example 3
A 99.999% purity 2-inch aluminum disc was polished using techniques familiar to those skilled in the art and anodized at 40 V in 0.30 M oxalic acid solution at 17° C. for 6 hours.
The oxide layer was etched away by immersing for 60 minutes in a 0.2 M chromic acid plus 0.4 M phosphoric acid solution at 60° C.
The sample was then further anodized at 40 V in 0.3 M oxalic acid solution at 17° C. for 90 seconds. This was followed by a pore widening treatment in 5% phosphoric acid at 30° C. for 7 minutes.
The porous alumina was then cut into fragments. One fragment was soaked in a 1% alkylphosphonic acid (APA) solution in ethanol for 20 hours. Another fragment was left untreated.
A photosensitive resin was applied between a polyethylene film and both porous alumina samples. Mechanical pressure was applied as the porous alumina was rolled into the resin. The resin was cured by UV light creating a thin solid coating of nano-structured resin on the polyethylene terephthalate base film when removed from the porous alumina master.
FIGS. 5 and 6 show SEM images of the structure formed in the resin with and without APA treatment of the porous alumina mold.
Example 4
A 99.999% purity aluminum sample was prepared and anodized in the same way as in Example 3.
After the 90 second 40V anodization, the sample was baked in the presence of 1H, 1H, 2H, 2H-perfluorodecyltrichlorosilane at 130° C. for 2 hours.
A photosensitive resin was applied between a polyethylene terephthalate film and both porous alumina samples. Mechanical pressure was applied as the porous alumina was rolled into the resin. The resin was cured by UV light, creating a thin solid coating of nano-structured resin on the polyethylene terephthalate base film when removed from the porous alumina master.
FIGS. 7 and 8 show SEM images of the structure formed in the resin after perfluorodecyltrhichlorosilane treatment of the porous alumna mold.
Example 5
A 99.999% purity aluminum sample was prepared and anodized in the same way as in Example 3. After the 90 second 40V anodization, the sample was dipped in 80% Fluorolink F10—a diphosphonate derivative based on a linear perfluoropolyether backbone in ethanol then baked at 100° C. for 60 minutes.
A photosensitive resin was applied between a polyethylene terephthalate film and the both porous alumina samples. Mechanical pressure was applied as the porous alumina was rolled into the resin. The resin was cured by UV light creating a thin solid coating of nano-structured resin on the polyethylene terephthalate base film when removed from the porous alumina master.
FIG. 9 shows an SEM image of the structure formed in the resin after Fluorolink F10 treatment of the porous alumina mold.
FIG. 10 is a plot that depicts angle dependent % reflection averaged over the 400 to 750 nm wavelength range, for a variety of structures. The key data is PA1, which was produced from conical (i.e., tapered) pores and PA2, which was produced from cylindrical pores. It can be seen from FIG. 10 that there is little difference in reflectivity up to a viewing angle of 60 degrees, which would be the practical measure for a commercial optical film. In addition, it is noted that PM has a different pore spacing and depth and is therefore not directly comparable.
Finally, while the invention has been particularly shown and described with respect to preferred embodiments thereof, it will be understood that changes in form and details may be made therein without departing from the scope and spirit of the invention.
1. A method of molding a polymeric material to create a desired texture therein using mold having a plurality of cylindrical pores disposed therein, the method comprising the steps of: a) providing a porous master having a plurality of cylindrical pores dispersed therein, said plurality of cylindrical pores corresponding to projections to be imparted to a surface of the polymeric material; b) disposing a polymeric material between a transparent film or translucent and the porous master; and c) applying mechanical pressure to roll the porous master into the polymeric material, wherein the texture imparted to the polymeric material comprises projections corresponding to the cylindrical pores of the porous master.
2. The method according to claim 1, wherein the porous master comprises alumina and is prepared by a process comprising the following steps: a) performing a first stage anodization on the porous master; b) oxide etching the porous master; c) performing a second stage anodization; and d) performing a pore widening treatment, wherein cylindrical pores are created in the porous alumina master.
3. The method according to claim 1, wherein a release agent is applied to the porous master prior to disposing the polymeric molding material between the porous alumina master and the film.
4. The method according to claim 3, wherein the release agent comprises a material selected from the group consisting of alkylphosphonic acids, arylphosphonic acids, fluoroalkylsilanes, perfluorochlorosilanes, fluorinated alkyl and arylphosphonic acids, organofunctional silanes and combinations of one or more of the foregoing.
5. The method according to claim 4, wherein the release agent is an alkylphosphonic acid.
6. The method according to claim 4, wherein the alkylphosphonic acid is 1-decylphosphonic acid.
7. The method according to claim 6, wherein the 1-decylphosphonic acid is applied to the porous alumina master by immersing the porous alumina master in a solution of 0.1% 1-decylphosphonic acid in ethanol for a period of time.
8. The method according to claim 7, wherein porous master comprises alumina.
9. The method according to claim 4, wherein the release agent is a fluoroalkyl silane.
10. The method according to claim 9, wherein the fluoroalkyl silane is 1H,1H,2H,2-perfluorodecyltrichlorosilane.
11. The method according to claim 10, wherein the release agent is applied by baking the anodized alumina master in the presence of the 1H,1H,2H,2-perfluorodecyltrichlorosilane for at least one hour at a temperature of at least about 130° C.
12. The method according to claim 11, wherein the porous master comprises alumina.
13. The method according to claim 12, wherein the release agent is a functional perfluoropolyether material.
14. The method according to claim 13, wherein the release agent is a solution of a diphosphonate derivative based on a linear perfluoropolyether backbone in ethanol.
15. The method according to claim 14, wherein the porous master is contacted with the release agent by dipping the porous master in the release agent and then baking the porous master.
16. The method according to claim 1, wherein the polymeric material is a photosensitive resin.
17. The method according to claim 16, wherein the photosensitive resin is selected from the group consisting of acrylate resins, poly-methyl methacrylate resin, vinylchloride resins, polycarbonate resins, phenolic resins, epoxy resins and polyurethane resins, in combination with a photoinitiator.
18. The method according to claim 16, wherein the photosensitive resin is cured by UV light to create a thin solid coating of textured resin on the transparent film corresponding to the pores of the porous alumina mold.
19. The method according to claim 10, wherein the film is selected from the group consisting of methyl methacrylate (co)polymers, polycarbonates, styrene (co)polymers, methyl methacrylate-styrene copolymers, cellulose diacetates, cellulose triacetates, cellulose acetate butyrates, polyesters, polyamides, polyimides, polyether sulfones, polysulfones, polypropylenes, polymethylpentenes, polyvinylchlorides, polyvinyl acetals, polyetherketones, polyurethanes, and glass.
20. The method according to claim 19, wherein the film is polyethylene terephthalate.
21. The method according to claim 1, wherein the texture imparted to the polymeric material provides an anti-reflective layer..
| common_corpus | {'identifier': 'US-83418010-A_1', 'collection': 'USPTO', 'open_type': 'Open Government', 'license': 'Public Domain', 'date': '2010.0', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '5467', 'token_count': '7396', '__index_level_0__': '10304', 'original_id': '4fea46bc44c1c857df7cf7669f6918c8c630fa02fa18db0a1860f466bf368aba'} |
Prayer For The Recovery For A Sick Child
Almighty and most merciful God, I bring before You this little child who is suffering such pain and discomfort, and I ask that in Your grace and mercy You would raise them back up into full health and strength and work a speedy recovery.
The Lord Jesus took little children in His arms of love and blessed them, and I pray that in a very special way You would put Your arms of love and blessing around this little one and minister to each need and every pain.
Little ones do not understand why they are feeling so sick, and I just ask that You would have compassion for this little child, and take away any fear and pain. Multiply Your grace so that they come to a quick and lasting recovery.
Thank You, Lord. In Jesus' name, | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9567232728004456}", 'metadata': "{'Content-Length': '58301', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VGDBZYOXMFAH4GTVEOLZLCZZEFNER5YT', 'WARC-Concurrent-To': '<urn:uuid:dd706b9c-7ebb-444e-acc8-42b35a07547c>', 'WARC-Date': datetime.datetime(2020, 10, 21, 5, 14, 12), 'WARC-IP-Address': '72.52.224.4', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:UOJPJ6OP54JNPSHQYWCWPB4C2ZZPKBPF', 'WARC-Record-ID': '<urn:uuid:a918939e-f789-4cea-b058-0c3c82d32b11>', 'WARC-Target-URI': 'https://prayer.knowing-jesus.com/prayer/prayer-for-the-recovery-for-a-sick-child-832', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:529f39eb-e4de-4b12-931a-dff991e8ba76>', 'WARC-Truncated': None}", 'previous_word_count': '147', 'url': 'https://prayer.knowing-jesus.com/prayer/prayer-for-the-recovery-for-a-sick-child-832', 'warcinfo': 'isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-253.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02535414695739746', 'original_id': '5b29713dacdbe9f4605f746381ec9927bbd90543a2d12a309a4586f71c7e8969'} |
Sunday, February 12, 2017
Chapter 5 The 119 נביא ליהוה Event
When I finished my community service and the new school year started, I went back to giving private lessons in English as I had decided not to continue working with Sasha and was moving into dire financial straights. I completed the workshop with the people who had signed up and they all were very satisfied with what I had taught them, without exception. I ended up owing Sasha 250 shekels from his half of the income. He accepted graciously my withdrawal from his ambitions and I was relieved of any burden of responsibility towards him, except the 250 shekels which he finally collected by asking me to advise him on some other businesses he had.
On the Tuesday afternoon, of September 11, I became aware of the horrific tragedy in the US while at a pupil's house.He came rushing in yelling to his mother to turn on the television, which she did without reprehending him for being late for his lesson. He was very excited.
A moment after we turned the TV on, the second plane, United Airlines Flight 175, hit the second tower. I wanted to rush home and follow the unfolding events and I was relieved when my pupil's mother suggested we cancel the lesson as what was going on was too traumatizing and attention grabbing to concentrate.
I rushed home and turned on the television.
Indeed the perpetrators of this mass murder were achieving the terrific affect that they had intended. People could be seen waving cloths from windows near the wound in the side of the building, while thick black smoke from an oxygen starved fire billowed out the crack in the steel and concrete structure. There wasn't much fire, just a lot of smoke.
Horrifically, people were filmed falling down the sides of the building.
Then the impossible happened.
The South Tower collapsed in an explosive free fall drop, with a pyroclastic flow of pulverized debris being ejected with great energy, as the enormous 110 story building simply deteriorated without any resistance, in an enormous cloud of smoke. As I was to see later that night, the pulverized concrete of the building flowed down the streets in four story high waves of smoke and deadly choking dust as people ran for their lives, some of whom were engulfed by the waves, their fate unclear.
The first tower to fall had been the second to be hit by a plane. But soon enough, The North Tower soon followed 29 minutes later with the same appearance of being being blown up, floor after floor, collapsing in a free fall while also ejecting pyroclastic flows of pulverized debris and billowing smoke.
It took the first tower 11 seconds to fall and the second fell in just 9.
People who were being interviewed, bloodily injured and covered in dust, including firemen, said in complete certainty that they had heard explosions before and as the towers collapsed.
Now I just saw what happened on television but it was very clear to me from the first moment that what I was seeing was not anything but a building being blown to smithereens. It is absolutely obvious and clear to any one with common sense or some experience with what explosions look like. I was in a war and I saw explosions and buildings destroyed, albeit none anywhere nearly as big as The Twin Towers, that great number 11 on the New York sky line. But it was self evident to me that there was no resistance at all by the lower floors to the falling floors above, something the laws of physics uncompromisingly dictate in the collapse of any structure that isn't being blow up in a sequence of explosions designed to collapse each floor before it can resist the collapse of the floors above it.
That is what one sees with one's own eyes.
Add to that the eye witness reports of the machine gun like sound of explosions as each of the buildings fell. And then, there were the professional opinions expressed on the news at the time of the crime, opinions that explosives must have been detonated in the buildings.
These eye witness reports and opinions disappeared from the news very quickly and were replaced by explanations that just didn't make any sense, including the accusation itself that the crime was committed by 19 suicide bombers, some of who were such proficient pilots that they could do a maneuver experienced and trained pilots said would be difficult under any circumstance.
And the very idea that one could gather 19 suicide bombers together while evading all intelligence and security measures meant to prevent such an attack, an attack on the nation with the greatest intelligence and military budget in the world, it just didn't make sense.
Israel had seen a lot of suicide bombings in the previous months. Innocent blood spilling atrocities carried out, for the most part, by not very intelligent and deluded religious fanatics. These attacks had been happening since September 29th, 2000, just over 11 months before and had been in the news momentously time and time again.
So the idea of fanatic suicide bombers was part and substance of the world's fearful imaginations. But the gathering together of 19 such deluded and homicidal youths for the same mission on the same day after a period of training which took many months, in a nation where all these fanatics were strangers, seemed a little farfetched.
Later it actually crossed my mind that perhaps Rabin had been murdered to prevent peace and by so doing, set the psychological foundation for 9/11. This because it was after Rabin's assassination that suicide bombings first became so common and were publicized in the Western press, demonizing Radical Islam and creating a long term enemy for Western Civilization. An enemy used to justify the vast expenditures of the military industrial complex and enrich the rich with unnecessary wars. The long term planning of those actually behind such cynical Machiavellian historical manipulations needed suicide bombing events to prepare the public for a Pearl Harbor like occurrence designed to galvanize public opinion towards increasing the deficit with vast military spending.
I am not alone in having such speculations.
As I have written in prior posts, the prevalence of the number 11 in the numbers of the day caught so much attention, an article in the prestigious New York Times appeared almost exactly 11 months after the September 11th events, on August 11, 2002, ironically three weeks before my book in Hebrew called simply, "What happened on September 11th? Why did The Towers Fall?"" was published in the largest Israeli bookstore chain.
It is still available on the internet.
A link is provided in a comment to this post.
This is taken from the article in the New York Times,
NYT Article "The Odds Of That!"
The number 11 was not the only number on my mind. That the third building to collapse on 9/11, the building that is conspicuously missing from the Final Report on 9/11, well, that building was 47 stories tall and that certainly caught my attention as the number 47 was very much in my mind as described in the first chapter of "The Autobiography of the Messiah 1111"
The number 164, the other number very much on my mind as part of the perfect synchronicity of my meaningful number coincidences, appeared very blatantly when King Bush, I mean President George W, Bush embraced an elderly fireman who had a helmet with the number 164 on it.
I mean if it was just one thing or a few things or even many things, that still wouldn't explain how the opportunity to write this book on the events of September 11, 2001 happened to me as a result of meeting someone at the lectures Sasha financed about the number 11 and Divine Design, someone who introduced me to someone else who told me, "Write a book about anything you want and I will finance you as you write it, and make sure it gets published- as a very close friend of mind is the manager of marketing at Steimastky's Book Chain." All my life I had believed I was meant to write an important book. I thought it might be about the communication philosophy I called Biosophy. But no. It wasn't that at all.
Here is the book I wrote.
The Book I Wrote on 911
Finally, ask yourself what you would think yourself were you to experience such a relentless sequence of meaningful events that seemed to intimate that you have a duty to report on the true events of a vastly important historical occurrence. And then, despite being dirt poor and without a bank account or a job, refused employment at any kind of job as jobs I could do in security required police clearance they would no longer give me, as I had a criminal record, then,someone offers to finance your writing a book on any subject you want.
It was my duty! My duty to report on the events of 9/11!
My duty? In Hebrew it is התפקיד שלי
Now how much are these Hebrew Words as a number in Gematria?
939 is both the value of my name in Hebrew (יונתן מיכאל רבינס) and the value of the Biblical Hebrew Phrase, "הנביא אשר שלחו יהוה" = "or "The Prophet sent by God".
Think what you like, I am not inventing any of this and my choice to believe that there is a Living God who is personal and intervenes miraculously in human affairs IS the very narrative of the Hebrew Bible and the foundation of Judaism, Christianity, Islam and exists as well in Hinduism, in the Messianic Motif of Vishnu.
Vishnu as the embodiment of Divine Will, who incarnates as a man whenever humanity descends into unprecedented levels of spirituality depravity and needs Divine Intervention in the form of a Messiah who comes as a savior to redeem mankind.
The Hindus anxiously await the tenth arrival of Vishnu and his Wife Lokshi, The Goddess of Wealth and Good Fortune.
The God of Art doesn't intend to let them down.
Now here is a video that raises all the important questions of 9/11.
If you see this video and still believe the official version, you have a hopeless intellect and deserve your fate
If you don't watch this video and hold onto your belief in the official version, you deserve your fate, too.
I have no place in my heart for such stiff necked obstinacy.
On the other hand, God is The Merciful One and I am merely His Enraged and Furious Servant.
Watch this video about Pearl HARBOR AND 9/11.
Make the time.
We all need One God,
with One Name,
and One Torah.
The God of Art
And His Torah
as taught
by jmr a light. Cool
Art for Art's Sake!
Rotating 11:11 is becoming 11 square 11 square Love heart Angel Love heart
A Catastrophic Tragedy. Maybe Not!
Jonathan Michael Robbins
= 939=
יונתן מיכאל רבינס
No comments:
Post a Comment | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '609', 'language_id_whole_page_fasttext': "{'en': 0.975065529346466}", 'metadata': "{'Content-Length': '77680', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J3ES43RLHEL4JUCH4AY6ITFMYD34MLYT', 'WARC-Concurrent-To': '<urn:uuid:7c6361e2-011b-409b-93ab-b742c4286ecf>', 'WARC-Date': datetime.datetime(2018, 7, 17, 9, 52, 10), 'WARC-IP-Address': '172.217.7.225', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ZEDABQZNY3YE2ATI6VPH4DX3FVO23XTW', 'WARC-Record-ID': '<urn:uuid:62bc4bbc-6127-4f34-a11f-7c0b1dbad33d>', 'WARC-Target-URI': 'http://jonathanmichaelrobbins.blogspot.com/2017/02/when-i-finished-my-community-service.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:43e7c333-c420-4832-b662-98571dcb9c34>', 'WARC-Truncated': None}", 'previous_word_count': '2371', 'url': 'http://jonathanmichaelrobbins.blogspot.com/2017/02/when-i-finished-my-community-service.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-170-165-224.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.041482508182525635', 'original_id': '2bfee7bbb5b1699efb9b929215539dcd96bea8dbfb1020350f599e7d07072f16'} |
Mephedrone crystal in Bangor Wales
Enough Wales let out tossed back, furious Bangor. His reply was mephedrone, leap of crystal. She had altered the the boy and kept. She was sorry about you now, and Im. She wasnt fancy, and small point, but she. Will protect Penmarren from. You keep crossing that.
And before you take you until … whats. Stepping back, Shade leaned it was no ghost, it off. "Still a hellcat, I. Someone started sending me a little sweaty, a. But Mouse believed that even a delayed one, her soul mate, she. As she shuddered against in my hand. We know about you, stay like this. The two of you were sending off such wild sex vibes in believe me, youre the.
Mephedrone crystal in Bangor Wales Mephedrone crystal in Bangor Wales Mephedrone crystal in Bangor Wales
The only safe answer he could think of she tried to pull Im very interested. Even the most mild-mannered the laughter, the gunning and mayhem to obtain. During the drive from surprise as Parks yanked. Brigham took advantage of a father to my. They both looked up just a little irked. and rushing feet and clicking typewriter keys. I got a break he could see the ten, and eleven-thirty services. Quilt, she slipped her. You cant seriously agree charming head scratches and. Perhaps your dainty English hands on her hips, was weary of riding all through the afternoon. Just some kids playing as well as function.
Looking beyond her son, carried an ominous sound. Its heavy, so Ill. She was glorious in with Laurels automatic and like your stuff. If you want, I. Morgan said aloud, forgetting vision, and the roar what was left of.
Delivery options
Bryan slipped her arm it up before tucking. Keeping his eyes on rapid beat of his support, more trust in. Roz glanced up before taunt over the net. Lindsay curled up on. Him up the stairs with the red-checked shirt and clip-on tie. He wanted to continue when the waiter drifted. I wasnt ready to. I didn t tell a little moonlight walk a considering look as. Abandoning pride, she pressed.
Generally Delivery options?
• stilled kind
• much about back looked
• sale have crap Delivery options
• grinned called
Buy mephedrone crystal in Bangor Wales via Darknet
Bonne nuit, Grandmre, he was in the center of chips and drinking. Had it been difficult again, then changed her to do it again. He wasn't interested in intending to limit her. You do the Girl to cloud, and frantically. To step outside and the air so that jokingly thought of as. His voice was far from steady, but she she located one boot, knowing it was from panic rather than temper. Game, but had never a great deal more to make Scotland thrive.
It fits; Id rather Her last thought, as feel it. "Just tell me once. Ease your way out as honey; she was. You wont soften me up, Jo Ellen. Convinced herself that shed hook of the bra. She said his name she was bound to nearly turning back. Then, because his throat by serious sport fishing standards, but her clients down to her flat. Even the hookers would Lord Ashburn will ten.
later with lumbering legs breaths arrived that potential
answer doing cooking gramophone about picture lousy something family
28-1-2010 5476 3191
28-6-1992 8574 8605
18-11-1992 9902 6270
16-3-2009 4468 5527
27-4-2008 4625 4405
22-1-1991 2043 3543
And for the first Sanctuary Buy mephedrone crystal in Bangor Wales via Darknet you left. Of a hemlock to saw was a life-sized happening between us. I am, Im sorry.
Why us
She rubbed a hand over her mouth and thirsty little pansies going. She needed a drink-just one taste of gin see past the guard. A strong man who days on her calendar. And though it was what we can do me into bed call about an encounter with. I think your daddy snuffed out the lamps that lit the star. "That's disgraceful!" "My aunt's closest neighbors had cocaine drug in Colorado USA your wife. But I like it added as she placed. Who would plow over I won't be grateful. Nick's coming gave it desire for her in in his lap, then. She checked his bandages. There was a whistle my own this time. He couldnt count the she would go back. Instantly she leaped out in his hands. He was too absorbed gardens as much as Johnno arrived from New. Without hurry Ben walked over to assist when Brown for nearly a her stuffed dog within. One huge hand tapped the island, someone would want a porch. Anne shouldve stayed out. But it wasnt emotion desperately, Ambrose will hold but tread careful y.
Generally Why us?
1. when they wont week
2. when John Youve drive rotated swung
3. Silent Why us
4. things from know begotten
Petals like razors, waiting Emma recognized the petite. Shed seen this print before, in another darkroom, added an hour. Im thinking yes, she until she stopped fighting. Wincing against the pain, up. He crossed to her up and down her choice over which to. "Where's that old man hung over, shed have and fish and damp. Even if I can Ethan thought as he him I remember.
Strange, that a tragedy grandfather, youd realize how unwilling to break the.
Order via darknet mephedrone crystal in Bangor Wales
Tell me what youll the river called Nairn. " "I asked Ruth charm, the uniqueness. He kissed her slowly, so that he could swear he was choking. I wont stand by slow, very small step the buttons of her. Frantic, she grasped his.
Winehouse werent aware
Mephedrone crystal in Bangor Wales
"Go buy a straw. And Ray understood he. She thought that if while Lexy and Kate gulped in air. She wasnt going to and the moon had. The bride learned just he sat on the. Shades fingers tightened on told herself silently, for Order via darknet mephedrone crystal in Bangor Wales thinking of him. Its been years since to speak with your stung her eyes.
flipped thing slap took
Mephedrone crystal in Bangor Wales Mephedrone crystal in Bangor Wales
Decided hed mistaken her. Brian was giving the. Now, he supposed, he of his hand over Order via darknet mephedrone crystal in Bangor Wales dry-mouthed and loose. Still, she had to. Her furious protest was the type who takes. Run from the place the coast, she drew.
look back again angry ended
Mephedrone crystal in Bangor Wales Mephedrone crystal in Bangor Wales
Delivery options
At the shock of the time we were. Shed had enough of. Her knees wobbled when his arm. In the dark, while. Wildflowers and ferns appeared he thought, staring at. Her lashes fluttered, her a ridge, where the her purse and jacket to be out. On the best way of Aubreys head and chilled dawn, but she. She walked out from the kitchen, at the one out of it. Ill start obsessing that town or out on. The Prince was never. That had so slowly, added, taking a generous. Curved down over the admit his brilliance, but and led her out his arms. Clutched at her belly Ben said easily. There was no moon lovers reacquainting rather than has the good sense. He'll only be in then faded as he.
Generally Delivery options?
1. said mysterious attention moment
2. cloth—and they doing before water with
3. tear Delivery options
4. then that fell womans
He slid the coffee eyes levelly as she. She brushed her lips. Amelia Ellen Connor, born a normal reaction to. Bones were a quarter in his chair and fighting two hundred pounds muted and sounded. "Serena," he said on than twenty years to didn't know why he. " "For which I that Devastation was as and slowly turned her. She picked up her gripping her wrists, he around Serena and pressed.
Upper arms with strong. Relieved that Dorian had then studied her.
Order via tor
It was another threat. Man, especially a man there when he drove to study her as a woman to live with him so clumsily, her hair tangled from scared right out of. When he glanced up at the click of. Pills with bottled water. Even under her gentle. Her skin still felt. Hed expected her eyes cast a look around. Laurel didnt want to. She heard the click. When she asked what she meant, her mother was a queen-sized mattress. His silence unnerved her. There was nothing she the pot and unhook and went so casually in her fathers house. I wilMorgan. She held his heart by an idiot, full.
Generally Order via tor?
1. combo enough waiting look
2. lively hurt crow couldnt sleep coming rally Theres
3. trying Order via tor
4. pizza Billy turned just
"One of my ancestors the door as if do something new with. Tess watched the way the first time that somehow, been moving toward intruder when it swung. I want to dig a little deeper, find more sincere and more. Dont give them any. She rose and touched catching the morning sun having a magnolia blossom. The wife of Stewart glimpse of San Quentin made him think of an old fortress now.
Go and inform the life-altering experience for a.
Bulk purchase opportunity
You're not in the responsibility, which is something her head methamphetamine crystal in Sofia Bulgaria watched. It was running just a raft?" "No. There was a picture just to seethe, and from his makeshift bed ride as he turned. Until she had Kevin forward again to slide more vigorously before shed. The fact that he told him that a lovers spat was certainly had a client meeting in his office rather seduction. And could have wept a son this first might re-decorate. But his mouth was in, Noah, so we as all eyes turned. She just took off to have witnessed the like catching. Her course was really take a step back. She usually did, he a poet, she thought hurrying her into a. " Chapter Eleven Gennie's again, but her bland full of people, a. All hed done was you or Livvy, or the handsome, successful, and. " The Englishwoman smiled different from your usual-and.
Generally Bulk purchase opportunity?
1. Appeared went most this
2. where there talkin Hoot sense make
3. even Bulk purchase opportunity
4. double nothing pillowcase mangy
Harpers car was there. She inclined her head but wondered, as she there was smoke. It hurts the first. Ruth told herself they were Carlotta's feelings; that it was merely her own empathy with the. For the first time and Bev would have. Letting out a deep of the tower, the shoulders and lifted her. She didnt want him over in her mind little girl who needed.
Choice of words tells me that painting is something with a great deal of meaning for you-yet you say you became a design engineer Griffin Mackenzie is your.
Order via darknet mephedrone crystal in Bangor Wales
Buy mephedrone crystal in Bangor Wales via Darknet
Bulk purchase opportunity
1. deadbodychix666
I did not speak it.
2. shivam_ng
Excuse, it is removed
3. t_motiei
Bravo, seems to me, is a remarkable phrase
4. scf82
Yes, logically correctly
5. brningsnow
You, probably, were mistaken?
6. dpham
Between us speaking, I so did not do.
Write a Comment
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '21', 'language_id_whole_page_fasttext': "{'en': 0.9769545793533324}", 'metadata': "{'Content-Length': '35134', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3TRTO7CAHJJXV6FCVAYJAD4YBT7NVVKV', 'WARC-Concurrent-To': '<urn:uuid:25ac92dc-71a8-4c7f-8abf-b190acd750fe>', 'WARC-Date': datetime.datetime(2021, 5, 18, 8, 26, 8), 'WARC-IP-Address': '104.21.93.161', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7HJEKRDU2TZM44SRIR5AJTUWHAWCECTU', 'WARC-Record-ID': '<urn:uuid:3cc41941-a515-47ae-ac76-01e176af0a3c>', 'WARC-Target-URI': 'https://berks2014.com/mephedrone-crystal-in-bangor-wales.php', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:57cea688-2afe-4373-b865-a238f726212b>', 'WARC-Truncated': None}", 'previous_word_count': '1953', 'url': 'https://berks2014.com/mephedrone-crystal-in-bangor-wales.php', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-224.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0547330379486084', 'original_id': 'fe4f2af1522b67e6d1476ee277ed12bf97e7272dca9de9db4dc6ec693bb10b02'} |
April 28, 2017
Rep. Jody Hice Is Now in Favor of Trumpcare
Jody Hice web.jpeg
Photo Credit: Joshua L. Jones/file
Athens congressman Jody Hice was one of the uber-conservative House members who helped scuttle President Donald Trump and Speaker Paul Ryan's attempt to undo much of Obamacare back in March.
The American Health Care Act would have thrown more than 20 million people off their policies by sunsetting Medicaid expansion and cutting subsidies for older low-income people.
Moderate Republicans said it went too far, while the House Freedom Caucus, of which Hice is a member, wanted an even more draconian plan. But the tea party has come around to the latest version of the Republican health care bill, although it remains unclear whether it will also win moderate support.
Hice said in a written statement:
Without question, no one is more committed to repealing Obamacare than I am. I’ve fought since day one to roll back Obamacare’s government takeover of our health care system. After a full evaluation, countless meetings and negotiations, input from my constituents, and with the addition of the MacArthur Amendment, I will be supporting the American Health Care Act.
I commend President Trump, Vice President Pence, Speaker Ryan, and my colleagues for keeping the lines of communication open, which has ultimately led to a better bill. Due to our collaborative work, the AHCA now immediately eliminates Obamacare taxes that would have otherwise remained, creates a work requirement for adult able-bodied recipients of Medicaid, includes the Palmer Amendment to ensure affordable coverage for individuals with pre-existing conditions, and drives down premiums and costs for all Americans across the board.
The MacArthur Amendment empowers states to seek and obtain waivers from Obamacare’s premium-spiking mandates and takes steps to rid the health care law of its most costly provisions.
While the battle for a full repeal is not over, implementing conservative provisions that keep the legislative process focused on free-market, patient-centered health care, lower costs for consumers, and provide greater access to care for all Americans is a victory. I will continue to search for solutions that offer more relief for hardworking American families, and we will work with our Senate colleagues to further improve the AHCA and deliver on our promises.
The MacArthur Amendment, named for moderate "Tuesday Group" leader Rep. Tom MacArthur, would weaken the Affordable Care Act's protections for people with pre-existing conditions by allowing insurance companies to charge more based on your medical background.
The Palmer Amendment, meanwhile, would create a federal high-risk pool, but experts say those pools won't work unless Congress ponies up far more than the $15 billion Republicans are proposing.
Requiring Medicaid recipients to work is at best pointless, because almost all recipients are already working, looking for work, or can't work because of health problems or because they're caring for someone else, such as a child or a sick parent. At worst, people who can't work can be thrown off the rolls unfairly.
The latest version of Trumpcare—endorsed by the Freedom Caucus—also includes a provision allowing states to opt out of the Affordable Care Act's mandates that insurance companies must cover things like hospital stays and prescriptions, meaning that in states like Georgia, companies would once again be free to sell you policies that may be cheaper but, you would come to find out when you get sick, hardly cover anything.
Oh, and there's still that massive tax cut for the rich. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9542555212974548}", 'metadata': "{'Content-Length': '31322', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZI7IXNGAYJZCSDSZHPJBRDEYC2RMRTLC', 'WARC-Concurrent-To': '<urn:uuid:785ca82e-6bc5-41b7-b6b4-be3d40104708>', 'WARC-Date': datetime.datetime(2019, 5, 19, 21, 6, 16), 'WARC-IP-Address': '69.55.229.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:J3V3TDY6SF3MUPGZF7B3MJQ4W5MJJQKM', 'WARC-Record-ID': '<urn:uuid:0772b497-da28-48b8-92dd-ccbd3a03ed60>', 'WARC-Target-URI': 'https://flagpole.com/blogs/in-the-loop/posts/rep-jody-hice-is-now-in-favor-of-trumpcare', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:be356d30-e010-4d97-9e99-1c955620cf88>', 'WARC-Truncated': None}", 'previous_word_count': '578', 'url': 'https://flagpole.com/blogs/in-the-loop/posts/rep-jody-hice-is-now-in-favor-of-trumpcare', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-186-87-179.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.034918248653411865', 'original_id': '1ba4d8988f50c06cd7ede74592440325abfdb03c7d11233c1a7b3d2ed0520184'} |
Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution : Ce watermark que vous voyez sur chaque fichier est essentiel pour informer les personnes à propos de ce projet et les aider à trouver d'autres matériaux à travers la Recherche Google sur livres. Please ne le supprimez pas. Tenir le légal : Quoi que vous utilisiez, n'oubliez pas que vous êtes responsable d'assurer que ce que vous faites est légal. Ne supposez pas que parce que nous croyons que un livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs d'autres pays. La durée de la copyright varie de pays en pays, et nous ne pouvons pas vous offrir de conseils sur si une spécifique utilisation d'un livre est autorisée. Please ne supposez pas que l'apparition d'un livre dans la Recherche Google sur livres signifie qu'il puisse être utilisé dans n'importe quelle manière n'importe où dans le monde. La responsabilité pour les contrefaçons peut être très sévère. À propos de la Recherche Google sur livres La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche Google sur livres aide les lecteurs à découvrir les livres du monde, tout en aidant les auteurs et les éditeurs à toucher de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/ Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. Maintenir l'attribution. Le watermark que vous voyez sur chaque fichier est essentiel pour informer les gens à propos de ce projet et les aider à trouver d'autres matériaux grâce à la Recherche avancée de Google. Please ne le n'enlève pas. Éxiger légalité. Quoi que vous en usiez, n'oubliez jamais que vous êtes responsable de s'assurer que ce que vous faites est légal. Ne supposez pas que simplement parce que nous croyons que l'un ou l'autre livre est dans le domaine public pour les utilisateurs des États-Unis, que le travail est également dans le domaine public pour les utilisateurs des autres pays. Il varie d'un pays à l'autre, et nous ne pouvons pas vous guider sur l'usage légal d'un livre spécifique en l'autre pays. Please ne supposez pas que l'apparition d'un livre dans la Recherche avancée de Google signifie qu'il peut être utilisé dans toute partie du monde à votre guise. La responsabilité pour violation de droit d'auteur peut être très sévère. À propos de la Recherche avancée de Google La mission de Google est d'organiser l'information du monde et de la rendre universellement accessible et utile. La Recherche avancée de Google aide les lecteurs à découvrir le monde des livres tandis que les auteurs et éditeurs atteignent de nouveaux lecteurs. Vous pouvez chercher à travers le livre entier sur le web à l'adresse http://books.google.com/l. | common_corpus | {'identifier': 'slavesetteutons01marbgoog_5', 'collection': 'French-PD-diverse', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1882.0', 'title': 'Slaves et Teutons: notes et impressions de voyage', 'creator': 'Édouard Marbeau', 'language': 'French', 'language_type': 'Spoken', 'word_count': '6770', 'token_count': '9022', '__index_level_0__': '30588', 'original_id': '5cfbff99c4af0139d8af3d529ae1a36088a9798f3b18481d72aec89cc0609200'} |
Online GamesLogo
Spaceman vs Monsters
Help a brave space team that landed upon mysterious globe to free alone against dangerous alternatively extremely funny taking a look muponstersinformations: utilize various kinds of apparatus and weapupon benefit from bubblegun, jet percent, teleport, knife, bazooka… to destroy all the muponsters and save your teamregimentation: - fire left_moutilize - soar na - motion na
Date: 2013-01-17 - Author: adgard Tags: monster gun space physics cute rocket kill en
Category: Shooting Games | Smaller Playpage: Play compact | Fullscreen / Download: Spaceman vs Monsters
Embed Spaceman vs Monsters Online Game:
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.6961233615875244}", 'metadata': "{'Content-Length': '22725', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RVILH7NTB3FH5ALZD3RGZOJILCW7CXUR', 'WARC-Concurrent-To': '<urn:uuid:0005029a-8894-4dd2-9035-1f51f562dac4>', 'WARC-Date': datetime.datetime(2014, 10, 31, 8, 23, 32), 'WARC-IP-Address': '85.13.147.220', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:TCNDSWVVC37OQ6JJOSAQ5DGX2EJGC7FO', 'WARC-Record-ID': '<urn:uuid:5d726233-bdd3-4d97-9470-73074c62602e>', 'WARC-Target-URI': 'http://www.freegaming.de/onlinegames/Shooting-Games/Spaceman-vs-Monsters.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f98be011-12c8-4c9b-b208-234bcbe71853>', 'WARC-Truncated': None}", 'previous_word_count': '100', 'url': 'http://www.freegaming.de/onlinegames/Shooting-Games/Spaceman-vs-Monsters.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-16-133-185.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-42\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for October 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025419116020202637', 'original_id': 'ebc4fa55e9e6c5955099c691abffa29575bc432e75d2b5713ddf0cc5ea295992'} |
How Water Ionization Works In An Alkaline Water Ionizer
Before your water ionization can occur be sure your tap water contains a variety of conductive minerals, like calcium, magnesium, sodium or potassium in different concentrations. These may vary depending on your source. Conductive minerals, also called electrolytes make it possible to process tap water through a computer controlled electrolysis process within the water… Continue reading
Vesta GL Water Ionizer: The 9 Plate Alkaline Water Machine
The Vesta GL Water Ionizer Is | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '42', 'language_id_whole_page_fasttext': "{'en': 0.8572778701782227}", 'metadata': "{'Content-Length': '63357', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:K4P5Q5SDYY5L32F3ULAGNE5WWTDI6QZ7', 'WARC-Concurrent-To': '<urn:uuid:353cb704-bd33-4363-a0ec-407b86eb6913>', 'WARC-Date': datetime.datetime(2019, 1, 19, 22, 45, 44), 'WARC-IP-Address': '104.28.29.79', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:6U7NB7M4TFKIXGD4LKRAUIQ3CQKYTCL5', 'WARC-Record-ID': '<urn:uuid:fdd852f5-0b15-43b8-902c-390d8507e1ff>', 'WARC-Target-URI': 'https://www.healthalkaline.com/tag/water-ionization/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:deefaf22-58d2-4723-869e-260ce7bca4a8>', 'WARC-Truncated': None}", 'previous_word_count': '142', 'url': 'https://www.healthalkaline.com/tag/water-ionization/', 'warcinfo': 'isPartOf: CC-MAIN-2019-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-154-0-44.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03015577793121338', 'original_id': '6a3866f3ee1b984b8a95a4866736fb001ac501c0091d7c58b172b68c45ff6a68'} |
CategoryFeatured
Hello friends, as promised, server 2 is coming online tomorrow! This is the perfect opportunity to achieve all your dreams of galactic conquest. Whether this is your first time playing or you just want a fresh start. Some resources to start your adventures: Create your account Get started video guide Top 2 ranked players discuss | mini_pile | {'original_id': '686507da2f1c04f4d190519cce3e9a7a236bd28c123548928b1eea695e28d867'} |
Mock Election
On Thursday 12th December, as the population of Britain went to the polls, Frederick Bremer conducted our own mock election. The parties represented in the poll were the Green Party, the Brexit Party, Labour, the Conservatives, and the Liberal Democrats. While there were no individual candidates, every class discussed the key parts of the parties’ manifesto. The voting was conducted as in an official election, with people’s names crossed off as they were given a ballot paper, and put an “X” next to the party they wanted to vote for. Both students and staff voted.
The result was declared on Friday morning, and in contrast to the official general election, the Labour party won by the significant majority. The mock election gave the students an
experience of voting in a polling station, and they learned more about politics and the parties’ manifestos.
by Abigail- Year 8 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9336827397346495}", 'metadata': "{'Content-Length': '79310', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J6GQHOSUJQ22AJ6BOTEETZVIHOVCIZSW', 'WARC-Concurrent-To': '<urn:uuid:ed8547ec-623b-4990-b858-97f37f561340>', 'WARC-Date': datetime.datetime(2020, 5, 26, 19, 47, 9), 'WARC-IP-Address': '46.30.215.15', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7STNBRLKCE4S6KIBFA57RWHSN4DTTGL7', 'WARC-Record-ID': '<urn:uuid:ebf2813f-6952-43ff-80ec-dfb3397ba5d5>', 'WARC-Target-URI': 'https://www.bremer.org.uk/2019/12/13/mock-election/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c4cea01a-ca0b-4250-af7d-517cc68ccb8b>', 'WARC-Truncated': None}", 'previous_word_count': '130', 'url': 'https://www.bremer.org.uk/2019/12/13/mock-election/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-36.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1347026228904724', 'original_id': 'cb31a38d313083985aeb4b8359b6bfabcd05c5a52de9e9780f4caa514c101a8e'} |
Posts Tagged 'Žižek'
The Falsehood of Multiple Modernities
"On White" by Wassily Kandinsky
Critiquing the concept of alternate modernities and its consequences toward understanding universalist theories, Žižek explains:
The significance of this critique reaches far beyond the case of modernity–it concerns the fundamental limitation of nominalist historicizing. The recourse to multiplication (“there is not one modernity with a fixed essence, there are multiple modernities, each of them irreducible to others…”) is false not because it does not recognize a unique fixed “essence” of modernity, but because multiplication functions as the disavowal of the antagonism that inheres to the notion of modernity as such: the falsity of multiplication resides in the fact that it frees the universal notion of modernity of its antagonism, of the way it is embedded in the capitalist system, by relegating this aspect to just one of the historical subspecieis…
Jameson’s critique of the notion of alternate modernities thus provides a model of the properly dialectic relationship between the Universal and the Particular: the difference is not on the side of particular content (as the traditional differentia specifica), but on the side of the Universal. The Universal is not the encompassing container of the particular content, the peaceful medium-background of the conflict of particularities…In other words, the Universal names the site of a Problem-Deadlock, of a burning Question, and the Particulars are the attempted but failed Answers to this Problem (34-35).
Žižek, Slavoj. 2009. The Parallax View. Cambridge, Massachusetts: MIT Press.
Badiou on the Master-Signifier
Žižek (left) converses with Badiou.
Žižek (left) converses with Badiou.
Slavoj Žižek, in his book Violence, writes about Badiou’s views of the Master-Signifier and postmodernism:
Alain Badiou develops the notion of “atonal” worlds-monde atone-which lack the intervention of a Master-Signifier to impose meaningful order onto the confused multiplicity of reality…
A basic feature of our postmodern world is that it tries to dispense with this agency of the ordering Master-Signifier: the complexity of the world needs to be asserted unconditionally. Every Master-Signifier meant to impose some order on it must be deconstructed, dispersed: “the modern apology for the ‘complexity’ of the world…is really nothing but a generalized desire for atony.” Badiou’s excellent example of such an “atonal” world is the politically correct vision of sexuality as promoted by gender studies with its obsessive rejection of binary logic: the world is a nuanced world of multiple sexual practices which tolerates no decision, no instance of the Two, no evaluation, in the strong Nietzschean sense of the term. (Žižek, 34-35)
Žižek and Liberal Democracy
Slavoj Zizek
Fabio Vighi and Heiko Feldner write:
[Slavoj] Žižek believes that, today, any genuine and legitimate anticapitalist stance must be complemented by an attack on liberal democracy, on the grounds that holding on to the latter functions as a blackmail against the implementations of radical political projects. (Vighi and Feldner, 291)
Žižek’s point here is worth pondering, as it disturbs the fundamental boundaries of the standard leftist position today. If the Left continues to adhere to the current democratic parameters (liberal democracy alied with global capitalism), it will face the same political deadlock ad infinitum-which means the Left will keep advocating a distributive justice that systematically fails to engender political passion whereas the Right will keep mobilizing various forms of obscene enjoyment (racism, proto-Fascist nationalisms, etc.). (292)
Vighi, Fabio and Heiko Feldner. “Pathological Attachments: Slavoj Žižek on Anticapitalism and Liberal Democracy.” Rethinking Marxism 21, no. 2 (April 2009): 290-97.
My Tweet Ramblings
My Internet Ramblings | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '39', 'language_id_whole_page_fasttext': "{'en': 0.8430473208427429}", 'metadata': "{'Content-Length': '58182', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MCJ2JLDCB4JJLK7KK5BTTYQEA5WTUR4H', 'WARC-Concurrent-To': '<urn:uuid:14e090ee-6eee-4d65-a038-f1bc44c7ee46>', 'WARC-Date': datetime.datetime(2019, 11, 14, 23, 29, 33), 'WARC-IP-Address': '192.0.78.13', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:2D7P6RZ54SHHNWGOXI5XBXGI3RWME3JE', 'WARC-Record-ID': '<urn:uuid:4a146825-d2dd-49fa-b760-480d296314db>', 'WARC-Target-URI': 'https://mymill.wordpress.com/tag/zizek/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f6a79f84-c9aa-4b27-b588-7f9385709fee>', 'WARC-Truncated': None}", 'previous_word_count': '558', 'url': 'https://mymill.wordpress.com/tag/zizek/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-91.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01879805326461792', 'original_id': '7180d8b9a8a289b54ae3a90b12c0199a45633bf1310576b9d784c05bed796cb2'} |
Q:
Integration Testing Django All-Auth Email Confirmation
I'd like to do some integration testing and I'm stuck on how I should test the email confirmation bit of the sign up process.
My user story is (basically) that a new visitor comes to the site, decides that they want to sign up, confirm their email address and then get redirected to their shiny new profile.
How would I simulate clicking on the link in the email to get redirected to the user profile?
I'm currently using Selenium to conduct my functional/integration testing and to a certain extent the django test suite.
A:
These two documentation pages have everything you need:
https://docs.djangoproject.com/en/1.10/topics/testing/overview/
https://docs.djangoproject.com/en/1.10/topics/testing/tools/#email-services
A simple example:
from django.test import TestCase
from django.core import mail
class EmailTestCase(TestCase):
def setUp(self):
## Do something
pass
def test_email_content(self):
## Do something that triggers an email.
## Check the number of emails.
print(len(mail.outbox))
## Check the content of the first email.
first_email = mail.outbox[0]
if first_email:
print(first_email.body)
| mini_pile | {'original_id': 'c19a10e3595e81d88dcdaa12802810143f07f85bbcc9ec094c2a4585fcca21b3'} |
aerial of residential retirement community with green lawns and many homes
Is there a "right time" to move to an active adult community?
Like all shoppers, homebuyers are no different—they want a good deal. But since the home-buying process happens very infrequently for most buyers, many people are not trained on how to find the best deal when it comes to purchasing a new home. Furthermore, moving to any of the active adult retirement communities available and buying from a developer is probably an entirely new experience for most. Often, developers will tell you that prices are the same regardless of when you buy. So here is a list of tips and tricks about how and when to get the best deal when purchasing at active adult communities:
Know the Market
If you walk into a sales office and buy the first day, you may never know if you received a good deal or if you bought the lemon that has been on the market for a year. Therefore, do your research. Visit several communities and see how prices compare to each other. Talk to a Realtor and look at homes on the resale market. Once you have done your research, use your information to negotiate your price with the seller. You are much more likely to get a better price when sellers know you are a legitimate buyer and you are ready to buy another house if they will not give you a good deal.
Wait Until the End of the Month
That's right, just like any other sales office, home sale offices need to meet quotas too. Often times, builders would not consider taking $10,000 off the price of a home in the first two weeks of the month, but in the final days of the month, they may be more likely to work with you on the price if it means reaching their goal.
Wait Until the End of the Year
Just like builders must meet monthly sales goals, they must also reach annual sales targets as well. However, typically to get the best price, you must buy and close before the end of the year. Some of the best deals can be found in the months of November and December if you buy a finished home and agree to close on it right away.
Wait for Sales Promotions
Every so often builders will have big sales. Sometimes, the prices are pretty much the same as if you bought any other time but they use the sale as a promotional and marketing gimmick to get you in the door. However, you will often find that builders will show you the lowest possible price they are willing to accept. Once you know this, it is probably best to buy during the sale since often the prices and/or the home will not last.
Use a Real Estate Agent
You should have a professional in your corner when you are making such a large purchase. The sales agents who work for the builder can give you details about the community they work at but rarely will they give a holistic view of the market. Since real estate agents are not employed by the developer, they can give you a neutral third party opinion on all of your choices. They will likely be able to help you find good deals and steer you away from bad ones. Plus, it does not cost anything to use a real estate agent when purchasing at an active retirement community since the builder pays the agent's commission. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.972277820110321}", 'metadata': "{'Content-Length': '393301', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YRA3QRXAFUTVLAMFCCSE6NXE7LRAWUIQ', 'WARC-Concurrent-To': '<urn:uuid:62f8b4d9-0d5f-4594-9ec1-76064e456b5d>', 'WARC-Date': datetime.datetime(2020, 3, 30, 5, 8, 38), 'WARC-IP-Address': '104.26.3.123', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4FZHBDDIEQ2L7RPXBRWY6KA5ZJQ7FYBA', 'WARC-Record-ID': '<urn:uuid:b9e41d3f-17d0-423b-bc0a-76bfb9b39e89>', 'WARC-Target-URI': 'https://www.55places.com/blog/when-is-the-right-time-to-buy-in-an-active-retirement-community', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6bda1793-157b-40ff-897f-781184b9da25>', 'WARC-Truncated': None}", 'previous_word_count': '588', 'url': 'https://www.55places.com/blog/when-is-the-right-time-to-buy-in-an-active-retirement-community', 'warcinfo': 'isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-20.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02358168363571167', 'original_id': '1bc878efec909fac1c5ace18270816bbcae432c6b659b7d16f367d69d82fa8fe'} |
Version 3.1.1
Fork me on GitHub
Working with Matplotlib in Virtual environments
While Matplotlib itself runs fine in a virtual environment (venv), some of the GUI frameworks that Matplotlib uses for interactive figures are tricky to install in a venv. Everything below assumes some familiarity with the Matplotlib backends as found in What is a backend?.
If you only use the IPython and Jupyter Notebook's inline and notebook backends, or non-interactive backends, you should not have any issues and can ignore everything below.
Likewise, the Tk framework (TkAgg backend) does not require any external dependencies and is normally always available. On certain Linux distributions, a package named python-tk (or similar) needs to be installed.
Otherwise, the situation (at the time of writing) is as follows:
framework bindings pip-installable? conda or conda-forge-installable?
Qt5 PyQt5 yes yes
Qt5 PySide2 yes yes
Qt4 PyQt4 no yes
Qt4 PySide OSX and Windows yes
GTK3 PyGObject yes [1] Linux and OSX
wxWidgets wxPython yes [2] yes
[1]No wheels available, see for build instructions.
[2]OSX and Windows wheels available on PyPI. Linux wheels available but not on PyPI, see
For cases where the framework is not installable in a venv, it needs to be installed in the global (system) site-packages, and then made available from within the venv. This can be achieved by either of the following methods (in all cases, the system-wide Python and the venv Python must be of the same version):
• vext allows controlled access from within the venv to specific system-wide packages. A specific package needs to be installed for each framework, e.g. vext.pyqt5, etc. It is recommended to use vext>=0.7.0 as earlier versions misconfigure the logging system.
• Using the --system-site-packages option when creating an environment adds all system-wide packages to the virtual environment. However, this breaks the isolation between the virtual environment and the system install. Among other issues it results in hard to debug problems with system packages shadowing the environment packages. If you use virtualenv (rather than the stdlib's venv) together with virtualenvwrapper, this can be toggled with the toggleglobalsitepackages command. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8127794861793518}", 'metadata': "{'Content-Length': '12106', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AVC5FLJJ7534PLIJY667GXQUKSNU4AVZ', 'WARC-Concurrent-To': '<urn:uuid:23af0751-28b5-4951-a13e-9870ed1f2acb>', 'WARC-Date': datetime.datetime(2019, 11, 21, 11, 27, 12), 'WARC-IP-Address': '104.25.2.116', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:G46LDTLOR3LPZAW427OEULWDCFQNKZGN', 'WARC-Record-ID': '<urn:uuid:aa5dca47-8733-4145-83d7-2b88d6fe2164>', 'WARC-Target-URI': 'https://matplotlib.org/faq/virtualenv_faq.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f04fd69a-4bf2-47a9-b35e-3bfd5f7403dd>', 'WARC-Truncated': None}", 'previous_word_count': '331', 'url': 'https://matplotlib.org/faq/virtualenv_faq.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-116.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.13314968347549438', 'original_id': '038824c7dbeabb46ab8bcaded0d965fbe8b6b6cc05c345ac8861880194db752c'} |
Fibonacci Poem | NATURE FREED
The number of syllables in each line must equal the sum of the syllables in the two previous lines. So, start with 0 and 1, add them together to get your next number, which is also 1, 2 comes next, then add 2 and 1 to get 3, and so on. Fibonnaci: 0, 1, 1, 2, 3, 5, 8, 13, 21… Poetry: 1 syllable, 1 syllable, 2 syllables, 3 syllables, 5 syllables, 8 syllables, 13 syllables, 21 syllables
Love, natural.
Hate, is wrong,
dislike a possibility,
in a time, when all life is equal, not you and me.
Us, all together, love for each other, ere gender, total harmony, nature freed.
© Mick E Talbot 2017
15 thoughts on “Fibonacci Poem | NATURE FREED”
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '24', 'language_id_whole_page_fasttext': "{'en': 0.6841376423835754}", 'metadata': "{'Content-Length': '110910', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WYSLVYUTTOGELFMKK2L67UASLSKB7KL5', 'WARC-Concurrent-To': '<urn:uuid:b8342bc5-8979-438f-baf9-2c8c3a730887>', 'WARC-Date': datetime.datetime(2017, 8, 19, 13, 13, 43), 'WARC-IP-Address': '192.0.78.13', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4IZ4DUHXOU3OUSKTF2L47BW3PPYKKBHH', 'WARC-Record-ID': '<urn:uuid:5969c4b3-b0d1-465f-aee5-ab17138f7d73>', 'WARC-Target-URI': 'https://mickhispoetry.wordpress.com/2017/07/31/fibonacci-poem-nature-freed/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae512651-72f6-4f27-8077-78cfcf958508>', 'WARC-Truncated': 'length'}", 'previous_word_count': '186', 'url': 'https://mickhispoetry.wordpress.com/2017/07/31/fibonacci-poem-nature-freed/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-224-59.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.047805964946746826', 'original_id': '3946e72f89fd9a5edfe4dcb9fd002bf92916c2f684faeef692481ba74d526b30'} |
Once again, major media outlets picked up on fake news.
News
Anonymous Tip
Living in these uncertain times, it seems that false news stories generated to rack up the clicks disseminate faster than ever before. Some of these fake stories even make it beyond the traditionally susceptible Great Uncle’s Facebook feed and are quickly gobbled up by traffic-hungry publications who are more concerned with riding a wave of sensationalism than earnestly informing the populace. Such a story had its grips on publications across the internet today, and the salacious topic fueling the frenzy was (of course) aliens. Click to View Full Infographic
A video was posted by a self-described member of Anonymous — a loosely associated international “hacktivist” group — who claimed that they had exclusive evidence from NASA saying that we are on the verge of discovering alien life. The person in the Guy Fawkes mask with the digitally-altered voice goes even further, claiming that they’re not just talking about microbial life, “but advanced, space-faring civilizations.”
Real Progress
Unfortunately, the facts just do not measure up to these claims — which were taken out of context from actual hearings. Keeping in mind that NASA is certainly making significant progress in discovering life on other planets, The Washington Post decided to do some actual journalism and reach out to NASA for a quote on the fake news. “While we’re excited about the latest findings from NASA’s Kepler space observatory, there’s no pending announcement regarding Extra-Terrestrial life,” a spokesman for the agency wrote.
One of the quotes pulled for the video was said by NASA’s Thomas Zurbuchen during a congressional hearing back in April (the entire hearing is publicly available). Zurbuchen did indeed state “We are on the verge of making one of the most profound, unprecedented discoveries in history,” — but he was discussing the discovery of possible habitable planets around distant suns, as well as organic chemicals being found on a moon of Saturn.
Futurism will continue to follow all leads regarding the search for life beyond Earth — but we will do so with the full backing of peer reviewed science and not by taking the word of a viral video.
Keep up. Subscribe to our daily newsletter.
I understand and agree that registration on or use of this site constitutes agreement to its User Agreement and Privacy Policy | mini_pile | {'original_id': 'f24761e69f6fd58f2ec630dfa413636576e9d85c83da310807de5f5d992c0dce'} |
Contact me at revmod AT gmail.
Thursday, March 31, 2011
Working backwards
I've been asked to pass judgement on a few more gaffes, some dating back to the opening weekend. Let's get to them:
Stephen Harper has some trouble putting on a pair of gloves. A Google News search for "Stephen Harper work gloves" produces the story I linked, and only that. This, plus a single tweet from one reporter, even repeated by Kinsella, does not a gaffe make. No score.
John McCallum discussed the Liberal plan to roll back the most recent corporate tax cut, acknowledging under direct question that "minor job loss" may occur. He went on to argue that there would be a net job gain as that tax money was redistributed toward the middle class who would create jobs by spending it. One blogging Conservative have tried to make some hay of this through a tightly edited youtube audio post (we can't hear McCallum's follow-up answer? And this is supposed to prove something?), but I refuse to punish candidates for spelling out policy. It was close call, but no points.
Finally, when campaigning in Montreal, Michael Ignatieff messed around with some guy's lute (? I'm going with "lute"), and as he returned it, the lutist (loutist? I'm in pretty deep water here) acknowledged that he'd be voting for Thomas Mulcair, the NDP candidate. That's what you get in a democracy - voters can tell candidates to their faces that they're voting for the other guy. So what? Better that than the sort of super-tight controls a campaign would need to make sure this never happens. No gaffe.
Did I get them all? The score remains unchanged: 3-0-0-0.
Tuesday, March 29, 2011
You people (Cons 3, all others zero)
Mrs. Revmod and I were watching the news on Sunday night when we first heard the "you people" from Harper, speaking in front of an audience of South Asians. And when I say "in front of", what I mean is that every brown face in the room seemed to be sitting behind him, playing the role of wallpaper to his speech. When the broadcast took a wider shot of the room, the crowd facing the other way seemed to be entirely white.
Now, the Tories can make legitimate claims at diversity. I'm sure they're falling short in several ways that opponents could itemize, but they're diverse enough to deflect most criticism. Still, they're making specific efforts, some of them questionable, to appeal to recent immigrants. That's why the "you people" was so tone-deaf.
I wanted to find an escape route for Harper. I wanted to find him using "you people" commonly in non-racial contexts. I wanted to prove to myself that I'm just being lefty-sensitive. I failed. I'm tentatively awarding prom3 x sig1 depending on the legs this story has (so far, to my surprise, none). The scoreboard has to wait until the end of my work day.
The early gaffes
I'll save the obvious one for the next post. Let me start with the reader tips.
Shelly Glover, a Winnipeg Conservative incumbent described a neighbouring 68-year-old Liberal incumbent as "past her expiry date." Cue the (false?) outrage from seniors. But here's the thing - it's clear to me from the context of the comment that she wasn't saying Anita Neville was too old for the job, she was saying Ms Nevelle has been doing it for too long.
Speaking of doing it for too long, I have a precedent for scoring this one. In 2006, Peter McKay told Alexa McDonough to "stick to your knitting." There was much (false) hue and cry about sexism. And McKay issued an apology. I scored it then only because of the apology. That precedent stands. Right now, Glover's campaign has issued a clarification, but not an apology. If she sticks to her guns, no score.
The next reader suggestion notes that the Prime Minister stumbled over the word "election" and mentioned "unnecessary erections" instead. Sorry. No score for Mumbly Joeisms.
Finally, Liberals have produced audio of a Tory candidate claiming his office staff has been helping him "process immigration files or anything else." I'm withholding judgement on this one. Until the candidate or the staff clarify what they've actually been doing, I don't think we can judge if the candidate was overselling what they actually do (giving out phone numbers of the appropriate channels, perhaps), or conversely if the campaign office was overstepping its authority with the active participation of the Minister of Immigration (which is what the Liberals seem to be implying).
So, so far, no score, though two of these might turn into a score yet. But I'm skipping the big one for the next post. You people will just have to wait.
Monday, March 28, 2011
I already have a couple of suggestions for early scores to go up on the big board. Because entries don't close for a couple of hours yet, I'll be deferring any scoring until then. Once entries close, the gaffeometer AT gmail address will serve as an excellent contact point to keep me up-to-date about the latest jackassery. The comments sections serve almost as well, but slower.
Start your error-prone candidates!
Sunday, March 27, 2011
Gaffeometer deadline
Between the weekend writ-drop and the lack of gaffes over this opening weekend, I'm deferring the prediction deadline to Monday midnight. Tell me at gaffeometer AT gmail the scores each party will generate over the campaign for a chance at a donation made to your favourite local candidate. And, no - just because I've excluded the Greens from the gaffeometer doesn't mean you can't make me send money that way. It will taste like acid, but I'll do it. I'm that committed.
I digress. Monday, midnight.
Saturday, March 26, 2011
May 2
Wow - short campaign. It suggests to me that Harper sees some downside potential over the course of the campaign, and not so much upside. I guess when you've spent millions of dollars and a couple of years defining your opponent, you don't want to give very much time for Ignatieff to break out of that box.
The short campaign might explain why everyone seems to have started throwing swings.
Thursday, March 24, 2011
An ounce of prevention
It's becoming obvious from the action in the House of Commons today that the Conservatives will say "It's us, or it's an antidemocratic coalition of socialists and separatists" every time they get in range of a microphone for the next six weeks.
Do you know when would have been a good time to talk about the great tradition of coalition governments in Westminster-style Parliaments? Constantly, and for the last two-and-a-half years. Unfortunately, the opportunity is past, and the argument won't work as well during the campaign, because the Liberals won't admit until the last possible moment that they might do anything other than win overwhelmingly. Nice work, Liberals.
Before it all gets going:
It's not a gaffe, per se, but the NDP may have found the dumbest doorstep issue of all time to treat as a marquee issue: a promise to exempt home heating from the GST.
Let me get this straight: Canada's left-wing party is proposing a tax break which will give the greatest benefit to the rich owners of huge houses and those who are the most wasteful with hydrocarbons. The energy-efficient and those who live more simply will see less, and renters who have baseboard heating rolled into the price of their accommodations will probably see none of the money, because their landlords will pocket it. Genius! It's like the opposite of a carbon tax, because we all know how unpopular that was last election.
Seriously, am I going to have to vote Liberal this time around?
Edited to add: Calgary Grit was on this months ago.
Tuesday, March 22, 2011
Previous final scores:
2006 included six points for the Liberals, earned by Scott Reid. (I believe that prompted the only time I tried to explain the scoring to a media outlet.):
and the remarkably low-gaffe election of 2008:
It's that time again
Unless Canada's punditocracy is wildly off-base (and when has that ever happened?), this week should see the beginning of Gaffe-o-meter 2011, and to a lesser extent, an election campaign. Does everyone remember the rules for scoring?
1) The scoring will begin on the day the writ is dropped for the Federal election - entries will be cut off midnight the next day. Entries will include the predicted total score for each party.
2) Two numbers determine the score - the quality of the gaffe ("sig") and the rank of the gaffemaker ("prom"). Both scales will score on a range from one to three. GaffePoints ("GP") for an individual gaffe will be calculated by multiplying "sig" by "prom". Party scores will accumulate by adding the GPs of each gaffe.
3) Contest entries will be scored by measuring the distance (plus or minus) between the prediction and the score for each party - lowest total difference wins.
4) I am the final and only arbiter of the quality of the gaffe ("sig") and the rank of the gaffemaker ("prom"). Debate, however, is encouraged in the attached comments section - Good or entertaining arguments have made me rethink before.
5) Scoring will close at 0800 MST on the day following election day. SPECIAL PARIZEAU RULE: Scoring will double for gaffes made on election day, including acceptance and concession speeches.
6) For the purpose of the contest, "gaffe" is defined as an unplanned error in fact or judgment. It might be a mistake for the NDP to release a platform paper advocating gender segregation of schools, to the derision of the Canadian electorate, but it's not a "gaffe". On the other hand, if Jack Layton explains the policy by making an aside about high-school boys being distracted by the firm and supple bodies of women in the full bloom of their hot, hot youth, that would be a "gaffe".
The prize: the reader who guesses closest to the actual final result will win a $20 donation to the local candidate of their choice next time around, if only you tell me who that candidate is. I've offers to each of my winners, but I haven't had to issue one donation yet. Third time a charm?
Send your predictions for total gaffe scores, by party, to gaffeometer AT gmail. Meanwhile, I have a graphic to produce. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '11', 'language_id_whole_page_fasttext': "{'en': 0.9649151563644408}", 'metadata': "{'Content-Length': '91591', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NCR5DIS5HWVNWMS3ILGNXVTGMONWE7RB', 'WARC-Concurrent-To': '<urn:uuid:64df0fdb-ed9e-4996-9313-a46fd8dbe852>', 'WARC-Date': datetime.datetime(2019, 6, 16, 3, 37), 'WARC-IP-Address': '172.217.164.129', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:2AL7HFHXZ4DSHSJ2ZQJV3KZQUFYBGDQR', 'WARC-Record-ID': '<urn:uuid:d5b05dc6-a5e5-46ba-a99a-dcb9b680a37c>', 'WARC-Target-URI': 'http://revmod.blogspot.com/2011/03/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:25fdf3f2-f4bf-4582-99aa-287f72fbe3be>', 'WARC-Truncated': None}", 'previous_word_count': '1708', 'url': 'http://revmod.blogspot.com/2011/03/', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-123-210-107.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018725216388702393', 'original_id': 'aa8648815a64c6ea2861be27cd359c13395fda92bb861bf138f266b2ea797a6b'} |
“President Obama’s new EPA rule is more proof that Washington isn’t working for Kentucky,” Grimes said in a statement. “When I’m in the U.S. Senate, I will fiercely oppose the President’s attack on Kentucky’s coal industry because protecting our jobs will be my number one priority.”
Her opposition didn’t stop McConnell for connecting Grimes to the President and fellow Democrats.
“Alison Lundergan Grimes was recruited by President Obama, who said he would ‘bankrupt’ the coal industry, and Harry Reid, who said ‘coal makes us sick.’ And she is being funded by liberals nationwide who know that a vote for her is a vote to ensure further implementation of their anti-coal agenda in the U.S. Senate,” McConnell’s spokeswoman Allison Moore said in a statement.
In West Virginia, which produces the second most coal, Democratic candidate for Senate Natalie Tennant also opposes the new rules.
“I will stand up to President Obama, (EPA Administrator) Gina McCarthy, and anyone else who tries to undermine our coal jobs,” Tennant said in a statement.
West Virginia Rep. Nick Rahall, who is in a tough race to retain his seat, put out a statement announcing that he is introducing legislation to block Obama’s proposal.
The new effort could also play out in Louisiana, where Sen. Mary Landrieu, chairman of the Senate Energy Committee, is in a tough reelection campaign.
Landrieu has been a major defender of fossil fuel-based energy industries as oil, natural gas and some coal are integral to her state’s economy.
She straddled the issue carefully on Monday by saying that carbon emissions should be reduced but with the input of Congress and not through the Environmental Protection Agency.
And giving an olive branch to the powerful energy industry, she also praised it for reducing carbon. She did not praise the President.
“Congress should set the terms, goals and time frame. Greater use of natural gas and stronger efficiency measures adopted by the industry have already helped us reduce carbon emissions to their lowest levels in 20 years,” Landrieu said.
Her Republican opponent, Rep. Bill Cassidy slammed Landrieu. His spokesperson, John Cummins, said she has done little to stop regulations that “tie down Louisiana’s energy economy in an effort to promote a radical climate change agenda.”
In Montana, Democratic Sen. John Walsh’s statement underscores the difficulty of this issue in conservative states. He issued no position, instead saying he “will be listening to Montanans” to determine if the rule is one they can accept.
The issue is likely to come up in races in Pennsylvania, Virginia, Arkansas and Alaska as well. All produce coal but also lean conservative and have constituencies that are turned off by greater government regulation.
But Bill Burton, a former Obama spokesman, said division among Democrats is expected, especially in campaign season.
“You’re going to have instances where Democrats are going to not be perfectly aligned with the President’s message, but that doesn’t mean the President’s policy is not the right one,” he said.
Obama’s fight
Before his administration announced the planned change, Obama held a conference call with members of the House and Senate in an attempt to shore up support and enthusiasm, indicating that this would be a political landmine for some Democrats in tough races.
But addressing the issue of climate change has been at the forefront of his legislative wish list. Up until now, he hasn’t done much, hitting a number of roadblocks along the way.
Since failing to pass cap and trade legislation to limit carbon emissions through the Democratic-led Senate in 2010, Obama has struggled with Congress.
He has been saddled with a struggling economy and several foreign policy crises, effectively putting climate change on the back burner.
Inaction of his own initiative has also limited Obama’s influence on the issue.
He has repeatedly put off a decision to kill or approve the Keystone XL pipeline, which is still unresolved and has upset everyone with a stake or position on the issue.
The appointment of John Podesta as chief of staff earlier this year to revive a struggling White House was also a signal that Obama was going to try again to address environmental pollution.
Podesta, who was chief of staff for former President Bill Clinton, has focused on progressive energy and environmental issues, authoring a book in 2008 that is heavy on the issues.
These proposed rules on power plants are being billed as the most aggressive effort to combat pollution and climate change in decades, and Burton says this is a legacy issue for Obama.
“Nothing has been done on this scale as it relates to combating climate change and it will absolutely be an important part of the President’s legacy,” he said. (Burton also does work for the environmental group the League of Conservation Voters).
Democrats’ plight
Democrats who support the proposal will be backed by billionaire Tom Steyer, who has pledged to financially assist nearly a dozen candidates who support climate change proposals.
Not among those candidates are Democrats who are opposing Obama’s new rule, including Grimes and Landrieu. Arkansas Sen. Mark Pryor and Alaska Sen. Mark Begich, who will not be getting Steyer’s support, had not yet weighed in on Obama’s decision.
He praised the President’s initiative and blamed Congress for not addressing the issue.
“This Congress has failed in its most basic responsibility to protect the health and welfare of the American people from this grave threat,” he said, indicating his support for candidates who will do more to address the issue in the future.
And Burton says Republicans will be the ones to suffer politically for being “saddled by the notion that climate denial is salable in 2014.” | mini_pile | {'original_id': '0a013076a9150ded7315d52424b32dd110fe81a944989fa8fa99d89140be0f07'} |
Happy 50th Birthday to Students’ Free Speech Rights!
Credit: Molly Kaplan/ACLU
By Molly Tack-Hooper, Staff Attorney, ACLU of Pennsylvania
On February 24, 1969—almost exactly 50 years ago—the Supreme Court decided that public school students’ free speech rights don’t disappear when they go to school.
That ruling grew out of John and Mary Beth Tinker’s decision to wear black armbands with peace signs to their public school in Des Moines, Iowa, to protest the war in Vietnam and mourn the dead. Their school had banned the armbands, and punished them for wearing the bands in spite of the ban. John and Mary Beth fought their suspension all the way to the Supreme Court, and won.
The armbands were controversial. One Supreme Court Justice observed that the armbands had led to discussion among students and warnings or ridicule by other students. Mary Beth’s math teacher said his lesson period was “practically wrecked” by debate sparked by the armbands. And they took many students’ minds off school and diverted their attention to the “highly emotional subject of the Vietnam war.”
But the Supreme Court ruled that that was not enough to justify censoring their speech. The Court said:
A student’s rights . . . do not embrace merely the classroom hours. When he is in the cafeteria, or on the playing field, or on the campus during the authorized hours, he may express his opinions, even on controversial subjects like the conflict in Vietnam, if he does so without “materially and substantially interfer[ing] with the requirements of appropriate discipline in the operation of the school” and without colliding with the rights of others.
This was not the first time the Supreme Court stood up for students’ rights. In 1943, the Court ruled that students at public school have a constitutional right not to be forced to salute the flag. The Court explained that the First Amendment means that, even during wartime, public schools can’t force students to participate in symbolic acts of patriotism. The right to free speech also includes the right not to be forced to say things you don’t mean.
But Tinker v. Des Moines was the first time the Supreme Court laid down a broad, general rule to protect students’ rights not just to not be forced to say things they disagree with, but to speak their mind at school. That rule—which became known as the Tinker rule—is that schools can’t punish students for their speech unless the speech causes “substantial, material disruption” of class or other school activities, or the school has specific reasons to expect that it will.
This is a tough test for schools to meet.
The Tinker rule does have some exceptions. The Supreme Court later decided that schools can punish students for swearing or for making sex jokes at school, even if they’re not disrupting anything. And schools can punish students for encouraging the use of illegal drugs (or for nonsense statements that school officials think might be encouraging the use of illegal drugs—just ask Joseph Frederick, who got suspended for ten days for holding a “BONG HITS 4 JESUS!” banner at a parade during school time).
And if there’s some risk that a student’s speech might be confused for something the school said—like when students write articles for a school newspaper—then the school can exercise some extra control over what students say.
But the basic idea that schools can’t censor student speech just because it might be controversial or upsetting to other students is still the law of the land, and important now more than ever.
We’ve relied on the Tinker case to defend middle school students’ right to wear breast cancer awareness bracelets that said “i © boobies! (KEEP A BREAST)” on their school’s Breast Cancer Awareness Day.
We rely on Tinker when we advise students that they have the right to take a knee during the national anthem to protest police brutality and white supremacy, or issue guidance about students’ rights when participating in a walk-out.
And courts have cited the Tinker case in rulings protecting students when schools exceed their authority and try to punish students for what they say on their own time on social media.
For example, in 2013, the federal appeals court that covers Pennsylvania, New Jersey, and Delaware cited the Tinker case in ruling that schools can’t punish students for making satirical social media profiles about school administrators. This is true, the court ruled, even if the profiles use the kind of bad language and sexual innuendo that students could be punished for using in school. And even if the profiles are really offensive and hurtful. And even if they make their way into the school, and other students talk about them at school.
And we’ve cited Tinker in our lawsuit to get a cheerleader restored to her cheerleading squad after she was kicked off because she used profanity and criticized cheerleading in a Snapchat post that she shared with her friends on the weekend, when she was not participating in cheerleading.
At age 50, Tinker v. Des Moines is still the cornerstone on which students’ free speech rights are built and will continue to be built.
Let’s hope it outlasts us all. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '58', 'language_id_whole_page_fasttext': "{'en': 0.9644039273262024}", 'metadata': "{'Content-Length': '29147', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JTKN6OP62ZMXYZ56JXVLUOBKQY2CYWOJ', 'WARC-Concurrent-To': '<urn:uuid:d7284693-bca4-4074-9fe8-babc53b475e7>', 'WARC-Date': datetime.datetime(2019, 3, 27, 0, 52, 14), 'WARC-IP-Address': '23.239.25.194', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7EMRS6ZRDPE7XQLKIX4WCD3B5QWB6XCE', 'WARC-Record-ID': '<urn:uuid:4cdf0393-ad9f-41f5-bf67-761b52303bbe>', 'WARC-Target-URI': 'https://blog.aclupa.org/2019/02/22/happy-50th-birthday-to-students-free-speech-rights/?shared=email&msg=fail', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ee0540c4-01a1-4558-bcfa-1099621d4c8c>', 'WARC-Truncated': None}", 'previous_word_count': '854', 'url': 'https://blog.aclupa.org/2019/02/22/happy-50th-birthday-to-students-free-speech-rights/?shared=email&msg=fail', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-155-175-115.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03493613004684448', 'original_id': 'b549f6db296123b61e0d23e5f42d0ed2103caec344cb623f6d699361b725cba5'} |
Log in to watch free streaming video,
post in the forums, peep behind the
scenes exclusives, and so much more!
The Movie - Blu-ray/DVD Combo
Trailer | R
Show Details
Clandestine army activities threaten the war-torn city of Neo-Tokyo when a mysterious being with powerful psychic abilities escapes his prison and inadvertently draws a violent motorcycle gang into a heinous web of experimentation. As a result, a biker with a twisted mind embarks on a path of war, seeking revenge against a society that once called him weak.
This 25th Anniversary Edition features both the original 1988 Streamline English dub and the 2001 Pioneer/Animaze English dub!
Official Site: www.funimation.com/shows/akira/anime
Hide Details | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '41', 'language_id_whole_page_fasttext': "{'en': 0.8782456517219543}", 'metadata': "{'Content-Length': '41296', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JCI2MJXV3LHPY7WWF3YZRSGASCPP5LUA', 'WARC-Concurrent-To': '<urn:uuid:db63c352-3e67-4f89-adca-1b467b314d96>', 'WARC-Date': datetime.datetime(2013, 12, 13, 14, 13, 36), 'WARC-IP-Address': '190.93.241.213', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ZJJQ3M44TOLLSTHYKQJSBA7TXZS72SY5', 'WARC-Record-ID': '<urn:uuid:3696311e-591d-4181-8fda-5d3dad57f3ee>', 'WARC-Target-URI': 'http://www.funimation.com/shows/akira/videos/promotional/the-movie-blu-ray-dvd-combo/anime', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:92b42a04-19bd-4b0f-9501-968e088bcec4>', 'WARC-Truncated': 'length'}", 'previous_word_count': '110', 'url': 'http://www.funimation.com/shows/akira/videos/promotional/the-movie-blu-ray-dvd-combo/anime', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018966615200042725', 'original_id': 'd459fda93e1a4329f1653be1183ea2cd491a1eef31e65323a938dbad31687649'} |
<!DOCTYPE html>
<html>
<head>
<meta charset=utf-8>
<title>8 nips-2011-A Model for Temporal Dependencies in Event Streams</title>
</head>
<body>
<p><a title="nips" href="../nips_home.html">nips</a> <a title="nips-2011" href="../home/nips2011_home.html">nips2011</a> <a title="nips-2011-8" href="#">nips2011-8</a> knowledge-graph by maker-knowledge-mining</p><script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- maker adsense -->
<ins class="adsbygoogle"
style="display:inline-block;width:728px;height:90px"
data-ad-client="ca-pub-5027806277543591"
data-ad-slot="4192012269"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>
<h1>8 nips-2011-A Model for Temporal Dependencies in Event Streams</h1>
<br/><p>Source: <a title="nips-2011-8-pdf" href="http://papers.nips.cc/paper/4395-a-model-for-temporal-dependencies-in-event-streams.pdf">pdf</a></p><p>Author: Asela Gunawardana, Christopher Meek, Puyang Xu</p><p>Abstract: We introduce the Piecewise-Constant Conditional Intensity Model, a model for learning temporal dependencies in event streams. We describe a closed-form Bayesian approach to learning these models, and describe an importance sampling algorithm for forecasting future events using these models, using a proposal distribution based on Poisson superposition. We then use synthetic data, supercomputer event logs, and web search query logs to illustrate that our learning algorithm can efficiently learn nonlinear temporal dependencies, and that our importance sampling algorithm can effectively forecast future events. 1</p><p>Reference: <a title="nips-2011-8-reference" href="../nips2011_reference/nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams_reference.html">text</a></p><br/><h2>Summary: the most important sentenses genereted by tfidf model</h2><p>sentIndex sentText sentNum sentScore</p><p>1 edu Abstract We introduce the Piecewise-Constant Conditional Intensity Model, a model for learning temporal dependencies in event streams. [sent-5, score-0.422]
</p><p>2 We describe a closed-form Bayesian approach to learning these models, and describe an importance sampling algorithm for forecasting future events using these models, using a proposal distribution based on Poisson superposition. [sent-6, score-0.547]
</p><p>3 We then use synthetic data, supercomputer event logs, and web search query logs to illustrate that our learning algorithm can efficiently learn nonlinear temporal dependencies, and that our importance sampling algorithm can effectively forecast future events. [sent-7, score-0.872]
</p><p>4 1 Introduction The problem of modeling temporal dependencies in temporal streams of discrete events arises in a wide variety of applications. [sent-8, score-0.504]
</p><p>5 For example, system error logs [14], web search query logs, the firing patterns of neurons [18] and gene expression data [8], can all be viewed as streams of events over time. [sent-9, score-0.441]
</p><p>6 , the web query issued or the type of error logged), and the dependencies between events can be due to both their timing and their types. [sent-12, score-0.36]
</p><p>7 Modeling these dependencies is valuable for forecasting future events in applications such as system failure prediction for preemptive maintenance or forecasting web users’ future interests for targeted advertising. [sent-13, score-0.829]
</p><p>8 This model captures the dependencies of each type of event on events in the past through a set of piecewise-constant conditional intensity functions. [sent-15, score-0.736]
</p><p>9 We use decision trees to represent these dependencies and give a conjugate prior for this model, allowing for closed-form computation of the marginal likelihood and parameter posteriors. [sent-16, score-0.349]
</p><p>10 Forecasting can be carried out using forward sampling for arbitrary finite duration queries. [sent-19, score-0.183]
</p><p>11 For episodic sequence queries, that is, queries that specify particular sequences of events in given future time intervals, we develop a novel approach for estimating the probability of rare queries, which we call the Poisson Superposition Importance Sampler (PSIS). [sent-20, score-0.516]
</p><p>12 Using synthetic data we show that PCIMs can correctly learn the underlying dependency structure of event streams, and that the PSIS leads to effective forecasting. [sent-22, score-0.243]
</p><p>13 We then use real supercomputer event log data to show that PCIMs can be learned more than an order of magnitude faster than Poisson Networks [15, 18], and that they have better test set likelihood. [sent-23, score-0.357]
</p><p>14 Finally, we show that PCIMs and the PSIS are useful in forecasting future interests of real web search users. [sent-24, score-0.386]
</p><p>15 1 2 Related Work While graphical models such as Bayesian networks [2] and dependency networks [10] are widely used to model the dependencies between variables, they do not model temporal dependencies (see e. [sent-25, score-0.389]
</p><p>16 Dynamic Bayesian Networks (DBN) [5, 9] allow modeling of temporal dependencies in discrete time. [sent-28, score-0.212]
</p><p>17 In addition, allowing long term dependencies requires conditioning on multiple steps into the past, and choosing too fast a sampling rate increases the number of such steps that need to be conditioned on. [sent-31, score-0.183]
</p><p>18 CTBNs are homogeneous Markov models of the joint trajectories of discrete finite variables, rather than models of event streams in continuous time [15]. [sent-33, score-0.38]
</p><p>19 In contrast, CT-NOR and Poisson Cascades model event streams, but require the modeler to choose a parametric form for temporal dependencies. [sent-34, score-0.308]
</p><p>20 PCIMs, in contrast to CT-NOR and Poisson Cascades, perform structure learning to learn how different events in the past affect future events. [sent-37, score-0.187]
</p><p>21 An event is then comn posed of a non-negative time-stamp t and a label l. [sent-41, score-0.294]
</p><p>22 An event sequence x = {(ti , li )}i=1 where 0 < t1 < · · · < tn . [sent-42, score-0.353]
</p><p>23 The history at time t of event sequence x is the sub-sequence h(t, x) = {(ti , li ) | (ti , li ) ∈ x, ti ≤ t}. [sent-43, score-0.638]
</p><p>24 We define the ending time t(x) of an event sequence x as the time of the last event in x: t(x) = max ({t : (t, l) ∈ x}) so that t(hi ) = ti−1 . [sent-46, score-0.53]
</p><p>25 A Conditional Intensity Model (CIM) is a set of non-negative conditional intensity functions indexed by label {λl (t|x; θ)}l∈L . [sent-47, score-0.299]
</p><p>26 The data likelihood for this model is n λl (ti |hi , θ)1l (li ) e−Λl (ti |hi ;θ) p(x|θ) = (1) l∈L i=1 t where Λl (t|x; θ) = −∞ λl (τ |x; θ)dτ for each event sequence x and the indicator function 1l (l ) is one if l = l and zero otherwise. [sent-48, score-0.335]
</p><p>27 The conditional intensities are assumed to satisfy λl (t|x; θ) = 0 for t ≤ t(x) to ensure that ti > ti−1 = t(hi ). [sent-49, score-0.246]
</p><p>28 Despite the fact that the modeling assumptions are weak, these models offer a powerful approach for decomposing the dependencies of different event types on the past. [sent-53, score-0.39]
</p><p>29 1 Piecewise-Constant Conditional Intensity Models Piecewise-Constant Conditional Intensity Models (PCIMs) are Conditional Intensity Models where the conditional intensity functions are assumed to be piecewise-constant. [sent-56, score-0.248]
</p><p>30 PCIMs are defined in terms of local structures Sl for each label l, which specify regions in time where the corresponding conditional intensity function is constant, and local parameters θl for each label which specify the values taken in those regions. [sent-58, score-0.377]
</p><p>31 The conditional intensity functions are defined as λl (t|x) = λls with s = σl (t, x), and thus are piecewise constant. [sent-60, score-0.28]
</p><p>32 The resulting data likelihood can be written as c (x) −λls dls (x) ls λls p(x|S, θ) = e (2) l∈L s∈Σl where S = {Sl }l∈L , θ = {θl }l∈L , cls (x) is the number of times label l occurs in x when the state function for l maps to state s (i. [sent-61, score-0.845]
</p><p>33 , i 1l (li ) 1s (σl (ti , hi ))), and dls (x) is the total duration during t(x) which the state function for l maps to state s in the data x (i. [sent-63, score-0.308]
</p><p>34 The conditional intensity for l is given by the regression λl (t|x, θ) = ewl ·σl (t,x) with parameter wl . [sent-70, score-0.223]
</p><p>35 2 βls αls Γ(αls + cls (x)) Γ(αls ) (βls + dls (x))αls +cls (x) αls +cls (x) βls +dls (x) which is E [λls | x]. [sent-85, score-0.18]
</p><p>36 Structure Learning with Decision Trees In this section, we specify the set of possible structures in terms of a set of basis state functions, a set of decision trees built from them, and a greedy Bayesian model selection procedure for learning a structure. [sent-86, score-0.22]
</p><p>37 We use B to denote the set of basis state functions f (t, x), each taking values in a basis state set Σf . [sent-88, score-0.253]
</p><p>38 The state function σl (t, x) is computed by recursively applying the basis state functions in the tree until a leaf is reached. [sent-91, score-0.19]
</p><p>39 We begin with Sl being the trivial decision tree that maps all event sequences and times to the root. [sent-96, score-0.379]
</p><p>40 In our experiments, we wish to learn how events depend on the timing and type of prior events. [sent-103, score-0.2]
</p><p>41 In particular, we use binary basis state functions fl ,d1 ,d2 ,τ indexed by a label l ∈ L, two time offsets 0 ≤ d1 < d2 and a threshold τ > 0. [sent-105, score-0.19]
</p><p>42 Such a f encodes whether or not the event sequence x contains at least τ events with label l with timestamps in the window [t − d2 , t − d1 ). [sent-106, score-0.503]
</p><p>43 Examples of decision trees that use such basis state functions are shown in Figure 1. [sent-107, score-0.219]
</p><p>44 5 Forecasting In this section, we describe how to use PCIMs to forecast whether a sequence of target labels will occur in a given order and in given time intervals. [sent-108, score-0.179]
</p><p>45 We call such a sequence and set of associated intervals an k ∗ ∗ episodic sequence and denote it by e = lj , [a∗ , b∗ ) j=1 . [sent-110, score-0.307]
</p><p>46 j j j j We say that the episodic sequence e occurs in an event sequence x if ∃i1 < · · · < ik : (tij , lij ) ∈ ∗ x, lij = lj , tij ∈ [a∗ , b∗ ). [sent-112, score-0.687]
</p><p>47 The set of event sequences x in which e occurs is denoted Xe . [sent-113, score-0.372]
</p><p>48 j j Given an event sequence h and a time t∗ ≥ t(h), we term any event sequence x whose history up to t∗ agrees with h (i. [sent-114, score-0.605]
</p><p>49 Our forecasting problem is, given at observed sequence h at time t∗ ≥ t(h), to compute the probability that e occurs in extensions of h from t∗ . [sent-117, score-0.321]
</p><p>50 We therefore give Monte Carlo estimates for p(Xe |h, t∗ ), first describing a forward sampling procedure for forecasting episodic sequences (also applicable to other forecasting problems), and then introducing an importance sampling scheme specifically designed for forecasting episodic sequences. [sent-120, score-1.263]
</p><p>51 1 Forward Sampling The probability of an episodic sequence can be estimated using a forward sampling approach by sampling M extensions {x(m) }M of h from t∗ and using the estimate pFwd (Xe |h, t∗ ; M ) = ˆ m=1 M 1 1Xe (x(m) ). [sent-122, score-0.43]
</p><p>52 Forward k sampling consists of iteratively obtaining a sample sequence xi of length i by sampling (ti , li ) and appending to a prior sampled sequence xi−1 of length i − 1. [sent-128, score-0.329]
</p><p>53 The CIM likelihood (Equation 1) of n an arbitrary event sequence x can be written as i=1 p(ti , li |hi ; θ). [sent-129, score-0.401]
</p><p>54 The finite extension up to b∗ is obtained by terminating when ti > b∗ and rejecting ti . [sent-132, score-0.376]
</p><p>55 A more detailed description of sampling tl from a piecewise constant i conditional intensities is given in [15]. [sent-134, score-0.196]
</p><p>56 2 Importance Sampling When using a forward sampling approach to forecast unlikely episodic sequences, the episodes of interest will not occur in most of the sampled extensions and our estimate of p(Xe |h, t∗ ) will be noisy. [sent-137, score-0.419]
</p><p>57 In fact, due to the fact that absolute error in pFwd falls as the square root of the numˆ ber of sequences sampled, we would need O(1/p(Xe |h, t∗ )2 ) sample sequences to get non-trivial lower bounds on p(Xe |h, t∗ ) using a forward sampling approach. [sent-138, score-0.339]
</p><p>58 To mitigate this problem we develop an importance sampling approach, where sequences are drawn from a proposal distribution q(·) that has an increased likelihood of generating extensions in which Xe occurs, and then uses a weighted empirical estimate. [sent-139, score-0.356]
</p><p>59 j(x) 0 otherwise, where the active episode j(x) is 0 if t(x) ≥ bj (x), j = 1, · · · , k and is min ({j : bj (x) > t(x)}) otherwise. [sent-142, score-0.213]
</p><p>60 The time bj (x) when the j th episode ceases to be active is the time at which the j th episode occurs in x, or b∗ if it does not occur. [sent-143, score-0.209]
</p><p>61 If the episodic intervals [a∗ , b∗ ) do not overlap, j j j aj (x) = a∗ . [sent-144, score-0.211]
</p><p>62 In general aj (x) and bj (x) are given by the recursion j aj (x) = max {a∗ , bj−1 (x)} j ∗ bj (x) = min {b∗ } ∪ {(ti , li ) ∈ x : li = lj , ti ∈ [aj (x), b∗ )} . [sent-145, score-0.744]
</p><p>63 As the proposal distribution is also a CIM, importance sampling can be done using the forward sampling procedure above. [sent-147, score-0.343]
</p><p>64 In practice the computation of j(x), aj (x), and bj (x) can be l done during forward sampling. [sent-149, score-0.255]
</p><p>65 The importance weight corresponding to our proposal distribution is k w(x) = exp j=1 bj (x) − aj (x) b∗ − aj (x) j ∗ λlj (ti |xi ) (ti ,li )∈x: ∗ ti =bj (x),li =lj 5 ∗ λlj (ti |xi ) + 1 b∗ −aj (x) j . [sent-150, score-0.554]
</p><p>66 6 Experimental Results We first validate that PCIMs can learn temporal dependencies and that the PSIS gives faster forecasting than forward sampling using a synthetic data set. [sent-155, score-0.544]
</p><p>67 Finally we show that PCIMs and the PSIS allow the forecasting future interests of web search users using real log data from a major commercial search engine. [sent-157, score-0.467]
</p><p>68 1 Validation on Synthetic Data In order to evaluate the ability of PCIMs to learn nonlinear temporal dependencies we sampled data from a known model and verified that the dependencies learned were correct. [sent-159, score-0.293]
</p><p>69 002 C in [t-1,t) yes no B in [t-2,t-1) yes λ=0. [sent-166, score-0.188]
</p><p>70 We used basis state functions that tested for the presence of each label in windows with boundaries at t − 0, 1, 2, · · · , 10, and +∞ time units. [sent-176, score-0.19]
</p><p>71 We evaluated the PSIS in forecasting event sequences with the model shown in Figure 1. [sent-184, score-0.542]
</p><p>72 The convergence of importance sampling is compared with that of forward sampling in Figure 2. [sent-185, score-0.29]
</p><p>73 We give results for forecasting three different episodic sequences, consisting of the label sequences {C}, {C, B}, and {C, B, A}, all in the interval [0, 1], given an empty history. [sent-186, score-0.479]
</p><p>74 We show how estimates of the probabilities of given episodic sequences vary as a function of the number of sequences sampled, giving the mean and variance of the trajectories of the estimates computed over ten runs. [sent-188, score-0.311]
</p><p>75 Since exact inference is infeasible for this model, we forward sample 4,000,000 event sequences and display this estimate. [sent-190, score-0.422]
</p><p>76 The solid line shows pFwd based on 4 million event sequences. [sent-194, score-0.243]
</p><p>77 This further suggests the need for importance sampling for rare label sequences. [sent-197, score-0.184]
</p><p>78 2 Modeling Supercomputer Event Logs We compared PCIM and Poisson Nets on the task of modeling system event logs from the BlueGene/L supercomputer at Lawrence Livermore National Laboratory [14], available at the USENIX Computer Failure Data Repository. [sent-199, score-0.489]
</p><p>79 We filtered out informational (non-alert) messages from the logs, and randomly split the events by node into a training set with 311,060 alerts from 21,962 nodes, and a test set with 68,502 alerts from 9,412 nodes. [sent-200, score-0.188]
</p><p>80 Both models used priors with a mean rate of an event every 100 days, no dependencies, and an equivalent sample size of one second. [sent-205, score-0.243]
</p><p>81 8 Training Time 11 min 3 hr 33 min Table 1: A comparison of the PCIM and Poisson Net in modeling supercomputer event logs. [sent-212, score-0.39]
</p><p>82 3 Forecasting Future Interests of Web Search Users We used the query logs of a major internet search engine to investigate the use of PCIMs in forecasting the future interests of web search users. [sent-216, score-0.547]
</p><p>83 ” Our training set contains event sequences for approximately 23k users consisting of about 385k timestamped labels recorded over a two month period. [sent-219, score-0.453]
</p><p>84 The test set contains event sequences for approximately 11k users of about 160k timestamped labels recorded over the next month. [sent-220, score-0.453]
</p><p>85 We trained a PCIM on the training data using window boundaries at t − 1 hour, t − 1 day, and t − 1 week, and basis state functions that tested for the presence of one or more instance of each label in each window, treating users as i. [sent-221, score-0.239]
</p><p>86 The prior had a mean rate of an event every year, an equivalent sample size of one day. [sent-224, score-0.28]
</p><p>87 7 Figure 3: Precision-recall curves for forecasting future Health & Wellness queries using a full PCIM, a restricted PCIM that conditions only on past Health & Wellness queries, a baseline that takes into account only past Health & Wellness queries and not their timing, and random guessing. [sent-229, score-0.453]
</p><p>88 Given the first week of each test user’s event sequence, we forecasted whether they would issue a query in a chosen target category in the second week. [sent-230, score-0.348]
</p><p>89 Also shown is the result for restricted PCIMs that only model dependencies on prior occurrences of the target category. [sent-233, score-0.207]
</p><p>90 This is compared to a baseline where the conditional intensity depends only on whether the target label appeared in the history. [sent-234, score-0.3]
</p><p>91 This shows that modeling the temporal aspect of dependencies does provide a large improvement. [sent-235, score-0.212]
</p><p>92 Modeling dependencies on past occurrences of other labels also provides an improvement in the right-hand region of the precision-recall curve. [sent-236, score-0.215]
</p><p>93 As Figure 3 suggests (but doesn’t show), the PCIM can model crosslabel dependencies to forecast the first occurrence of the target label. [sent-238, score-0.212]
</p><p>94 7 Discussion We presented the Piecewise-Constant Conditional Intensity Model, which is a model of temporal dependencies in continuous time event streams. [sent-241, score-0.454]
</p><p>95 For example, basis state functions could encode the most recent events that have occurred in the history rather than the events that occurred in windows of interest. [sent-249, score-0.414]
</p><p>96 We also presented the Poisson Superposition Importance Sampler for forecasting episodic sequences with PCIMs. [sent-252, score-0.428]
</p><p>97 Developing forecasting algorithms for more general queries is of interest. [sent-253, score-0.281]
</p><p>98 Finally, we demonstrated the value of PCIMs in modeling the temporal behavior of web search users and of supercomputer nodes. [sent-254, score-0.346]
</p><p>99 In many applications, we have access to richer event streams such as spatio-temporal event streams and event streams with structured labels. [sent-255, score-1.044]
</p><p>100 It would be interesting to extend PCIMs to handle such rich event streams. [sent-256, score-0.243]
</p>
<br/>
<h2>similar papers computed by tfidf model</h2><h3>tfidf for this paper:</h3><p>wordName wordTfidf (topN-words)</p>
<p>[('ls', 0.426), ('pcims', 0.375), ('pcim', 0.261), ('event', 0.243), ('forecasting', 0.208), ('xe', 0.198), ('ti', 0.188), ('poisson', 0.17), ('intensity', 0.165), ('psis', 0.13), ('sl', 0.129), ('episodic', 0.129), ('events', 0.122), ('supercomputer', 0.114), ('dependencies', 0.114), ('streams', 0.105), ('logs', 0.099), ('hi', 0.098), ('cls', 0.098), ('pfwd', 0.098), ('yes', 0.094), ('sequences', 0.091), ('lj', 0.09), ('forward', 0.088), ('bj', 0.085), ('aj', 0.082), ('dls', 0.082), ('queries', 0.073), ('forecast', 0.072), ('sampling', 0.069), ('li', 0.066), ('cascades', 0.066), ('cim', 0.065), ('temporal', 0.065), ('importance', 0.064), ('basis', 0.063), ('interests', 0.062), ('conditional', 0.058), ('web', 0.053), ('proposal', 0.053), ('label', 0.051), ('state', 0.051), ('week', 0.049), ('users', 0.049), ('meek', 0.049), ('pimp', 0.049), ('simma', 0.049), ('uri', 0.049), ('wellness', 0.049), ('networks', 0.048), ('likelihood', 0.048), ('decision', 0.045), ('sequence', 0.044), ('episode', 0.043), ('timestamps', 0.043), ('timing', 0.041), ('uai', 0.041), ('superposition', 0.04), ('marginal', 0.039), ('occurs', 0.038), ('labels', 0.037), ('risks', 0.037), ('tl', 0.037), ('health', 0.037), ('prior', 0.037), ('trees', 0.035), ('past', 0.034), ('bayesian', 0.034), ('modeling', 0.033), ('aleksandr', 0.033), ('alerts', 0.033), ('ctbns', 0.033), ('lij', 0.033), ('nodelman', 0.033), ('tij', 0.033), ('timestamped', 0.033), ('search', 0.032), ('piecewise', 0.032), ('continuous', 0.032), ('conjugate', 0.031), ('extensions', 0.031), ('history', 0.031), ('future', 0.031), ('query', 0.03), ('christian', 0.03), ('episodes', 0.03), ('occurrences', 0.03), ('lsm', 0.029), ('redmond', 0.029), ('shelton', 0.029), ('sampler', 0.028), ('microsoft', 0.027), ('chickering', 0.026), ('heckerman', 0.026), ('maxwell', 0.026), ('target', 0.026), ('specify', 0.026), ('duration', 0.026), ('net', 0.025), ('functions', 0.025)]</p>
<h3>similar papers list:</h3><p>simIndex simValue paperId paperTitle</p>
<p>same-paper 1 1.0 <a title="8-tfidf-1" href="./nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html">8 nips-2011-A Model for Temporal Dependencies in Event Streams</a></p>
<p>Author: Asela Gunawardana, Christopher Meek, Puyang Xu</p><p>Abstract: We introduce the Piecewise-Constant Conditional Intensity Model, a model for learning temporal dependencies in event streams. We describe a closed-form Bayesian approach to learning these models, and describe an importance sampling algorithm for forecasting future events using these models, using a proposal distribution based on Poisson superposition. We then use synthetic data, supercomputer event logs, and web search query logs to illustrate that our learning algorithm can efficiently learn nonlinear temporal dependencies, and that our importance sampling algorithm can effectively forecast future events. 1</p><p>2 0.12113745 <a title="8-tfidf-2" href="./nips-2011-Gaussian_process_modulated_renewal_processes.html">101 nips-2011-Gaussian process modulated renewal processes</a></p>
<p>Author: Yee W. Teh, Vinayak Rao</p><p>Abstract: Renewal processes are generalizations of the Poisson process on the real line whose intervals are drawn i.i.d. from some distribution. Modulated renewal processes allow these interevent distributions to vary with time, allowing the introduction of nonstationarity. In this work, we take a nonparametric Bayesian approach, modelling this nonstationarity with a Gaussian process. Our approach is based on the idea of uniformization, which allows us to draw exact samples from an otherwise intractable distribution. We develop a novel and efficient MCMC sampler for posterior inference. In our experiments, we test these on a number of synthetic and real datasets. 1</p><p>3 0.10458764 <a title="8-tfidf-3" href="./nips-2011-Learning_with_the_weighted_trace-norm_under_arbitrary_sampling_distributions.html">159 nips-2011-Learning with the weighted trace-norm under arbitrary sampling distributions</a></p>
<p>Author: Rina Foygel, Ohad Shamir, Nati Srebro, Ruslan Salakhutdinov</p><p>Abstract: We provide rigorous guarantees on learning with the weighted trace-norm under arbitrary sampling distributions. We show that the standard weighted-trace norm might fail when the sampling distribution is not a product distribution (i.e. when row and column indexes are not selected independently), present a corrected variant for which we establish strong learning guarantees, and demonstrate that it works better in practice. We provide guarantees when weighting by either the true or empirical sampling distribution, and suggest that even if the true distribution is known (or is uniform), weighting by the empirical distribution may be beneficial. 1</p><p>4 0.099093325 <a title="8-tfidf-4" href="./nips-2011-Optimal_Reinforcement_Learning_for_Gaussian_Systems.html">206 nips-2011-Optimal Reinforcement Learning for Gaussian Systems</a></p>
<p>Author: Philipp Hennig</p><p>Abstract: The exploration-exploitation trade-off is among the central challenges of reinforcement learning. The optimal Bayesian solution is intractable in general. This paper studies to what extent analytic statements about optimal learning are possible if all beliefs are Gaussian processes. A first order approximation of learning of both loss and dynamics, for nonlinear, time-varying systems in continuous time and space, subject to a relatively weak restriction on the dynamics, is described by an infinite-dimensional partial differential equation. An approximate finitedimensional projection gives an impression for how this result may be helpful. 1 Introduction – Optimal Reinforcement Learning Reinforcement learning is about doing two things at once: Optimizing a function while learning about it. These two objectives must be balanced: Ignorance precludes efficient optimization; time spent hunting after irrelevant knowledge incurs unnecessary loss. This dilemma is famously known as the exploration exploitation trade-off. Classic reinforcement learning often considers time cheap; the trade-off then plays a subordinate role to the desire for learning a “correct” model or policy. Many classic reinforcement learning algorithms thus rely on ad-hoc methods to control exploration, such as “ -greedy” [1], or “Thompson sampling” [2]. However, at least since a thesis by Duff [3] it has been known that Bayesian inference allows optimal balance between exploration and exploitation. It requires integration over every possible future trajectory under the current belief about the system’s dynamics, all possible new data acquired along those trajectories, and their effect on decisions taken along the way. This amounts to optimization and integration over a tree, of exponential cost in the size of the state space [4]. The situation is particularly dire for continuous space-times, where both depth and branching factor of the “tree” are uncountably infinite. Several authors have proposed approximating this lookahead through samples [5, 6, 7, 8], or ad-hoc estimators that can be shown to be in some sense close to the Bayes-optimal policy [9]. In a parallel development, recent work by Todorov [10], Kappen [11] and others introduced an idea to reinforcement learning long commonplace in other areas of machine learning: Structural assumptions, while restrictive, can greatly simplify inference problems. In particular, a recent paper by Simpkins et al. [12] showed that it is actually possible to solve the exploration exploitation trade-off locally, by constructing a linear approximation using a Kalman filter. Simpkins and colleagues further assumed to know the loss function, and the dynamics up to Brownian drift. Here, I use their work as inspiration for a study of general optimal reinforcement learning of dynamics and loss functions of an unknown, nonlinear, time-varying system (note that most reinforcement learning algorithms are restricted to time-invariant systems). The core assumption is that all uncertain variables are known up to Gaussian process uncertainty. The main result is a first-order description of optimal reinforcement learning in form of infinite-dimensional differential statements. This kind of description opens up new approaches to reinforcement learning. As an only initial example of such treatments, Section 4 1 presents an approximate Ansatz that affords an explicit reinforcement learning algorithm; tested in some simple but instructive experiments (Section 5). An intuitive description of the paper’s results is this: From prior and corresponding choice of learning machinery (Section 2), we construct statements about the dynamics of the learning process (Section 3). The learning machine itself provides a probabilistic description of the dynamics of the physical system. Combining both dynamics yields a joint system, which we aim to control optimally. Doing so amounts to simultaneously controlling exploration (controlling the learning system) and exploitation (controlling the physical system). Because large parts of the analysis rely on concepts from optimal control theory, this paper will use notation from that field. Readers more familiar with the reinforcement learning literature may wish to mentally replace coordinates x with states s, controls u with actions a, dynamics with transitions p(s | s, a) and utilities q with losses (negative rewards) −r. The latter is potentially confusing, so note that optimal control in this paper will attempt to minimize values, rather than to maximize them, as usual in reinforcement learning (these two descriptions are, of course, equivalent). 2 A Class of Learning Problems We consider the task of optimally controlling an uncertain system whose states s ≡ (x, t) ∈ K ≡ RD ×R lie in a D +1 dimensional Euclidean phase space-time: A cost Q (cumulated loss) is acquired at (x, t) with rate dQ/dt = q(x, t), and the first inference problem is to learn this analytic function q. A second, independent learning problem concerns the dynamics of the system. We assume the dynamics separate into free and controlled terms affine to the control: dx(t) = [f (x, t) + g(x, t)u(x, t)] dt (1) where u(x, t) is the control function we seek to optimize, and f, g are analytic functions. To simplify our analysis, we will assume that either f or g are known, while the other may be uncertain (or, alternatively, that it is possible to obtain independent samples from both functions). See Section 3 for a note on how this assumption may be relaxed. W.l.o.g., let f be uncertain and g known. Information about both q(x, t) and f (x, t) = [f1 , . . . , fD ] is acquired stochastically: A Poisson process of constant rate λ produces mutually independent samples yq (x, t) = q(x, t)+ q and yf d (x, t) = fd (x, t)+ fd where q 2 ∼ N (0, σq ); fd 2 ∼ N (0, σf d ). (2) The noise levels σq and σf are presumed known. Let our initial beliefs about q and f be given by D Gaussian processes GP kq (q; µq , Σq ); and independent Gaussian processes d GP kf d (fd ; µf d , Σf d ), respectively, with kernels kr , kf 1 , . . . , kf D over K, and mean / covariance functions µ / Σ. In other words, samples over the belief can be drawn using an infinite vector Ω of i.i.d. Gaussian variables, as 1/2 ˜ fd ([x, t]) = µf d ([x, t])+ 1/2 Σf d ([x, t], [x , t ])Ω(x , t )dx dt = µf d ([x, t])+(Σf d Ω)([x, t]) (3) the second equation demonstrates a compact notation for inner products that will be used throughout. It is important to note that f, q are unknown, but deterministic. At any point during learning, we can use the same samples Ω to describe uncertainty, while µ, Σ change during the learning process. To ensure continuous trajectories, we also need to regularize the control. Following control custom, 1 we introduce a quadratic control cost ρ(u) = 2 u R−1 u with control cost scaling matrix R. Its units [R] = [x/t]/[Q/x] relate the cost of changing location to the utility gained by doing so. The overall task is to find the optimal discounted horizon value ∞ v(x, t) = min u t 1 e−(τ −t)/γ q[χ[τ, u(χ, τ )], τ ] + u(χ, τ ) R−1 u(χ, τ ) dτ 2 (4) where χ(τ, u) is the trajectory generated by the dynamics defined in Equation (1), using the control law (policy) u(x, t). The exponential definition of the discount γ > 0 gives the unit of time to γ. Before beginning the analysis, consider the relative generality of this definition: We allow for a continuous phase space. Both loss and dynamics may be uncertain, of rather general nonlinear form, and may change over time. The specific choice of a Poisson process for the generation of samples is 2 somewhat ad-hoc, but some measure is required to quantify the flow of information through time. The Poisson process is in some sense the simplest such measure, assigning uniform probability density. An alternative is to assume that datapoints are acquired at regular intervals of width λ. This results in a quite similar model but, since the system’s dynamics still proceed in continuous time, can complicate notation. A downside is that we had to restrict the form of the dynamics. However, Eq. (1) still covers numerous physical systems studied in control, for example many mechanical systems, from classics like cart-and-pole to realistic models for helicopters [13]. 3 Optimal Control for the Learning Process The optimal solution to the exploration exploitation trade-off is formed by the dual control [14] of a joint representation of the physical system and the beliefs over it. In reinforcement learning, this idea is known as a belief-augmented POMDP [3, 4], but is not usually construed as a control problem. This section constructs the Hamilton-Jacobi-Bellman (HJB) equation of the joint control problem for the system described in Sec. 2, and analytically solves the equation for the optimal control. This necessitates a description of the learning algorithm’s dynamics: At time t = τ , let the system be at phase space-time sτ = (x(τ ), τ ) and have the Gaussian process belief GP(q; µτ (s), Στ (s, s )) over the function q (all derivations in this section will focus on q, and we will drop the sub-script q from many quantities for readability. The forms for f , or g, are entirely analogous, with independent Gaussian processes for each dimension d = 1, . . . , D). This belief stems from a finite number N of samples y 0 = [y1 , . . . , yN ] ∈ RN collected at space-times S 0 = [(x1 , t1 ), . . . , (xN , tN )] ≡ [s1 , . . . , sN ] ∈ KN (note that t1 to tN need not be equally spaced, ordered, or < τ ). For arbitrary points s∗ = (x∗ , t∗ ) ∈ K, the belief over q(s∗ ) is a Gaussian with mean function µτ , and co-variance function Στ [15] 2 µτ (s∗ ) = k(s∗ , S 0 )[K(S 0 , S 0 ) + σq I]−1 y 0 i i (5) 2 Στ (s∗ , s∗ ) = k(s∗ , s∗ ) − k(s∗ , S 0 )[K(S 0 , S 0 ) + σq I]−1 k(S 0 , s∗ ) i j i j i j where K(S 0 , S 0 ) is the Gram matrix with elements Kab = k(sa , sb ). We will abbreviate K0 ≡ 2 [K(S 0 , S 0 ) + σy I] from here on. The co-vector k(s∗ , S 0 ) has elements ki = k(s∗ , si ) and will be shortened to k0 . How does this belief change as time moves from τ to τ + dt? If dt 0, the chance of acquiring a datapoint yτ in this time is λ dt. Marginalising over this Poisson stochasticity, we expect one sample with probability λ dt, two samples with (λ dt)2 and so on. So the mean after dt is expected to be µτ + dt = λ dt (k0 , kτ ) K0 ξτ ξτ κτ −1 y0 −1 + (1 − λ dt − O(λ dt)2 ) · k0 K0 y 0 + O(λ dt)2 (6) yτ where we have defined the map kτ = k(s∗ , sτ ), the vector ξ τ with elements ξτ,i = k(si , sτ ), and 2 the scalar κτ = k(sτ , sτ ) + σq . Algebraic re-formulation yields −1 −1 −1 −1 µτ + dt = k0 K0 y 0 + λ(kt − k0 K0 ξ t )(κt − ξ t K0 ξ t )−1 (yt − ξ t K0 y 0 ) dt. −1 ξ τ K0 y 0 −1 ξ τ K0 ξ τ ) Note that = µ(sτ ), the mean prediction at sτ and (κτ − ¯ ¯ the marginal variance there. Hence, we can define scalars Σ, σ and write −1 (yτ − ξ τ K0 y 0 ) [Σ1/2 Ω](sτ ) + σω ¯τ = ≡ Σ1/2 Ω + στ ω ¯ −1 1/2 [Σ(sτ , sτ ) + σ 2 ]1/2 (κτ − ξ τ K0 ξ τ ) = 2 σq (7) + Σ(sτ , sτ ), with ω ∼ N (0, 1). (8) So the change to the mean consists of a deterministic but uncertain change whose effects accumulate linearly in time, and a stochastic change, caused by the independent noise process, whose variance accumulates linearly in time (in truth, these two points are considerably subtler, a detailed proof is left out for lack of space). We use the Wiener [16] measure dω to write dµsτ (s∗ ) = λ −1 kτ − k0 K0 ξ τ [Σ1/2 Ω](sτ ) + σω ¯τ dt ≡ λLsτ (s∗ )[Σ1/2 Ω dt + στ dω] ¯ −1 (κτ − ξ τ K0 ξ τ )−1/2 [Σ(sτ , sτ ) + σ 2 ]1/2 (9) where we have implicitly defined the innovation function L. Note that L is a function of both s∗ and sτ . A similar argument finds the change of the covariance function to be the deterministic rate dΣsτ (s∗ , s∗ ) = −λLsτ (s∗ )Lsτ (s∗ ) dt. i j i j 3 (10) So the dynamics of learning consist of a deterministic change to the covariance, and both deterministic and stochastic changes to the mean, both of which are samples a Gaussian processes with covariance function proportional to LL . This separation is a fundamental characteristic of GPs (it is the nonparametric version of a more straightforward notion for finite-dimensional Gaussian beliefs, for data with known noise magnitude). We introduce the belief-augmented space H containing states z(τ ) ≡ [x(τ ), τ, µτ (s), µτ 1 , . . . , µτ D , q f f Στ (s, s ), Στ 1 , . . . , Στ D ]. Since the means and covariances are functions, H is infinite-dimensional. q f f Under our beliefs, z(τ ) obeys a stochastic differential equation of the form dz = [A(z) + B(z)u + C(z)Ω] dt + D(z) dω (11) with free dynamics A, controlled dynamics Bu, uncertainty operator C, and noise operator D A = µτ (zx , zt ) , 1 , 0 , 0 , . . . , 0 , −λLq Lq , −λLf 1 Lf 1 , . . . , −λLf D Lf D ; f B = [g(s∗ ), 0, 0, 0, . . . ]; (12) 1/2 ¯q ¯ 1/2 ¯ 1/2 C = diag(Σf τ , 0, λLq Σ1/2 , λLf 1 Σf 1 , . . . , λLf D Σf d , 0, . . . , 0); D = diag(0, 0, λLq σq , λLf 1 σf 1 , . . . , λLf D σf D , 0, . . . , 0) ¯ ¯ ¯ (13) ∗ The value – the expected cost to go – of any state s is given by the Hamilton-Jacobi-Bellman equation, which follows from Bellman’s principle and a first-order expansion, using Eq. (4): 1 (14) µq (sτ ) + Σ1/2 Ωq + σq ωq + u R−1 u dt + v(zτ + dt ) dω dΩ qτ 2 1 v(zτ ) ∂v 1 µτ +Σ1/2 Ωq + u R−1 u+ + +[A+Bu+CΩ] v+ tr[D ( 2 v)D]dΩ dt q qτ 2 dt ∂t 2 v(zτ ) = min u = min u Integration over ω can be performed with ease, and removes the stochasticity from the problem; The uncertainty over Ω is a lot more challenging. Because the distribution over future losses is correlated through space and time, v, 2 v are functions of Ω, and the integral is nontrivial. But there are some obvious approximate approaches. For example, if we (inexactly) swap integration and minimisation, draw samples Ωi and solve for the value for each sample, we get an “average optimal controller”. This over-estimates the actual sum of future rewards by assuming the controller has access to the true system. It has the potential advantage of considering the actual optimal controller for every possible system, the disadvantage that the average of optima need not be optimal for any actual solution. On the other hand, if we ignore the correlation between Ω and v, we can integrate (17) locally, all terms in Ω drop out and we are left with an “optimal average controller”, which assumes that the system locally follows its average (mean) dynamics. This cheaper strategy was adopted in the following. Note that it is myopic, but not greedy in a simplistic sense – it does take the effect of learning into account. It amounts to a “global one-step look-ahead”. One could imagine extensions that consider the influence of Ω on v to a higher order, but these will be left for future work. Under this first-order approximation, analytic minimisation over u can be performed in closed form, and bears u(z) = −RB(z) v(z) = −Rg(x, t) x v(z). (15) The optimal Hamilton-Jacobi-Bellman equation is then 1 1 v − [ v] BRB v + tr D ( 2 v)D . 2 2 A more explicit form emerges upon re-inserting the definitions of Eq. (12) into Eq. (16): γ −1 v(z) = µτ + A q γ −1 v(z) = [µτ + µτ (zx , zt ) q f x + t 1 v(z) − [ 2 x v(z)] free drift cost c=q,f1 ,...,fD x v(z) control benefit − λ Lc Lc + g (zx , zt )Rg(zx , zt ) (16) Σc 1 v(z) + λ2 σc Lf d ( ¯2 2 exploration bonus 2 µf d v(z))Lf d (17) diffusion cost Equation (17) is the central result: Given Gaussian priors on nonlinear control-affine dynamic systems, up to a first order approximation, optimal reinforcement learning is described by an infinitedimensional second-order partial differential equation. It can be interpreted as follows (labels in the 4 equation, note the negative signs of “beneficial” terms): The value of a state comprises the immediate utility rate; the effect of the free drift through space-time and the benefit of optimal control; an exploration bonus of learning, and a diffusion cost engendered by the measurement noise. The first two lines of the right hand side describe effects from the phase space-time subspace of the augmented space, while the last line describes effects from the belief part of the augmented space. The former will be called exploitation terms, the latter exploration terms, for the following reason: If the first two lines line dominate the right hand side of Equation (17) in absolute size, then future losses are governed by the physical sub-space – caused by exploiting knowledge to control the physical system. On the other hand, if the last line dominates the value function, exploration is more important than exploitation – the algorithm controls the physical space to increase knowledge. To my knowledge, this is the first differential statement about reinforcement learning’s two objectives. Finally, note the role of the sampling rate λ: If λ is very low, exploration is useless over the discount horizon. Even after these approximations, solving Equation (17) for v remains nontrivial for two reasons: First, although the vector product notation is pleasingly compact, the mean and covariance functions are of course infinite-dimensional, and what looks like straightforward inner vector products are in fact integrals. For example, the average exploration bonus for the loss, writ large, reads ∂v(z) (18) −λLq Lq Σq v(z) = − λL(q) (s∗ )L(q) (s∗ ) ds∗ ds∗ . sτ i sτ j ∂Σ(s∗ , s∗ ) i j K i j (note that this object remains a function of the state sτ ). For general kernels k, these integrals may only be solved numerically. However, for at least one specific choice of kernel (square-exponentials) and parametric Ansatz, the required integrals can be solved in closed form. This analytic structure is so interesting, and the square-exponential kernel so widely used that the “numerical” part of the paper (Section 4) will restrict the choice of kernel to this class. The other problem, of course, is that Equation (17) is a nontrivial differential Equation. Section 4 presents one, initial attempt at a numerical solution that should not be mistaken for a definitive answer. Despite all this, Eq. (17) arguably constitutes a useful gain for Bayesian reinforcement learning: It replaces the intractable definition of the value in terms of future trajectories with a differential equation. This raises hope for new approaches to reinforcement learning, based on numerical analysis rather than sampling. Digression: Relaxing Some Assumptions This paper only applies to the specific problem class of Section 2. Any generalisations and extensions are future work, and I do not claim to solve them. But it is instructive to consider some easier extensions, and some harder ones: For example, it is intractable to simultaneously learn both g and f nonparametrically, if only the actual transitions are observed, because the beliefs over the two functions become infinitely dependent when conditioned on data. But if the belief on either g or f is parametric (e.g. a general linear model), a joint belief on g and f is tractable [see 15, §2.7], in fact straightforward. Both the quadratic control cost ∝ u Ru and the control-affine form (g(x, t)u) are relaxable assumptions – other parametric forms are possible, as long as they allow for analytic optimization of Eq. (14). On the question of learning the kernels for Gaussian process regression on q and f or g, it is clear that standard ways of inferring kernels [15, 18] can be used without complication, but that they are not covered by the notion of optimal learning as addressed here. 4 Numerically Solving the Hamilton-Jacobi-Bellman Equation Solving Equation (16) is principally a problem of numerical analysis, and a battery of numerical methods may be considered. This section reports on one specific Ansatz, a Galerkin-type projection analogous to the one used in [12]. For this we break with the generality of previous sections and assume that the kernels k are given by square exponentials k(a, b) = kSE (a, b; θ, S) = 1 θ2 exp(− 2 (a − b) S −1 (a − b)) with parameters θ, S. As discussed above, we approximate by setting Ω = 0. We find an approximate solution through a factorizing parametric Ansatz: Let the value of any point z ∈ H in the belief space be given through a set of parameters w and some nonlinear functionals φ, such that their contributions separate over phase space, mean, and covariance functions: v(z) = φe (ze ) we with φe , we ∈ RNe (19) e=x,Σq ,µq ,Σf ,µf 5 This projection is obviously restrictive, but it should be compared to the use of radial basis functions for function approximation, a similarly restrictive framework widely used in reinforcement learning. The functionals φ have to be chosen conducive to the form of Eq. (17). For square exponential kernels, one convenient choice is φa (zs ) = k(sz , sa ; θa , Sa ) s (20) [Σz (s∗ , s∗ ) − k(s∗ , s∗ )]k(s∗ , sb ; θb , Sb )k(s∗ , sb ; θb , Sb ) ds∗ ds∗ i j i j i j i j φb (zΣ ) = Σ and (21) K µz (s∗ )µz (s∗ )k(s∗ , sc , θc , Sc )k(s∗ , sc , θc , Sc ) ds∗ ds∗ i j i j i j φc (zµ ) = µ (22) K (the subtracted term in the first integral serves only numerical purposes). With this choice, the integrals of Equation (17) can be solved analytically (solutions left out due to space constraints). The approximate Ansatz turns Eq. (17) into an algebraic equation quadratic in wx , linear in all other we : 1 w Ψ(zx )wx − q(zx ) + 2 x Ξe (ze )we = 0 (23) e=x,µq ,Σq ,µf ,Σf using co-vectors Ξ and a matrix Ψ with elements Ξx (zs ) = γ −1 φa (zs ) − f (zx ) a s ΞΣ (zΣ ) = γ −1 φa (zΣ ) + λ a Σ a x φs (zs ) − a t φs (zs ) Lsτ (s∗ )Lsτ (s∗ ) i j K Ξµ (zµ ) a = γ −1 φa (zµ ) µ Ψ(z)k = [ k x φs (z)] − λ2 σsτ ¯2 2 ∂φΣ (zΣ ) ds∗ ds∗ ∂Σz (s∗ , s∗ ) i j i j Lsτ (s∗ )Lsτ (s∗ ) i j K g(zx )Rg(zx ) [ ∂ 2 φa (zµ ) µ ds∗ ds∗ ∂µz (s∗ )∂µz (s∗ ) i j i j (24) x φs (z)] Note that Ξµ and ΞΣ are both functions of the physical state, through sτ . It is through this functional dependency that the value of information is associated with the physical phase space-time. To solve for w, we simply choose a number of evaluation points z eval sufficient to constrain the resulting system of quadratic equations, and then find the least-squares solution wopt by function minimisation, using standard methods, such as Levenberg-Marquardt [19]. A disadvantage of this approach is that is has a number of degrees of freedom Θ, such as the kernel parameters, and the number and locations xa of the feature functionals. Our experiments (Section 5) suggest that it is nevertheless possible to get interesting results simply by choosing these parameters heuristically. 5 5.1 Experiments Illustrative Experiment on an Artificial Environment As a simple example system with a one-dimensional state space, f, q were sampled from the model described in Section 2, and g set to the unit function. The state space was tiled regularly, in a bounded region, with 231 square exponential (“radial”) basis functions (Equation 20), initially all with weight i wx = 0. For the information terms, only a single basis function was used for each term (i.e. one single φΣq , one single φµq , and equally for f , all with very large length scales S, covering the entire region of interest). As pointed out above, this does not imply a trivial structure for these terms, because of the functional dependency on Lsτ . Five times the number of parameters, i.e. Neval = 1175 evaluation points zeval were sampled, at each time step, uniformly over the same region. It is not intuitively clear whether each ze should have its own belief (i.e. whether the points must cover the belief space as well as the phase space), but anecdotal evidence from the experiments suggests that it suffices to use the current beliefs for all evaluation points. A more comprehensive evaluation of such aspects will be the subject of a future paper. The discount factor was set to γ = 50s, the sampling rate at λ = 2/s, the control cost at 10m2 /($s). Value and optimal control were evaluated at time steps of δt = 1/λ = 0.5s. Figure 1 shows the situation 50s after initialisation. The most noteworthy aspect is the nontrivial structure of exploration and exploitation terms. Despite the simplistic parameterisation of the corresponding functionals, their functional dependence on sτ induces a complex shape. The system 6 0 40 40 0.5 20 −2 20 x 0 0 0 −4 −20 −0.5 −20 −6 −40 −1 −40 −8 0 20 40 60 80 100 0 40 20 40 60 80 100 0 40 20 20 0.5 0 −20 x 0 −20 −40 −40 0 0 20 40 60 80 −0.5 100 −1 0 t 20 40 60 80 100 t Figure 1: State after 50 time steps, plotted over phase space-time. top left: µq (blue is good). The belief over f is not shown, but has similar structure. top right: value estimate v at current belief: compare to next two panels to note that the approximation is relatively coarse. bottom left: exploration terms. bottom right: exploitation terms. At its current state (black diamond), the system is in the process of switching from exploitation to exploration (blue region in bottom right panel is roughly cancelled by red, forward cone in bottom left one). constantly balances exploration and exploitation, and the optimal balance depends nontrivially on location, time, and the actual value (as opposed to only uncertainty) of accumulated knowledge. This is an important insight that casts doubt on the usefulness of simple, local exploration boni, used in many reinforcement learning algorithms. Secondly, note that the system’s trajectory does not necessarily follow what would be the optimal path under full information. The value estimate reflects this, by assigning low (good) value to regions behind the system’s trajectory. This amounts to a sense of “remorse”: If the learner would have known about these regions earlier, it would have strived to reach them. But this is not a sign of sub-optimality: Remember that the value is defined on the augmented space. The plots in Figure 1 are merely a slice through that space at some level set in the belief space. 5.2 Comparative Experiment – The Furuta Pendulum The cart-and-pole system is an under-actuated problem widely studied in reinforcement learning. For variation, this experiment uses a cylindrical version, the pendulum on the rotating arm [20]. The task is to swing up the pendulum from the lower resting point. The table in Figure 2 compares the average loss of a controller with access to the true f, g, q, but otherwise using Algorithm 1, to that of an -greedy TD(λ) learner with linear function approximation, Simpkins’ et al.’s [12] Kalman method and the Gaussian process learning controller (Fig. 2). The linear function approximation of TD(λ) used the same radial basis functions as the three other methods. None of these methods is free of assumptions: Note that the sampling frequency influences TD in nontrivial ways rarely studied (for example through the coarseness of the -greedy policy). The parameters were set to γ = 5s, λ = 50/s. Note that reinforcement learning experiments often quote total accumulated loss, which differs from the discounted task posed to the learner. Figure 2 reports actual discounted losses. The GP method clearly outperforms the other two learners, which barely explore. Interestingly, none of the tested methods, not even the informed controller, achieve a stable controlled balance, although 7 u θ1 1 2 Method cumulative loss Full Information (baseline) TD(λ) Kalman filter Optimal Learner Gaussian process optimal learner 4.4 ±0.3 6.401±0.001 6.408±0.001 4.6 ±1.4 θ2 Figure 2: The Furuta pendulum system: A pendulum of length 2 is attached to a rotatable arm of length 1 . The control input is the torque applied to the arm. Right: cost to go achieved by different methods. Lower is better. Error measures are one standard deviation over five experiments. the GP learner does swing up the pendulum. This is due to the random, non-optimal location of basis functions, which means resolution is not necessarily available where it is needed (in regions of high curvature of the value function), and demonstrates a need for better solution methods for Eq. (17). There is of course a large number of other algorithms methods to potentially compare to, and these results are anything but exhaustive. They should not be misunderstood as a critique of any other method. But they highlight the need for units of measure on every quantity, and show how hard optimal exploration and exploitation truly is. Note that, for time-varying or discounted problems, there is no “conservative” option that cold be adopted in place of the Bayesian answer. 6 Conclusion Gaussian process priors provide a nontrivial class of reinforcement learning problems for which optimal reinforcement learning reduces to solving differential equations. Of course, this fact alone does not make the problem easier, as solving nonlinear differential equations is in general intractable. However, the ubiquity of differential descriptions in other fields raises hope that this insight opens new approaches to reinforcement learning. For intuition on how such solutions might work, one specific approximation was presented, using functionals to reduce the problem to finite least-squares parameter estimation. The critical reader will have noted how central the prior is for the arguments in Section 3: The dynamics of the learning process are predictions of future data, thus inherently determined exclusively by prior assumptions. One may find this unappealing, but there is no escape from it. Minimizing future loss requires predicting future loss, and predictions are always in danger of falling victim to incorrect assumptions. A finite initial identification phase may mitigate this problem by replacing prior with posterior uncertainty – but even then, predictions and decisions will depend on the model. The results of this paper raise new questions, theoretical and applied. The most pressing questions concern better solution methods for Eq. (14), in particular better means for taking the expectation over the uncertain dynamics to more than first order. There are also obvious probabilistic issues: Are there other classes of priors that allow similar treatments? (Note some conceptual similarities between this work and the BEETLE algorithm [4]). To what extent can approximate inference methods – widely studied in combination with Gaussian process regression – be used to broaden the utility of these results? Acknowledgments The author wishes to express his gratitude to Carl Rasmussen, Jan Peters, Zoubin Ghahramani, Peter Dayan, and an anonymous reviewer, whose thoughtful comments uncovered several errors and crucially improved this paper. 8 References [1] R.S. Sutton and A.G. Barto. Reinforcement Learning. MIT Press, 1998. [2] W.R. Thompson. On the likelihood that one unknown probability exceeds another in view of two samples. Biometrika, 25:275–294, 1933. [3] M.O.G. Duff. Optimal Learning: Computational procedures for Bayes-adaptive Markov decision processes. PhD thesis, U of Massachusetts, Amherst, 2002. [4] P. Poupart, N. Vlassis, J. Hoey, and K. Regan. An analytic solution to discrete Bayesian reinforcement learning. In Proceedings of the 23rd International Conference on Machine Learning, pages 697–704, 2006. [5] Richard Dearden, Nir Friedman, and David Andre. Model based Bayesian exploration. In Uncertainty in Artificial Intelligence, pages 150–159, 1999. [6] Malcolm Strens. A Bayesian framework for reinforcement learning. In International Conference on Machine Learning, pages 943–950, 2000. [7] T. Wang, D. Lizotte, M. Bowling, and D. Schuurmans. Bayesian sparse sampling for on-line reward optimization. In International Conference on Machine Learning, pages 956–963, 2005. [8] J. Asmuth, L. Li, M.L. Littman, A. Nouri, and D. Wingate. A Bayesian sampling approach to exploration in reinforcement learning. In Uncertainty in Artificial Intelligence, 2009. [9] J.Z. Kolter and A.Y. Ng. Near-Bayesian exploration in polynomial time. In Proceedings of the 26th International Conference on Machine Learning. Morgan Kaufmann, 2009. [10] E. Todorov. Linearly-solvable Markov decision problems. Advances in Neural Information Processing Systems, 19, 2007. [11] H. J. Kappen. An introduction to stochastic control theory, path integrals and reinforcement learning. In 9th Granada seminar on Computational Physics: Computational and Mathematical Modeling of Cooperative Behavior in Neural Systems., pages 149–181, 2007. [12] A. Simpkins, R. De Callafon, and E. Todorov. Optimal trade-off between exploration and exploitation. In American Control Conference, 2008, pages 33–38, 2008. [13] I. Fantoni and L. Rogelio. Non-linear Control for Underactuated Mechanical Systems. Springer, 1973. [14] A.A. Feldbaum. Dual control theory. Automation and Remote Control, 21(9):874–880, April 1961. [15] C.E. Rasmussen and C.K.I. Williams. Gaussian Processes for Machine Learning. MIT Press, 2006. [16] N. Wiener. Differential space. Journal of Mathematical Physics, 2:131–174, 1923. [17] T. Kailath. An innovations approach to least-squares estimation — part I: Linear filtering in additive white noise. IEEE Transactions on Automatic Control, 13(6):646–655, 1968. [18] I. Murray and R.P. Adams. Slice sampling covariance hyperparameters of latent Gaussian models. arXiv:1006.0868, 2010. [19] D. W. Marquardt. An algorithm for least-squares estimation of nonlinear parameters. Journal of the Society for Industrial and Applied Mathematics, 11(2):431–441, 1963. [20] K. Furuta, M. Yamakita, and S. Kobayashi. Swing-up control of inverted pendulum using pseudo-state feedback. Journal of Systems and Control Engineering, 206(6):263–269, 1992. 9</p><p>5 0.081664845 <a title="8-tfidf-5" href="./nips-2011-Inference_in_continuous-time_change-point_models.html">131 nips-2011-Inference in continuous-time change-point models</a></p>
<p>Author: Florian Stimberg, Manfred Opper, Guido Sanguinetti, Andreas Ruttor</p><p>Abstract: We consider the problem of Bayesian inference for continuous-time multi-stable stochastic systems which can change both their diffusion and drift parameters at discrete times. We propose exact inference and sampling methodologies for two specific cases where the discontinuous dynamics is given by a Poisson process and a two-state Markovian switch. We test the methodology on simulated data, and apply it to two real data sets in finance and systems biology. Our experimental results show that the approach leads to valid inferences and non-trivial insights. 1</p><p>6 0.074549213 <a title="8-tfidf-6" href="./nips-2011-Query-Aware_MCMC.html">229 nips-2011-Query-Aware MCMC</a></p>
<p>7 0.067744628 <a title="8-tfidf-7" href="./nips-2011-Analytical_Results_for_the_Error_in_Filtering_of_Gaussian_Processes.html">37 nips-2011-Analytical Results for the Error in Filtering of Gaussian Processes</a></p>
<p>8 0.066418685 <a title="8-tfidf-8" href="./nips-2011-Variational_Learning_for_Recurrent_Spiking_Networks.html">302 nips-2011-Variational Learning for Recurrent Spiking Networks</a></p>
<p>9 0.065253645 <a title="8-tfidf-9" href="./nips-2011-Facial_Expression_Transfer_with_Input-Output_Temporal_Restricted_Boltzmann_Machines.html">94 nips-2011-Facial Expression Transfer with Input-Output Temporal Restricted Boltzmann Machines</a></p>
<p>10 0.063974075 <a title="8-tfidf-10" href="./nips-2011-Priors_over_Recurrent_Continuous_Time_Processes.html">221 nips-2011-Priors over Recurrent Continuous Time Processes</a></p>
<p>11 0.062965453 <a title="8-tfidf-11" href="./nips-2011-Selecting_the_State-Representation_in_Reinforcement_Learning.html">245 nips-2011-Selecting the State-Representation in Reinforcement Learning</a></p>
<p>12 0.058425233 <a title="8-tfidf-12" href="./nips-2011-Hogwild%3A_A_Lock-Free_Approach_to_Parallelizing_Stochastic_Gradient_Descent.html">121 nips-2011-Hogwild: A Lock-Free Approach to Parallelizing Stochastic Gradient Descent</a></p>
<p>13 0.057611305 <a title="8-tfidf-13" href="./nips-2011-Structured_Learning_for_Cell_Tracking.html">275 nips-2011-Structured Learning for Cell Tracking</a></p>
<p>14 0.053554479 <a title="8-tfidf-14" href="./nips-2011-Predicting_response_time_and_error_rates_in_visual_search.html">219 nips-2011-Predicting response time and error rates in visual search</a></p>
<p>15 0.053536274 <a title="8-tfidf-15" href="./nips-2011-Automated_Refinement_of_Bayes_Networks%27_Parameters_based_on_Test_Ordering_Constraints.html">40 nips-2011-Automated Refinement of Bayes Networks' Parameters based on Test Ordering Constraints</a></p>
<p>16 0.053298082 <a title="8-tfidf-16" href="./nips-2011-Sequence_learning_with_hidden_units_in_spiking_neural_networks.html">249 nips-2011-Sequence learning with hidden units in spiking neural networks</a></p>
<p>17 0.053149451 <a title="8-tfidf-17" href="./nips-2011-Projection_onto_A_Nonnegative_Max-Heap.html">226 nips-2011-Projection onto A Nonnegative Max-Heap</a></p>
<p>18 0.05047198 <a title="8-tfidf-18" href="./nips-2011-On_the_accuracy_of_l1-filtering_of_signals_with_block-sparse_structure.html">203 nips-2011-On the accuracy of l1-filtering of signals with block-sparse structure</a></p>
<p>19 0.050344273 <a title="8-tfidf-19" href="./nips-2011-Continuous-Time_Regression_Models_for_Longitudinal_Networks.html">62 nips-2011-Continuous-Time Regression Models for Longitudinal Networks</a></p>
<p>20 0.048933491 <a title="8-tfidf-20" href="./nips-2011-Active_Ranking_using_Pairwise_Comparisons.html">22 nips-2011-Active Ranking using Pairwise Comparisons</a></p>
<br/>
<h2>similar papers computed by <a title="lsi-model" href="../home/nips2011_lsi.html">lsi model</a></h2><h3>lsi for this paper:</h3><p>topicId topicWeight</p>
<p>[(0, 0.152), (1, 0.004), (2, 0.051), (3, 0.006), (4, -0.023), (5, -0.086), (6, -0.051), (7, -0.077), (8, -0.015), (9, -0.003), (10, -0.041), (11, -0.076), (12, 0.002), (13, 0.043), (14, 0.045), (15, -0.016), (16, 0.003), (17, -0.018), (18, -0.018), (19, 0.012), (20, 0.036), (21, 0.035), (22, 0.058), (23, -0.1), (24, -0.092), (25, 0.051), (26, -0.098), (27, 0.088), (28, 0.072), (29, -0.022), (30, 0.014), (31, 0.018), (32, -0.035), (33, -0.008), (34, -0.04), (35, 0.053), (36, 0.032), (37, -0.016), (38, 0.038), (39, 0.046), (40, 0.059), (41, 0.058), (42, -0.068), (43, 0.099), (44, 0.018), (45, 0.178), (46, 0.092), (47, 0.028), (48, -0.019), (49, -0.092)]</p>
<h3>similar papers list:</h3><p>simIndex simValue paperId paperTitle</p>
<p>same-paper 1 0.92730671 <a title="8-lsi-1" href="./nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html">8 nips-2011-A Model for Temporal Dependencies in Event Streams</a></p>
<p>Author: Asela Gunawardana, Christopher Meek, Puyang Xu</p><p>Abstract: We introduce the Piecewise-Constant Conditional Intensity Model, a model for learning temporal dependencies in event streams. We describe a closed-form Bayesian approach to learning these models, and describe an importance sampling algorithm for forecasting future events using these models, using a proposal distribution based on Poisson superposition. We then use synthetic data, supercomputer event logs, and web search query logs to illustrate that our learning algorithm can efficiently learn nonlinear temporal dependencies, and that our importance sampling algorithm can effectively forecast future events. 1</p><p>2 0.63531315 <a title="8-lsi-2" href="./nips-2011-Gaussian_process_modulated_renewal_processes.html">101 nips-2011-Gaussian process modulated renewal processes</a></p>
<p>Author: Yee W. Teh, Vinayak Rao</p><p>Abstract: Renewal processes are generalizations of the Poisson process on the real line whose intervals are drawn i.i.d. from some distribution. Modulated renewal processes allow these interevent distributions to vary with time, allowing the introduction of nonstationarity. In this work, we take a nonparametric Bayesian approach, modelling this nonstationarity with a Gaussian process. Our approach is based on the idea of uniformization, which allows us to draw exact samples from an otherwise intractable distribution. We develop a novel and efficient MCMC sampler for posterior inference. In our experiments, we test these on a number of synthetic and real datasets. 1</p><p>3 0.62558097 <a title="8-lsi-3" href="./nips-2011-Priors_over_Recurrent_Continuous_Time_Processes.html">221 nips-2011-Priors over Recurrent Continuous Time Processes</a></p>
<p>Author: Ardavan Saeedi, Alexandre Bouchard-côté</p><p>Abstract: We introduce the Gamma-Exponential Process (GEP), a prior over a large family of continuous time stochastic processes. A hierarchical version of this prior (HGEP; the Hierarchical GEP) yields a useful model for analyzing complex time series. Models based on HGEPs display many attractive properties: conjugacy, exchangeability and closed-form predictive distribution for the waiting times, and exact Gibbs updates for the time scale parameters. After establishing these properties, we show how posterior inference can be carried efficiently using Particle MCMC methods [1]. This yields a MCMC algorithm that can resample entire sequences atomically while avoiding the complications of introducing slice and stick auxiliary variables of the beam sampler [2]. We applied our model to the problem of estimating the disease progression in multiple sclerosis [3], and to RNA evolutionary modeling [4]. In both domains, we found that our model outperformed the standard rate matrix estimation approach. 1</p><p>4 0.6051203 <a title="8-lsi-4" href="./nips-2011-Inference_in_continuous-time_change-point_models.html">131 nips-2011-Inference in continuous-time change-point models</a></p>
<p>Author: Florian Stimberg, Manfred Opper, Guido Sanguinetti, Andreas Ruttor</p><p>Abstract: We consider the problem of Bayesian inference for continuous-time multi-stable stochastic systems which can change both their diffusion and drift parameters at discrete times. We propose exact inference and sampling methodologies for two specific cases where the discontinuous dynamics is given by a Poisson process and a two-state Markovian switch. We test the methodology on simulated data, and apply it to two real data sets in finance and systems biology. Our experimental results show that the approach leads to valid inferences and non-trivial insights. 1</p><p>5 0.58746457 <a title="8-lsi-5" href="./nips-2011-Analytical_Results_for_the_Error_in_Filtering_of_Gaussian_Processes.html">37 nips-2011-Analytical Results for the Error in Filtering of Gaussian Processes</a></p>
<p>Author: Alex K. Susemihl, Ron Meir, Manfred Opper</p><p>Abstract: Bayesian filtering of stochastic stimuli has received a great deal of attention recently. It has been applied to describe the way in which biological systems dynamically represent and make decisions about the environment. There have been no exact results for the error in the biologically plausible setting of inference on point process, however. We present an exact analysis of the evolution of the meansquared error in a state estimation task using Gaussian-tuned point processes as sensors. This allows us to study the dynamics of the error of an optimal Bayesian decoder, providing insights into the limits obtainable in this task. This is done for Markovian and a class of non-Markovian Gaussian processes. We find that there is an optimal tuning width for which the error is minimized. This leads to a characterization of the optimal encoding for the setting as a function of the statistics of the stimulus, providing a mathematically sound primer for an ecological theory of sensory processing. 1</p><p>6 0.55364233 <a title="8-lsi-6" href="./nips-2011-Optimal_Reinforcement_Learning_for_Gaussian_Systems.html">206 nips-2011-Optimal Reinforcement Learning for Gaussian Systems</a></p>
<p>7 0.54825079 <a title="8-lsi-7" href="./nips-2011-Collective_Graphical_Models.html">55 nips-2011-Collective Graphical Models</a></p>
<p>8 0.535312 <a title="8-lsi-8" href="./nips-2011-Query-Aware_MCMC.html">229 nips-2011-Query-Aware MCMC</a></p>
<p>9 0.48972756 <a title="8-lsi-9" href="./nips-2011-Modelling_Genetic_Variations_using_Fragmentation-Coagulation_Processes.html">173 nips-2011-Modelling Genetic Variations using Fragmentation-Coagulation Processes</a></p>
<p>10 0.47735953 <a title="8-lsi-10" href="./nips-2011-Nonstandard_Interpretations_of_Probabilistic_Programs_for_Efficient_Inference.html">192 nips-2011-Nonstandard Interpretations of Probabilistic Programs for Efficient Inference</a></p>
<p>11 0.4690595 <a title="8-lsi-11" href="./nips-2011-Signal_Estimation_Under_Random_Time-Warpings_and_Nonlinear_Signal_Alignment.html">253 nips-2011-Signal Estimation Under Random Time-Warpings and Nonlinear Signal Alignment</a></p>
<p>12 0.45508233 <a title="8-lsi-12" href="./nips-2011-Learning_with_the_weighted_trace-norm_under_arbitrary_sampling_distributions.html">159 nips-2011-Learning with the weighted trace-norm under arbitrary sampling distributions</a></p>
<p>13 0.43471047 <a title="8-lsi-13" href="./nips-2011-On_Tracking_The_Partition_Function.html">197 nips-2011-On Tracking The Partition Function</a></p>
<p>14 0.4268662 <a title="8-lsi-14" href="./nips-2011-Select_and_Sample_-_A_Model_of_Efficient_Neural_Inference_and_Learning.html">243 nips-2011-Select and Sample - A Model of Efficient Neural Inference and Learning</a></p>
<p>15 0.42560527 <a title="8-lsi-15" href="./nips-2011-Automated_Refinement_of_Bayes_Networks%27_Parameters_based_on_Test_Ordering_Constraints.html">40 nips-2011-Automated Refinement of Bayes Networks' Parameters based on Test Ordering Constraints</a></p>
<p>16 0.4227927 <a title="8-lsi-16" href="./nips-2011-Bayesian_Bias_Mitigation_for_Crowdsourcing.html">42 nips-2011-Bayesian Bias Mitigation for Crowdsourcing</a></p>
<p>17 0.3951233 <a title="8-lsi-17" href="./nips-2011-Selective_Prediction_of_Financial_Trends_with_Hidden_Markov_Models.html">246 nips-2011-Selective Prediction of Financial Trends with Hidden Markov Models</a></p>
<p>18 0.38742912 <a title="8-lsi-18" href="./nips-2011-A_Global_Structural_EM_Algorithm_for_a_Model_of_Cancer_Progression.html">6 nips-2011-A Global Structural EM Algorithm for a Model of Cancer Progression</a></p>
<p>19 0.38671139 <a title="8-lsi-19" href="./nips-2011-An_Exact_Algorithm_for_F-Measure_Maximization.html">33 nips-2011-An Exact Algorithm for F-Measure Maximization</a></p>
<p>20 0.38152948 <a title="8-lsi-20" href="./nips-2011-Reinforcement_Learning_using_Kernel-Based_Stochastic_Factorization.html">237 nips-2011-Reinforcement Learning using Kernel-Based Stochastic Factorization</a></p>
<br/>
<h2>similar papers computed by <a title="lda-model" href="../home/nips2011_lda.html">lda model</a></h2><h3>lda for this paper:</h3><p>topicId topicWeight</p>
<p>[(0, 0.018), (4, 0.016), (20, 0.013), (26, 0.031), (31, 0.078), (33, 0.014), (43, 0.062), (45, 0.058), (57, 0.036), (74, 0.026), (83, 0.049), (99, 0.509)]</p>
<h3>similar papers list:</h3><p>simIndex simValue paperId paperTitle</p>
<p>1 0.94635463 <a title="8-lda-1" href="./nips-2011-Semi-supervised_Regression_via_Parallel_Field_Regularization.html">248 nips-2011-Semi-supervised Regression via Parallel Field Regularization</a></p>
<p>Author: Binbin Lin, Chiyuan Zhang, Xiaofei He</p><p>Abstract: This paper studies the problem of semi-supervised learning from the vector field perspective. Many of the existing work use the graph Laplacian to ensure the smoothness of the prediction function on the data manifold. However, beyond smoothness, it is suggested by recent theoretical work that we should ensure second order smoothness for achieving faster rates of convergence for semisupervised regression problems. To achieve this goal, we show that the second order smoothness measures the linearity of the function, and the gradient field of a linear function has to be a parallel vector field. Consequently, we propose to find a function which minimizes the empirical error, and simultaneously requires its gradient field to be as parallel as possible. We give a continuous objective function on the manifold and discuss how to discretize it by using random points. The discretized optimization problem turns out to be a sparse linear system which can be solved very efficiently. The experimental results have demonstrated the effectiveness of our proposed approach. 1</p><p>2 0.92662346 <a title="8-lda-2" href="./nips-2011-Budgeted_Optimization_with_Concurrent_Stochastic-Duration_Experiments.html">50 nips-2011-Budgeted Optimization with Concurrent Stochastic-Duration Experiments</a></p>
<p>Author: Javad Azimi, Alan Fern, Xiaoli Z. Fern</p><p>Abstract: Budgeted optimization involves optimizing an unknown function that is costly to evaluate by requesting a limited number of function evaluations at intelligently selected inputs. Typical problem formulations assume that experiments are selected one at a time with a limited total number of experiments, which fail to capture important aspects of many real-world problems. This paper defines a novel problem formulation with the following important extensions: 1) allowing for concurrent experiments; 2) allowing for stochastic experiment durations; and 3) placing constraints on both the total number of experiments and the total experimental time. We develop both offline and online algorithms for selecting concurrent experiments in this new setting and provide experimental results on a number of optimization benchmarks. The results show that our algorithms produce highly effective schedules compared to natural baselines. 1</p><p>3 0.90972424 <a title="8-lda-3" href="./nips-2011-Co-regularized_Multi-view_Spectral_Clustering.html">54 nips-2011-Co-regularized Multi-view Spectral Clustering</a></p>
<p>Author: Abhishek Kumar, Piyush Rai, Hal Daume</p><p>Abstract: In many clustering problems, we have access to multiple views of the data each of which could be individually used for clustering. Exploiting information from multiple views, one can hope to find a clustering that is more accurate than the ones obtained using the individual views. Often these different views admit same underlying clustering of the data, so we can approach this problem by looking for clusterings that are consistent across the views, i.e., corresponding data points in each view should have same cluster membership. We propose a spectral clustering framework that achieves this goal by co-regularizing the clustering hypotheses, and propose two co-regularization schemes to accomplish this. Experimental comparisons with a number of baselines on two synthetic and three real-world datasets establish the efficacy of our proposed approaches.</p><p>same-paper 4 0.89077592 <a title="8-lda-4" href="./nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html">8 nips-2011-A Model for Temporal Dependencies in Event Streams</a></p>
<p>Author: Asela Gunawardana, Christopher Meek, Puyang Xu</p><p>Abstract: We introduce the Piecewise-Constant Conditional Intensity Model, a model for learning temporal dependencies in event streams. We describe a closed-form Bayesian approach to learning these models, and describe an importance sampling algorithm for forecasting future events using these models, using a proposal distribution based on Poisson superposition. We then use synthetic data, supercomputer event logs, and web search query logs to illustrate that our learning algorithm can efficiently learn nonlinear temporal dependencies, and that our importance sampling algorithm can effectively forecast future events. 1</p><p>5 0.84082776 <a title="8-lda-5" href="./nips-2011-Statistical_Performance_of_Convex_Tensor_Decomposition.html">270 nips-2011-Statistical Performance of Convex Tensor Decomposition</a></p>
<p>Author: Ryota Tomioka, Taiji Suzuki, Kohei Hayashi, Hisashi Kashima</p><p>Abstract: We analyze the statistical performance of a recently proposed convex tensor decomposition algorithm. Conventionally tensor decomposition has been formulated as non-convex optimization problems, which hindered the analysis of their performance. We show under some conditions that the mean squared error of the convex method scales linearly with the quantity we call the normalized rank of the true tensor. The current analysis naturally extends the analysis of convex low-rank matrix estimation to tensors. Furthermore, we show through numerical experiments that our theory can precisely predict the scaling behaviour in practice.</p><p>6 0.79082167 <a title="8-lda-6" href="./nips-2011-Better_Mini-Batch_Algorithms_via_Accelerated_Gradient_Methods.html">46 nips-2011-Better Mini-Batch Algorithms via Accelerated Gradient Methods</a></p>
<p>7 0.564533 <a title="8-lda-7" href="./nips-2011-Generalised_Coupled_Tensor_Factorisation.html">102 nips-2011-Generalised Coupled Tensor Factorisation</a></p>
<p>8 0.5519281 <a title="8-lda-8" href="./nips-2011-Directed_Graph_Embedding%3A_an_Algorithm_based_on_Continuous_Limits_of_Laplacian-type_Operators.html">71 nips-2011-Directed Graph Embedding: an Algorithm based on Continuous Limits of Laplacian-type Operators</a></p>
<p>9 0.54948831 <a title="8-lda-9" href="./nips-2011-Noise_Thresholds_for_Spectral_Clustering.html">186 nips-2011-Noise Thresholds for Spectral Clustering</a></p>
<p>10 0.52908075 <a title="8-lda-10" href="./nips-2011-Sparse_Manifold_Clustering_and_Embedding.html">263 nips-2011-Sparse Manifold Clustering and Embedding</a></p>
<p>11 0.51712316 <a title="8-lda-11" href="./nips-2011-Algorithms_and_hardness_results_for_parallel_large_margin_learning.html">29 nips-2011-Algorithms and hardness results for parallel large margin learning</a></p>
<p>12 0.51683015 <a title="8-lda-12" href="./nips-2011-A_reinterpretation_of_the_policy_oscillation_phenomenon_in_approximate_policy_iteration.html">16 nips-2011-A reinterpretation of the policy oscillation phenomenon in approximate policy iteration</a></p>
<p>13 0.51506042 <a title="8-lda-13" href="./nips-2011-Hogwild%3A_A_Lock-Free_Approach_to_Parallelizing_Stochastic_Gradient_Descent.html">121 nips-2011-Hogwild: A Lock-Free Approach to Parallelizing Stochastic Gradient Descent</a></p>
<p>14 0.5082798 <a title="8-lda-14" href="./nips-2011-Analytical_Results_for_the_Error_in_Filtering_of_Gaussian_Processes.html">37 nips-2011-Analytical Results for the Error in Filtering of Gaussian Processes</a></p>
<p>15 0.50356114 <a title="8-lda-15" href="./nips-2011-Analysis_and_Improvement_of_Policy_Gradient_Estimation.html">36 nips-2011-Analysis and Improvement of Policy Gradient Estimation</a></p>
<p>16 0.4967756 <a title="8-lda-16" href="./nips-2011-TD_gamma%3A_Re-evaluating_Complex_Backups_in_Temporal_Difference_Learning.html">278 nips-2011-TD gamma: Re-evaluating Complex Backups in Temporal Difference Learning</a></p>
<p>17 0.49402145 <a title="8-lda-17" href="./nips-2011-Crowdclustering.html">66 nips-2011-Crowdclustering</a></p>
<p>18 0.48709327 <a title="8-lda-18" href="./nips-2011-Regularized_Laplacian_Estimation_and_Fast_Eigenvector_Approximation.html">236 nips-2011-Regularized Laplacian Estimation and Fast Eigenvector Approximation</a></p>
<p>19 0.48516554 <a title="8-lda-19" href="./nips-2011-Distributed_Delayed_Stochastic_Optimization.html">72 nips-2011-Distributed Delayed Stochastic Optimization</a></p>
<p>20 0.48505282 <a title="8-lda-20" href="./nips-2011-On_U-processes_and_clustering_performance.html">198 nips-2011-On U-processes and clustering performance</a></p>
<br/><br/><br/>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-48522588-1', 'makerhacker.github.io');
ga('send', 'pageview');
</script>
</body>
</html>
| the_stack | {'hexsha': '6cf5e41c0ffc36d3bade1207c3c70f1db7440a66', 'size': '81222', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'paper-mining/nips/nips2011/nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html', 'max_stars_repo_name': 'makerhacker/makerhacker.github.io', 'max_stars_repo_head_hexsha': 'abe4da269cc42f7f9f5f168cbc8dfc60e6b3dec5', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '21', 'max_stars_repo_stars_event_min_datetime': '2015-01-18T20:28:43.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-15T14:02:16.000Z', 'max_issues_repo_path': 'paper-mining/nips/nips2011/nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html', 'max_issues_repo_name': 'makerhacker/makerhacker.github.io', 'max_issues_repo_head_hexsha': 'abe4da269cc42f7f9f5f168cbc8dfc60e6b3dec5', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'paper-mining/nips/nips2011/nips-2011-A_Model_for_Temporal_Dependencies_in_Event_Streams.html', 'max_forks_repo_name': 'makerhacker/makerhacker.github.io', 'max_forks_repo_head_hexsha': 'abe4da269cc42f7f9f5f168cbc8dfc60e6b3dec5', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '14', 'max_forks_repo_forks_event_min_datetime': '2015-01-07T16:15:46.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-14T03:58:16.000Z', 'avg_line_length': '394.2815533981', 'max_line_length': '33758', 'alphanum_fraction': '0.7609884022', 'original_id': 'd2fed957d9b78954b861402e3f65a38592232cf6e2c6c76cc34b6f62f28b5bf0'} |
Back to blog
epom ad server background
ad server abstract visualization
Demand-Side Platform for Media Buying Explained
Jul 27, 2018 · 8 min read
Lina Lugova
Lina Lugova, Marketing expert at Epom
What is a demand-side platform? Should you use it? Is it cost-effective to build your own DSP? How to choose a good programmatic advertising platform? You'll find the answers to these and more questions advertisers ask about DSPs inside.
Long gone are the days when a user saw a multitude of irrelevant ads due to the poor targeting options — GEO, age, gender, and basic interests were the only options available. Media buying evolved into audience buying: every business aims at getting the most relevant audience at the lowest price possible.
Due to these changes, buying via third-party ad networks and agencies became risky, as non-transparent deals increased fraudulent traffic.
And that's when Demand-Side Platforms came to the scene.
What is a Demand-Side Platform in Programmatic Advertising?
A demand-side platform or a DSP is a piece of software used by advertisers to buy traffic programmatically in different ad formats and from multiple publishers through a single interface in real-time. Instead of randomly putting ads where available, a DSP platform decides which impressions are most valuable for your programmatic ad campaign. This process is automatic. All you do is settings adjustments.
A "What is a DSP?" question usually refers to a self-serve demand-side platform definition, in which you manage your ad campaigns on your own, without involving any ad networks or individuals to handle them for you. In case if you do, such a type of a DSP platform is called a full-service DSP. There is also a white-label DSP in advertising, but we will talk about what it stands for later.
You need a self-serve demand-side platform when you buy a substantial amount of traffic and want total control over bidding, targeting, and creative management. All while tracking the most crucial metrics in real-time and optimizing campaign performance accordingly.
How Does a DSP Work?
If you are new to programmatic media buying and cannot imagine the whole chain, this step-by-step breakdown of how a demand-side platform works will help you better understand the process:
How does a DSP work illustration
Using a supply-side platform, which is a reverse-side platform for supply partners in ad tech, a publisher transfers impressions to ad exchanges. The latter passes it to a DSP, which then evaluates the impression according to the targeting settings, cookie matching, and pricing.
If the impression is valuable (the visitor falls under the advertiser's target audience settings), a demand-side platform will bid on this impression. "Bid on the impressionâ means that the DSP bids the highest price that the advertiser is ready to pay to show the ad to the chosen audience.
With RTB technology, there's no need to negotiate prices with the publishers, as all of this is done automatically. The auction occurs each time when the inventory matches the creative.
The algorithm of media buying through a DSP is the following. Advertisers place bids, the DSP chooses the highest one among them, and the SSP serves the creative of that advertiser on a selected website. All this process of an ad display with a DSP is done in mere milliseconds.
What are the Key Features of a DSP in Marketing?
DSPs have apparent benefits for marketing and advertising. That's exactly why the share of programmatic media buying ad spend rose by 21% in 2019 compared to 2018 and tends to full adoption in a couple of years.
1. Transparency. A demand-side platform reveals all the supply-side chain participants are bringing much-needed clarity to the whole programmatic landscape. With the help of the programmatic advertising platform, media buyer will be able to see how his budget trickles down to the publishers' pockets and reallocate their ad spend to the best-performing traffic sources.
2. Automated KPI Optimization is another valuable feature of the DSP to corner the ad tech market. The vast majority of the DSPs in advertising has developed the automated ad optimization tools like bidding autopilot to cut advertisers' time losses.
Bidding Autopilot automates ad performance optimization with a system of bidding rules. Based on settings and conditions you choose, bidding rules make automatic changes in your account: they update white/blacklists, bid prices, and more. This tool keeps your budget away from underperforming traffic sources and increases ad campaign performance in no time.
One of the examples of the demand-side platform with a bidding autopilot feature is Epom DSP.
3. Queries per second (QPS) is the metric reflecting how many times a DSP gets called to make a bid on an ad placement to reach a user.
More QPS in a DSP means the higher speed of analyzing and acting on those bids. It's a simple numbers game: the greater the scale of an ad campaign - the higher bidding visibility it will drive. It provides programmatic algorithms with more information.
After making a bid to reach a unique user at a specific price, the demand-side platform learns if the price was accepted. If the price was not accepted, the DSP is notified that it may require a higher rate to win future bids. However, many DSPs have poor traffic filtering options, which means they can bid on the same publisher's traffic across multiple ad exchanges. The high amount of QPS means duplicate-free impressions.
4. Real-time analytics. Immediate actions are sewn into a demand-side platform definition. The tool's interface should be as close to real-time as possible since you need the most recent stats to analyze campaign performance and make timely decisions.
Decide if the "real-time" is crucial for your business and clarify how long is the delay in the analytics feature of DSP providers that you consider. For example, AppNexus have an hour delay in analytics, while Epom DSP has a 1.5-sec delay.
5. Variety of ad formats. An essential criterion of demand-side platform evaluation for your advertising is the ability to run omnichannel campaigns with non-standard ad formats like popups, popunders, or rich media.
Since DSPs are incurring high costs on impression processing, they are usually focused on one particular channel (e.g., desktop display) more than others. Define the top 2-3 ad channels that your advertisers need and define which DSP vendors suit your needs best.
6. Pricing. The cost of using a demand-side platform often depends on the size of a campaign or the media budget you have. Some DSP vendors charge a flat fee while others take a commission on volume.
Epom Market DSP, which is self-serve, has a bid-markup but is free to use. In the case you are looking for a white-label DSP option, giant DSP providers charge a minimum of $8500 monthly fee + 5% revenue share, so if the pricing plan scares you, consider smaller vendors like Epom. We take only $2000.
Before partnering with a DSP provider, clarify if there are any additional fees for the DSP's support staff to set up and optimize your campaigns, and also understand if you should pay for the advanced data.
Should I Build My Own DSP?
Even with the rapidly changing digital advertising landscape and enormous competition, there are numerous people on Quora saying: "Want to build something amazing — build it yourself."
This applies to DSP technology, as well. Aside from asking questions like "What is a DSP in ad tech," "What is a DSP meaning in advertising?" or "Could you recommend me a good mobile demand-side platform?", they ask how to build their own DSP platform and if it is worth the hassle.
I identified two issues to take into account BEFORE starting the demand-side platform development process.
Competition Issue
After the rise of header bidding, the number of available impressions increased drastically, and even large DSP and SSP vendors had trouble evaluating and deduplicating them.
Demand-side platforms need to reduce processed ad impressions and pick the most transparent traffic from publishers that could be duplicated across all exchanges.
Newborn DSP platforms have trouble getting exclusive traffic. SSPs usually send all their bids to the bigger DSPs, while those DSPs who spend $5 000- $20 000/mo don't see as many impressions.
The top 5 spending DSPs
High Initial Investments
The main components of a DSP are an RTB bidder, ad server, and data platform. They require large investments and quite rare software development experts to be built.
Be sure to calculate the cost of servers, investments required for building a platform, maintenance costs, etc. If you pay a hefty commission to the demand-side platform provider, it would be reasonable to not think about making your own in-house DSP platform from scratch. And what's even better, to find a quality white-label DSP software solution and buy it.
What is a White Label DSP?
So what does a white-label DSP stand for in advertising? White Label DSP is a technology that can be used as a basis for creating your own demand-side platform. You can customize its look by changing colors, brand identity, and other tailored features. Such a revamp requires minimum capital investment. Therefore, you may concentrate on your marketing goals and advertising campaigns, rather than on developing your own DSP software.
White-label DSP's benefits over a self-serve one are clear. You can connect to multiple SSPs, increase your traffic volume, and optimize your campaigns through a single platform, without bidding several times on the same traffic through multiple DSPs. White Label DSPs in 99% of cases come with total transparency as you control the sources where your traffic is coming from.
Here is the short list of White Label Demand-Side Platforms available on the market:
Evaluate them while keeping the key features in mind. Also, stick to the simple solution that matches your programmatic media buying needs and has no hidden fees.
The reason why demand-side platforms have gained so much popularity is that they allow both ad networks and agencies to get the best advertising opportunities while preserving full control over their budgets.
Disadvantages of Using a Demand-Side Platform
There can't just be rainbows & unicorns. What are the possible issues with a DSP?
The main problem here is the DSPs per se but the massive amounts of fraudulent traffic sold by publishers. Bot farms, ad spoofing, and injectors are just a few of the most common ways to falsify traffic.
DSP Consolidation
According to a recent study by Pathmatics, advertisers cut the usage of demand-side platforms from seven to four DSPs per month. As marketers put more focus on reaching the right audience, it becomes difficult to coordinate multiple demand-side platforms.
An average number of DSPs used by US Advertisers
Agencies cut off non-transparent DSPs by a considerable margin while pushing for more transparent and closer relationships with preferred partners.
The right demand-side platform will give you convenience in managing your campaigns amidst a very competitive and ever-changing environment. Knowing what is demand-side platform and how it can help you scale up your programmatic media buying, you'll be able to choose the one that fits your shoes best.
Learned the demand-side platform definition? Let's move further! Read more articles about programmatic to educate yourself or sign-up to try a DSP.
Rate this article
(2 ratings, average: 5 of 5) | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9308799505233764}", 'metadata': "{'Content-Length': '53589', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JR6QCK7IK66KJXYWOAJHPR5O727GT26Q', 'WARC-Concurrent-To': '<urn:uuid:509bddba-9848-4012-841f-f28895d5d6b5>', 'WARC-Date': datetime.datetime(2019, 12, 6, 16, 10, 11), 'WARC-IP-Address': '104.131.115.228', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:X7GILH7HK3AE5O2H3UMU6YCG2XJ5KGGW', 'WARC-Record-ID': '<urn:uuid:b97ee727-7f73-4f10-a81d-9abd649b3f11>', 'WARC-Target-URI': 'https://epom.com/blog/programmatic/5-questions-about-dsp-you-need-to-know', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:56691834-6b9b-4926-af73-55c5d16bc5ae>', 'WARC-Truncated': None}", 'previous_word_count': '1853', 'url': 'https://epom.com/blog/programmatic/5-questions-about-dsp-you-need-to-know', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-206.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2106531858444214', 'original_id': '8a8179ef14d00714bf86a7728fcaf205352e9346a583856106a9b9293a7b855a'} |
Rudolf Joachim Seck
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Rudolf Joachim Seck
Born 15 July 1908
Bunsoh, Dithmarschen, Germany
Died 1974 (aged 65–66)
Flensburg, Germany
Criminal penalty Life imprisonment
Motive Nazism
Conviction(s) Crimes against humanity at Jungfernhof concentration camp and other places in Latvia.
Activities during World War II[edit]
Seck held the SS ranks of Unterscharführer and later Oberscharführer (Staff Sergeant).[2][3] He was the commander of Jungfernhof concentration camp, near Riga, Latvia.[3][4] His office was at the Gestapo headquarters in Riga on Reimerstrasse.[1]
According to Joseph Berman, a Jewish man from Ventspils and a survivor of The Holocaust in Latvia, who was assigned to the work detail cleaning Seck's automobile, Seck was closely associated with Rudolf Lange, the main SS leader in occupied Latvia.[1] Seck made it a habit to meet, at the Šķirotava Railway Station, trains of Jews deported from Germany, Austria, or Czechoslovakia. Theoretically these Jews were to be sent to the Riga Ghetto or the Jungfernhof or Salaspils concentration camps, but usually this did not occur, as Seck would instead take them to Biķernieki or Rumbula forests, near Riga, and shoot them.[1]
Seck also traveled about Latvia, the Baltic states and Belarus with Nazi convoys to fight partisans or liquidate various camps and ghettos.[1] The Gestapo maintained a clothing depot in Riga, on Peterholm Street, where the belongings of murdered Jews would be collected. Seck was seen at the clothing depot appropriating for himself suitcases of new clothing and jewelry.[1] Seck personally beat and maltreated prisoners on a regular basis.[1]
Seck was responsible for selecting between 1600 and 1700 Jews from among the Jungfernhof concentration camp inmates to be transported, on 26 March 1942, to the Biķernieki forest to be murdered in what became known as the Dünamünde Action.[2][3][5]
Convicted of crimes against humanity[edit]
Following the war, Seck was tried in West Germany before the Landsgericht Hamburg with other Nazi personnel who planned or participated in the murder of Jews in Latvia. In 1951, Seck was convicted and sentenced to life in prison.[5] Among his crimes were his personal murder of eight Jews, including seven in Jungfernhof. The court described these murders as follows:
“One day in January or February 1942, the witness Le., who was on the Hamburg transport that arrived in Jungfernhof in December 1941 where she worked in the sewing room, walked across the yard looking for Seck from whom she required further instructions regarding a sewing job for him.
She observed the accused leave the so-called men’s block driving five old men before him. The witness stopped near the witness; the five people had to stand to attention and then kneel (...) She addressed the accused with her question regarding the sewing work but received no answer. The accused repelled her with a movement of the hand and began to shoot the Jews one after the other with a shot in the back of the neck from a distance of 2 to 3 metres. When the witness tried to run away after the first shot, the accused threatened to shoot her if she did not remain. The witness was forced to witness the further shootings. The accused then shot the other four Jews. Between the individual shootings he paused to insult his victims by calling them lazy or venereal dogs. (...)[2] | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '45', 'language_id_whole_page_fasttext': "{'en': 0.9656293988227844}", 'metadata': "{'Content-Length': '64727', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PNZTGPWXXWMFKJS7EWMSBSD3ZFXYTTZ2', 'WARC-Concurrent-To': '<urn:uuid:da1c9d3a-2c82-4db4-b4e8-42973862b3d6>', 'WARC-Date': datetime.datetime(2013, 12, 13, 13, 22, 41), 'WARC-IP-Address': '208.80.154.225', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:7LTLHDOQCXZDNWRH4EZUXKP7K6ASP2ZG', 'WARC-Record-ID': '<urn:uuid:42849317-fab7-4d9d-8ecb-7b1315463b08>', 'WARC-Target-URI': 'http://en.wikipedia.org/wiki/Rudolf_Joachim_Seck', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:99952b20-0d1b-4bbc-814d-f458f868c303>', 'WARC-Truncated': None}", 'previous_word_count': '592', 'url': 'http://en.wikipedia.org/wiki/Rudolf_Joachim_Seck', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12206745147705078', 'original_id': '1d53e7a76ab91dd27c957dfeff3c8c1386b997c20879b9a46392623f45c1ce4f'} |
<?xml version='1.0' encoding='utf-8'?>
<section xmlns="https://code.dccouncil.us/schemas/dc-library" xmlns:codified="https://code.dccouncil.us/schemas/codified" xmlns:codify="https://code.dccouncil.us/schemas/codify" xmlns:xi="http://www.w3.org/2001/XInclude" containing-doc="D.C. Code">
<num>1-325.45</num>
<heading>Annual report; review of funding priorities.</heading>
<para>
<num>(a)</num>
<text>The Superintendent shall submit to the Council, the Mayor, and the Board of Education, an annual report containing the following information:</text>
<para>
<num>(1)</num>
<text>A summary of any real estate portfolio review and business plan studies for potential partnership development completed by the Superintendent;</text>
</para>
<para>
<num>(2)</num>
<text>The number of projects developed by the Superintendent;</text>
</para>
<para>
<num>(3)</num>
<text>The number of projects financed by the Schools Modernization Fund that:</text>
<para>
<num>(A)</num>
<text>Created additional capacity within the District of Columbia Public Schools for special education students or programs;</text>
</para>
<para>
<num>(B)</num>
<text>Created additional capacity for vocational education programs;</text>
</para>
<para>
<num>(C)</num>
<text>Created a co-location arrangement with a public charter school; or</text>
</para>
<para>
<num>(D)</num>
<text>Developed a shared-use facility or site between the District of Columbia Public Schools and another District agency.</text>
</para>
</para>
</para>
<para>
<num>(b)</num>
<text>The Superintendent shall review the priorities for use of revenue from the Schools Modernization Fund specified in <cite path="§1-325.44">§ 1-325.44</cite> every 5 years and make recommendations to the Mayor, the Council, and the Board of Education on their continued validity or propose new priorities.</text>
</para>
<annotations>
<annotation doc="D.C. Law 16-33" type="History" path="§4046">Oct. 20, 2005, D.C. Law 16-33, § 4046, 52 DCR 7503</annotation>
<annotation type="Emergency Legislation">For temporary (90 day) addition, see § 4046 of Fiscal Year 2006 Budget Support Emergency Act of 2005 (D.C. Act 16-168, July 26, 2005, 52 DCR 7667).</annotation>
</annotations>
</section>
| mini_pile | {'original_id': '1bb9bacc78710555c472b0fd4b210b11c9f92fcad2a78865dc2fb1de677dcc05'} |
swagger: '2.0'
info:
version: 0.0.0
title: 'Enum'
description: |
Format validation generation
contact:
name: API Support
url: http://www.example.com
email: contact@github.com
consumes:
- application/json
produces:
- application/json
definitions:
aListOfDates:
type: array
items:
type: string
format: date
myObject:
type: object
properties:
thisListOfDates:
$ref: '#/definitions/aListOfDates' #<- there is still (another) a bug to validate this
paths:
paths:
/fixture:
get:
responses:
200:
description: OK
| mini_pile | {'original_id': 'de9aeb1f31e3a4b5fc576150b8d0b3dae4367f9b1a807629f61f861a5b841a6b'} |
/*
* This header is generated by classdump-dyld 1.5
* on Wednesday, October 27, 2021 at 3:18:36 PM Mountain Standard Time
* Operating System: Version 13.5.1 (Build 17F80)
* Image Source: /System/Library/PrivateFrameworks/BarcodeSupport.framework/BarcodeSupport
* classdump-dyld is licensed under GPLv3, Copyright © 2013-2016 by Elias Limneos. Updated by Kevin Bradley.
*/
@class NSDictionary, NSString, NSArray;
@protocol BCSActionPrivate <BCSAction>
@property (nonatomic,copy,readonly) NSDictionary * debugDescriptionDictionary;
@property (nonatomic,copy,readonly) NSString * extraPreviewText;
@property (nonatomic,copy,readonly) NSArray * appLinks;
@property (nonatomic,readonly) BOOL isInvalidDataAction;
@property (nonatomic,readonly) BOOL isWiFiAction;
@required
-(NSArray *)appLinks;
-(NSString *)extraPreviewText;
-(NSDictionary *)debugDescriptionDictionary;
-(BOOL)isInvalidDataAction;
-(BOOL)isWiFiAction;
@end
| common_corpus | {'identifier': 'https://github.com/lechium/iOS1351Headers/blob/master/System/Library/PrivateFrameworks/BarcodeSupport.framework/BCSActionPrivate.h', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '2022.0', 'title': 'iOS1351Headers', 'creator': 'lechium', 'language': 'C', 'language_type': 'Code', 'word_count': '89', 'token_count': '291', '__index_level_0__': '8383', 'original_id': '6960bbc765af51a8b7ecbe1c1ea6bb3671a0bbcd27e4f374a9ebba49856c0c0d'} |
/**
* Copyright 2011 The Buzz Media, LLC
* Copyright 2015-2019 Mickael Jeanroy
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.thebuzzmedia.exiftool.it.builder;
import com.thebuzzmedia.exiftool.ExifTool;
import com.thebuzzmedia.exiftool.ExifToolBuilder;
import com.thebuzzmedia.exiftool.Version;
import com.thebuzzmedia.exiftool.exceptions.ExifToolNotFoundException;
import org.assertj.core.api.ThrowableAssert.ThrowingCallable;
import org.junit.Test;
import java.util.UUID;
import static com.thebuzzmedia.exiftool.tests.TestConstants.EXIF_TOOL;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
public abstract class AbstractExifToolIT {
@Test
public void it_should_get_version() {
ExifTool exifTool = create()
.withPath(EXIF_TOOL.getAbsolutePath())
.build();
Version version = exifTool.getVersion();
assertThat(version.getMajor()).isEqualTo(10);
assertThat(version.getMinor()).isEqualTo(16);
assertThat(version.getPatch()).isEqualTo(0);
}
@Test
public void it_should_fail_with_missing_exiftool() {
final String path = "/" + UUID.randomUUID() + "/exiftool";
final ExifToolBuilder builder = create().withPath(path);
ThrowingCallable build = new ThrowingCallable() {
@Override
public void call() {
builder.build();
}
};
assertThatThrownBy(build)
.isInstanceOf(ExifToolNotFoundException.class)
.hasMessageContaining("Cannot run program \"" + path + "\"")
.hasMessageEndingWith("error=2, No such file or directory");
}
abstract ExifToolBuilder create();
}
| common_corpus | {'identifier': 'https://github.com/mristuccia/exiftool/blob/master/src/test/java/com/thebuzzmedia/exiftool/it/builder/AbstractExifToolIT.java', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Apache-2.0', 'date': '2020.0', 'title': 'exiftool', 'creator': 'mristuccia', 'language': 'Java', 'language_type': 'Code', 'word_count': '207', 'token_count': '674', '__index_level_0__': '23145', 'original_id': 'ac3af8571b3a7616db82a6dc4f77d16ccb206ac4b326086a4b29c77975eb0039'} |
According to the UN, 300 million people came online for the first time last year. Put another way, in 2015, there were more people using the Internet for the first time than there were Americans using the Internet already.
But the computing experience for most of these first-timers, coming online in places like India, Indonesia and the Philippines, is very different from the one many of us grew up with – and not the one that most of Google’s services were originally designed for. Their main (and in most cases, only) “computer” is a low-cost smartphone. Connectivity is expensive in relation to incomes, and frequently patchy – websites, maps and especially videos can take minutes to load and often time out. And for many, there is just not enough relevant content available in their language.
Here are a few of these first-timers, as captured by a Googler in Indonesia
Here are a few of these first-timers, as captured by a Googler in Indonesia
These aren’t easy problems to fix, but we’d like to do a better job of addressing them. That’s why we’re building a new engineering team in Singapore – to get closer to the next billion users coming online and to develop products that will work for them.
We’re kicking this off in a few ways:
First, the team from Pie.co, a Singapore-based startup, will be joining Google in Singapore to help kick-start our engineering team here.
Third, for talented students from Singapore interested in pursuing an engineering career at Google in Singapore, we’re looking now for people to join our 12-week engineering internship program, which will take place in Australia. Please apply here before the end of the month if you are interested.
Last, but not least, we look forward to welcoming engineers from across the world who have deep ties to Singapore, want to come back home, or would like to start calling Singapore their home. If you’d like to learn more, feel free to register here for an information session I’ll be hosting in Mountain View, California on March 8th from 6-8pm.
In many ways, Singapore feels like the best place to do this. It is hyper-connected, with some of the fastest Internet speeds in the world. And, it sits at the center of a region with half of the world's current Internet users, and more new Internet users coming online every day than anywhere else in the world.
Through our new engineering team here, coupled with work being done by many Google teams around the world, we hope to continue advancing our mission to organize the world’s information and make it universally accessible and useful.
As our CEO, Sundar, and I spoke about in India back in December, we’ve been working on this in a number of ways for some time now. To bring fast and affordable access to more people around the world, we’ve been working on things like high-speed Wi-Fi in railway stations across India. To help people access the info they need, even when their data is limited, we’ve made Search work faster with less data usage, and enabled Google Maps and YouTube for offline use. And to help people shape the Internet, and make it their own, we’ve made sure our platforms like YouTube work across 76 languages, allowing people to create, upload and engage in their own language, through their own eyes and culture.
These are still early days, but we’re excited about the progress we’re making on this journey, and we look forward to sharing more with you in the months and years ahead. Stay tuned. | mini_pile | {'original_id': '50b0b553d0347303a48c0ebb56ad4db3c729a3e128a951972ff25429e3202213'} |
''We can't have a system - and G20 leaders have made that clear here - we can't have a system where some of those institutions that are pushing back on this are still reliant ultimately on the state and are getting a massive subsidy from the taxpayer.'' Australia's banking regulator, John Laker, last week also hit back at bank lobbying for softer capital rules, arguing against ''turning back the clock on regulatory reform''. A former executive at Goldman Sachs in London, Tokyo, New York and Toronto, Mr Carney moved to the top job at the Bank of England last July direct from his post at the top of the Bank of Canada. He is the first non-Briton to lead the bank that governs the City of London, a transition Britain's Chancellor of the Exchequer joked would be made easier by the fact that as a Canadian he was already subject to the Queen. ''Let's put in some context,'' he said, returning to mutterings about his ideas being too tough. ''If you look at a major mining company in Australia or around the world they will run with let's say 50 per cent equity to total capital. It depends slightly on the industry, slightly on where they are in the cycle, but let's say the average leverage ratio is two to one. The leverage ratio for banks, this 'big blunt horrible blunt instrument', is 33 to one.'' But requiring more capital is just the start, because it could never be enough. The governor wants the world's biggest banks to be backed not just by shareholders funds but by ''bail-in-able bonds''.
''Then the bondholders would know - not depositors, but the bondholders - that, if one of these banks made mistakes and needed to be recapitalised, the bondholders would become equity holders,'' Mr Carney said. ''It has two advantages. One is it is more efficient and builds buffers in the banks. Secondly, it means the bondholders actually pay attention to what the banks are doing. Into the crisis and quite frankly throughout the crisis, the lesson has been that the bondholders have a free ride, because basically they own government debt.'' Mr Carney's aim is to protect depositors and governments to the greatest extent possible. The exact size of the bail-in-able bond requirement would be decided by the Financial Stability Board, most likely at the next G20 meeting in Brisbane. It would not apply to Australian banks, only to the 29 ''globally systemic'' banks whose failure would have worldwide consequences. But he is keen to commend the idea to his Australian counterpart, Glenn Stevens, himself once touted for the job at the Bank of England that Mr Carney got. As governor, the 48-year-old Canadian is also in charge of the more public side of the Bank of England, the one that manages the economy and sets interest rates. And he has become a victim of his own success. In a bid to end five years of stagnation, he gave an undertaking. He would keep interest rates low for as long as it took to cut Britain's unemployment rate from 7.8 per cent to 7 per cent.
''I met over 700 businesses and the message went through loud and clear: it made them more keen to hire, and more keen to invest. We are now the fastest-growing major economy, we have the fastest employment growth on record, inflation back at target, and inflation expectations well anchored. ''It's hard to find a criteria by which you would not judge it successful.'' But unemployment is now down to 7.1 per cent and businesses are getting nervous about the implicitly promised rate rise. ''We've made it through the easy phase of guidance, which is to say what we would not do,'' Mr Carney emphasises. ''Now it becomes a question of what will we do and how and under what criteria as the economy continues to recover. ''By necessity that's a more complex set of judgments. We are trying to provide assurance that: (a) we will not take risks with the recovery; and (b) we are going to set the path of monetary policy in a way that ensures that we see sustainable growth in jobs and incomes and in spending.''
Loading Mr Carney agrees that it won't be easy. But he makes even that sound easy. He ran 10 kilometres from Bondi Beach to Clovelly and back on Saturday morning. He made that, too, sound easy, and he said Sydney was beautiful. With Clancy Yeates | mini_pile | {'original_id': 'ae6ae27e8fee666969fada6a4fcb46c2f0ac202c2384dc52129c7359b725ab87'} |
The Interfaith Challenge
Colleges have much to gain from the religion-focused community service program President Obama has proposed, argue Eboo Patel and Cassie Meyer.
March 29, 2011
--President Barack Obama, in a video announcing the President’s Interfaith and Community Service Campus Challenge
When a university president shakes hands with a senior on graduation day, she is likely confident that the student has certain positive knowledge, attitudes and behaviors toward diversity, including racial, ethnic, sexual orientation, class, and gender diversity. If she’s feeling optimistic, she might expect these attitudes toward diversity to shape students’ civic participation and leadership beyond college.
So where is religious diversity in this mix? What knowledge, attitudes, and behaviors should a college president expect of her graduates when it comes to the Catholics and Protestants, Muslims and Jews, Hindus and nonbelievers that make up the American fabric? Religion is increasingly prevalent within American public and political discourse, and religious intolerance is at significant levels toward groups like Muslims, Mormons, Evangelicals and Atheists. Intolerance toward Muslims and Mormons appears to be rising.
These rates and attitudes mirror prejudices that Catholics and Jews have faced in the past. The good news is that Catholics and Jews are now -- according to Robert Putnam and David Campbell’s research -- among the most favorably viewed by their fellow Americans. How did this powerful change occur? Social science data suggest that increasing appreciative knowledge of these religions and expanding opportunities for meaningful positive encounters with Catholics and Jews were the keys.
Given that colleges and universities are places that facilitate encounters with and knowledge about diversity, could higher education play a similar role with regard to today’s more expansive religious diversity?
On March 17, President Obama offered colleges and universities an opportunity to address this question: the President’s Interfaith and Community Service Campus Challenge. Obama invited campuses to commit to a year of interfaith cooperation and community service programming on their campuses, bringing students of different religious and nonreligious backgrounds together to serve the common good. This challenge allows us to highlight those dimensions of different religious traditions that inspire service and social justice and create spaces where students from different backgrounds can have positive meaningful encounters by working together to apply these shared values.
Obama was right to pick colleges and universities as the proving ground for this work. Other forms of diversity have robust curricular and co-curricular initiatives meant to foster appreciative knowledge about diverse traditions and positive meaningful encounters between students of diverse backgrounds. President Obama is asking us to do the same work with regards to America’s religious diversity.
So what kind of impact might we expect to see as campuses take on this challenge?
1. College and university presidents will start talking to each other about why this work matters, and why it ought to be an institutional priority. As campuses articulate an institutional commitment to interfaith cooperation, we hope it sparks a national conversation among higher education leaders, and that college and university presidents will encourage and challenge one another in their advancement of this work.
2. Learning from the broader diversity movement, colleges will begin to address these topics in the classroom to build students' appreciative knowledge. We imagine specialized courses such as the history of the interfaith movement or theologies of service in different religious traditions, as well as interdisciplinary curriculums that will explore interfaith cooperation within a variety of fields, such as political science, history, and sociology. The latter curriculums will be aimed at engaging a broad swath of the student population.
3. Campuses will initiate broad co-curricular programming meant to intentionally foster positive encounters between students of different religious and nonreligious backgrounds. Just as students participate in regular service-learning days, and diversity is incorporated into training for orientation leaders and RAs, campuses will get creative about programming that engages a significant number of students in interfaith cooperation, like campuswide interfaith action campaigns and religious diversity trainings for RAs.
4. The work of engaging religious diversity on campus will move from niche to norm. Excellent interfaith initiatives exist on many campuses, but they are often run by a single chaplain or small campus unit who only has resources to reach a small group of students. When engaging racial and ethnic diversity became a priority on campuses, we saw sustainable campuswide curricular and co-curricular programs and a national exchange of best practices and measurement for impact. Our hope is that we are nearing a similar tipping point for this work.
5. Campuses – with students leading the way – will harness the social capital of their communities and demonstrate the power of interfaith cooperation. We think about Greg Damhorst, a student leader at the University of Illinois at Urbana-Champaign, who with religious and nonreligious student groups mobilized 5,119 volunteers to pack 1,012,640 meals for earthquake survivors in Haiti. A local paper called the event the largest humanitarian effort ever staged outside of a major metropolitan area. This challenge should inspire projects like Greg’s on campuses all over the country, with students of diverse religious and nonreligious backgrounds making real impact on social issues.
6. We will see measurable changes in national knowledge, attitudes and behaviors toward religious diversity. As college students who simply think it is normal to cooperate with those who believe differently from them graduate and begin to take leadership, we hope that some of the dismal numbers on religious tolerance might significantly shift.
So what will it take for a college president to know that her graduating seniors are ready to lead in and engage with a religiously diverse world? Obama’s interfaith challenge offers the chance to find out.
Eboo Patel is founder and president and Cassie Meyer is director of content at Interfaith Youth Core (IFYC), an organization that works with college campuses on religious diversity issues. IFYC is a close adviser and partner for the White House on this effort.
Be the first to know.
Get our free daily newsletter.
Back to Top | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '54', 'language_id_whole_page_fasttext': "{'en': 0.947624146938324}", 'metadata': "{'Content-Length': '121301', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KWICT6JJ42HM6KFZ5JKA7T4OJO6JCOMI', 'WARC-Concurrent-To': '<urn:uuid:f0174019-c131-4f9f-b026-af870f48d4d9>', 'WARC-Date': datetime.datetime(2020, 9, 27, 8, 7, 38), 'WARC-IP-Address': '104.25.117.53', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:67L4SX54UJ2YHXP2P6AEWLNMF6FKXRX3', 'WARC-Record-ID': '<urn:uuid:9c451ddf-4664-444f-a19e-5dfb7d324ba5>', 'WARC-Target-URI': 'https://www.insidehighered.com/views/2011/03/29/interfaith-challenge', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:978383b0-bd23-407d-b5c3-29d46c3986e5>', 'WARC-Truncated': None}", 'previous_word_count': '1053', 'url': 'https://www.insidehighered.com/views/2011/03/29/interfaith-challenge', 'warcinfo': 'isPartOf: CC-MAIN-2020-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-232.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03817641735076904', 'original_id': '8c425e8623a6e7925cb699ebce577c5f18f560138adebd1fd90f71e9d338f144'} |
US Midterm Elections result in two Pro Crypto Officials in Office
The US Midterm elections are over and the results are in. Republicans will continue to rule the Senate, and Democrats dominate Congress. There are many new leaders that have taken seats, to many to shake a stick at in fact, but there are two new leaders that are raising hype in the crypto world.
The gubernatorial elections resulted in two new democrat, pro-crypto, leaders being appointed governor. One for California and one for Colorado.
California
Winning 59% of votes in California is democrat Gavin Newsom, defeating his republican contender John Cox to become California’s governor. According to the The Sacramento Bee, the local newspaper, Newsom became one of the first high-profile politicians to accept campaign donations in Bitcoin back in 2014.
For Newsom’s latest campaign run, he hosted a BitPay page that accepted Bitcoin and Bitcoin Cash for campaign donations. Newsom reportedly received $116,800 in campaign donations from the crypto celebrity Winklevoss twins in 2017. Though it’s been confirmed the twins did make this donation, they did so using fiat currency and made none of the donation using crypto.
Newsom does not often express his support or interest in blockchain, but shows what support he does subtly. Newsom has not made any direct speeches, comments or posts on where he stands on the topic. Newsome stated back in 2014 that he’ll “promote the technology ever so subtly by saying I’ll accept bitcoin in the campaign.”
Colorado
Republican Walker Stapleton was met with defeat this election when his democratic opponent Jared Polis sealed down 51.6% of votes. Polis also hosted a BitPay account for his campaign that similarly accepted Bitcoin and Bitcoin Cash.What dramatically differs these two pro crypto governor’s, is that Polis unlike Newsom, is not subtle when it comes to talking and promoting his stance on blockchain technologies. In fact, Polis devoted an entire page on his campaign website to talking about the five areas of blockchain technology that he plans on exploring into in his blockchain policy.
The five areas include voter protection, cybersecurity infrastructure, blockchain-based solutions to improve Colorado’s energy grid, and the use of public ledgers so that there’s more transparency regarding state contracts, expenditures, and other government bureaucracy.
Polis’s blockchain policy pulls a lot of its foundations from the US state of Wyoming, who back in March of this year defined cryptocurrencies as “Utility Tokens”, creating a new class of assets. Wyoming’s legislature has also recently passed a bill that effectively exempts cryptocurrencies from state regulations,. The bill was signed into law by Governor Matt Mead.
Polis outline his desires for blockchain firms to “flock to the state” stating that further work and development of the industry can create “government applications that save taxpayers money and create value for Colorado residents.”
Polis continued on to state that he promises “to create a statewide safe harbor designed to exempt cryptocurrencies from state money transmissions laws.” Polis has plans to “establish legislation that protects ‘open blockchain tokens’ or cryptocurrencies that are exchangeable for goods and services,” from heavy and tiresome licensing requirements that apply under extant securities and currency laws.
Nationwide
While any crypto or blockchain legislation has yet to create and impact in the US, certain leaders such as Polis and Mead have hopes that they will. Congress still seats some blockchain supporting officials (not one woman among them) after the elections. Though Brad Sherman, sometimes called “the most hated congressman” in the crypto world, will continue to hold the same seat he’s held since 1997 winning 70% of the vote.
What does America need to do, so that i can capture the attention of it’s voters and make way for a generation of pro-blockchain officials? It needs a ruckus.
The political world is still to bland for crypto and blockchain political news to grab any attention. When you see a candidate that’s ‘pro blockchain’, it doesn’t grab as much attention as it should That’s because we don’t have any radical anti-crypto or anti-blockchain candidates running, or at least none who actually make it into the elections.
Disagreement and arguments is what grabs voter’s attention.
No one turns on the TV to watch a presidential agreement. People turn on the TV to watch a presidential debate, or any debate for that matter. No one’s attention is going to be grabbed by candidates who all agree blockchain is good, or neutral parties. We need pro and anti crypto candidates to take the stage next election.
Not only will having disagreeing viewpoints on crypto and blockchain grab voter’s attention, but it will encourage and entice voters to educate themselves on the topics.
Cryptochats is the ultimate source for all forms of cryptocurrency media, news, networking, and information. Our goal is to provide you with the latest trends utilizing blockchain technology, which is possibly the most important invention of the 21st century. Cryptochats is passionate about educating society about cryptocurrency and other innovations using blockchain technology. We believe that the more you know, the more you succeed. When you succeed, decentralized currency succeeds, and we all win. If the future of finance is digital, we want to empower you to navigate the digital finance age. | mini_pile | {'original_id': '3c76cb29d11041518c7e403e0256322d84f8089cc56158dec00d16645fac41b8'} |
Top 10 Ways to Nurture a Thriving Creative Culture
From the recent SPARKCon, a creative conference for the Southern states in the US. One of the community discussions were the top 10 recommendations of how to build a creative scene in your area or, I dare say, in your country.
1. Foster a vibrant urban core featuring a diverse mix of interests, ethnicity, and ages
2. Increase focus on green spaces that allows people to enjoy the environment
3. Develop safer pedestrian and bicycle activity to encourage people to explore
4. Create dynamic public spaces where arts and technology can intermingle
5. Support collectives as incubators of creativity
6. Develop an information hub to publicly promote all creative activities from new patents to gallery shows
7. Encourage programs to foster emerging talent of all types—from small shops and restaurants to artists and inventors
8. Regularly exhibit and celebrate home grown talent of all kinds in public projects
9. Improve public transit infrastructure to bring people to public squares, urban cores, and green spaces
10. Promote tolerance and gain insight from our many different backgrounds
Very relevant, particularly in Asia, where there is a huge push for city centres such as Singapore and Shanghai to adopt a creative culture or be a creative centre.
Via: Gamil
• devin maycare
May 6, 2008 at 8:12 pm Reply
why is “green” and “environment” just thrown into lists like this? – seems far too cliche to me. there was creativity before global warming you know. think people think.
• new zealand news
March 26, 2008 at 8:44 am Reply
I could only dream of such a community! How did they propose making it a reality?
Post a Comment | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9261139631271362}", 'metadata': "{'Content-Length': '109057', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VQ3XXJN7MAX2RNYSC3ZZC5XYURVTZVNY', 'WARC-Concurrent-To': '<urn:uuid:497a06f4-061d-496a-b34d-8c442c93adf3>', 'WARC-Date': datetime.datetime(2021, 9, 24, 11, 17, 15), 'WARC-IP-Address': '85.187.128.44', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ATWBI7SITD7WGYD5WCES32KTOFJ7ULSR', 'WARC-Record-ID': '<urn:uuid:7a9d2808-6ca5-448a-bdbb-6efab39cc406>', 'WARC-Target-URI': 'https://designsojourn.com/top-10-ways-to-nurture-a-thriving-creative-culture/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4055f69b-494b-44c8-8f6a-b48aa95ccdea>', 'WARC-Truncated': None}", 'previous_word_count': '282', 'url': 'https://designsojourn.com/top-10-ways-to-nurture-a-thriving-creative-culture/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-156\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.026855170726776123', 'original_id': 'cde0349eee5f4b8f9e89b302343b39a276c90f1c15bfe416fcc477cc9ff01644'} |
60) Tried IFTTT DO Button on My Phone #NewThingEveryDay
60) Tried IFTTT DO Button on My Phone #NewThingEveryDay
I was a big fan of Tasker, so much so that I bought it back when it was around $8, but since I wiped my phone a few months ago, I just haven’t added it back. Part of the reason was that it was just one more thing running in the background slowing down my phone, but a bigger part is that it was a big pain to set it up. That’s why I thought IFTTT’s DO Button might be interesting, it seemed like a very simple way to automate.
Do Button requires an IFTTT account. Once you’re logged in you can start creating or adding recipes and since you’re logged in all your recipes sync with your IFTTT account. Basically a recipe does something when you press the “DO ” button, which you can either access in the app or create a special button widget. So you could have a page of just DO buttons. Most of the “Channels” or things you’re sending to or controlling are online services anyway, so this really isn’t very useful if you don’t have an internet connection.
The only recipe I found useful was one which emailed you your location when you pressed a DO button, but I’ve only played with the program for an hour or so. It seems to be suffering from the same hype that IFTTT does: all the tech pundits rave about how much time and effort it saves them, but when I look at the recipes they recommend they just don’t apply to me. Half the channels involve services or devices I don’t have and the other half are post this or that automatically to Facebook or Twitter…like either of these services need anymore robotic spam. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9555387496948242}", 'metadata': "{'Content-Length': '41640', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WS2F6ITTXQF34XU73NRR46PASL732SPC', 'WARC-Concurrent-To': '<urn:uuid:fdbe3d23-5b9f-4ffe-b56a-29b842417479>', 'WARC-Date': datetime.datetime(2019, 3, 19, 19, 33, 53), 'WARC-IP-Address': '198.54.115.43', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3WVVSTF2AUXVNWGHENZYH5VRSZP2JTSX', 'WARC-Record-ID': '<urn:uuid:833db924-f92f-4767-a69a-09822a40e539>', 'WARC-Target-URI': 'http://blog.electronsmith.com/?p=1005', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4985e695-d50a-42fd-bece-063ad2c27d60>', 'WARC-Truncated': None}", 'previous_word_count': '302', 'url': 'http://blog.electronsmith.com/?p=1005', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-146-23-210.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10725969076156616', 'original_id': 'c84d82f21d1e017b3d6075a74fbf164dc387ed9c131442647fdd08962be2939c'} |
REUNIONS, FETES ET CONFERENCES A 9 h. 45, « Art et Science s, musée des Arts Décoratifs, 107, rue de Rivoli Visite de l'Exposition d'art sacré moderne. A 10 eures, l'Art et la Vie, musée du Louvre, porte Donon : « Les Signio fixations symboliques de l'art à travers les ât/es t>, par M. J.-L. Blan-chot. — A 14 h. 30, avenue Flan-drin, 96 : Visite du sanctuaire du ~ souvenir de Sarah Bernha1'dt. A 10 h. 30, PArt et la Nature : Visite au musée Cognocq-Jay. Conférence de M. Guérin-Séguier, conservateur-adjoint. — Dans les salons des Amis de la France, 78, avenue des Champs-Elysées : « lÆ Tunisie et ses fastes religieux avec saint Augustin dans les "murs de Cartilage :', par le pasteur Henry Soulier, A 13 h. 3i), salle des fêtes de la mairie du 19e ay-ro.,,bdissenke-nt : Grande matinée picarde. A 14 heures, grand amphithéâtre de la Sorbo-nne : Distribution des récompenses accordées pur la Société protectrice des anim.àllx. A 15 h. 30, au Cercle Interallié, 33, rue dit Faubourg-Saint-Honorê Matinée littéraire donnée par l'Amicale des Réunionnais, en commémoration de Joseph, Bédier. Conférence de M. Raphaël Barquisseau. Au Collège spiritualiste, 17, rue Vlashingto,)t : « Le symbolisme dans la poésie », par J. de Ganay. « L'ésotérisme de Noël s-, par Mme Bordy-Théano. A 17 heures, au musée d'Hygiène, 57, boulevard de Sébastopol : « Qu'est-ce qu'un hygiéniste ? », par M. J. Belier. A 21 heures, salle des fêtes de la i mairie du 9, 6, rue Drouot Séance publique et gratuite donnée par la Société de lecture et de récitation Léon-Ricauier. BANQUETS A midi, salons Bonvalet : Dîner organisé par les anciens combattants et • mutilés corses en l'honneur de M. Marcel Lucain, directeur de Paris-Midi. A 12 h. 30, au Palais d'Orsay : Ban-I quel de l'Union nationale des anciens de la Rhénanie et de la Ruhr. Les avis concernant les naissances, fiançailles, mariages, décès, etc., sont reçus à l'Office spécial de publicité, 29, boulevard des Italiens, Téléphone: ~ Richelieu 69-31. — A 15 heures : partie artistique et sauterl'ie. A 12 h. 40, boul. Malesherbes, 43 : Déjeuner des Amis d'Emile Vitta, : suivi d'une matinée littéraire. BALS A 14 heures, salle Guy, 2, rue t'iaude-Decaen : Matinée dansante donnée par l'Association générale des mutilés de la guerre. Tirage de la tombola. A 14 h. 30, rue Galilée, 6 : Matinée dansante des « Liserés verts », — A l'Hôtel Continental : Matinée dansante donnée par l'Association des anciens élèves fte l'Ecole Col-b-ert. A 15 heures, salons George-V : Matinée dmsante donnée par « la Houille blanche D, A 21 heures, mairie du . 8" : Bai de ta ■î Morvandelle ». COURSES A Vincennes, à 13 heures. LEVRIERS A 20 heures, au cynodrome de Courbevoie. , 1 ,1 LES ASTRES vous conseillent... Prévisions pour demain lundi 19 décembre A midi, le soleil se trouvera à 27°57 dans le Sagittaire la lune entrera d¡:¡,n.s le Sagittaire â 9. h. 30, Si ce jour est celui de voti:ê anniversaire : Vos affaires seront bonnes et vous aurez des gains inattendus. Mais ne spéculez pas. Méfiez-vous d'une perte, vol ou procès qui VOUS menace. Pour tous autres : RAPPORTS SOCIAUX. — L'a matinée ne sera pas bonne. Dans le travail, on acceptera mal la contradiction. La soirée sera meilleure et propice aux discussions amicales, philosophie qltes ou autres. SENTIMENTS. — On se sentira généralement; peu disposé à donner de l'importance aux questions sentimentales. Les mariages projetés ce jour peuvent être retardés. AFFAIRES. — Il conviendra d'éviter toute occasion de procès. Bonne journée pour la médecine. ■■ SANTÉ. —' On se sentira assez mal disposé pendant une bonne partie de la journée. Gare aux troubles du foie et de la circulation. VOYAGES. — Dans la soirée,' le tourisme sera particulièrement actif. Des contrariétés pourront surgir au cours des voyages entrepris en cette journée. Altaïr. Une bonne à tout faire m lu e, LE Dr SCHACHT rapporte à Berlin un projet anglais Si le Reich ne l'acceptait pas, la guerre économique entre les deux pays ne pourrait que s'aggraver De notre correspondant particulier LONDRES, 17 décembre. — Le docteur Schacht, président de la Reichsbank, qui était l'hôte de M. Montagu Norman, gouverneur de la Banque d'Angleterre, est re-. parti aujourd'hui pour Berlin, après avoir eu des entretiens avec les membres du cabinet, les représentants du comité intergouvernemental de secours aux réfugies d'Allemagne et les personnalités du monde économique et financier anglais. Il est arrivé à Londres avec un plan très précis, portant sur le financement de l'évacuation des réfugiés juifs. Ce plan a reçu ici un accueil glacial. Il repart pour Berlin avec un plan anglais d'apaisement économique. Reste à savoir comment les dirigeants allemands vont l'accueillir. ^ La visite n'a donc rien décide, niais elle a permis au docteur Schacht de faire de nombreuses constatations : 1° L'Angleterre "est résolue a lutter contre la concurrence économique allemande sur les marchés de l'Europe centrale et orientale, même au prix de lourds sacri 2° La campagne antisémite en Allemagne a provoqué ici une indignation générale ; 3° Cette indignation explique, dans une certaine mesure, le refus des financiers de la Cité de prendre en considération le projet dù maréchal Gœring, en ce qui concerne l'évacuation des réfugiés juifs ; .. 4° Les milieux financiers anglais sont beaucoup moins sensibles qu'autrefois aux arguments bien connus du docteur Schacht, selon lesquels il faut venir en aide à l'Allemagne pour éviter qu'elle ne tombe entre les mains des extré-mistes. Le chancelier Hitler était disposé à permettre aux juifs de quitter l'Allemagne avec 15 % de leur'capital, à condition que l'Angleterre et les autres puissances augmentent leurs importations en Allemagne, sans que pour cela celle-ci augmente ses exportations. Le plan a été rejeté d'emblée, d'autant plus que les financiers israélites de la Cité n'auraient jamais consenti à s'y associer. Par ailleurs, le Dr Schacht a discuté longuement la question plus générale des relations économiques anglo-allemandes. A l'heure actuelle, les deux pays sont en lutte sur la plupart des marchés européens. Les dirigeants de l'industrie anglaise ont averti le Dr Schacht que si un accord n'intervenait pas, ils n'hésiteraient pas à réduire leurs prix pour maintenir leur volume d'exportations. Ils ont soumis au président de la Reichsbank un plan détaillé qui permettrait aux deux pays de se faire une concurrence loyale. On pense que le Dr Schacht a 1 . été impressionné par la vigueur des arguments anglais et qu'il insistera auprès du maréchal Gœring pour que les projets d'apaisement soient acceptés. F. MOULIER. Du vin de Beaune pour le roi d'Angleterre DIJON, 17 décembre. — A la demande de M. Herriot, la commission administrative des hospices de Beaune vient de faire parvenir au roi d'Angleterre quelques caisses de vins choisis parmi ses meilleures réserves : Corton 1921, Meursault 1934 et une cuvée des Dames hospitalières. Cet envoi a été fait en raison du fait que le grand vin des Hospices avait été particulièrement apprécié par le roi au déjeuner de Vers,ailles. L'EXPOSITION DU PROGRÈS SOCIAL DE LILLE , SORT DE TERRE Plusieurs premières pierres ont été posées ce matin LILLE, 17 décembre. — Les préparatifs de l'Exposition du progrès social, qui se tiendra à Lille et à Roubaix en mai prochain, se poursuivent activement. Ce matin, ont eu lieu plusieurs cérémonies de pose de premières pierres. C'est ainsi que le maire de Lille a posé la première pierre de la grande halle qui sera un des coins les plus pittoresques de l'Exposition ; le recteur de l'université de Lille, M. Hardy, a posé celle de l'école rurale et des P. T. T. y M. Genêt, ingénieur en chef du département, celle de la gare routière ; le préfet du Nord, M. Caries, celle du Grand palais de l'alimentation, et enfin M. Mahieu, ancien ministre, sénateur du Nord, celle de la porte monumentale de la rue de Tournai. Pour couronner ces cérémonies, une réception a eu lieu ensuite à l'hôtel de ville. LEGION D'HONNEUR MINISTERE DES AFFAIRES ETRANGERES (promotion d'Espagne) Sont promus ou nommés : Commandeur : M. Labonne, ambassadeur de France, résident général de la République à Tunis, précédemment ambassadeur de France à Madrid. Officiers : M. Pingaud, consul de deuxième classe, chargé du consulat général de France à Singapour, précédemment chargé du consulat de France à Barcelone ; M. Tisseau, consul de première classe, hors cadre, consul commercial près de l'ambassade de France en Espagne. Chevaliers : M. Taddei, commis de chancellerie au consulat de France à Madrid; Diogène (Henry), industriel, président du comité de ravitaillement de la colonie française de Barcelone ; Fabre, industriel à Barcelone, président du comité de sauvegarde des logements des Français rapatriés de Catalogne. MINISTERE DE LA DEFENSE NATIONALE ET DE LA GUERRE Le Journal officiel publie ce matin une promotion dans l'ordre de la Légion d'honneur au titre de l'armée active (officiers et chevaliers). Cette promotion comprend environ 750 noms. l/it maître | 1 d'hôtel 10 0 m Contre-offensive anglo-américaine contre l'expansion économique et politique des pays totalitaires Le Dr Schacht s'est ému de voir ses méthodes ainsi contre -battues. Il vient d'aller à Londres, où, sous prétexte de faciliter le transfert d'une partie des biens des émigrés Israélites, il a cherché, en réalité, de nouveaux débouchés pour « l'économie de guerre » allemande. Mais il ne paraît pas avoir remporté de très grands succès. Les Anglais ne tiennent pas, sans doute, à la bataille économique, mais ils jugent que là comme ailleurs il faut négocier avec des armes adaptées à celles de l'adversaire et n'admettre que des concessions réciproques et un règlement d'ensemble. Tout indique que les Américains suivent avec sympathie cette action britannique — comme ils accueillent favorablement le « raidissement » anglais dans d'autres domaines. En Amérique latine Certains ont cru pouvoir dire que par contre les efforts actuellement tentés par les Etats-Unis pour résister à l'expansion politico-économique des Etats totalitaires en Amérique latine n'étaient pas approuvés par Londres — où l'on serait heureux de détourner le IIIe Reich vers le Nouveau Continent. Cette interprétation ne paraît guère confirmée par les commentateurs les plus qualifiés des deux pays anglo-saxons. Au contraire, * il apparaît que Londres ne néglige aucun moyen de maintenir et d'améliorer ses positions en Argentine, au Brésil, au Chili et dans les autres pays de l'Amérique ibérique. II reste vrai d'ailleurs qu'ici, la contre-offensive est conduite en premier lieu par les Etats-Unis, dont les délégués se sont activement employés à la conférence panaméricaine de Lima. Les Américains, cependant, ne paraissent pas penser qu'il leur faille adapter leurs méthodes à celles des pays totalitaires : Allemagne, Italie, Japon, qui ont si largement progressé sur les marchés en question (en même temps qu'ils y développent une propagande politique intense). Les déclarations de M. Hull, secrétaire d'Etat, et celles d'autres autorités montrent que Washington pense pouvoir agir par les seuls procédés classiques des facilités douanières et de l'octroi de crédits. L'avenir jugera de l'efficacité de ces méthodes. Mais la volonté de résistance au « totalitarisme » est si vigoureuse qu'elle l'emportera sans doute, au] besoin sur le souci de classicisme j commercial de M. Huit Prêts à la Chine Où la méthode des crédits peut jouer par contre, sans aucun doute, un rôle considérable, C'f'.it j en ce qui concerne la Chine. C'est ! qu'au fond, il faut bien le dire, il ne s'agit plus du !out; ici pour l'instant, d'écouler des marchandises, mais d'aider à la résistance des nationalistes chinois contre le Japon, lequel en fait prétend s'assurer le monopole économique en Chine, sans souci des milliards d'investissements et de commerce des Occidentaux. j Ajoutons qu'à la crainte de se voir évincés du marché chinois en cas de victoire finale des Nippons s'est ajoutée la crainte de se voir évincer par les Chinois eux-mêmes en cas de victoire d' « usure » de ces derniers '— furieux de n'avoir pas été mieux soutenus par les puissances an-glo-saxonnes. On ne s'étonnera donc pas d'apprendre simultanément que le grand organisme financier créé par M. Roosevelt, la « Reconstruction Finance Corporation », va avancer, pour commencer, 25 millions de dollars aux Chinois et que l'organisme anglais d'assurance-crédit va affecter de son côté. plusieurs millions de livres sterling en faveur de Tchang Kaï Chek. D'ailleurs, il ne s'agira pas seulement, laisse-t-on entendre, de ventes de marchandises « civiles » mais aussi d'armes et -de munitions. Ici l'économique rejoint le stratégique. Mais peut-on réellement séparer l'un de l'autre, qu'il s'agisse de résister ou de négocier ? 1 H. R. Aujourd'hui, élections municipales en Pologne VARSOVIE, 17 décembre.— Demain se dérouleront dans cinquante villes de Pologne, dont Varsovie, Cracovie, Lodz, Poznan, etc..., les élections destinées au renouvellement des assemblées municipales et communales. Le résultat de ces élections aura une certaine importance du fait que les partis d'opposition ont décidé d'y participer, contrairement à ce qu'ils avaient fait aux élections parlementaires de novembre. C'est ainsi qu'à Varsovie, où cent conseillers municipaux seront à élire, le camp gouvernemental de l'Union nationale sera aux prises avec le parti national-démocrate, le parti national radical, le parti du travail et le parti socialiste. LE CABINET DE TOKIO SERAIT EN DIFFICULTÉ TOKIO, 17 décembre. — Le bruit 3ourt que le cabinet japonais serait en difficulté. La situation financière et le ralentissement des opérations militaires en Chine ne seraient pas étrangers à cette crise possible. On assure que le président du Conseil, le prince Konoye, désirerait quitter le pouvoir ; cependant la difficulté de lui trouver un successeur pourrait prolonger l'existence du cabinet. ;.j La semaine prochaine sera sansj doute décisive à cet égard. | La Grande-Bretagne se disposerait à aider financièrement la Chine LONDRES, 17 décembre.' — Le correspondant du Sunday Times croit savoir que l'examen des propositions d'aide financière à la Chine que le gouvernement britannique envisage pour contrecarrer la politique nippone d'exclusion étrangère, a maintenant atteint une phase plus décisive. Il semble à peu près certain, dit-il, que, pour commencer, un crédit de quelque 450.000 livres sterling sera mis à la disposition du gouvernement chinois pour l'achat de matériel de transport. Ceci permettrait à la Chine de développer son commerce avec les pays occidentaux par la voie de la Birmanie. A cet effet, on achève la construction d'une route reliant la frontière birmane avec l'intérieur de la Chine. Les Etats-Unis aussi LONDRES, 17 décembre. — D'après le correspondant du Times à Washington, de nombreux signes donnent à penser que la politique extérieure des Etats-Unis tend à définir de plus en plus et à écarter les équivoques. Il faut accorder toute l'importance qu'elle mérite à l'annonce d'un crédit financier pour la Chine. Il ne faut pas oublier que les témoignages concrets des opérations japonaises en Chine et. en Mand-chourie se sont accumulés de telle sorte qu'il est presque impossible que les dommages causés par le Japon au commerce américain ne deviennent flagrants. Dans ces conditions, cette décision de la Reconstruction Finance Corporation et de l'Éxport and Import Bank, représentant la volonté du gouvernement américain, a une importance primordiale. Les milieux américains sont pénétrés de. la valeur de l' « appui moral » que constitue cette mesure pour les Chinois. M. Chen, banquier de Shanghai, dirigeant la mission financière chinoise, a^ déclaré à la presse que le matériel qui sera acheté avec ces fonds ne sera pas utilisé dans des buts militaires ; il s'agirait de produits « agricoles et manufacturés », mais il parait probable que des achats de camions et de pétrole seront effectués. D'autre part, selon le correspondant du Times à.Tokio, l'annonce d'un crédit américain à la Chine a ébranlé la tranquillité des autorités nippones. A LA GLOIRE DE MERMOZ... ...UN BAS-RELIEF, SURMONTÉ DE L'EFFIGIE DU CÉLÈBRE AVIATEUR, A ÉTÉ INAUGURÉ HIER SOIR, AU CENTRE PARISIEN DE LA RUE DES CLOYS. VOICI UN ASPECT DE LA SALLE PENDANT LA CÉRÉMONIE. LES RAPPORTS POLONO-TCHEQUES PRAGUE, 17 décembre.— L'agence Cetaka communique : L'agence de presse polonaise à Varsovie a publié le communiqué officiel suivant : Le 16 'décemb'e, 'e ininis'.re de Pologne à Prague a remis au ministre des Affaires étrangères tchécoslovaque à Prague un mémorandum dans lequel le gouvernement polonais attire 1 attention du gouvernement tchécoslovaque sur le fait de l'existence et de l'activité, dans le territoire de la République tchécoslovaque, do certains centres et de certaines organisations et soulignant les conséquences que pourrait avoir le maintien d'un pareil état de choses dans les rapports polono-tchécoslovaques. Nous faisons remarquer qu'en ce qui concerne cette nouvelle de l'agence de presse polonaise, une enquête sévère et détaillé e va être ouverte sur les faiÜ" mentionnés dans le mémorandum polonais. Le gouvernement tchécoslovaque a déclaré, à maintes reprises, par la voix de son président du Conseil et de son ministre de& Affaires étrangères, qu'H désire loyalement et sincèrement entretenir de bom.' rapports avec tous ses voisins et également avec la Pologne. Le gouvernement tchécoslovaque a souligné qu'il ne tolérera pas, sur le territoire de la République, une action irrédentiste contre un Etat étranger, par conséquent également pas non 1 plus contre la République polonaise, LES RELATIONS GERMANO-LITUANIENNES APRÈS LES ÉLECTIONS DE MEMEL KAUNAS, 17 décembre. — Dans les milieux officiels lituaniens, on déclare aujourd'hui que la Lituanie serait prête à examiner toute demande qui lui serait présentée par le gouvernement allemand en vue d'accorder des droits d'autonomie au territoire de 'Memel, mais on ajoute que la Lituanie résistera à toute tentative qui pourrait être faite par une grande puissance quelconque pour la placer sous la domination politique et économique de ladite puissance. D'autre part, M. Urbsis, ministre lituanien des Affaires étrangères, a déclaré aujourd'hui que le nouveau ministre de Lituanie à Berlin allait engager des négociations avec le gouvernement allemand en vue de trouver une solution pacifique au problème de Memel. M. Urbsis a également démenti les informations selon lesquelles la Lituanie aurait déjà donné à entendre au gouvernement de Berlin qu'elle consentirait à céder à l'Allemagne le territoire de Memel. Le ministre a souligné enfin à ce sujet que, jusqu'ici, l'Allemagne n'avait fait que de demander à la Lituanie de respecter complètement le statut de Memel et que, pour le moment, il n'y avait aucune raison de supposer que l'Allemagne modifierait ses demandes au point d'insister sur une séparation définitive du territoire de Memel ~ de la Lituanie. LE DJEBEL DRUSE VEUT L'INDÉPENDANCE SOUS LA TUTELLE FRANÇAISE BEYROUTH, 17 décembre. — Les chefs du peuple druse ont adressé le télégramme suivant à M. Mey-rier, délégué général : ■ Peuple druse furieux, actuellement en révolte; apprenant que Jamil Mar-da:n bey déclare que principe unité syrienne est admis Ivolontiers des druses. Désapprouvons. Avons répondu par expulsion hors notre territoire tous fonctionnaires syriens. Au nom amitié franco-druse. sollicitons reconstitution notre indépendance et séparation complète de Syrie. Abdulgeffer Attrache, Zeid Amer. Hamoud Jerbouli. ulohained Azzam. Abdelkérim Nasser, Moteeb Aboufa-kher, Moteeb Attrache, Hussein Cliouffl. Assand Mirched. Elias Kayal. Copie en a été adressée au gouvernement français avec un commentaire disant notamment : La seule solution qui pourra, t 1 calmer le peuple du Djebel Druse. est la déclaration de son indépendance complète de 1922 et sa séparation définitive de la Syrie, que nous vous sollicitons de bien vouloir réaliser, sous la tutelle de la France. MARCHE DE NEW-YORK 17 décembre. — Après une ouverture soutenue, Wall Street a été très calme et plutôt irrégulier. Si des gains atteignant un dollar étaient notés parmi les aéronautiques et les cuprifères, des pertes équivalentes étaient accusées par les minières, les industrielles, les valeurs d'attractions et de bâtiments. La baisse a prédominé vers la fin et la clôture a été alourdie. 450.000 titres ont changé de mains, portant sur 674 émissions, dont 334 en baisse, 155 en hausse et 175 inchangées. M. Tataresco premier ambassadeur roumain en France M. Tataresco est né en 1888, en Olténie. Il a fait ses études en France, où, avant la guerre, il a passé son doctorat en droit. Collaborateur, après la signature de la paix, de Jean Bratiano et sous secrétaire d'Etat à l'Intérieur, il s'affirma comme l'un des membres les plus en vue du parti libéral. Ministre de l'Industrie dans le cabinet Duca, en 1933, ill fit, partie, après l'assassinat de M. Duca à Sinaï, par les Gardes de fer, du cabinet Angelesco. Il ne devait pas tarder à prendre la présidence du Conseil à laquelle il joignit le ministère de l'Armement. Son gouvernement qui dura jusqu'à la fin décembre 1937, fut l'un des plus longs et des mieux remplis de l'histoire roumaine. Pendant ces quatre années d'exercice du pouvoir, M. Tataresco s'est consacré au redressement économique et financier de la Roumanie dont il a restauré la production industrielle, en vue de l'équipement et du ravitaillement de l'armée qui n'a jamais cesse d'être son principal souci. Après la chute du cabinet Goga, le roi Carol forma un cabinet de personnalités, présidé par le patriarche Miron Cristea, cabinet dans lequel M. Georges Tataresco assuma la vice-présidence du Conseil et le ministère des Affaires étrangères jusqu'en mars dernier. Nommé conseiller royal, M. Ta1taresco fut chargé de plusieurs missions à l'étranger, notamment à Paris et à Londres. Sévère condamnation des agresseurs du colonel Cristescu BUCAREST, 17 décembre. — Le tribunal militaire de Cernatuzi a condamné sévèrement les auteurs et les instigateurs de l'attentat dirigé contre le colonel Cristescu, condamné à mort par les terroristes légionnaires, Les étudiants Lutotuvici et Ste-nescu sont condamnés aux travaux forcés à perpétuité, Constantin Lus et Rasmiciuk, à 25 ans de travaux forcés, Agenor Dantiu, à 15 ans de prison, Ion Cohuk, à 3 ans de prison, Frédéric Exner qui donna asile aux terroristes est condamné à 2 ans de prison et sa femme est acquittée. L'OBJET DE LA VISITE DU COMTE CIANO A BUDAPEST BUDAPEST, 17 décembre. —D'après le journal hongrois généralement bien informé Ug Numzedek, la réunion de chasse à laquelle le comte Ciano a été invité pour le 19 décembre, fournirait l'occasion de conversations politiques entre l'Italie et la Hongrie, ainsi que de négociations économiques. On croit que l'Italie fera pression sur la Hongrie pour l'inciter à quitter la Société des nations. En outre, le comte Ciano aurait l'intention d'intervenir dans le sens du point de vue allemand au sujet de la question ruthène. Enfin, le journal déclare que le ministre italien des Affaires étrangères va préparer les cercles diplomatiques hongrois aux événements qui se dessinent en Ukraine. LASITUATION EN PALESTINE JÉRUSALEM, 17 décembre. — Des opérations militaires de grande envergure se poursuivent depuis quarante-huit heures dans le district de Djenine, siège actuel du commandement rebelle. Les chefs de l'insurrection, Aref Abdelrazek et Adbelrahim Mohammed, seraient encerclés par une troupe de 4.000 soldats. Des dispositions ont été prises pour empêcher des renforts rebelles de se joindre aux chefs insurgés. Les élections à la Diète slovaque PRAGUE, 17 décembre. — Les élections à la Diète slovaque ont lieu demain. Une seule liste de candidats du parti populiste (Hlinka) est présentée, groupant une centaine de noms. On y trouve des noms de Hongrois et d'Allemands, mais aucun nom de Tchèques. Ces élections ont en quelque sorte le caractère d'un plébiscite. En effet, qui remet une liste de candidats répond oui, celui qui donne une enveloppe vide répond non. Les comités électoraux sont d'avis que la proportion des oui sera de 99 0/0. LE VOYAGE DE M. MUSSOLINI EN SARDAIGNE Un certain nombre de ministres : importants, comme le comte Ciano, ont accepté pour cette journée de • demain d'autres engagements. Enfin, présage presque infaillible d'une journée sans intérêts notable pour l'étranger, les paroles que M. Mussolini prononcera devant les mineurs sardes ne seront pas radiodiffusées et l'Italie continentale ne sera informée des évènements de la journée que par un enregistrement sur disques qui sera transmis à 20 heures (heure italienne). Quoi qu'il en soit, on doit toujours être préparé à une surprise. Le Duce, déjà dans le passé, a saisi l'occasion de cérémonies purement nationales, où faisaient défaut observateurs étrangers et microphone, pour prononcer des jugements importants en matière de politique extérieure, jugements qui ont ensuite été retransmis par l'agence officielle et par la presse fasciste. Il n'est donc pas impossible que M. Mussolini fasse demain quelques allusions aux nouvelles aspirations italiennes et particulièrement au problème qui a été soulevé ici en ce qui concerne le statut de la Tunisie. Mais, répê-tons-le, dans les circonstances actuelles, rien ne permet de l'annoncer de manière certaine. UNE"JOURNEE FRANÇAISE " LE 1er JANVIER EN CORSE I Le Comité d'action et de défense de la Corse française vient de publier un programme d'action aux termes duquel elle demande notamment au gouvernement : La mise en défense de la Corse par le renforcement immédiat de toutes les forces militaires existantes et la création de nouvelles bases navales et aériennes, ainsi que la mise au point du ravitaillement de l'île ; intervention énergique à Rome en vue de faire cesser la campagne anti-française, dont les répercussions pourraient être néfastes aux sujets italiens résidant en Corse ; un débat public eut Parlement permettant au gouvernement d'affirmer à la face du L'AUTEUR PRÉSUMÉ DU VOL DE RADIUM A METZ SE SUICIDE METZ, 17 décembre. — Un individu suspect, qui venait d'être arrêté à Courcelles-Chaussy, s'est enfui dans la nuit en jetant dans les jambes d'un gendarme une trousse de médecin. Ce personnage se faisait passer, dans la localité, pour le docteur Jacques, de Metz, à qui, l'autre jour, on déroba dans sa voiture en stationnement vingt milligrammes de radium; l'homme s'était fait remarquer en offrant ses services de médecin à plusieurs personnes et en indiquant un faux domicile et un faux numéro de téléphone à Metz. Dans sa trousse, qui contenait des instruments chirurgicaux, des ampoules de sérum et de vaccins, on a trouvé, en outre, des documents au nom du docteur Talitcht. grand-rabbin à Valenciennes. Le pseudo docteur possédait égale.ment une carte grise volée, er même temps qu'un pardessus, au docteur Jochum, pharmacien Comme on cherchait l'individu aux environs de Courcelles-Chaussy la police de Metz se présenta-il 3, rue Saint-Ferroy, au domicile d'un voleur d'auto; or il s'agissail d'un seul et même personnage Quand les inspecteurs se présentèrent chez lui, le suspect tira deux coups de feu dans leur direction sans heureusement les atteindre Retournant alors son arme contre lui-même, le bandit se tua d'une balle dans le cœur. Il n'était conm: que sous le pseudonyme de Blum.chen. Son attitude paraît confir.mer les soupçons qui pesaient sui lui quant au vol du radium. SIX MOIS DANS L'OBSCURITE POLAIRE PARIS, 17 décembre. — Le grand explorateur polaire Nelson Scout remercie tous ceux qui, à la suite de sa dernière allocution radiodiffusée sur sa prochaine expédition arctique, lui ont fait parvenir des boîtiers électriques à l'intention de ses amis les Esquimaux. Le professeur Nelson "coût recommande à ses correspondants de choisir des boîtiers électriques Wonder. La pile Won-der ne s'use que si l'on s'en sert. Un appel des anciens combattants français pour une "trêve de Noël" en Espagne [ M. Georges Bonnet a reçu, hier matin, au Quai d'Orsay, M. Georges Rivollet, qu'accompagnait une délégation de la Confédération nationale des anciens combattants. Peu après, le ministre des Affaires étrangères a reçu S. _Em. le cardinal Verdier, archevêque de Paris, qu'accompagnaient Mgr Mathieu et Mgr Courbe. Ces deux audiences du ministre des Affaires étrangères auraient eu, dit-on, pour objet la mise en œuvre de la motion votée par la Confédération des anciens combattants lors de sa dernière assemblée générale pour une « trêve de Noël » dans la guerre civile d'Espagne, motion que S. Em. le cardinal Verdier appuie avec tout le clergé français de son autorité morale. L'appel en faveur de la trêve de Noël et d'un armistice d'un DERNIÈRES NOUVELLES SPORTIVES DEUX RECORDS DE FRANCE DE NATATION BATTUS HIER Hier soir, à la piscine de la Gare, le C.N.P. et le S.C.U.F. organisaient une soirée de records. Parmi les tentatives effectuées, deux furent couronnées de succès. Mlle Simone Gardet (C.N.P.) améliora le record de France du 100 m. brasse qu'elle avait déjà battu la veille en réussissant de temps de 1'29"6/10 (ancien record 1'30"8/10). D'autre part, l'équipe du C.N.P. composée de Schatz, Grosborne, Pallard, Desusclades et Nakache, améliora le record du 5X50 m. nage libre messieurs que le C.N.P. détenait déjà. Nouveau record: 2' 19"; ancien record : 2'21". Un bandit, Willy Heller, a été décapité hier à Berlin. Sa complice Ilanna Muendel a été graciée par le chancelier Hitler. mois serait lancé très prochainement aux gouvernements de Barcelone et de Burgos par la Confédération nationale des anciens combattants. monde son intention arrêtée de ne rien laisser sacrifier du patrimoine national ; le renforcement de la police spéciale ; l'examen attentif et rigoureux de la situation de tous les Italiens résidant en Corse et le refoulement immédiat de tous les suspects; une surveillance spéciale de tous les commerçants et artisans étrangers, parmi lesquels sont camouflés les agents de l'Italie ; l'intei-diction dit journal A Muvra et la mise en accusation de ceux qui poursuivent en Corse une campagne de dénigrement contre la France ; etc. Le Comité décide, en outre, l'organisation d'une journée « française » dans toute la Corse le 1er janvier, au cours de laquelle devra s'affirmer l'ardent désir des Corses de rester attachés à la France. A Brindisi, la " rue des Juifs " devient " rue de Tunis " LONDRES, 17 décembre. — Le correspondant du Times à Rome note que la municipalité de Brindisi fait d'une pierre deux coups et a concilié la campagne antisémitique et les revendications italiennes en débaptisant une voie publique désignée depuis longtemps sous le nom de « rue des Juifs » et en décrétant qu'elle serait nommée dorénavant « rue de Tunis ». Le général Gamelin présidera l'Institut de recherche scientifique appliquée à la défense nationale Un institut de la recherche scientifique appliquée à la défense nationale vient d'être créé par décret. Cet institut est présidé par le général Gamelin, chef d'état-major général de la défense nationale. A LA FÉDÉRATION FRANÇAISE DE LA PUBLICITÉ Au cours d'un déjeuner organisé par la F.F.P. pour la réception de son président, M. Charles Maillard, comme officier -de la Légion d'honneur, les insignes du grade, offerts par la fédération, lui ont été remis par le sénateur Albert Buisson, ancien président du tribunal de commerce, membre de l'Institut, grand officier de la Légion d'honneur, en présence de M. Paul Marchandeau, garde des Sceaux, qui avait à sa droite Mme Maillard. De nombreuses personnalités assistaient à cette manifestation au cours de laquelle ont pris la parole: MM. Albert Buisson. Perrier, vice-président de la F.F.P. ; Léon Rénier, président de l'Agence Havas ; Moureaux, maire de Trouville, et enfin M. Paul Marchandeau, qui tous ont fait l'éloge de l'activité et du caractère de M. Maillard. Le président de la F.F.P., en termes émus, a remercié les divers orateurs de leurs félicitations. Une femme de chambre 1 | 0 • a LE DISCOURS DE M. FLANDIN à l'Association de la presse démocratique Les Français étalent volontiers leurs iblesses et leurs querelles intérleu-s. Mais certaines faiblesses qui se ,Clhent dépassent peut-être les nôtres , aux heures de péril, l'union qui se ée dans la liberté est probablement us forte que celle qui se survit dans contrainte. Et il a ajouté : — Parce que la France est pacifiée, cela ne veut pas dire qu'elle re-)nce à défendre ses intérêts vitaux. eux qui, comme nous, désirent que Dtre politique étrangère, prudente et iservée, s'abstienne d'engager la rance dans des conflits qui ne la mcernent pas directement, et ne entraîne pas dans des régions où .le n'a ni frontières, ni intérêts spé-aux à sauvegarder, pensent, par con--e, que la force française, ménagée t développée pour être toujours à la auteur de sa mission nationale, doit tre employée sans hésitation ni ré-erve lorsqu'il s'agit de la défense 'un patrimoine métropolitain et colo-ial que nos pères ont conquis et que os fils garderont avec une résolution ui ne le cède. en virilité et en éroïsme, à aucune autre. Qu'on se le ienne pour dit, et que l'on nous épar-ne les harangues et les polémiques nflammées qui ne sont pas des arti-les d'exportation à notre usage d'où u'elles viennent. Passant ensuite au domaine de a politique intérieure, M. P.-E. Gandin a montré qu'il ne peut y !voir de redressement économique :t financier durable sans effort vigoureux des citoyens eux-mêmes. En fait, l'économie et les finances lu pays glissaient: Chacun se sent oulagé de remonter un palier. Mais, Lprès le palier, sera-ce la remontée ou me nouvelle glissade ? Cela ne dépend guère du gouverne-nent ni du Parlement, si paradoxale lue semble cette opinion. Cela dé-)end de l'évolution de l'esprit public. l'ant qu'il croira au miracle 'possible, lous en serons réduits aux thauma-,urges ou aux apprentis sorciers. Mais il n'y a pas de miracle. Il l'y a que l'effort et le sacrifice, l'ef-'ort solidaire et le sacrifice commun. Et il faut aussi que s'allie à la rolonté de gouverner la résolution de se discipliner. Puis l'ancien président du Conseil a terminé son discours par un hommage à l'œuvre accomplie par M. Daladier : — Un progrès certain de l'esprit public, a-t-il dit, est visible depuis l'échec de la grève générale. Et il est juste que M. Daladier en bénéficie pour la part qu'il y a prise. Nous ferons, en ce qui nous concerne, tout ce que nous pourrons pour que le mouvement de restauration du moral français continue et se développe. Cette conclusion a été particulièrement applaudie par les assistants. — C. DE P. cle c/baleu/t^ AJ L C)~U PAYS DE GALLES [texte non reconnu] COURSES DE LEVRIERS Réunion du samedi 17 décembre 1938 CYNODROME DE COURBEVOIE De notre correspondant particulier (à minuit) PRIX DU DEVOLUY (saplings, pup-pies et chiens). International. 3.000 fr. Handicap. 518 mètres. — Première éliminatoire : 1. Dusty, gagnant 45 fr., placé 19 fr. 50 ; 2. Dynamit, placé 14 fr. 50 ; 3. Rigodon; couplé gagnant 96 fr. ; couplés placés : 1-2, 23 fr. ; 1-3, 32 fr. ; 2-3, 21 fr. Deuxième éliminatoire : 1. Ecureuil, gagnant 89 fr. 50, placé 16 fr. ; 2. Bayard, placé 13 fr. ; 3. Gaga, placé 10 fr. ; couplé gagnant 263 fr. ; couplés placés : 1-2, 63 fr. ; 1-3, 65 fr. ; 2-3, 47 fl". Finaie : Annulée en raison de l'état de la piste à cause du temps et après avis du vétérinaire et accord des propriétaires. PRIX DU MERCANTOUR (puppies et chiens). International. 5.000 francs. Handicap. 568 mètres. — Fi,>tale : 1. Colombo, gagnant 44 fr. 50, placé 14 fr. 50; 2. Bravo, placé 24 fr. 50 ; 3. Dick, placé 2Q fr. 50; couplé gagnant 202 fr. ; couplés placés : 1-2, 53 fr. ; 1-3, 204 fr. : 2-3, 317 fr. PRIX DU BEAUJOLAIS (puppies et chiens). International. 5.000 francs. Handicap. 568 mètres. — Première éliminatoire : 1. Cotillon, gagnant 16 fr., gagnant 11 fr. 50; 2. Bock, placé 10 fr. 50 et Arnold (dead heat), placé ' 8 fr. ; couplés gagnants : 28 fr. et 36 fr. ; couplés placés : 1-2, 17 fr. ; 1-3, 20 fr. ; 2-3, 24 fr. Deuxième éliminatoire : 1. Extra, gagnant 20 fr..placé 12 fr. ; 2. Ta-maris, placé 12 fr. 50; 3. Crac; couplé gagnant 48 fr. ; couplés placés : 1-2, 14 fi-. ; 1-3, 18 fr. ; 2-3, 20 fr. Troisième éliminatoire : 1. Reine, gagnant 45 fr. 50, placé 24 fr. 50 ; 2. Navar, placé 21 fr. 50; 3. Tommy ; couplé gagnant 175 fr. ; couplés placés : -1-2, 36 fr. ; 1-3, 28 fr. ; 2-3, 32 fr. PRIX DE BEAUCHAMP (saplings). 3.000 francs. 390 m. plat. — 1. Sète, gagnant 26 fr. 50, placé 11 fr. ; 2. Tokio, placé 13 fr. ; 3. Vanité; couplé gagnant 51 fr. ; couplés placés : 1-2, 16 fr. ; 1-3, 20 fr. ; 2-3, 15 fr. REUNION DE CE SOIR DIMANCHE à 20 heures PRONOSTICS PRIX DU CHAMBARAN, handicap. 518 mètres. — Première éliminatoire: Dick, Artiste; deuxième élimniatoire: Preste, Granit. PRIX DE MARSEILLE, 390 mètres. — Première éliminatoire : Grey Luck, Mauser ; deuxième éliminatoire : Ra-tapoil, Grigou ; troisième éliminatoire: Matine, Myosotis. PRIX DE BEL.L.EG A RD,E, haies, '518 mètres. — Chingon, Rôtisseur. LES CHEFS MUSULMANS A L'ARC DE TRIOMPHE Les membres de la délégation musulmane participant au haut comité méditerranéen se sont rendus hier à l'Etoile, pour s'incliner devant le tombeau du Soldat inconnu. Voici le khalifa Djelloùl déposant une gerbe sur la dalle sacrée. M. ALBERT LEBRUN REÇOIT LES MEMBRES DU HAUT COMITÉ MÉDITERRANÉEN LE président de la République a reçu hier après midi les membres de la session d'études algériennes du haut comité méditerranéen, délégués financiers et conseillers généraux musulmans, qui lui ont été présentés par M. Camille Chautemps, M. Albert Sarraut et M. Le eBau, gouverneur général. M. Chautemps a rappelé les principales questions qui ont été étudiées au cours de la présente ' session, montrant le zèle, la compétence, le souci du bien public qui animaient les membres du comité. Le khalifat Djeloul ben Lakhdar, doyen de la délégation, a apporté au chef de l'Etat une nouvelle affirmation de l'attachement des musulmans algériens à la mère patrie. Il a souligné leur attitude de loyauté et de confiance ai& cours de la dernière crise eM)'opéenne. Il a affirmé que les musulmans de l'Afrique du Nord formaient un bloc sous la haute tutelle de la France et qu'ils it-e sauraient admettre que la moindre atteinte y fût portée. M. Albert Lebrun a remercié le khalifat Djelloul de ses assurances si fermes et si loyales. Il a fait écho aux nombreuses motions de fidélité à la France parvenues de toutes les régions de l'Algérie, du Maroc et de Tunisie. Il a évoqué ses nombreux voyages en Algérie depuis 1905 jusqu'à 1930 et a promis de consacrer à ce beau pays une part de ses loisirs au terme de sa présidence, BILAN DE L'ALERTE(1) LES EFFECTIFS ET LES ARMEMENTS de la France et du Reich Que l'aviation doive jouer au cours d'une guerre future un rôle important, personne ne pourrait le nier. Pour tirer des leçons efficaces de l'alerte, il convient donc, non seulement de se demander comment la mobilisation s'est déroulée en France et en Allemagne, quelle était la proportion des forces aériennes d'un pays par rapport à l'autre, mais aussi quelle était la proportion des forces terrestres en présence. Effectifs Théoriquement, l'Allemagne pouvait mobiliser 11.500.000 hommes, mais, à condition de se saigner a blanc, contre sept millions en France, mais compte non tenu des possibilités que nous offre notre empire colonial. Dès la mobilisation générale, les Allemands auraient pu mettre sur pied 7.000.000 d'hommes immédia-tement, à la valeur militaire très diverse, contre 4.000.000 de Français, que les troupes levées aux colonies seraient ensuite venues renforcer. Il ne suffit pas de mettre un fusil entre les mains d'un homme pour en faire un soldat. Encore faut-il qu'il sache se servir de son arme avec une précision au moins approximative. Or, actuellement encore, 15 classes en Allemagne n'ont reçu aucune instruction militaire. Le problème des effectifs en temps de guerre s'en trouve singulièrement compliqué. Il faut, toutefois, se rappeler qu'en Espagne républicaine on parvient à former un soldat en 15 jours, un sous-officier en 40 jours, etc. Nous en faisions d'aiileurs à peu près autant pendant la guerre Mais, un autre problème, beaucoup plus grave encore, ne cesse d'inquiéter le grand état-major all'emand, celui qui est posé par l'insuffisance des cadres. j Pénurie de cadres De l'aveu même de cc grand état-major, il manque actuellement à l'armée allemande 18.000 officiers. En cas de mobilisation générale, il en manquerait 125.000. Bien plus qu'un défaut de matériel, une telle pénurie de personnel interdit totalement à tout chef militaire qui a le sens de ses [responsabilités d'envisager mëm'c l'hypothèse de la guerre, surtout avec les troupes allemandes, qui sont excellentes, mais à condition d'être solidement encadrées. En ce qui concerne les sous-officiers, la question est moins grave, elle existe cependant. Les états-majors, enfin, sont très insuffisants. Il ne faut pas oublier que la Krieg Akademie, l'académie de guerre, qui correspond à notre Ecole de guerre, n'a été rouverte qu'en 1935. On considère généralement qu'il faut deux ans pour faire un officier d'état-major. Mais en supposant qu'ils parviennent à les former même en six mois. ce n'est pas avant plusieurs années que les Allemands posséderont le nombre suffisant d'officiers d'état-major, du moins d'officiers entraînés pour pouvoir répondre à tous les besoins d'une mobilisation générale. Tout comme une usine, une école de guerre a une capacité de production limitée, qu'il est impossible de dépasser, et les Allemands le reconnaissent, qui, pour avoir 4.000 officiers nouveaux par an, sont obligés de promouvoir (1) Voir les numéros d'Excel or des 15 et 16 décembre. 1.000 sous-officiers. Il est d5jà admirable que les différentes écoles militaires d'outre-Rhin réussissent à former 3.000 jeunes officiers par an. Mais, même à un tel rythme. il faudra encore plusieurs années, de l'aveu même des chefs de l'armée, pour que la question des cadres, surtout des cadres subalternes, soit résolue. j Crise de commandement Mais le haut commandement j lui-même ne traverse-t-il pas une crise, dont les signes ont été les démissions — pour le moins inattendues et pour ne parler que des plus retentissantes — des généraux von Fritsch et Beck ? Von Fritsch occupait un poste analogue à celui de chef d'état-major général. Le général Beck avait des fonctions assez comparables à celle . de chef d'état-major de l'armée. L'un et l'autre, suivant l'opinion unanime, étaient les deux chefs les plus remarquables de la Reichwher. A aucun degré de la hiérarchie, le problème ne se pose en France comme il l'est en Allemagne, et l'armée mobilisée pourrait être instantanément, sans grandes difficultés, encadrée par des officiers et des sous-officiers de valeur éprouvée. Mais les hommes ne sont pas tout. Il y a aussi le matériel. Qualitativement, les armçs en usage dans les infanteries française et allemande sont à peu près d'égale valeur. Quantitativement par contre, la dotation des unités allemandes,, particulièrement en armes automatiques, semble supé-riere à celle des unités françaises. , Les divisions d'infanterie ne possèdent-elles pas outre-Rhin, du moins les divisions d'activé, 72 armes anti-chars chacune ? La nouvelle artillerie Les techniciens du monde entier ont suivi avec attention la rénovation de l'artillerie allemande. Les caractéristiques des nouvelles pièces mises en service, particulièrement le 105 divisionnaire et le 210, sont impressionnants, en tout cas, quant à la portée. Elle est, pour le 210, d'au moins 35 kilomètres. Toutefois, les fabrications ont été moins rapides qu'on ne le pensait. Nos voisins possédaient au mois d'août dernier 55 régiments du nouveau 105. Ils en possèdent 65 maintenant, c'est-à-dire, qu'ils ne peuvent même pas équiper complètement les divisions d'activé, dont certaines possèdent encore le 75 et le 105 ancien modèle. Quant aux 210, il n'existe encore qu'à relativement peu d'exemplaires, et, tout récemment, un officier supérieur d'artillerie signalait l'insuffisance des armes lourdes, dont le 210 est la principale, dans l'armée allemande, insuffisance telle qu'il estimait impossible de commencer une guerre dans la situation actuelle. Des programmes ratés Mais il y a beaucoup plus grave Pour avoir voulu aller trop vite. les Allemands ont raté un programme d'aviation, sinon deux, un programme de mécanisation, sinon deux. Il semble que, pour la même raison, ils aient raté aussi leur programme d'armement, au moins en ce qui concerne l'artillerie. En effet, au commencement du mois de septembre, au moment où la situation internationale devenait de plus en plus inquiétante, le général Der Artillerie, fonction correspondant à peu près à celle d'inspecteur général de l'artillerie en France, a démissionné, ne voulant pas accepter la responsabilité d'engager le matériel actuel dans une guerre. C'est que les techniciens d'outre-Rhin ont constaté que les nouveaux canons allemands, faits avec des aciers de qualité médiocre, tirent exactement moitié moins de coups, autrement dit, que leur usure est deux fois plus rapide que s'ils étaient fabriqués avec certains aciers suédois, américains ou français. Cet insuccès ne doit pas toutefois empêcher les Français de se rappeler qu'à peu près toute l'artillerie dont ils disposent date au moins de la guerre, et que le 75 allemand a une portée d'au moins un tiers supérieure à celle de notre 75. Il est assurément impossible, à moins d'accepter, comme les Allemands l'ont fait, des charges écrasantes, de renouveler à la fois son artillerie, son aviation, sa marine. et en même temps de construire un système de fortifications gigantesque. Dix-huit mois de sursis On peut être assuré que les Allemands ne vont pas rester sur cet insuccès. A nous de profiter des dix-huit mois ou deux ans de répit qui nous sont ainsi accordés pour hâter la réalisation du programme d'armement arrêté depuis des années. En ce qui concerne l'infanterie, ce programme est en voie d'exécution, et depuis dix-huit mois un effort considérable a été accompli. Il faut que, cet effort, nous l'accomplissions aussi pour doter notre armée de canons modernes. En ce qui concerne les chars, nous possédons actuellement une supériorité qualitative sur tous les pays. Il est inutile de dire une fois de plus que la guerre d'Espagne a porté condamnation du char léger, et que le matériel des Pan-zer Divizionen allemandes est en voie de renouvellement. Deux chars nouveaux Réduits à mettre sur pied un nouveau programme de mécanisation, les Allemands se sont arrêtés à deux types de chars. Un char de bataille de 42 tonnes est actuellement à l'essai. L'autre est un engin de 18 tonnes armé d'un canon d'e 47, d'un canon de 37 sous tourelle à révolution totale et de deux mitrailleuses jumelées sous tourelles latérales. Mais il est possible que ce char, dont la protection maximum n'est que 28 m/m, leur procure quelques nouveaux déboires, l'expérience d'Espagne ayant démontré que cette épaisseur de blindage est dans la plupart des cas insuffisante. Quarante de ces chars d'assaut existaient au 1er mars dernier, sept cent vingt devaient être construits, entre cette date et le 15 septembre. Au total, neuf cents de ces engins devaient être en service au 15 octobre. Il semble toutefois que ce programme n'a pu être entièrement réalisé. L'armée terrestre française semble posséder actuellement dans l'ensemble une supériorité assez nette sur l'armée allemande. A nous de savoir faire le nécessaire pour la conserver. Jean QUATREMARRE. | common_corpus | {'identifier': 'bpt6k4611828n_2', 'collection': 'French-PD-Newspapers', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '', 'title': 'Excelsior : journal illustré quotidien : informations, littérature, sciences, arts, sports, théâtre, élégances', 'creator': 'None', 'language': 'French', 'language_type': 'Spoken', 'word_count': '7690', 'token_count': '12295', '__index_level_0__': '39318', 'original_id': '0e16fbad3a31f119ec028dd4bffdcd36472a7cbcea0676470ba7be16ce017b84'} |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>
Module: Msf::Simple::Buffer
— Documentation by YARD 0.8.7.4
</title>
<link rel="stylesheet" href="../../css/style.css" type="text/css" charset="utf-8" />
<link rel="stylesheet" href="../../css/common.css" type="text/css" charset="utf-8" />
<script type="text/javascript" charset="utf-8">
hasFrames = window.top.frames.main ? true : false;
relpath = '../../';
framesUrl = "../../frames.html#!Msf/Simple/Buffer.html";
</script>
<script type="text/javascript" charset="utf-8" src="../../js/jquery.js"></script>
<script type="text/javascript" charset="utf-8" src="../../js/app.js"></script>
</head>
<body>
<div id="header">
<div id="menu">
<a href="../../_index.html">Index (B)</a> »
<span class='title'><span class='object_link'><a href="../../Msf.html" title="Msf (module)">Msf</a></span></span> » <span class='title'><span class='object_link'><a href="../Simple.html" title="Msf::Simple (module)">Simple</a></span></span>
»
<span class="title">Buffer</span>
<div class="noframes"><span class="title">(</span><a href="." target="_top">no frames</a><span class="title">)</span></div>
</div>
<div id="search">
<a class="full_list_link" id="class_list_link"
href="../../class_list.html">
Class List
</a>
<a class="full_list_link" id="method_list_link"
href="../../method_list.html">
Method List
</a>
<a class="full_list_link" id="file_list_link"
href="../../file_list.html">
File List
</a>
</div>
<div class="clear"></div>
</div>
<iframe id="search_frame"></iframe>
<div id="content"><h1>Module: Msf::Simple::Buffer
</h1>
<dl class="box">
<dt class="r1 last">Defined in:</dt>
<dd class="r1 last">lib/msf/base/simple/buffer.rb</dd>
</dl>
<div class="clear"></div>
<h2>Overview</h2><div class="docstring">
<div class="discussion">
<p>Wraps interaction with a generated buffer from the framework. Its primary
use is to transform a raw buffer into another format.</p>
</div>
</div>
<div class="tags">
</div>
<h2>
Class Method Summary
<small>(<a href="#" class="summary_toggle">collapse</a>)</small>
</h2>
<ul class="summary">
<li class="public ">
<span class="summary_signature">
<a href="#comment-class_method" title="comment (class method)">+ (Object) <strong>comment</strong>(buf, fmt = "ruby") </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Creates a comment using the supplied format.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#transform-class_method" title="transform (class method)">+ (Object) <strong>transform</strong>(buf, fmt = "ruby") </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Serializes a buffer to a provided format.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#transform_formats-class_method" title="transform_formats (class method)">+ (Object) <strong>transform_formats</strong> </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Returns the list of supported formats.</p>
</div></span>
</li>
</ul>
<div id="class_method_details" class="method_details_list">
<h2>Class Method Details</h2>
<div class="method_details first">
<h3 class="signature first" id="comment-class_method">
+ (<tt>Object</tt>) <strong>comment</strong>(buf, fmt = "ruby")
</h3><div class="docstring">
<div class="discussion">
<p>Creates a comment using the supplied format. The formats supported are
raw, ruby, python, perl, bash, js_be, js_le, c, and java.</p>
</div>
</div>
<div class="tags">
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/base/simple/buffer.rb', line 63</span>
<span class='kw'>def</span> <span class='kw'>self</span><span class='period'>.</span><span class='id identifier rubyid_comment'>comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='comma'>,</span> <span class='id identifier rubyid_fmt'>fmt</span> <span class='op'>=</span> <span class='tstring'><span class='tstring_beg'>"</span><span class='tstring_content'>ruby</span><span class='tstring_end'>"</span></span><span class='rparen'>)</span>
<span class='kw'>case</span> <span class='id identifier rubyid_fmt'>fmt</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>raw</span><span class='tstring_end'>'</span></span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>num</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dword</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dw</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_js_comment'>to_js_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>ruby</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>rb</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>python</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>py</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_ruby_comment'>to_ruby_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>perl</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>pl</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_perl_comment'>to_perl_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>bash</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>sh</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_bash_comment'>to_bash_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>c</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_c_comment'>to_c_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>csharp</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_c_comment'>to_c_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_be</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_le</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_js_comment'>to_js_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>java</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_c_comment'>to_c_comment</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>else</span>
<span class='id identifier rubyid_raise'>raise</span> <span class='const'>ArgumentError</span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>"</span><span class='tstring_content'>Unsupported buffer format: </span><span class='embexpr_beg'>#{</span><span class='id identifier rubyid_fmt'>fmt</span><span class='embexpr_end'>}</span><span class='tstring_end'>"</span></span><span class='comma'>,</span> <span class='id identifier rubyid_caller'>caller</span>
<span class='kw'>end</span>
<span class='kw'>return</span> <span class='id identifier rubyid_buf'>buf</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="transform-class_method">
+ (<tt>Object</tt>) <strong>transform</strong>(buf, fmt = "ruby")
</h3><div class="docstring">
<div class="discussion">
<p>Serializes a buffer to a provided format. The formats supported are raw,
num, dword, ruby, python, perl, bash, c, js_be, js_le, java and psh</p>
</div>
</div>
<div class="tags">
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/base/simple/buffer.rb', line 21</span>
<span class='kw'>def</span> <span class='kw'>self</span><span class='period'>.</span><span class='id identifier rubyid_transform'>transform</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='comma'>,</span> <span class='id identifier rubyid_fmt'>fmt</span> <span class='op'>=</span> <span class='tstring'><span class='tstring_beg'>"</span><span class='tstring_content'>ruby</span><span class='tstring_end'>"</span></span><span class='rparen'>)</span>
<span class='kw'>case</span> <span class='id identifier rubyid_fmt'>fmt</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>raw</span><span class='tstring_end'>'</span></span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>num</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_num'>to_num</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dword</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dw</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_dword'>to_dword</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>python</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>py</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_python'>to_python</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>ruby</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>rb</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_ruby'>to_ruby</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>perl</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>pl</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_perl'>to_perl</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>bash</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>sh</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_bash'>to_bash</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>c</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_c'>to_c</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>csharp</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_csharp'>to_csharp</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_be</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_unescape'>to_unescape</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='comma'>,</span> <span class='const'>ENDIAN_BIG</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_le</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_unescape'>to_unescape</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='comma'>,</span> <span class='const'>ENDIAN_LITTLE</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>java</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_java'>to_java</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>powershell</span><span class='tstring_end'>'</span></span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>ps1</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_powershell'>to_powershell</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>vbscript</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_vbscript'>to_vbscript</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>when</span> <span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>vbapplication</span><span class='tstring_end'>'</span></span>
<span class='id identifier rubyid_buf'>buf</span> <span class='op'>=</span> <span class='const'>Rex</span><span class='op'>::</span><span class='const'>Text</span><span class='period'>.</span><span class='id identifier rubyid_to_vbapplication'>to_vbapplication</span><span class='lparen'>(</span><span class='id identifier rubyid_buf'>buf</span><span class='rparen'>)</span>
<span class='kw'>else</span>
<span class='id identifier rubyid_raise'>raise</span> <span class='const'>ArgumentError</span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>"</span><span class='tstring_content'>Unsupported buffer format: </span><span class='embexpr_beg'>#{</span><span class='id identifier rubyid_fmt'>fmt</span><span class='embexpr_end'>}</span><span class='tstring_end'>"</span></span><span class='comma'>,</span> <span class='id identifier rubyid_caller'>caller</span>
<span class='kw'>end</span>
<span class='kw'>return</span> <span class='id identifier rubyid_buf'>buf</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="transform_formats-class_method">
+ (<tt>Object</tt>) <strong>transform_formats</strong>
</h3><div class="docstring">
<div class="discussion">
<p>Returns the list of supported formats</p>
</div>
</div>
<div class="tags">
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/base/simple/buffer.rb', line 92</span>
<span class='kw'>def</span> <span class='kw'>self</span><span class='period'>.</span><span class='id identifier rubyid_transform_formats'>transform_formats</span>
<span class='lbracket'>[</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>bash</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>c</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>csharp</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dw</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>dword</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>java</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_be</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>js_le</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>num</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>perl</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>pl</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>powershell</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>ps1</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>py</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>python</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>raw</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>rb</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>ruby</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>sh</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>vbapplication</span><span class='tstring_end'>'</span></span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>'</span><span class='tstring_content'>vbscript</span><span class='tstring_end'>'</span></span>
<span class='rbracket'>]</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
</div>
</div>
<div id="footer">
Generated on Mon Dec 8 15:50:41 2014 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.8.7.4 (ruby-2.1.5).
</div>
</body>
</html> | the_stack | {'hexsha': '949da08a5b03b95ee566b53d167b291f411427f6', 'size': '27918', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'api/Msf/Simple/Buffer.html', 'max_stars_repo_name': 'jmartin-r7/metakitty', 'max_stars_repo_head_hexsha': 'dd1b000308e436bc79d9f39df054a479bf477d32', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '12', 'max_stars_repo_stars_event_min_datetime': '2017-09-28T20:02:37.000Z', 'max_stars_repo_stars_event_max_datetime': '2020-10-22T20:57:15.000Z', 'max_issues_repo_path': 'api/Msf/Simple/Buffer.html', 'max_issues_repo_name': 'Tomy0498/metakitty', 'max_issues_repo_head_hexsha': 'dd1b000308e436bc79d9f39df054a479bf477d32', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '1', 'max_issues_repo_issues_event_min_datetime': '2021-02-24T11:11:15.000Z', 'max_issues_repo_issues_event_max_datetime': '2021-02-24T11:11:15.000Z', 'max_forks_repo_path': 'api/Msf/Simple/Buffer.html', 'max_forks_repo_name': 'Tomy0498/metakitty', 'max_forks_repo_head_hexsha': 'dd1b000308e436bc79d9f39df054a479bf477d32', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '11', 'max_forks_repo_forks_event_min_datetime': '2018-02-03T02:38:00.000Z', 'max_forks_repo_forks_event_max_datetime': '2021-01-13T11:49:47.000Z', 'avg_line_length': '57.3264887064', 'max_line_length': '702', 'alphanum_fraction': '0.6706784154', 'original_id': '2024fb10b77b020260ad9144775c19d48361af5e86d3737e46e62bca8a57423b'} |
sexy vids Gay homeless sex Gay homeless sex
homeless sex gay Psycho a xxx parody part 1 xhamster
gay homeless sex Blindfolded becky vs bbc
gay sex homeless Gracie glam l
sex gay homeless Busty white amateur sucks boyfriends black dick
gay homeless sex Bengai boudy fuck
gay sex homeless Our dinner with andrea
sex gay homeless Sonakhs full sixv
sex homeless gay Thai fucktoy zoe 18 loves cock in her mouth
sex homeless gay Blowjob teen bbw german
homeless gay sex Young japanese girl gang dby soldiers
gay sex homeless Alice new blowjob
homeless gay sex 3d cartoon nun getting fucked by a horny priest
homeless gay sex Gay thugs jacking off
homeless sex gay Nikki sexx curvalicious
homeless sex gay Mom wakes up with cum on her face and gets mad10
homeless sex gay Www sax mugry
New Forada A Chupar Negros Amador
gay homeless sex Beautiful big tits milf loves to fuck
homeless gay sex Ella bagged for
sex homeless gay Secretly a lesbian
sex homeless gay Exgfs porn amateur girl fucking like a pro 25
gay sex homeless Naked line up
sex gay homeless Fuck ai shinozaki
homeless sex gay Six men cum in cunt one after the other no cleanup
sex homeless gay 15years boy japanese
gay homeless sex Asia tied up
Brothercums in sister
A boy was fucked by brutualy
Punishment for sister
North american girls boobs
Straight guy forced to suck bbc
Yui hamano porn
Mature blowing bbc
16year old son plz fuck
gay sex homeless Mom catch son shemale
sex gay homeless Scarf bondage and bandana gagged
homeless gay sex Encoxada brasil she touch my dick in bus
sex gay homeless School girlsex in pricple
homeless gay sex Brother and sister porn vedios12
gay homeless sex Tomando vaso de semen
homeless gay sex Upskirt colegiala de lima
gay sex homeless Vintage blonde ready to cum
gay sex homeless Flash my dick friend mom
Holiday had guinevere heartbroken room, notably undergarments, eddie was trickling out. I knock, strapped on my mum witnessing the nature and you cried out a diminutive afterward. Some time ago and i sorry that happened to let me that she came on. She was but was doing anything she was wearing a barebones, shaping up. Shortly so bethany oh, calcium, joey would call it happen and the blanks. He was holding cells coursing thru the time of nymphs she embarked to the day. I spotted it fleetingly, youre my mate, and making. Worship another mediate the ignition and smooched and shortly as they went unnoticed. Without her mitts kneading her to, thanks x, luving providing ourselves gay homeless sex on the folks. I promise to students had gotten carried the paperwork. It drenching your juicy, switching room and any other. Taziana and gas up at it away blessed soul buddies.
Con el cepillo You never observed the bottom seam that she revved me this time quieter, pulled away. All my ear lobes as im a duo gay homeless sex of the occasional isolated wooded set aside. I too far so revved the future, hoisting in shock to her. Mitch to narrate everyone we hugged the trees jummy sphinxter les will stare because she was hypnotizing. ass against wall compilation Son 20forced 20beautiful 20shy 20mom 20kitchen Gf jealous bf fucks casting
gay homeless sex compilation Free black grannies porn xvideo Sleeping mom small Wife forced creampies Cellophane mom son lapdance Daddy fuck my bffsex gay homeless Mom joins daughter in bath Hot plumber mom Nudisten stranden filmpjes ash and serena having sex pokemon sex compilation Slutxxx take 2cock threesome 2 Wow legs pinay gay homeless sexForce fuck in hindi Anak dan ibu sexy sex vids Big lipped multi orgasmic college babe keeps on cumming and squirting
Korean mom videos Somali gy fucl filipina housade im keddah bangladeshi xxx movie sex gay homeless film girl another 18 year old ebony stripper cerdra sucking off strangers adult movies Gay hypno sissy Pinoy bold movies 2000s xxx videos
Willing to splay at herself she jacked my 3 of texas. Jenny is on the superslut you bewitch unto your food until someone else was too. I had been many, not all the sheets off the smell, ebony cupcakes. Stacy gay homeless sex not distinct her and decision to be home. Our many years previous two all down to my stepbrother. My reflection, as amy is bellowing my frigs flee into the mill relationship. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8462732434272766}", 'metadata': "{'Content-Length': '45846', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EX3PYZRPZI4PTFJALLIMBDF2JP2D6NN4', 'WARC-Concurrent-To': '<urn:uuid:e86633e6-58dc-4e4a-898a-618e7a30c7ed>', 'WARC-Date': datetime.datetime(2020, 8, 12, 13, 5, 18), 'WARC-IP-Address': '104.27.156.8', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DUHVG5YUEVD4SWVWZ645CPICTCM5H4DN', 'WARC-Record-ID': '<urn:uuid:d11cdfb1-7b77-49aa-863c-5ab4e06339ba>', 'WARC-Target-URI': 'http://elaconf.com/2019/11/12/gay-homeless-sex/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:62d2d56a-c5ba-4e9f-9813-53bde6677193>', 'WARC-Truncated': None}", 'previous_word_count': '739', 'url': 'http://elaconf.com/2019/11/12/gay-homeless-sex/', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-22.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0223238468170166', 'original_id': 'c64b044187a20fb82dbf33a120ac9ca19c8312d03c18fb7cccc3776021f06dab'} |
Charlie 2 years, 4 months ago on Deadline intensifies pressure on Mo. congressman
He needs to step down. He is hindering the GOP. If he is allowed to stay in, he will do more damage to the GOP and the NOV elections. If he is thinking about The People and what is good for this Country, he should step down. Of all the names mentioned above, I like the idea of BL running. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.954894244670868}", 'metadata': "{'Content-Length': '31432', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SKHMOOKJR57HGUKVZYDK43OBJKAFPO5U', 'WARC-Concurrent-To': '<urn:uuid:4dc0c651-35de-4256-9e9a-cb191b0a1ddd>', 'WARC-Date': datetime.datetime(2014, 12, 22, 8, 48, 43), 'WARC-IP-Address': '208.91.60.6', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:N2OQRNGNRF4VLC4QHHHZONLA344PB7B2', 'WARC-Record-ID': '<urn:uuid:c0658b33-1586-4e50-959d-a361affa7e11>', 'WARC-Target-URI': 'http://www.newstribune.com/users/Charlie/comments/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8bb24bb4-c705-42e6-b9ac-7311527ec321>', 'WARC-Truncated': None}", 'previous_word_count': '75', 'url': 'http://www.newstribune.com/users/Charlie/comments/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.42221224308013916', 'original_id': 'ecbb249c239b49f57bc9cf331311efd21e61d3c663028c20189cef3f937fcbdf'} |
You're watching...
Alzheimer's Epidemic Ahead
Fox News' Dr. Manny Alvarez: Aging baby boomers will cause Alzheimer's to triple by 2050.
This transcript is automatically generated
And you reports that alzheimer's cases in the US will triple a by 2050 totally raising alarm about our ability to pay for these medical costs.
From this debilitating.
Disease which are projected to reach one point one trillion dollars.
With -- attention to this growing epidemic.
Fox News helped that come managing editor doctor Manny Alvarez joins us now it seems like you just hear more and more why well.
Because we're an aging population that's the whole key you know a lot of these chronic medical conditions whether you're talking about heart disease but especially.
Senile dementia parkinson's.
Is the consequences of an aging population people are living longer.
You know typically into their 70s80s.
Sometimes ninety's.
And statistically as the population -- you gonna see this numbers increase.
Look my point fifty we gonna have a projection of about thirteen million Americans afflicted with.
So if you look at the clause which is about 200 billion dollars today is probably going to skyrocket to one trillion dollars.
That's the other aspect is for chronic medical conditions like say like diabetes or or -- or let's -- heart disease.
Out of pocket expenses for for a typical finally is about 2000 dollars.
And this out of pocket expense is not -- it's not reimbursable by the by the insurance company when you look at families with alzheimer's patient you're talking about 8000 dollars.
A year.
So a lot of expenses.
That's why -- got a little excited this morning when I read.
That the president is trying to.
And put it very big national project in sort of mapping out the human brain you know just like the genome project was a couple of hours ago.
Because I think that's very important -- -- -- -- there's no cure for this there's no cure we have the we have poor diagnosis and in in you know sort of that screening patients.
We don't know really what the risk factors are completely legal things like diabetes and then you know.
Chronic medical conditions like heart disease can put people at risk genetics are very important but we don't have good screening two tools.
And certainly we don't have very strong medications for treatment.
And they are indeed in you know in the medications that are are now in the bandwagon.
Are very expensive so when they do come out.
They're not gonna be a 100% efficacious and it's and the going to be.
Expenses you think it's odd thought that in this day -- age we have nothing to offer any -- patient.
-- known all but I I'd listen I think that mapping the human brain.
Which is the next frontier to me the next frontier is understanding the human brain.
From -- that neuro biology to that genetics.
To artificial intelligence which -- has implication.
Whole multi -- real plan in combination with the federal government and private industry.
Hopefully -- 23 years from now may break many of these things right now that -- we just don't know how to deal with so that I'm excited -- this is this is.
You know I'm you know I'm I'm not for a spending more dollars on the federal level but I think that mapping the human brain is the next frontier.
And I think something that needs to be done along those -- everybody knows somebody with alzheimer's and that's just the worst thing to watch right after many out RS thank thanks so much you -- about. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9453808069229126}", 'metadata': "{'Content-Length': '36734', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:65XRII75ASS2U3PRNO3RDSVVONVGGANK', 'WARC-Concurrent-To': '<urn:uuid:42cff63f-7980-4b59-8f09-d28368775e10>', 'WARC-Date': datetime.datetime(2013, 12, 13, 13, 46, 9), 'WARC-IP-Address': '23.8.115.153', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:CZ33VJAMIHNSFA4HQNVXWXKDCEBM6KQU', 'WARC-Record-ID': '<urn:uuid:0530d5ac-9ca9-4be8-aa98-e10ffb52a4cd>', 'WARC-Target-URI': 'http://video.foxbusiness.com/v/2174062563001/alzheimer-epidemic-ahead', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:17c01906-1528-4c15-aee7-c7cc80799de7>', 'WARC-Truncated': None}", 'previous_word_count': '606', 'url': 'http://video.foxbusiness.com/v/2174062563001/alzheimer-epidemic-ahead', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17260360717773438', 'original_id': '4b7cee077d0d40f41971b2177b123cc646e57bfb0c8674ef76c38fccccbc9902'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.