text stringlengths 3 7.38M | source_data stringclasses 5 values | info stringlengths 83 12.5k |
|---|---|---|
The Beginner's Guide to Ayurveda
Spa Sophia is proud to be one of the few places in Los Angeles to offer Ayurvedic treatments. On top of the Ayurveda Massage, our resident massage therapist and Ayurvedic practitioner Megan Darwin offers treatments such as Nasya, Abyhanga, Therapeutic Steam and an Ayurvedic Detox Program . Want to know what exactly Ayurveda is, and why it's so good for you? Read our little Beginner's Guide to Ayurveda...
What is Ayurveda?
Ayurveda is a 5,000 year old lifestyle philosophy and comprehensive natural healing system from India. It's a Sanskrit term and means "science of life" or "practices of longevity." Ayurveda is all about the person as a whole, physically, mentally and spiritually, and teaches that these three things are intricately connected. Ayurveda also emphasizes a person's place in his or her environment, and the world. Through natural medicinal treatments, mediation, nutrition, yoga, massage and essential oils Ayurveda aims to prevent and cure diseases and help you live a balanced life to reach your fullest potential.
Three Elements of Ayurveda
In Ayurveda there are three doshas, which are biological forces in the body believed to govern life. Pitta includes the elements fire and water, which are responsible for heat, appetite and digestion, while Kapha is characterized by the elements earth and water, which are responsible for structure and stability. Vata is the biggest life force and derives from the elements of space and air, which constitutes the energy of movement. When the three doshas are in harmony, you are in optimum balance and health. Symptoms of mental and physical illnesses are seen as doshic imbalances, which can be healed through Ayurvedic medicine and therapy.
ayurvedic practitioner ayurveda los angeles treatments massage detox venice abbot kinneyTreatments of Ayurveda
Ayurvedic practitioners believe mental and physical health are inextricably connected, and equally important. Since Ayurveda places big emphasis on our place in the world around us, things like changes in weather, society, economy, lifestyle, diet, work, financial status, emotions and relationships are also considered. That's why Ayurvedic healing - on top of herbal treatments - almost always includes lifestyle interventions. Think of a healthy diet, sleep pattern, and yoga, but also skin care and hygiene.
Contemporary Ayurvedic Treatments
Contemporary Ayurvedic practitioners, such as Spa Sophia's Megan Darwin, focus on attaining a healthy metabolic system, maintaining good digestion and releasing toxins. The combination of specific massage techniques, diet, oleation, lymph drainage, steam and purgation makes Ayurvedic cleansing an incredibly comprehensive and successful process for detoxifying and rejuvenating the entire system.
Ayurvedic Massages
Ayurvedic massage with warm therapeutic herbal oils can open up the channels in our bodies through which all of our fluids flow. Without healthy flow, these channels will accumulate toxins that will eventually lead to disease. Spa Sophia offers several Ayurvedic massages with essential oils, that will leave you feeling totally relaxed and renewed. Here are just some of the benefits of Ayurvedic massages: Building immunity, decreasing stress, cleansing the body, achieving overall balance, improved sleep and glowing skin. Want to discover Ayurveda in Los Angeles at Spa Sophia? Book a treatment online, email us, or call (310) 564 6676to set an appointment! For more information on the 5 Day Ayurvedic Detox Program, email Megan directly at
How To Stay Healthy During The Holidays
Oh, the holidays. We look forward to them all year, but they can also stress us out. And we're not just talking about the stress of organizing. The abundance of unhealthy food and overeating can be a source of anxiety. Most people gain 1 to 3 pounds over the holidays. Not a big drama on its own, except that many people never lose those extra pounds. How do we make the holidays a little healthier, so we can enjoy it guilt-free. Here are 7 tips...
1. Exercise More the Weeks Before
How not to worry about the small weight gain during Thanksgiving and Christmas? By shedding some extra weight beforehand! Start doing adding some cardio exercises the weeks before, lengthen your existing workouts, and/or eat smaller portions than usual. Possibly the simplest and most reliable way to stay healthy on track during the holidays, and diminish guilt.
2. Throw in Walks
You may not have time or motivation to go do full workouts, but a nice stroll can be very fitting holiday activity! Take the family for a walk in nearby nature and burn calories while enjoying the fall and winter weather. The cosier it is inside afterwards! If you are at a big party, there are always some people who are down for a little after-dinner walk.
how to stay healthy and guilt free during holidays los angeles spa sophia3. Eat Beforehand
While you might be tempted to skip eating all day on Thanksgiving and Christmas to "save" some calories that way, it is actually wiser to eat something small before. Research has found this prevents people from binging on food. So don't let yourself go hungry, eat a fulfilling breakfast with a small portion of protein.
4. Choose Calmly
When you see all that food everywhere it's tempting to load up your plate with everything, but try to take a moment before. What dishes are there? What are your favorites? Which dishes are special? Go for only the things you really like and that you don't already have weekly. There is no need to try everything. And know that plain turkey, pumpkin pie and roasted veggies are healthier than gravy loaded red meat, chocolate cake and bean casseroles.
5. Be Mindful
When you do eat, savor! Put your fork down after every bite and eat consciously. Perhaps have a sip of water every few bites. Be present in the moment and really enjoy your food. It takes your mind about 20 minutes to realize you're full, so don't rush. Talking to people is also great to take your mind off the food. Traverse the room, speak to all those you haven't seen for a while. Enjoy!
6. Drink Water
Drink plenty of water throughout the day. It detoxes, helps move your food down to digestive tract, and also makes you feel satiated more quickly. If you can, try to drink water instead of soda, sugary juices, and alcoholic beverages. Drinking water on top of those is still a great idea, though. Add a little lemon or lime juice for an extra kick.
7. Use Healthy Holiday Recipes
You may not be able to control what others bring to the table, but you can control what you bring, so make it worth your while. There are many healthy holiday recipes around, but here are some quick tips:
• Grill, roast, broil, stir-fry, poach and steam food instead of frying or deep frying.
• Season turkey and other meat overnight with spices, rather than using creamy, heavy sauces
• Use fat-free chicken broth for gravy.
• Use fruit purees instead of butter and oil for baked goods.
• Use plain yogurt or fat-free sour cream for creamy dips, mashed potatoes, and casseroles.
Need a little relief from all the holiday craziness? Spa Sophia is offering 20% off all Zents products with the purchase of a Zents massage! Find out more here.
5 Easy, Healthy Breakfast Recipes That Keep You Full
Mornings can be chaotic and rushed, and breakfast may be turned into a quick bagel with cream cheese, a coffee, or even nothing it all. But remember what your parents said? Something along the lines of "Breakfast is the most important meal of the day?" Don't want to listen to your folks? Then listen to us! Or, well, science. Because studies have shown that people who eat their biggest meal at breakfast have a smaller chance of gaining weight, high cholesterol, diabetes and heart disease, and are less likely to regain lost weight. Eating a good breakfast prevents you from splurging later on, and gets your metabolism going. So no matter what your nutritional goals are, it's very important to get a healthy breakfast. A healthy breakfast consists of proteins, fiber and vitamins, and is calorie conscious. Here are five of our favorite easy, healthy breakfast recipes that keep you full...
Leek & Goat Cheese Frittata
This savory breakfast recipe has tons of protein, and can be refrigerated and served cold later on. It's one of our favorite healthy breakfast recipes that keep you full, because you only have to make it only once or twice to have a delish nutritious breakfast all week.
1. 1 tbsp olive oil
2. 3 large eggs
3. leeks
4. 1 bell pepper
5. spinach leaves
6. brown onion
7. crumbled goat cheese
8. pepper
9. salt
Prep: Preheat the oven to 400 degrees. In a bowl, crack the eggs and whisk with pepper and salt. Cut the veggies and fry them in a small saucepan until the spinach leaves have shrunk and the onion is golden brown. Pour over the egg mixture and stir, then let it sit until the egg begins to set. Take the pan off the stove and sprinkle crumbled goat cheese on top. Put the whole thing in the preheated oven. Let it bake for about 10 minutes, and voila! Un frittata!
Apple Coconut Bowl
This is one of our fave healthy breakfast recipes that keep you full because it's so fresh, and made within 5 minutes. It can also easily be eaten on the go. The nuts and yoghurt add some protein while the fruit and chia seeds gets you your vitamins.
1. Unsweetened Coconut Flakes
2. 1/2 cup Plain non fat/low fat yogurt
3. Chia seeds
4. 10 oven roasted almonds
5. 2 Apples
Prep: Grate your apples with a cheese grater into a bowl, add chia seeds, almonds, coconut flakes, yoghurt and that's it: you're all done!
Veggie Omelet
Another one of those savory, healthy breakfast recipes that keep you full all morning, and takes maybe 10 minutes to make. Cut the veggies on Sunday and bag and refrigerate them to save time, or just buy chopped veggies.
Ingredients: olive oil 1/2 zucchini 2 green onion 1/2 bell pepper 1 large egg 3 large egg whites 2 tablespoons shredded Gouda cheese pepper salt
Prep: Whisk eggs, egg whites, salt, pepper, some water and cheese in a bowl. Cut veggies and heat the olive oil in a small saucepan over medium-high heat. Add veggies and a pinch of salt to the pan and sauté until they're crisp-tender. Remove from heat. Then heat a nonstick skillet over medium-high heat and coat pan with olive oil. Pour egg mixture into pan and cook until edges begin to set (about 2 minutes). Lift the edges of the omelet and tilt the pan to allow uncooked egg mixture to cook. Add the veggies to one half of the omelet and sprinkle with cheese. Then fold the omelet and enjoy!
Walnut & Banana Cereal Combo
This sweet, fruity breakfast can be made within a minute and is super delicious. While low on calories, the nuts and Greek yogurt add protein and the bran flakes fiber, so you'll feel satiated all morning. Probably one of the easiest healthy breakfast recipes that keep you full.
Ingredients: 1 banana 10 walnuts 1/4 cup bran flakes 1/4 cup Greek yogurt 1 teaspoon cinnamon
Cut the banana into pieces, throw them into a bowl, and add cinnamon, walnuts, bran flakes and yogurt. Yup, that's all. So you really have no excuse to skip breakfast ever again, you!
Breakfast Quesedilla
On of those very California healthy breakfast recipes that keep you full, and we're sure nothing new for our Los Angeles spa clients. But unlike restaurant versions and breakfast burritos, this one is low on calories, full of fiber, and low on carbs!
cooking spray 1 whole grain tortilla 1 large egg 2 tablespoons chunky salsa 1/2 avocado 1/4 cup grated sharp Cheddar
Whisk the eggs and spray a skillet with cooking spray, then heat over a medium heat. Reduce heat to low and add eggs, scrambling until cooked through. Take off heat. Spread one half of the tortilla with salsa, scrambled eggs, avocado and cheese. Then fold op. Grill in a frying pan or on a grill and take off when both sides are brown. Yum!
Combine your healthy diet with relaxing massages or Ayurvedic treatments from Spa Sophia to achieve full inner beauty. And while beauty starts within, nothing beats a good facial ;) Book your Spa Sophia treatments online or by calling (310) 564 6676.
Sleep Tips: 5 Natural Ways to Improve Your Sleep
sleep tips 5 natural ways to improve sleep Sleep is one of the most important things when it comes to staying healthy, both mentally and physically. During sleep our bodies and brains recover. Sleep helps with processing memories, growth, and restoring the immune system. Making sure you get an adequate amount of sleep every night is therefore very important. Modern life can make this challenging sometimes though. Many people therefore opt for sleeping pills, but sleeping pills come with dangerous side effects, plus the risk of developing a dependency. Luckily there are also many natural ways to improve your sleeping habits. Spa Sophia selected the five best sleep tips...
Sleep Tip 1: No Bright Screens Before Bedtime
Laptops, TV, iPods, phones: They all mess with your melatonin levels. Melatonin is a hormone secreted in your brain that plays a big part in what is often called your internal clock, your circadian rhythm. Melatonin levels are influenced by light: When it gets dark, melatonin levels rise, making you feel tired and sleepy. When it's light melatonin levels are low, keeping you feeling awake.
Brightly lit screens lead to a delay of the rise in melatonin levels, which is why you'll have a harder time finding sleep if you look at bright screens before sleeping. One of the best sleep tips is therefore not to play video games, watch TV or anything else that involves a bright screen up to an hour before sleeping. So yes to eye pads and no to iPads!
Sleep Tip 2: No Caffeine After 2PM
This may be one of the most well-known yet most ignored sleep tips. Seriously, people. We know you love your coffee, afternoon tea, and soda, but any caffeine after 2PM will make finding sleep at night much harder. It takes your body about 6 hours for deplete 50% of an 8 ounce caffeine intake. That's 6 hours for your regular small Starbucks coffee. Think of what a venti (20 ounces) will do to you! So opt for herbal tea, decaf coffee, or other caffeine free drinks after 2PM.
Sleep Tip 3: Get Moving
Exercise is the miracle medicine for many problems in life: lack of energy, depression, cardiovascular diseases...we could go on and on. And it also helps you sleep better! This is one of those sleep tips we probably don't even need to get into the science of - we've al felt how tired a good workout can make us - but research has proven that sleep improves drastically when people pick up some aerobic exercise.
Sleep Tip 4: Get On a Regular Sleeping Schedule
Like we described in the first one of the sleeping tips, melatonin plays a big part in creating a circadian rhythm. And sticking to this rhythm really helps you find sleep every night. Wether you're a night owl or morning person, try to go to sleep and get up at around the same time every day. Even in the weekends. The occasional all nighter is okay, as long as you have some sort of routine.
Steep Tip 5: Don't Eat Before Sleeping
Eating right before going to bed - especially food with a high glycemic load - will flood your blood with glucose. This in turn will cause your heart rate to go up and free energy for your body. Which is exactly what you don't need right before going to bed. So say no to those late night snacks.
Want to enjoy ultimate relaxation while awake? Book one of Spa Sophia's amazing healing massages online or by phone by calling (310) 564 6676.
Ten Best Foods For Beautiful Skin
ten best foods for beautiful skin almonds spa sophiaWhile facials and good skin care products can help your skin tremendously, beauty starts from the inside. Unhealthy habits can undo many of the benefits facials and external skin care create, particularly smoking and a bad diet. That's why Spa Sophia recommends a healthy, balanced diet for clients who are serious about skin care and want to create long term effects. Want to know which foods are the best for your skin? Read our list of the 10 best skin foods...
1. Kale
Kale is all the rage, and for a good reason. Kale contains carotinoids, which in a clinical study were proven to enhance complexion and skin color. People therefore rated the skin of people who ate more kale as better looking.
2. Pomegranate
Pomegranates are full of polyphenols. What? Polyphenols are antioxidants that fight free radicals, protecting your skin from damage. They also regulate your skin's blood flow, giving you an healthy, rosy tone. When applied directly to the skin pomegranate also moisturizes and fights wrinkles. Bring out the pomegranate juice!
3. Avocado
Angelenos love their avocados, and thankfully they're full of health and beauty benefits too! Avocados contain lots of vitamin C, E and K, which are essential for a healthy skin. It also has plenty of antioxidants, so go ahead and enjoy that guac!
4. Greek Yogurt
Yogurt and dairy products in general are nice for your skin, as they calm irritation and reduce dryness, but Greek yogurt is especially beneficial due to its protein content. Proteins keep skin firm and wrinkle resistant, and Greek yogurt often has twice the amount of protein that regular yoghurt has. Add some berries and granola and turn Greek yoghurt into your breakfast.
5. Almonds
These verstatile seeds are full of vitamin E, which helps protect against sun damage. Studies even found that people who ate more almonds got less sunburned. Add them to salads, that Greek yoghurt breakfast, or go with peanuts as a suitable replacement.
6. Carrots
Just like kale, carrots contain a lot of carotinoids, which improve your skin color and complexion. On top of that carrots also contain heaps of vitamin A, which reduces overproduction of the outer skin layer and the resulting clogged pores and breakouts.
7. Flaxseed
Flaxseed is full of Omega-3, which reduces redness and irritation, and makes skin absorb more moisture. This in turn leads to less wrinkles. Add some flaxseed to your smoothies or sautee your veggies in flaxseed oil. Fish are also a great source of Omega-3.
8. Spinach
Popeye knew what he was doing. The water in spinach and most other greens passes the skins' cell membranes, making it look more plump and healthy. More importantly though: The folate in spinach helps protect against skin cancer by preventing and restoring DNA damage. People who eat lots of greens have been shown to have half the amount of tumors.
9. Sweet Potatoes
Sweet potatoes are total health champs. They contain boat loads of Vitamin C that increases collagen production. In fact, sweet potatoes have been proven to lead to 11 % less wrinkles if eaten over a long time. Carrots also do the trick!
10. Tuna
Just like flax seed tuna contains Omega-3 which - like we stated before- reduces redness and irritation, and makes skin absorb more moisture. On top of that tuna also contains selenium that preserves elastin. More elastin means less wrinkles, so add some tuna to your diet!
Want to really treat your skin? Get one of Spa Sophia's cutting edge facials. Book one online or call us at 310.564-6676.
How To Pick Healthy Carbs: The Glycemic Index
how to find healthy carbs glycemix indexFollowing a healthy, nutritious diet can sometimes seem like a day job. Proteins, sugars, carbs, gluten, fat, omega-3, mercury: There are so many things to pay attention to. Especially sugar and carbs have gotten a lot of attention. While we used to look at just the amount of sugar in food, it later became carbs as a whole. Then it was the amount of simple carbs versus complex carbs, and recently it became all about the Glycemic Index, Glycemic Load and Insulin Index. What are these things, what do they teach you about food, and what should you pay attention to? Spa Sophia explains.
The Importance of Glucose
Carbs and sugars are so important because they create blood sugar, also known as glucose. Your body uses glucose for energy, but stores whatever is left over as fat. High levels of glucose can lead to diabetes, stroke, obesity and other cardiovascular diseases.
Eating large amounts of carbs is therefore never a good thing, but not all carbs are created equal. Some carbs are digested very quickly, flooding your blood with glucose, which makes you feel hungry soon after. These carbs are found in candy and junk food, and are the ones that can and leads to aforementioned health problems. Other carbs release glucose more gradually though, which is healthier and also keeps you feeling more satiated. Fruits and vegetables are examples.
The Glycemic Index
The Glycemic Index (GI) has recently gained a lot of popularity because it takes this difference between carbs into account. The GI is a number that describes how quickly glucose rises after eating certain foods. Foods with high GI scores (in the 70-100 range) cause quick glucose spikes, while food with low GI scores (55 and under) have a gradual glucose release.
The Glycemic Load
While the GI is a better measure than just looking at carbs, the GI doesn’t take into account how many carbs of a food are typically eaten. For example, white pasta has a GI of 46 and apples a GI of 50. That doesn’t mean white pasta is healthier though, because people typically eat 100 calories of an apple, while they eat about 500 of white pasta. That’s why the Glycemic Load (GL) was invented. The GL looks at both the GI and how many carbs are typically eaten in one serving. A GL of 20 or more is considered high, while a GL of less than twenty is considered low.
The Insulin Index
With the popularity of the GI and the GL came the criticism that it only takes into account food with carbs, while other food can also influence glucose levels, due to their effect on insulin. For example protein heavy foods like steak. While the GI and the Insulin Index scores are often quite similar, some foods do trigger a disproportionate insulin reaction. The insulin index, just like the GI, doesn’t account for the amount of carbs usually eaten per serving, though.
So How To Pick Healthy Carbs?
It’s good to educate yourself about things like the GI, GL and Insulin Index, but don’t worry about adding another checklist item to following a healthy diet. Because the foods with high GI, GL and insulin scores are the ones you probably already know are unhealthy. And the same goes for those with low scores. So stick to as much fruit, veggies and raw, non processed foods as you can, and you should be good!
Want to go about your health and beauty holistically? Book an all natural facial, wax or massage at Spa Sophia’s online or make an appointment by calling 310.564.6676.
Ten Tips For De-Stressing
ten tips for de-stressing - spa sophiaStress is not only unpleasant, it’s also very unhealthy. Stress breaks down your immune system and can lead to depression, digestive problems, heart disease, sleep problems, weight gain, and memory and concentration impairment. On top of that stress can make your skin thinner and less capable of restoring itself. At Spa Sophia we therefore place a lot of emphasis on making our facials and waxes completely stress free, and we also offer a variety of healing and relaxing massages. To help you continue to feel stress free at home and at work, here are ten tips for de-stressing…
1. Put Things in Perspective
If there’s a specific thing that’s stressing you out, ask yourself: How important will this be a week from now? A month from now? Even a year from now? Think about it in the grand scheme of things.
2. Make Your Mornings Count
Mornings set the pace for the entire day, but too many people rush their mornings. Wake up even 10 small minutes earlier so you can get a little times for yourself, eat a healthy breakfast, and do some stretching exercises or meditation.
3. Take Sufficient Breaks
Always take breaks during work. You may feel like it will cost too much time, but not taking breaks decreases your productivity so you actually save time by taking breaks. Don’t take your breaks behind you computer though. Get away from work both mentally and physically.
4. Exercise
Working out releases all kinds of stress relieving and happy making hormones, so break a sweat, even if it’s just during a small walk, or by taking the stairs instead of the elevator.
5. Make To-Do Lists
To do lists ensure you won’t forget anything and can make the daily or weekly tasks more overseeable and less daunting. Plus, it’s so satisfying to cross things off that list!
6. Get Enough Sleep
Sleep isn’t a luxury, it’s a necessity. We need sleep to keep us sane, healthy and productive. Therefore make sure you get enough sleep, even if you feel like you don’t have the time for it.
7. Eat Well
The foods we tend to crave when we’re stressed usually only make stress worse, since they trigger the same bodily reactions. Stress makes your heart beat faster and your blood pressure go up, and so do foods that have a high glycemic index, such as most candy and junk food. So snack on nuts, avocados, fish, fruits and dark chocolate instead!
8. Smile
Science has proven that even fake smiling will make you feel happier. Not to mention the benefits of laughter therapy. So put a smile on your face and not only look nicer, but also feel nicer!
9. Enjoy Some Nature
The great outdoors has been proven to have stress relieving effects, often because the lack of stimuli offers space for reflection. LA has so much great scenery to offer. Go enjoy a hike in the hills or a walk on the beach, and you’ll feel invigorated after!
10. Breathe
People who do yoga and meditation will already know this, but just paying attention your breathing, and making sure your breaths are deep and steady can work miracles for your stress levels. It may sound easy, but see how quickly you forget. So let go, and breathe.
Need a little extra help relaxing? Book one of our healing massages online or call Spa Sophia at 310.564.6676 to set an appointment today.
7 Health Benefits of Massages
Did you know massages have been proven by science have a wide range of health benefits? Not that you needed any additional reasons, the benefits of a massage are quite clear when you’re on the massage table, completely Zen. But if you want to know what other benefits there are to massages, here are the seven health benefits of massages…
massages spa sophia los angeles venice beach abbot kinney1. Massages Relieve Pain
It’s not just imagined, a massage can lead to significant pain relief. A massage benefits sore muscles, stiffness, and sports injuries. They can also decrease chronic back pain and provide a better range of motion for people with osteoarthritis and other joint conditions.
2. Massages Reduce Anxiety & Depression
Massages have been proven to be able to reduce anxiety and depression. They stimulate the production of neurotransmitter serotonin, a substance in the brain that’s widely associated with feelings of happiness. Massages also reduce the production of cortisol, often called ‘the stress hormone’ and therefore massages can make you feel less anxious.
3. Massages Are Good for Your Blood & Cells
Massages encourage lymphatic drainage. This is the transportation of toxins out and away from cells so that there’s more place for nutrients. It also increases blood circulation. Both these things have great effects on your complexion and hair, which is why we always include a massage in our facials.
4. Massages Make You More Alert
Studies found that massages - even short ones that last about 15 to 30 minutes - increase alertness and problem solving abilities. So they’re a great way to start your day!
5. Massages Decrease Headaches & Migraines
Due to the beneficial effects of massages on stress, there are a lot of massage benefits for stress induced conditions, like tension headaches. But massage benefits aren’t limited to tension headaches. Massages can also lead to fewer migraine attacks and less painful migraine attacks.
6. Massages Boost The Immune System
Although the support for this finding isn’t very large yet, science does indicate that a massage benefits the immune system. Researchers have found more disease-fighting white blood cells in people who received regular massages. It’s not a surprising finding: Stress puts your immune system on hold, which can damage it in the long run, and massages decrease stress and thus this damage.
7. Massages Increase The Quality of Sleep
People who struggle with insomnia or other sleep problems should give regular massages a try. Massages can increase healthy sleeping patterns, something that’s thought to be due to the effect massages have on delta waves; brain waves associated with sleeping.
Want to enjoy these health benefits and get a heavenly massage? Call Spa Sophia at 310.564.6676 to set an appointment today, or book online. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '26', 'language_id_whole_page_fasttext': "{'en': 0.9291632771492004}", 'metadata': "{'Content-Length': '127747', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7ZCABDTJHJAUDIEU4RPGJMMR5JLYF7H4', 'WARC-Concurrent-To': '<urn:uuid:09c324c8-0670-4140-a5f1-9d7eca956112>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 33, 33), 'WARC-IP-Address': '198.185.159.145', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BZG4EJBNGSVC5OPIBDQC5IN57PK7WWFT', 'WARC-Record-ID': '<urn:uuid:4ffcaf92-04e7-4b46-8824-f5d53c12bfe2>', 'WARC-Target-URI': 'https://www.spasophia.com/spa-life?category=Health', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae365904-b67a-42d7-a127-1c16d788e03e>', 'WARC-Truncated': None}", 'previous_word_count': '4848', 'url': 'https://www.spasophia.com/spa-life?category=Health', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14492911100387573', 'original_id': '007cbc10ef89c39d4b98224bbd0c31334213daddee05d0518dac5d468609566a'} |
Can You Steal From Self Checkout?
Can you get caught stealing from self checkout?
Unfortunately, the self-checkout is being abused by people who think they can get away with stealing, by not scanning all the items before they place them in the bag.
People are getting arrested all the time for shoplifting.
However, you can go to jail up to a year for petty theft..
How does Walmart know if you steal?
What is the banana trick?
Will police find you if caught shoplifting on camera?
The police will find you if you got caught shoplifting on camera.
How often do shoplifters get caught after the fact?
Police and merchant data shows that shoplifters are caught an average of only once every 48 times they commit an act of thievery. 28. When they are caught, stores and retailers contact the police and have shoplifters arrested approximately 50% of the time.
Can police come to my house for shoplifting?
Yes, the Police can show up at your house, although I don’t know if they will. It is possible although not likely given the facts you stated. If they do, the important thing to remember is that you don’t have to speak to the police whether…
What happens if you shoplift and don’t get caught?
Even if you successfully shoplift and exit the store without being caught, you can still be arrested. When there is missing inventory or if something distinctive is gone from the shelves, businesses may review security footage.
What is the most stolen item in a grocery store?
The correct answer is actually…. CHEESE. That’s right, according to a 2011 survey by Centre for Retail Research, cheese was globally the most stolen item in a grocery store.
How does self checkout prevent theft?
When shoplifters attempt to steal through self checkouts, they are expecting an easy process since they are in control of scanning the items. There is also less guilt because they don’t engage with a person. Having an employee who works solely at the self checkout area will serve as a major deterrent for shoplifters.
Can you get caught shoplifting months after?
Most shoplifting cases are classified as a misdemeanor. This means that you can face charges for shoplifting after leaving the store for up to 1 year after committing the crime. Sometimes it will take weeks or months for the store to file charges because of the constraints of video footage.
Can you sue a store for falsely accusing you of stealing?
The fact that you were pursued into another store and accused must have been deeply humiliating, to say the least. You could sue them for defamation, however, you might find the cost of litigation to be prohibitive. I suggest you call the manager and ask him to offer you a public apology for your embarrassment.
Does Walmart send police to your house?
Does Walmart send the police to your house? … Wal-mart doesn’t “send” police anywhere. If you’ve committed some sort of a crime, Wal-Mart can report it, and provide police with whatever information they may have, including who you are, and where you live.
Does Walmart build cases on shoplifters?
Case building is to get charges to stick. If someone steals $15 they won’t even get prosecuted. But if you can prove they stole $15 worth on 3 or 4 occasions then not only are they getting prosecuted, the chances of the charges dropping are a lot less.
Is it okay to steal if you’re starving?
Yes it is totally fine if they have to be that desperate that they have to steal food that means that land which they are on or that country has forsaken them. While they are dieing of hunger there must be people in the same country enjoying lavish meals.
What happens if you steal from a grocery store?
The grocery store can report it to the police, who can then arrest you for attempted larceny if they get a warrant signed by a judge. But, it is unlikely that they will, as you noted they received their items back and even if they do and you get…
Will police track me down for shoplifting?
Can they track you down, sure. They can find out who the car belongs to and see who was driving it at the time and match it up to any surveillance footage from the store. That’s a lot of work for a shoplifting, but they can certainly pursue it if they…
Is it stealing if you don’t leave the store?
Answer: Yes, a defendant can commit the crime of shoplifting without actually leaving the store. All he needs to is to move the property and exercise control over it in a way that is inconsistent with the shop owner’s reasonable expectations as to how shoppers will handle merchandise.
Do stores keep track of shoplifters?
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '170', 'language_id_whole_page_fasttext': "{'en': 0.960394561290741}", 'metadata': "{'Content-Length': '37299', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:75K4JPJWG6ETUA3QNV4DABLFJ2XX5UIJ', 'WARC-Concurrent-To': '<urn:uuid:ad869fcd-514a-4f5e-b922-40d294d303bb>', 'WARC-Date': datetime.datetime(2021, 5, 11, 8, 2, 53), 'WARC-IP-Address': '45.130.40.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OZ62AWXTDHRR6AIDR7Y5O2JR5BX5O7PQ', 'WARC-Record-ID': '<urn:uuid:72692039-1fe0-422e-a88d-965494d4ad70>', 'WARC-Target-URI': 'https://educationforthemany.com/qa/can-you-steal-from-self-checkout.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2b5de3b5-5574-439a-86c6-afdbcccd4d16>', 'WARC-Truncated': None}", 'previous_word_count': '952', 'url': 'https://educationforthemany.com/qa/can-you-steal-from-self-checkout.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-16.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.966347873210907', 'original_id': '2190a0198611de8f6f31f113a9437786a2b299d02ae963f637ae369b561c6627'} |
I can't believe it's not January anymore
I really can't get over how fast January has gone by. I think I say this every year, but time just seems to speed up in January. When I stop and pause and look back on the month it feels like it only began yesterday and I've run out of days to achieve everything I set out to. My goals have outstripped the time allocated to achieve them and sometimes it kind of feels like I've let myself down. Not sure if you feel the same way, but if you do it can be the biggest downer and the fastest way of falling off the wagon, or loosing momentum for all your setting out to do. So what do you do? How do you keep on track?
I wish I could tell you I had the magic answer, but the truth is that right now, some of my goals are in worse shape than when I started. Instead of making baby steps of progress, I've actually gone backwards. Hands up all those who've done the same? You know who you are? Come on... eyes closed no-one is looking. Let's get real with each other and confess... some of our good intentions for the year are already gathering dust on the shelves. We try and ignore the truth of the situation, because it feels like failure, but in the harsh light of day the truth is we've done nothing to achieve them.
On a positive note, not all of my goals are in such bad shape. My commitment to my creative outlets and my blogs is still on track - although there have been a few close calls. And I'm diligently protecting my time, my energy and my life like a mother hen protects her chicks. So there are a few things I'm on track to achieve in the coming months and year. What then is the difference? Why am I succeeding in some goals and not others? I'm not 100% sure I have the answer yet, but here's a few things I've noticed.
Having a plan has made all the difference. Last week I talked about the difference creating a roadmap for your goals and dreams makes in achieving them. For me that's truth right now. At the end of December I planned what I wanted to blog about in January and I've more or less stuck to it. In that roadmap I set both hard and soft goals. The things I wouldn't compromise on doing and the nice to haves that I wanted to do if I had time. Well I've hit all the hard goals and even a few of the soft ones. For the goals I haven't hit I haven't really had a plan. Well that's not entirely true. In my head I had thought about how I would achieve them, but I never actually wrote them down and stuck to them. There was no daily or weekly commitment to stick to. For me this makes all the difference, so now I have to set aside time to write up my goal roadmaps for February.
The second thing I've noticed is that my attitude has made all the difference. The goals I've made progress on have been things I've been wanting to do for months. I've been actively thinking about them and slowly working on a mental strategy to achieve them even before I started work on them. When I did sit down to plan and then execute on that plan it was easy because I'd already made the mental commitment to do so. The fact of the matter is when I look at the goals I've made little or no progress on I can't say I have the same attitude or mindset. They are things I want to do, but I'm not as passionate about them. I can't say I've worked through the process in my mind. It's no wonder it's easy to keep putting them off until tomorrow.
So where does that leave me today? Well right now I'm reassessing. What is it I want to achieve this year? What is really important to me? The goals I've been making progress on I plan to keep on work on. Clearly they are important to me and I have both energy and motivation to continue working on them. The goals that I've made little process on require a bit more thought. Are they really important to me? If the answer is no then they need to drop off the list. If the answer is yes then I need to make a concrete plan on getting there. If the answer is I'm not sure then I need to carve out time to answer that question. After all time is ticking away and I want to spend it doing the important stuff, not just the stuff I can do. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9870165586471558}", 'metadata': "{'Content-Length': '98960', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2HJJQHP2RLHORBY4VHT3D3DUWPDHNNS2', 'WARC-Concurrent-To': '<urn:uuid:21238566-7d64-4de4-8793-83c046e5d12c>', 'WARC-Date': datetime.datetime(2020, 3, 30, 5, 0, 43), 'WARC-IP-Address': '172.217.164.179', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YXDAQEGUJKKC3IV76SQFCQBJ3C7TT57L', 'WARC-Record-ID': '<urn:uuid:4eb736a6-e5f2-43df-915b-76e077335dd0>', 'WARC-Target-URI': 'http://www.simply-sally.com/2013/01/i-cant-believe-its-not-january-anymore.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0c442dcb-30e9-4b34-ac2f-c58be3fae517>', 'WARC-Truncated': None}", 'previous_word_count': '814', 'url': 'http://www.simply-sally.com/2013/01/i-cant-believe-its-not-january-anymore.html', 'warcinfo': 'isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-67.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11848902702331543', 'original_id': '5b7336882ed6ef5091116106c6618e963a9c1350e9666cb3ab5e99a646383293'} |
Original URL: http://pregnancy.familyeducation.com/first-trimester/day-2.html
First Trimester 2nd Trimester 3rd Trimester
278 days to go...
ovaries on day 2 of menstrual cycle
What's happening inside
Your eggs are already developing, as can be seen in this color-enhanced ovary. The small white structures are the immature follicles that contain the eggs at different stages of development. Once one of the follicles matures, the egg will burst out.
By tracking your menstrual cycle and understanding how it works, you may increase your chances of conceiving.
This is day two of your period and day two of your complete menstrual cycle, which starts on the first day of your period and ends on the first day of your next period. A full cycle is, on average, 28 days, but many women have a shorter or longer cycle.
This may be the time when your period is at its heaviest, since the tissue and blood that make up the lining of the uterus (the endometrium) is shed. The average blood loss during menstruation is around two tablespoons (30 ml). While the lining is being sloughed off, the blood vessels in the uterus constrict, which can cause cramplike period pains. As soon as your period has finished, an egg begins to mature within its follicle in one of your ovaries, ready to be released around mid-cycle. This is called ovulation (see This is Day 14 of your Menstrual Cycle).
Meanwhile, the lining of the uterus starts to build up again under the influence of the hormones progesterone and estrogen, ready to receive a fertilized egg. If the egg is not fertilized, hormone levels fall, the lining sheds, and the cycle begins again.
As A Matter Of Fact
Periods can synchronize in women who live or work together.
Scientists claim that pheromones (chemicals that trigger a biological response in someone) waft from one woman to another. Receptors in the nose detect these pheromones and a biological process takes place whereby one woman naturally adjusts her menstrual cycle.
Changes during the menstrual cycle
The monthly cycle of an egg as it grows to maturity inside an ovary is shown at the top of the chart. It is released from its follicle around day 14. The bottom of the chart shows the corresponding development of the lining of the uterus-shedding at the start of a period, then rebuilding in preparation for the fertilized egg.
The empty egg follicle (called the corpus luteum) secretes progesterone, which is a hormone that helps the endometrium reach a thickness of about 0.2 in (6 mm) over the 28 days of the menstrual cycle, ready to receive a fertilized egg.
ovulation calendar, menstrual cycle chart
Excerpted from Pregnancy Day by Day.
Copyright © 2009 Dorling Kindersley Limited.
Buy this book now!
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.912675142288208}", 'metadata': "{'Content-Length': '11009', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:36HDEF3YEWQ44ZJG435PWM23A7XFSSZZ', 'WARC-Concurrent-To': '<urn:uuid:a29759f8-2a94-444b-9701-2dc2e6b7a96f>', 'WARC-Date': datetime.datetime(2014, 12, 22, 2, 5, 10), 'WARC-IP-Address': '165.193.122.26', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:R76JIIYZWLTAXNHCN2RH3FE5EFIKSV6G', 'WARC-Record-ID': '<urn:uuid:a17a0ad9-b0d1-4bbb-bc75-1e2c095b0bf5>', 'WARC-Target-URI': 'http://pregnancy.familyeducation.com/first-trimester/day-2.html?for_printing=1', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e6b37def-57d5-4f44-adf4-e0e441e34427>', 'WARC-Truncated': None}", 'previous_word_count': '472', 'url': 'http://pregnancy.familyeducation.com/first-trimester/day-2.html?for_printing=1', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03541761636734009', 'original_id': 'ac6d4430e22d62caf10bf3fc379a6671fffd8ae6da097f0631efc1d23e1534e4'} |
How to draw a Pulley in CATIA
This post shows you how to draw a Pulley in CATIA using Boolean operations.
There are many reason you as a beginner should master how to use Boolean operation in CATIA. It is one of the preferred method used by CAD designers for the following reasons.
1. It is easy to model a part using this method.
2. Editing the model without failure is possible.
3. One can easily get idea, how the core will look like in case of plastic or casting components.
Let see how this works.
We will be designing a Drive pulley using Boolean operations.
Here are some dimensions of the pulley.
One can easily understand that there are three major parts in this component.
1. Input gear
2. Shaft
3. Pulley
Our strategy will be to make these three individual parts separately so to be able to join all at the end of the design.
Step 1
In the specification tree, I have added 6 bodies and renamed them to a suitable name.
In these bodies we will create features.
Step 2
1. Right click on Power Input Gear and Define it. In this body we will create gear.
2. On the front plane draw a circle of 150mm diameter.
3. Extrude it to 50mm distance.
On the same plane draw gear tooth profile.
Using circular pattern complete the gear.
Step 3
1. To create the core of the gear, define next body as in work object. Create a plane at a distance of 10 mm from front plane using Plane option. (You will find Plane option in the Reference Elements toolbar.)
2. Draw a circle of diameter 125mm on this plane.
3. Extrude it to 40mm.
Step 5
1. Now we will create the shaft. Define shaft body as in work object.
2. On the front plane draw a circle of 60mm and extrude it to 120mm on the opposite side of gear.
Step 6
Before creating shaft core we will create pulley. In pulley body, take a plane offset of front plane at a distance of 120mm.
On this plane draw a circle of 100mm dia. and extrude it to another 50mm.
Step 7
Now we will create shaft core. Activate Shaft Core body.
1. On the front plane, draw a circle of 20mm diameter.
2. Extrude it to 170mm distance on shaft side and 10mm on the gear side.
We will get a core, with total length of 180mm.
Step 8
After creating all the basic parts, we will perform Boolean operations.
At the very first step we have created a body named as Drive pulley – Main Part. We will Add and Remove features in this body to get our final component.
So which body do we have to add or remove?
It’s easy. The body which was named as ‘Core' has to be removed from Main Part and all other bodies are to be added to the Main Part.
At the end, click on Drive pulley – Main Part and define it in work object. Give appropriate edge fillets at sharp edges and you should have the final component looking like the following.
cad exercises | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8840846419334412}", 'metadata': "{'Content-Length': '75781', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7EVYTSGN4F6E2YRPDWJ5IYHU2HCEVNFI', 'WARC-Concurrent-To': '<urn:uuid:fb1d1c48-2c2f-48dc-bb9b-147c9ca3789b>', 'WARC-Date': datetime.datetime(2018, 12, 10, 20, 20, 13), 'WARC-IP-Address': '216.194.173.157', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6YZWRNEUBPG6MTPH5NBQ27QGSA6WSGEL', 'WARC-Record-ID': '<urn:uuid:5d21788d-7d77-449f-8206-086f88df10e8>', 'WARC-Target-URI': 'https://www.computeraideddesignguide.com/how-to-draw-a-pulley-in-catia/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:91cc9568-2d6e-49e5-ab73-341713614d4b>', 'WARC-Truncated': None}", 'previous_word_count': '531', 'url': 'https://www.computeraideddesignguide.com/how-to-draw-a-pulley-in-catia/', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-179-113-199.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04611915349960327', 'original_id': '461b2683211a99a13c6ad2c6152aed63d7fe605bb438a6178a499930e6ca72b9'} |
Fun, Ingenious, and Unusual Math Resources & Ideas
Fun, Ingenious, and Unusual Math Resources & Ideas
Compiled By Fran Wisniewski,
Universal Preschool's Worldwide Ambassador
The following list of math resources may fall under the traditional math radar — however, they often work better for teaching math concepts than more familiar textbooks and workbooks. These resources, compiled from recommendations by homeschool parents, can be used with a variety of age and grade ranges — it simply depends on the learner's ability and interest.
1. Make your own abacus!
2. Make structures with toothpicks and marshmallows
3. Inter-locking cubes and pattern blocks: good for teaching patterns, addition, subtraction, division, multiplications, volume, geometry and more.
Workbooks & Activity Books
1. Mazes -- Use mazes for math (problem solving). There are books available for Pre-K to adult levels. Play online!
2. "Calc-U-Draw" and "Calc-U-Color" -- Solve problems and then plot your answers or color the space according to a chart.Buki Books is the publisher and homeschool parents we consulted highly recommend anything they make.
3. "Plotting Points" -- published by Instructional Fair available for grades 2-4 and 5-8. Kids will learn plotting and end up with graphic art when finished. Purchase in teachers supply stores or from Teachers Paradise.
1. "Math Curse" by Jon Scieszka and Lane Smith. This book is about finding patterns in the world around you! These patterns are called Fibonacci. Great for ages 8+ (Adults will enjoy this book as well!) You'll find yourself looking for patterns in everything you do!
2. "Real World Math for Hand-On Fun" by Cindy A Littlefield -- Learn how math fits into the real world with fun filled projects. Available at Amazon.com
3. "Math Play" for Preschoolers put out by Williamson Publishing for ages 4-8.
1. "Math Blaster" for ages 6-12. Available from Amazon.
2. Any of the "JumpStart" Math programs.
3. Algebra World: Gives a reason for learning algebra by showing how algebra fits into the real world for grades 6-High school.
4. "Clue Finders Math Learning System" for ages 9-11.
5. Soccer Math - Test your math skills as you fake out your opponents on the soccer field. For ages 7 to 14.
CDs, DVDs, & Online Videos
1. Brain games and puzzles are great for logical thinking and problem solving. All ages can enjoy brain games.
2. Kids (about ages 8+) can make mazes and puzzles and give them to friends to solve. Learn more about mazes!
3. Catalog Math: Helps kids to learn real life math skills. What to do: Get a favorite catalog (we used American Girls, Oriental Trading, and toy catalogs), give a set budget, and challenge the kids to buy until they reach their limit. If they go over, they will need to deduct items, if they are not close enough to the dollar amount set, let them keep buying. As your kids get better at it, have them come within a certain dollar amount such as $25 including taxes and shipping and handling fees without going over. Great for ages 8-High school.
Variation: Prepare a food budget: Use store flyers and ask your child to budget a meal for 1 day or 1 week with a certain dollar amount. Then go purchase the items and use the them the next day! Ages 9+
1. "Tri-Ominoes": Played like Dominoes but with triangular tiles. Put out by Pressman Toys for ages 8+ but younger children can play with help, buy the game from Amazon, or play on-line
2. SMATH: Math game that combines number and symbol tiles to form math equations. Pressman Toys ages 6+
3. Rummikub: A sequencing tile game put out by Pressman Toys; played like the card game rummy. Games available for pre-K children with animals and older kids-adults with numbers.
4. Math Dice comes with three 6-sided dice and two 12-sided dice; cotton drawstring bag and instruction booklet with lessons and examples for ages 8 to Adult.
5. Head Full of Numbers Math Game for ages 7-12.
6. Payday - The classic game of making and spending money! You'll make money every month, but you might spend it just as fast. For ages 8-12 years.
7. Aha! Brainteaser Classics by ThinkFun Inc. Just when you think solving the puzzle is impossible, Aha! you discover the solution. Each brainteaser comes with 3 hint cards and solutions in case you get stuck. For ages 8 and up.
8. Mighty Mind Educational Game by Briarpatch. Fun that builds skills! Mighty Mind prepares children to tackle the challenges ahead. It develops children's skills in problem-solving, creative thinking, counting, sorting, categorizing, spatial relationships, matching colors, shapes, and sizes. 36 months - 8 years.
1. Gnarly Math: Sign-up for a bi-monthly math newsletter for ages 10-14 but older kids can benefit from it as well.
2. National Library of Virtual Manipulatives: This site has math games, puzzles, and math manipulation such as an abacus, base 10 board, Venn diagrams, and much, much more Serves grades pre-K-12.
3. Fun Mathematics Lessons by Cynthia Lanius: Lessons that are easy to use and that relate to real life. Don't let the cartoon nature of the site fool you! This site has lessons for pre-K aged children thru adults.
Additional Math Articles | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '34', 'language_id_whole_page_fasttext': "{'en': 0.9122471809387208}", 'metadata': "{'Content-Length': '36300', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5E6DIYTJB5S7RPOIWL5WEQIDR4YTJSPU', 'WARC-Concurrent-To': '<urn:uuid:a7343435-4908-4702-8bb9-d2b935a26ef6>', 'WARC-Date': datetime.datetime(2022, 11, 28, 22, 44, 19), 'WARC-IP-Address': '169.47.218.84', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TQHFIRJMQ442XN4JK63ASCDZWQP32ZVO', 'WARC-Record-ID': '<urn:uuid:82259f12-93f6-438a-80e0-546c41df3190>', 'WARC-Target-URI': 'https://homefires.com/articles/unusual_math.asp', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e8b30b0d-b8ed-40ac-88c8-76333844c22b>', 'WARC-Truncated': None}", 'previous_word_count': '858', 'url': 'https://homefires.com/articles/unusual_math.asp', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08763229846954346', 'original_id': '3e612343f8cf231a32fedd8764ed28bafa442834499d0441e007379db10be3ca'} |
Pretty Little Liars Round Table: "Gamma Zeta Die!"
at . Comments
"Gamma Zeta Die!" wasn't the best Pretty Little Liars episode of all-time.
Still, TV Fanatic Round Table participants Carissa Pavlica, Nick McHatton, Leigh Raines and Teresa Lopez are here to break down the college-based Season 4 installment. What worked? What failed? Gather around and let's debate!
The girls are planning for college. What are the odds they all go to Cicero?
Nick: The odds are pretty stellar that they'll end up going to the same school, but will the join the same sororities?
Leigh: I think they'll all go in the area with at least two going to Cicero. Or they'll probably all only get accepted there. Good point about the sororities Nick.
Teresa: Well I have my doubts that Hanna could even get in to college. But it would make things easier for A... all the targets were in one location.
Carissa: I think we've seen their future. A lot of lies seem to be tied up in that school, and those lies mean answers.
PLL RT Logo - depreciated -
Who is house mother Carla Grunwald? Any thoughts on how she might fit in?
Nick: She was probably the house mother to someone in the older crowd. She had a pulse for everything that was going on, and I doubt that is a recent development.
Leigh: Definitely someone the older crowd knew like maybe Cece. I bet Ali ended up running to he for help a time or two. Maybe getting caught by her.
Teresa: Maybe Carla Grunwald caught "board shorts" guy messing around with Ali and then disappeared. I just hope it's not some elaborate conspiracy involving an insane house mother.
Carissa: I hadn't thought about it until just this very minute, but "board shorts," who could have also been Wilden in his younger days, might have been the son of this woman. It would explain a lot about why he was so friggin involved in all the A and Liars crap.
What did Spencer mean by "It ain't that big a bird?"
Nick: I thought she was referring do the bird saying the phone number over and over again. I thought she was just making a deadpan joke.
Leigh: This seems like a metaphor for Spencer not being intimidated by A. She's gonna do what she's gonna do for answers.
Teresa: I thought Spencer said "It ain't big bird," cause that kinda made sense. Otherwise, I have no idea.
Carissa: Frankly, I thought I was going insane. I can't think of a time I was more lost than during that comment.
Were you surprised that nobody seemed to know but Ashley and Hanna how deeply involved with Wilden they were?
Nick: Those involvements go back towards the beginning of the show when Hannah shoplifts at the mall and Ashley helps get her charges dropped by sleeping with Wilden. This is pre-Liar formation, so I doubt Hannah was going to bring up the fact that her mom boned Wilden to get her shoplifting dropped.
Leigh: I thought they were all a little more clued in but I guess it makes sense. Even the liars have some secrets from each other.
Teresa: I'll bet Wilden kept his involvement with the Marins a secret due to his own shady involvement with them and Ali (and the A team).
Carissa: It made me think that A sets traps for those involved to get themselves so wrapped up in her games that they makes themselves suspects without her help. She makes them think she'll do something, but in the end she just sits back and watches while her prodding makes people get sucked down into quicksand just because of their fears. Pretty good tactic.
Is A's plans to tear the girls away from their families failing?
Nick: Like all things A, I think the method matters as long as the results are the same. Aria's Mom is still heading out; Spencer's parents are glorified wall decorations at this point; whether Hannah is ripped away from Ashley or vice-versa the results are the same; and the investigations are probably ongoing for Emily's parents.
Leigh: I think it's still on. Was that first bee a camera bee? It looked like surveillance. Ashley is also so screwed. Spencer's dad was once in the hot seat. The Fields are feeling it now. A gets around.
Teresa: It seems to be working but I expected A to be way more deadly. Remember when Caleb's mom was run off the road? Ella got bees, which could have been a disaster if she was allergic.
Carissa: It feels like something has changed, as if A needs a reminder of what it was like to have family of her own. Maybe it's having Mrs. D so close again?
Tags: ,
Pretty Little Liars Season 4 Episode 5 Quotes
You get to act like a total snotrag because Mommy and Daddy have a safety net of cash to catch your fall.
Emily (to Spencer)
Mom, I am not a sofa!
Pretty Little Liars Season 4 Episode 5 Music
Song Artist
Imaginary friend love is beginning Love Is Beginning Imaginary Friend iTunes
Kai brown moments like this Moments Like This Kai Brown iTunes
Karmina prove Prove Karmina iTunes | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '11', 'language_id_whole_page_fasttext': "{'en': 0.9767054319381714}", 'metadata': "{'Content-Length': '35350', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LCSQ446EJUM6FRALR7DCFA6IMQWV6IES', 'WARC-Concurrent-To': '<urn:uuid:490a598c-32d4-412c-80e5-4f44a7ab908f>', 'WARC-Date': datetime.datetime(2016, 7, 30, 17, 16, 35), 'WARC-IP-Address': '151.101.20.249', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:2VSYLONF6SPQ3O64SY5YI3DS2QK6G43J', 'WARC-Record-ID': '<urn:uuid:5f3b17d8-d5ef-45fa-ab7a-2b37628bb972>', 'WARC-Target-URI': 'http://www.tvfanatic.com/2013/07/pretty-little-liars-round-table-gamma-zeta-die/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:32e02839-feae-4fba-82de-3a4149cfacb1>', 'WARC-Truncated': None}", 'previous_word_count': '885', 'url': 'http://www.tvfanatic.com/2013/07/pretty-little-liars-round-table-gamma-zeta-die/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.15179789066314697', 'original_id': '7318031a99d40afc0aa16bdcd444769f1796cfbdd2ed406354ab4ae26e00a9c7'} |
37 S.W.3d 732 (2000)
Bruce Robert LIPSTEUER Appellant,
v.
CSX TRANSPORTATION, INC. Appellee.
No. 1998-SC-1132-DG.
Supreme Court of Kentucky.
December 21, 2000.
Rehearing Denied March 22, 2001.
*734 Robert Arledge, Schwartz & Associates, PA, Jackson, MS, James W. Owens, Donald R. Green, Jr, Paducah, for Appellant.
David T. Klapheke, Edward H. Stopher, Boehl, Stopher & Graves, Louisville, for Appellee.
*733 STUMBO, Justice.
Appellant, Bruce Lipsteuer, filed this action under the Federal Employer's Liability Act (FELA), 45 U.S.C. § 51-60, to recover monetary damages for injuries allegedly suffered as a result of exposure to toxic chemicals during his employment with CSX Transportation, Inc. (CSX). We have two issues before us. First, whether a post-deposition affidavit may be submitted to explain prior deposition testimony and, second, if the affidavit is accepted, whether the Appellant brought his claim within the applicable statute of limitations.
FACTS
From 1980 to 1994, Appellant was employed as a pipefitter for CSX in both Florida and Corbin, Kentucky. During this time, he was exposed to chemical solvents. Although he began experiencing health problems as early as 1992, Appellant contends that he did not become aware of the existence of a causal connection between his medical condition and his exposure to chemical toxins at work until October 1993 when he discovered some of his co-workers were being treated for similar symptoms.
Shortly thereafter, in 1993, Appellant filed a Federal Employers' Liability Act (FELA) suit in Georgia. Although discovery was obtained and depositions were taken, Appellant voluntarily dismissed his Georgia civil suit, without prejudice, in September 1996, nearly three years after filing the complaint. On September 12, 1996, Appellant filed this identical suit in Jefferson County, Kentucky.
In January 1997, CSX moved for summary judgment on the basis that pre-trial discovery and deposition testimony obtained in the Georgia suit proved conclusively that Appellant knew or should have known he had a cause of action in 1992, *735 and therefore the cause of action was barred by the three year statute of limitations. FELA specifically provides that "[n]o action shall be maintained under this chapter unless commenced within three years from the day the cause of action accrued." 45 U.S.C § 56. In response to the motion for summary judgment, Appellant submitted an affidavit in which he attempted to explain some of the answers he gave during his deposition. He asserted that it was not until October 1993 that he learned his health problems might have been the result of exposure to chemicals while employed by CSX. Further, he explained he "did not intend his answers [given during his deposition in April 1995] to be interpreted as meaning that he knew in 1992 that his [health] problems were related to his chemical exposures while employed by CSX." Instead, he was "simply informing defense counsel that in hindsight, based upon information which he possessed as of April 1995, he felt the problems he was having in 1992 were a result of his exposure to chemicals." Aff. of Bruce Robert Lipsteuer at 3.
The trial court granted Appellee's motion for summary judgment. In its order, the trial court did not refer to or mention Appellant's sworn affidavit, even though the affidavit was filed as an attachment to the Motion in Opposition of Summary Judgment. Therefore, it is not clear whether the trial court considered the affidavit in deciding to grant summary judgment. Lipsteuer appealed to the Court of Appeals, claiming that the trial court erred in granting summary judgment because Appellant's sworn affidavit created a genuine issue of material fact. The Court of Appeals considered the affidavit, but were "not persuaded." In an opinion affirming the decision of the circuit court, the Court of Appeals held "Appellant's sworn testimony indicates that he knew the nature and existence of, as well as the probable origin of, his illness in 1992," and, therefore, summary judgment was proper, as his complaint was filed outside of the statute of limitations. Lipsteuer v. CSX Transp., Inc., Ky.App., No. 97-CA-001357-MR (1998).
I.
The first question presented to us on appeal is whether a post-deposition affidavit may be submitted to explain deposition testimony, thereby creating a genuine issue of material fact, and thus precluding summary judgment. The Appellee urges us to use the less restrictive federal summary judgment rule to decide this issue. However, we believe summary judgment is a procedural issue, and therefore should be examined under the law of the state where the action was brought. Under the Kentucky summary judgment standard, we find that a post-deposition affidavit may be admitted to explain deposition testimony.
This Court has repeatedly admonished that summary judgment "is to be cautiously applied." Steelvest v. Scansteel Service Center, Inc. et al., Ky., 807 S.W.2d 476, 480 (1991). CR 56.03, the Kentucky rule on summary judgments, states:
The adverse party prior to the day of the hearing may serve opposing affidavits. The judgment sought shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, stipulations, and admissions on file, together with affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law.
While CR 56.03 does not specifically prohibit a party from submitting an affidavit to clarify earlier discovery answers, the rule does not specifically authorize such affidavits either. This is simply an issue that has yet to be addressed by the Kentucky courts.
Since this is a case of first impression in the Commonwealth, we look to courts of other jurisdictions for guidance. The case we find most persuasive and analogous to this situation is Van Zweden v. Southern Pacific Transportation Co., 741 F. Supp. *736 209 (D.Utah 1990). In that case, like the one before us now, the plaintiff filed a FELA action and the defendant moved for summary judgment. Just as in the case at bar, the defendant contended that the action was barred by the statute of limitations. Id. at 209. In response, the plaintiff filed an affidavit which attempted to explain his earlier testimony. The defendant "argue[d] that the plaintiff cannot create a disputed fact by contradicting his prior deposition testimony with an affidavit." Id. at 211.
The court noted that while "[a]s a general proposition, a deposition is more reliable than an affidavit," this "does not mean that the affidavit may be ignored, especially if the affidavit explains the apparent inconsistency." Id. This argument, while extremely persuasive, is not the sole reason why we agree with the decision in that case. What we find even more persuasive is the federal court's language regarding why inconsistencies may need to be explained: "[m]any people when recounting an event will mix past and present verb tenses. When this occurs, it may be difficult to determine to what period the speaker is referring." Id. at 212.
Appellant in the case at bar, similarly to the plaintiff in Van Zweden, sought to resolve any apparent inconsistencies between his deposition and his affidavit. His affidavit explained that his deposition answers were predicated upon, and with the benefit of, the information he possessed at the time he was deposed in March 1997. This is the exact type of inconsistency addressed by the Van Zweden court. We disagree with Appellee's contention that the affidavit was a "self-serving manufactured affidavit." Appellant's post-deposition, sworn affidavit did not attempt to create a genuine issue of material fact by simply contradicting his earlier testimony. Rather, it was merely an attempt to explain the inconsistencies.
When ruling upon a motion for summary judgment, "[t]he record must be viewed in a light most favorable to the party opposing the motion for summary judgment and all doubts are to be resolved in his favor." Steelvest, 807 S.W.2d at 480. A trial court should be granted the opportunity to review all the evidence, instead of basing its decision on what appears to be clear and unequivocal testimony, but which is really incomplete and misleading. When such an affidavit is submitted which attempts to resolve these inconsistencies, summary judgment is precluded, as a genuine issue of material fact exists. "[Summary] judgment is only proper where the movant shows that the adverse party could not prevail under any circumstances." Id.
Today's decision is not meant to limit the principle that an affidavit which merely contradicts earlier testimony cannot be submitted for the purpose of attempting to create a genuine issue of material fact. Obviously, if such practice were allowed, the use of summary judgment would be even more severely curtailed. While we have repeatedly stated that the use of summary judgment should be "cautiously applied" and should not "cut litigants off from their right of trial if they have issues to try," it is still a useful device "designed to expedite the disposition of cases and avoid unnecessary trials when no genuine issues of material fact are raised." Steelvest, 807 S.W.2d at 480. We continue to stand by the principle announced in the benchmark case of Paintsville Hospital v. Rose, Ky., 683 S.W.2d 255 (1985). In those cases where there is no genuine issue of material fact, summary judgment should be granted.
II.
After finding the affidavit sufficiently raised a genuine issue of material fact, we next turn to the issue of the statute of limitations. We are to use the FELA three-year limitations period, as opposed to the Kentucky statute of limitations, since statute of limitations issues are substantive rather than procedural. Chesapeake & Ohio Railway Co. v. Miles, Ky., 249 S.W.2d 160, 161 (1952). Unlike the previous issue, a definitive standard for statute of limitations issues has been articulated *737 by a long stream of cases in the federal courts, starting with Urie v. Thompson, 337 U.S. 163, 69 S.Ct. 1018, 93 L.Ed. 1282 (1949).
In Urie, the United States Supreme Court developed the "discovery" rule, holding that a cause of action for a FELA claim accrues when the injury manifests itself. Id. at 170, 69 S.Ct. 1018. The rule has been further modified to hold that a cause of action accrues when a plaintiff knows or, in the exercise of reasonable diligence, should know of both the injury and its cause. United States v. Kubrick, 444 U.S. 111, 122-23, 100 S.Ct. 352, 62 L.Ed.2d 259 (1979); Aparicio v. Norfolk & Western Railway, 84 F.3d 803, 814 (6th Cir.1996); Fries v. Chicago & Northwestern Transp. Co., 909 F.2d 1092, 1095-96 (7th Cir.1990).
Applying this test to the instant case, it needs to be determined when Appellant was put on notice about the cause of his injury, and if that notice was within the statute of limitations. The first is a question of fact and should therefore be answered by a jury. Lynn Mining Co. v. Kelly, Ky., 394 S.W.2d 755, 759 (1965). The latter, however, is a question of law. Appellant filed his action on September 12, 1996. Applying the three year statute of limitations, the court cannot entertain Appellant's claim if his action accrued before September 12, 1993. If the jury determines Appellant was not aware of the causal connection between his injuries and his workplace until October 1993, we find that his action was brought in a timely fashion. If, however, the jury determines Appellant was put on notice before September 12, 1993, the case must be dismissed based on the statute of limitations.
We hold that a reasonable jury could find that Appellant did not become aware of both his injury and its cause until October 1993 when his doctor informed him that it could be work-related. This question should be submitted to the jury on remand.
Accordingly, we reverse the Court of Appeals and remand this case to the Jefferson Circuit Court for proceedings consistent with this opinion.
LAMBERT, C.J.; and KELLER, J., concur.
WINTERSHEIMER, J., concurs in result only.
COOPER, J., concurs by separate opinion, with GRAVES and JOHNSTONE, JJ., joining that opinion.
COOPER, Justice, concurring.
I concur in the result reached by the majority. However, as stated in my dissent in Pan-American Life Ins. Co. v. Roethke, Ky., 30 S.W.3d 128 (2000), that case effectively deleted from our jurisprudence that aspect of Civil Rule 56.03 which formerly permitted the entry of a summary judgment premised upon the nonexistence of a genuine issue of material fact. In my view, Roethke essentially mooted the issue addressed in the majority opinion in this case, i.e., whether a party can "testify himself out of court."
GRAVES and JOHNSTONE, JJ., join this concurring opinion.
| mini_pile | {'original_id': 'ed608d8c9a175f0116a441297ab1d0753c728f10c2a7a838f9e62fbf96116b85'} |
Hollywood Trash
Kim Kardashian Claims She Weighs 140 Pounds
Over the years, we have been infatuated with many larger sized ladies, from First Lady DOLLEY MADISON to MARILYN MONROE . . .
All the way up to
KATE WINSLET and KATE UPTON. So it pains us when someone tries to disavow their SACCHARINE GOODNESS. And that is just what KIM KARDASHIAN appears to be doing.
In an interview with "Extra", Kim takes a shot at all the gossip rags that are claiming she weighs 200 pounds. Kim claims she wouldn't mind if she really DID weigh that, but the tabloids are WAY OFF. By how much, you ask? She says, "You are 60 pounds off here." (Check out video here.)
video platformvideo managementvideo solutionsvideo player
Yes, Kim wants you to believe she weighs 140 pounds. (And you WON'T believe it when you see these pics.) (The Superficial) | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '30', 'language_id_whole_page_fasttext': "{'en': 0.8390824794769287}", 'metadata': "{'Content-Length': '47946', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BO7VOW456H2GGKXCP7JBQPWKB4FXC2LY', 'WARC-Concurrent-To': '<urn:uuid:cd14acb6-1354-407e-800f-e4c63d896641>', 'WARC-Date': datetime.datetime(2015, 3, 1, 6, 54, 50), 'WARC-IP-Address': '72.21.92.20', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:HYQ4CIB6M42WKYGW6ZIW5Z7EJ2OYH2WR', 'WARC-Record-ID': '<urn:uuid:63151c9c-e73e-4af8-90b8-7fbe74540172>', 'WARC-Target-URI': 'http://www.alice965.com/Channels/HollywoodTrashnews/story.aspx?ID=1921346', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:200cd95d-8ddd-4ff1-8963-fbd7c07acdda>', 'WARC-Truncated': None}", 'previous_word_count': '130', 'url': 'http://www.alice965.com/Channels/HollywoodTrashnews/story.aspx?ID=1921346', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2214781641960144', 'original_id': '14ec1caa62cdb480791114f97076bcc06debedeb48cfec402948b8f84bccc9aa'} |
Bowls, it's in our blood
In Cobham since 1932
lawn bowls and short mat bowls.
Life's a bowling ball. It's all about the delivery!
A dead draw isn't everything
it's the only thing
A bad place to be is between me and the jack
Everyone should have a goal to conquer.
I believe I'll conquer yours.
News and Events | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9626725316047668}", 'metadata': "{'Content-Length': '45329', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZH3VAOGMREQJVRIYAKC4O623CHFZPSPY', 'WARC-Concurrent-To': '<urn:uuid:901b8955-44e8-4498-b20f-0b6c472b3a1b>', 'WARC-Date': datetime.datetime(2020, 6, 2, 20, 1, 12), 'WARC-IP-Address': '62.100.206.76', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:QQ4YW2WABZO7NJS3KULSIE34VFZ56XDI', 'WARC-Record-ID': '<urn:uuid:5238c97d-25bf-405c-8e50-cfcf0f0db17b>', 'WARC-Target-URI': 'http://cobhambowlingclub.co.uk/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e6695b38-7303-4d88-9f20-977492c3829d>', 'WARC-Truncated': None}", 'previous_word_count': '59', 'url': 'http://cobhambowlingclub.co.uk/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-236.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.40993839502334595', 'original_id': '209dfad59e7d659fccdc1694cb54bb901431198152be9d8a89e86793983ac7ed'} |
Relationship of upbringing to later behavior disturbance of mildly mentally retarded young people
S. A. Richardson, H. Koller, M. Katz
Research output: Contribution to journalArticle
16 Scopus citations
Factors were examined that might explain the higher rate of behavior disturbance found in a population of mildly mentally retarded young adults compared with nonretarded peers. Results showed that neurological impairment, found in one-third of the retarded subjects, was not a factor. Three results supported the explanation that instability of upbringing was responsible for the difference in behavior disturbance: a significant relationship was found between unbringing and behavior disturbance for both retarded and nonretarded subjects; conditions of upbringing were significantly more unstable among the retarded than nonretarded subjects; and when upbringing was held constant for both sets of subjects, no differences were found in behavior disturbance.
Original languageEnglish (US)
Pages (from-to)1-8
Number of pages8
JournalAmerican Journal of Mental Deficiency
Issue number1
Publication statusPublished - Jan 1 1985
ASJC Scopus subject areas
• Psychiatry and Mental health
Cite this | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9562647938728333}", 'metadata': "{'Content-Length': '35285', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:F6ZN4X5OAYFSJAK3UB7HVWVOJGHWUV63', 'WARC-Concurrent-To': '<urn:uuid:4e88b5ae-4050-4ce2-a926-378c3b5b737f>', 'WARC-Date': datetime.datetime(2020, 4, 4, 2, 37, 15), 'WARC-IP-Address': '52.72.50.98', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:R2BF5Y3ZNIV6TC4C42MSXEYCQ4Z3QD44', 'WARC-Record-ID': '<urn:uuid:5469ce22-4830-4629-b77d-fa591d27c839>', 'WARC-Target-URI': 'https://einstein.pure.elsevier.com/en/publications/relationship-of-upbringing-to-later-behavior-disturbance-of-mildl-2', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:845bd674-444e-44c3-9928-6f2937105bc9>', 'WARC-Truncated': None}", 'previous_word_count': '165', 'url': 'https://einstein.pure.elsevier.com/en/publications/relationship-of-upbringing-to-later-behavior-disturbance-of-mildl-2', 'warcinfo': 'isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-155.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07594549655914307', 'original_id': 'f2433dab8fdf14c0f120207684c149166dc1c8d6d336f5236a01dfe1bfdc7740'} |
Deviant Login Shop
Join deviantART for FREE Take the Tour
Closed to new replies
January 9, 2013
Replies: 70
What are your pet peeves of DeviantArt or Real Life?
DesmondeKapi Featured By Owner Jan 9, 2013 Student Traditional Artist
DeviantArt: Rude people, art thieves, trolls (I usually don't mind these but the really annoying ones), hard-to-read journal skins/ones with poor color choice.
Real Life or somewhere else, well some are more than a pet peeve: Duck faces, bigots, me procrastinating.etc
Idk I can't think of much now.
Devious Comments
FalseShepherd Featured By Owner Jan 24, 2013 Hobbyist Photographer
Drunken messes
People who needlessly hate others
Curry containing anything but chicken, pork or the actual sauce
No poppadom or naan bread to go with said curry
General arguments in day to day life
Pizzas with any topping I find ridiculous or simply don't like
Attention seekers
People that play the victim when they most certainly are not
People that use others misfortune as a way of somehow gaining sympathy themselves, usually on FB
Anyone over the age of 18 that purposely write like a child all the time
Bad grammar (though I do realise mine isn't perfect)
People who butcher the English language
People that often mis-spell and sometimes being confused as to what the right spelling is even though before then I could spell whatever it may be without a problem
Screaming kids
Obnoxious people
Forced over done laughter
People who repeatedly use past tragedies in their life to gain sympathy and/or attention on a regular basis
People who think too highly of their own self
Abusers, whether It's animals, kids, women or other such things involved
Vandals of local shops that plainly don't deserve it
Over-reactions, such as people screaming at the t.v over a football match, so trivial and pointless
People who get pregnant with no intention of caring for the child
Zombie obsessions a lot of people seem to have these days
Watching films excessively, especially the same one(s)
Cheesy films and actors, though I can tolerate cheesiness to some level
Discrimination - as I don't discriminate, I hate each and every one of you equally
Being touched, especially by someone I don't like or if they happen to have poor personal hygiene
People that genuinely believe "the world is ending" kind of crap
People claiming to have a hard life, when they go on holiday 3+ times a year, have enough money to live comfortably and have most things handed to them on a plate
People that brag, even moreso if it is something that I don't care about
People who turn others against each other
General policies and acts of the current UK government
Unwarranted cruelty
Family members who think they are better than the rest, because they have managed to improve their life in some way or other - I have no time for this
Constant anxiety I have to put up with on a regular basis
Tacky re-creations of game characters I happen to like
When someone brings out a terrible song that goes viral and everyone seems to love for no apparent reason, when they deserve no recognition in terms of talent
People who hate singers who are genuinely good at what they do, just because they don't want to be considered mainstream or look like they are following the crowd
The fact many people believe that by trying to be original and unique is infact no more unique than copying someone else as its gotten to a point where everyone and their cousin are trying to be different
When people are judged for their talent by how popular they are
People leaving doors open when it's cold and you are trying to keep warm
Pregnancy in people who just should not be pregnant for whatever reasons their may be
Compulsive liars
Deliveries that arrive at stupid o'clock
Not being able to sleep or otherwise being awakened
People who touch my food
Forgetting things even when I've literally just been thinking of it moments before
Pointless and stupid broadcasts over BBM
People that add you as a friend on a social network, not because they are interested in an actual friendship or because they are infact your friend but to make themselves look more popular due to friend count via web stats
Massive hypocrites - although everyone at sometime may unintentionally do something that is considered hypocritical
People who are self-righteous
Anyone who thinks their own opinion is gold and unwilling to even consider the weight that another persons may hold
Bailiffs - basically the legal version of thieves
Cars racing at lights, down roads with general pedestrian activity or anywhere they people would be endangered by their stupidity
The fact that some vets are in their job as some pets are a gold mine to them as they are in it for only the money and not becausethey care about the animal
People who Belive in wild conspiracies and preach about them repetitively
The fact the current PM got to be PM
Jokes made in terribly bad taste
People such as murderers, though not limited to that gain new identities and get to make a fresh start with the possibility of committing a crime like they already have once more
The smell of fish
People who try to demotivated others, usually because they're scar ed that said person will become better than they are at something or gain an advantage in some way that they don't like
Ridiculous pricing of modern game that often lack in game length, story, interesting characters, gameplay or all of the above
Public toilets, god forbid I ever have to use one - don't ask me why though, I just simply don't like them
Backstabbers, or otherwise people who cheap shot whether it be physically or verbally, but mostly physically
Demanding respect through the use of intimidation and fear
Expecting to be respected when none deserving and not paying any outwardly
Third party companies that things you sign up to whom sometimes pass on your details to
PPI emails, I mean I've never even had a loan from a bank!
Frauds, whether it be identity theft or malicious content that can spy on your activities which once resulted in money being stole from my account via emergency payment due to having collected enough information on me through a dodgy hoax email link to pose as me and successfully withdraw the money without raising any red flags, I still to this day don't understand how exactly they got all the specific details as I never once used all the details they would have needed to prove themselves to be me
Having my patience tested
I think I'll stop myself there, but let me just finish by apologising for the majorly excessive list! :/ and there will be a treat of the readers choice to anyone who actually reads all of my list. I don't recommend or expect anyone to though. I almost fall asleep at the site of massive posts and fully understand should anyone just completely skip it. xD
silverHyacinth Featured By Owner Jan 24, 2013 Hobbyist General Artist
-People who make rude, insulting comments about other people's work.
-People who tiipe ik dis nd ThInK its kute.
-Most Emo people.
-Stupid fangirls
In Real Life
-People who put 'pretty, bad, cute, lovely, sexy etc. ' in their usernames.
-People who put 'poet/poetic' in their username.
-People who don't say 'please' or 'thank you'
-People who slowly walk in the middle of the sidewalk or in halls.
-Stupid fangirls
-Stupid people in general
-Meaningless music
DesmondeKapi Featured By Owner Jan 24, 2013 Student Traditional Artist
kerokko Featured By Owner Jan 24, 2013 Student General Artist
On deviantART:
-When idiots accept artwork of any kind regarding their quality
-When people steal other people's artwork and fucking edit them then upload them. Come up with you're own art, dammit!
-people who make dA accounts just to take pictures of themselves. Don't get me wrong, I love photography, just not when some prepubescent little girl decides to duckface her whole gallery. Oh yeah, I've seen worse than that to.
-TROLLS. :fork:
-Dumb@sses who expect me/ask me to donate to them despite the fact i have 20 f*cking dA points in my account. It's kind of rude when you ask.
-People who upload art from other people and call it theirs or don't credit at all.
-I'm not trying to be a hater here, but I'm going to be a freaking hater. My Little Pony sucks ass. God I'm tired of all the crap about it, all the profiles COVERED in unicorns and My Little Pony.
-Kids or even anyone [my shits don't give] that have bad vocabulary and tipe LyK DiSSSSSsssz
-People who can't draw, GTFO and stop wasting usernames
In real life:
-This gets on my nerves so much, I'm going to say it twice. POSERS.
-People who always think they're right despite the fact they know that they are completely wrong and still commence to bullshit their opinion
-Idiot rude people with low IQ's
-When I stub my toe on my bed stand...
FalseShepherd Featured By Owner Jan 24, 2013 Hobbyist Photographer
And from here on out, I shall name thee: kerokko rant-a-lot!
But I agree with your list, mostly.
kerokko Featured By Owner Jan 24, 2013 Student General Artist
LOLOL I was actually looking for a forum like this to post on.
kerokko Featured By Owner Jan 24, 2013 Student General Artist
Oh yeah, and I also hate bases. So much. They're so unoriginal. I dislike people who use them too. They're usually noobs with art, and I already mentioned how the pissed me off.
Cup-of-Javo Featured By Owner Jan 12, 2013
- When people have 3,000-mile long profiles filled with 20 50-megabyte Tumblr .GIFS; 5,000 plz accounts; 9600 Quizilla test results; and 50 million journal dolls. DeviantART has quickly become the Myspace of the Internet world.
- People who write in subscript. 100% of the time these people are pretentious, holier-than-thou, and just plain annoying 15-year old sparkledog furry fucks who think they're being badass and unique.
- The entire Literature section. :puke:
- How when you search for semi-realism or realism, all you get is fucking anime shit.
- Anime shit.
- BASES, especially if they're traced.
- The adoptables section.
- People who call adoptables, "adopts". "Adopt" is not a fucking noun.
- Camwhores.
- "Thanks for the fave/llama/watch!"
- People who discourage critique.
- Fandom.
In real life:
- When people begin to pack up before the professor is done talking. SO RUDE.
- People who walk slow and block the goddamn walkway.
- People who touch me and especially hit me.
- Drunks.
- Creepy guys who try and hit on me.
- People who can't speak English yet they have a job that requires it to be used extensively.
- People who try to barter at the cash register.
- My neighbors. I want to murder them. Horribly.
DesmondeKapi Featured By Owner Jan 13, 2013 Student Traditional Artist
All of that so true.
Haha sometimes I pack up when the teacher is talking XD
Once I just zipped close my pencil case after I put something back and the teacher was all like..
"Why do I hear zippers? Don't pack up yet."
deVere Featured By Owner Jan 12, 2013
I'll add your RL list ##1-3 to my list below! :nod:
Add a Comment: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.9453019499778748}", 'metadata': "{'Content-Length': '130763', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YL5W46MXVPJG4DEMHNKETWZLWPO26EQK', 'WARC-Concurrent-To': '<urn:uuid:5a1bec67-17a5-4082-83ac-c33e8929c58a>', 'WARC-Date': datetime.datetime(2014, 7, 24, 17, 43, 39), 'WARC-IP-Address': '72.21.92.146', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:4IGAI2BD3YLHJUIVHV5WTZFHCUKPZ442', 'WARC-Record-ID': '<urn:uuid:2174918c-ca6a-4db2-b670-7dec6c5a106b>', 'WARC-Target-URI': 'http://forum.deviantart.com/devart/general/1821459/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:fdef6989-4479-463d-9fb0-fd9f213660ce>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1888', 'url': 'http://forum.deviantart.com/devart/general/1821459/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-131-23.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09515112638473511', 'original_id': '718f0a24aa0d0d7f44de99d71f101d05f5e58a79bc1fd35a81d8b55798446731'} |
Can Neanderthals Be Brought Back from the Dead?
In a SPIEGEL interview, synthetic biology expert George Church of Harvard University explains how DNA will become the building material of the future — one that can help create virus-resistant human beings and possibly bring back lost species like the Neanderthal.
George Church, 58, is a pioneer in synthetic biology, a field whose aim is to create synthetic DNA and organisms in the laboratory. During the 1980s, the Harvard University professor of genetics helped initiate the Human Genome Project that created a map of the human genome. In addition to his current work in developing accelerated procedures for sequencing and synthesizing DNA, he has also been involved in the establishing of around two dozen biotech firms. In his new book, “Regenesis: How Synthetic Biology Will Reinvent Nature and Ourselves,” which he has also encoded as strands of DNA and distributed on small DNA chips, Church sketches out a story of a second, man-made Creation.
SPIEGEL recently sat down with Church to discuss his new tome and the prospects for using synthetic biology to bring the Neanderthal back from exctinction as well as the idea of making humans resistant to all viruses. | mini_pile | {'original_id': 'af8e51de878e8cdfb4c9c30c8a37f121de1450263315718315ead4a745463c61'} |
<?php
/**
* Created by PhpStorm.
* User: maoqiu
* Date: 2018/6/10
* Time: 下午3:07
*/
namespace app\index\controller;
use think\Request;
use think\Validate;
use think\Db;
class Upload
{
public function uploadAdd(){
$request = Request::instance();
$data = $request->param();
$validate = new Validate([
'name' => 'require|max:25',
'id_card' => 'require'
]);
if (!$validate->check($data)) {
return json([
'code'=>1001,
'message'=>$validate->getError()
]);
}
$id = Db::table('user_info')->insertGetId($data);
return view('index',['data'=>$data]);
}
}
| common_corpus | {'identifier': 'https://github.com/maoqiu123/lipei/blob/master/application/index/controller/Upload.php', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Apache-2.0', 'date': '', 'title': 'lipei', 'creator': 'maoqiu123', 'language': 'PHP', 'language_type': 'Code', 'word_count': '63', 'token_count': '221', '__index_level_0__': '16628', 'original_id': 'e1189f050e22ab5278b2feef4487c5055ec7ae18dc814fe87687cd8ae02b9e03'} |
netflix and blu-ray
I find it kind of interesting that Netflix chose Blu-Ray as its high-definition DVD format to back. I guess the “format wars” are almost over. I, personally, always figured that the two would learn to live side by side, since, unlike some previous format differences, the actual media was the same physical size so it would have been just a matter of firmware to play discs from both camps.
However, one thing I completely forgot about is that its the retailers who the ones that are really paying the price while this thing wages itself out, and for one important reason — retail space. It hurts the stores the most because they have to stock the same movie three times over — in standard definition, and both HD formats. And of course the best way to get retailers to take action is to hit them where it costs money.
So choosing a format was never really up to the consumers at all, and I was silly to imagine that in the first place. My only minor annoyance was that Blu-Ray is a stupid name compared to the simplicity of HD DVD, but oh well. Things have worked out well anyway, since I’ve got a Sony Bravia HDTV, and Sony makes some nice Blu-Ray DVD players, and all my DVD players have been Sony. Plus, that whole Bravia Theater Sync thing is really nice (I hit play on my DVD player, and my TV automatically turns to the right input. Plus when I turn off my TV, it turns off my DVD player too. Hey, it’s the small things).
I’m not going to be shelling out $400 for a player anytime soon, though. I’m still regretting paying that much for a DVD player back in 1998. The last one I got, on the other hand, does 1080p upconversion, and it was only $84. Not bad.
I’d love to check out some HD titles some day though, since every time I go to the store and see a demo, my eyeballs take a bath in amazement. I would consider getting a PS3, but I’ve read that you can only control it with a Bluetooth-enabled remote, meaning a universal remote is out of the picture. Bummer.
About these ads
Filed under Entertainment
3 responses to “netflix and blu-ray
1. It’s not just a matter of firmware to be able to play both.
HD-DVD is effectively just DVD with a blue laser (higher wavelength). The lens is almost the same.
Blu-ray also switches from red to blue laser, but also has a lens with a different numerical aperture (leads to a smaller focused laser spot on the disc, which means higher capacity). The lens difference means that the laser head has to be closer to the disc.
So not only do you need the firmware to cope, you also need a special lens for blu-ray, and you also need to modify the mechanics to move the lens closer to the disc.
2. melindamarie
Whatever you say Steve…I’ll believe it! I’m going to start the “Stevie Dibb groupie.”)
3. Greg
The whole new format thing is just a ploy by well-marketed companies run by very rich old men who make a lot of money of of those who are dumb enough to pay $15 for a movie you will never actually watch more than once, then pay another $15 to never watch it in High Def. Come on folks, save your money by not paying for a $.03 colorful piece of plastic, and give it to someone who needs $15 for food instead of a new DVD to sit on your shelf collecting dust.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9497761130332948}", 'metadata': "{'Content-Length': '58631', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XUP5CTY3INGEOXZRXO56CHD2UUSKIEPN', 'WARC-Concurrent-To': '<urn:uuid:d5c75ba7-fd6e-4203-a3bc-6b6e605f4656>', 'WARC-Date': datetime.datetime(2014, 12, 23, 3, 37), 'WARC-IP-Address': '76.74.254.120', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:IHKAJDDKVWCQ32DRHWBHINAFIBTPTZUB', 'WARC-Record-ID': '<urn:uuid:9883fd35-a764-4960-8a55-a1c10a709c9a>', 'WARC-Target-URI': 'http://wonkabar.org/2008/02/11/netflix-and-blu-ray/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:622c20a3-3e55-4890-9b2f-97065d83b323>', 'WARC-Truncated': 'length'}", 'previous_word_count': '655', 'url': 'http://wonkabar.org/2008/02/11/netflix-and-blu-ray/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04318171739578247', 'original_id': 'f8c9c50e62ec17ad0c7ecf3d03e8a8ca05bba0d25ad167881b80d9f390a20b67'} |
Social Question
Gossamer's avatar
Should your S/O allow you to have one affair per year?
Asked by Gossamer (930 points ) December 18th, 2009
Would it cut down on cheating spouses if they were allowed to have one affair a year? Would they be more picky on who it was with?
Observing members: 0 Composing members: 0
24 Answers
EgaoNoGenki's avatar
can’t stop laughing
AnnieB's avatar
No. I would be bothered that he would be okay with me having an affair.
I don’t believe it will cut down on cheating spouses. If they’re willing to cheat, they’re going to cheat, whether their spouse allows it or not.
Kelly_Obrien's avatar
No. More affairs than one should be mandated for blissful wedded contentment.
flameboi's avatar
where can I find S/O like that???
Mine would kill me :P
Vunessuh's avatar
I would never be in a relationship where my spouse allowed me to cheat or wanted to do so himself once a year.
However, it really isn’t any of my business what other marriages choose to do. If it works for them, go for it I suppose.
But once a year will easily turn into once a month.
I think there’s a word for that. Oh yeah, swinging.
whatthefluther's avatar
You are kidding, right?
See ya…..Gary/wtf
HumourMe's avatar
I don’t think you should be with your significant other if they want to have an affair at least once a year, simple as that.
SuperMouse's avatar
I am not the least bit interested in having an affair. Being given the option to have one a year would shock and offend me and make me wonder what an SO who put that idea on the table is up to.
grumpyfish's avatar
You have to realize that the type of folks have have affairs are generally the type who would have the one sanctioned affair per year, along with other non-sanctioned ones.
Cotton101's avatar
LMAO….love those answers!
G my answer is NO!
Simone_De_Beauvoir's avatar
I think that wouldn’t work for couples that want monogamy
and for those that don’t need monogamy, allowing or not allowing isn’t something we’re into…our partners are individuals and can decide for themselves
daemonelson's avatar
Not likely. Especially with me considering cheating to be just about the most abhorrent thing you can do in a relationship.
Yeah, probably not such a good idea.
Gossamer's avatar
Thank you all for your wonderful input…and by the way my answer is no as well…I could not bring myself to that humiliating moment of having an affair!
Simone_De_Beauvoir's avatar
@Gossamer well if you’re ‘allowing’ the affair, is it still an affair?
dalepetrie's avatar
Only if you’re going to allow your spouse to have one a year as well, and I suspect that would be the harder part, imagining what your spouse was doing with someone else. If an open relationship works for both of you, great, but nah…I don’t really think you can contract for that kind of thing within an otherwise monogamous marriage. Plus I tend to think that when people cheat, they for the most part don’t go out looking for an affair, it just finds them. A person who respects his or her spouse and is deeply committed enough to doing the right thing instead of just the most pleasurable thing would reject temptation no matter how strong. A person who goes looking for temptation probably should never have gotten married in the first place (and likely wouldn’t have).
Gossamer's avatar
@Simone_De_Beauvoir a point very well pointed out…I thought the same thing myself!
Allie's avatar
I’d still consider it cheating even if it were “allowed.” He’d be cheating on me and also be cheating when it came to the vows he claimed he’d uphold. Also, I could never imagine “allowing” my husband to do something like that. If he didn’t want to be with me then maybe he shouldn’t have married me. I also hope that I don’t pick someone like that to be with for the rest of my life.
downtide's avatar
Only if both people entered into the relationship knowing and agreeing that it was to be an open relationship, and only if you allow the same freedom to your S/O to have affairs of their own. Otherwise it’s just cheating.
Simone_De_Beauvoir's avatar
@Allie at least for me, being with others has nothing to do with not being satisfied or happy with my husband
Zen_Again's avatar
Maybe. Maybe. GQ
Allie's avatar
@Simone_De_Beauvoir If that’s something you and your husband have come to an agreement over then great, I’m glad you’ve found an arrangement that works for you. Personally, I wouldn’t want my husband to go and sleep with other people and I wouldn’t want to sleep with other people besides him.
Answer this question
to answer.
Your answer will be saved while you login or join.
Have a question? Ask Fluther!
What do you know more about?
Knowledge Networking @ Fluther | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9606879353523254}", 'metadata': "{'Content-Length': '64597', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4NRUSQDWNTRIOVMQITXCGMBVNCO2PY6N', 'WARC-Concurrent-To': '<urn:uuid:36218590-65be-4bc8-b9d3-8ea6ee35845b>', 'WARC-Date': datetime.datetime(2014, 8, 2, 1, 11, 43), 'WARC-IP-Address': '50.56.238.75', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ZLA3VTHQFZZXWN3BGBLIVXFOAJF7Q6BO', 'WARC-Record-ID': '<urn:uuid:73d02636-eb73-412b-af8e-da5910808f81>', 'WARC-Target-URI': 'http://www.fluther.com/65683/should-your-so-allow-you-to-have-one-affair-per-year/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2c07c904-bbf0-4feb-a7b5-df5d90879011>', 'WARC-Truncated': None}", 'previous_word_count': '813', 'url': 'http://www.fluther.com/65683/should-your-so-allow-you-to-have-one-affair-per-year/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03737437725067139', 'original_id': 'eb6f04f768a97a071220340104d02009ec65e9258656799db4794321cf82078e'} |
Home > Chinese > Alchemy Emperor of the Divine Dao > 315 You Have A Lot of Hope
Alchemy Emperor of the Divine Dao 315 You Have A Lot of Hope
Table of Contents
Chapter 315: You Have A Lot of Hope
Translator: _Dark_Angel_ Editor: Kurisu
Heaven's Sword Sect!
It was as if these three words possessed a magic of their own, filling the young men and women here with a sense of deep respect; they all wore expressions of endless yearning on their faces.
"Close to 10,000 years ago, a great calamity happened in our world, and it was the seniors and leaders of such ultra powerful parties like the Heaven's Sword Sect, the Absolute Saber Sect, and the Cloud Phoenix Sect that fought a furious battle which finally brought an end to the great calamity, and led to the many generations of peace we have now."
"Furthermore, the Heaven's Sword Sect has an ultra elite of the Shattering Void Tier among their ranks, so they're practically a living masterpiece of martial arts."
"If it was me, needless to say, I would immediately eagerly race over."
"Haha, if you cut off what you have between your legs and do something extreme to your face, you will have a good chance."
"Get lost!"
Everyone broke out into raucous laughter, yet they all had an indescribable yearning for the Heaven's Sword Sect. This was a real Holy Land of martial arts, and possessed an immortal inheritance. Perhaps one day there would appear an ultimate existence who could successfully shatter the void and enter into the ranks of Gods.
"So in the end, did Zhu Xuan Er go to the middle state?" Liu Yu Tong could not help but ask, filled with curiosity.
"No," the person who had heard the gossip said. "It's said that Zhu Xuan Er is extremely filial. Her master went mad a few years ago when cultivating, and she has sworn that she would definitely help her master recover. Whoever manages to do so, she'll give them no matter how many resources for cultivation they desire, or even marry him. However, according to the words of an amazing healer, only a Heaven Grade alchemical pill can heal that kind of injury to a person's Dao! As a result, our fairy here ultimately did not choose to go to the middle state, and who knows which bastard she would ultimately end up with."
When he spoke the last few words, he was already gritting his teeth, as if he could already see the goddess of his dreams being embraced by some damn man. His heart ached at the thought.
Shua , all of a sudden, everyone's eyes fixed upon Ling Han.
"What are you all looking at me like that for?" Ling Han asked very innocently.
"If anyone in the north region is capable of becoming a Heaven Grade alchemist, that would definitely be you." Gu Feng Hua laughed loudly. "You're such a pervert that it is only a matter of time for you to become a Heaven Grade alchemist. At that time, you'd be able to carry the beauty home! Let's have a chat, can you give me one of Fairy Zhu's underpants?"
Peng, peng, peng, peng . Without waiting for Ling Han to speak, the pervert had already been surrounded by more than ten people who admired Zhu Xuan Er and instantly beaten so much that he didn't even look human anymore.
"Yes, that's Fairy Zhu we're talking about here!" Liu Yu Tong said with a very jealous air.
"Heng!" Li Si Chan was the same as well.
Only Hu Niu was completely uncaring and thought inside her head, 'Ling Han is Niu's; a bunch of silly big girls.'
Ling Han merely smiled calmly. In his last life, what kind of beauty had he not seen? Heavenly Phoenix Divine Maiden was even acclaimed as the most beautiful woman in history, and he was still unmoved. Only, when she asked him to concoct an alchemical pill for her, he had Heavenly Phoenix Divine Maiden tell him her real name.
And he had no idea what was the woman's problem... It was as if asking her for her name was like killing her, and afterwards, she would frequently come visit, and without saying much, she would simply take alchemical pills from him as she liked. It was as if she thought herself his master.
If he wanted to stop her and battled her… that was merely asking for torture.
The reason why Ling Han had so wanted to break through to the Shattering Void Tier was because he had had enough of being "bullied" by Heavenly Phoenix Divine Maiden, and wanted to turn the tables and become the Boss. And the result was great. Not too long after, he was killed by the Black Tower.
If Heavenly Phoenix Divine Maiden had entered the realm of Gods, she would probably be beautiful enough to make one flustered, wouldn't she?
All of a sudden, he was a bit nostalgic about Heavenly Phoenix Divine Maiden, as well as Sword Emperor, and also Setting Sun Saber Emperor. Had these guys actually died long ago, or had they broken through to the realm of Gods? Theoretically, since even Jiang Fei Yue had possibly entered the ranks of Gods, there should be even less of a problem for these guys.
"Thinking so much that you're entranced?" Liu Yu Tong was jealous and could not help but pinch Ling Han's waist. Yet when she saw that Li Si Chan had pinched the other side of Ling Han's face in a very well coordinated movement, she could not help but let out a laugh.
Yet Ling Han asked, "Then what about the Winter Moon Sect? Do they have any particularly shocking geniuses?"
"In the case of the Winter Moon Sect, the Seven Sons of the Ao Clan should be the strongest," Lin Xiang Qin said after some consideration.
"Ao Feng's seventh son?" Ling Han asked.
"No, Ao Feng has seven sons that are all geniuses, and are collectively known as the Seven Sons of the Ao Clan," Xu Wen Tong explained. "These seven people are all at the peak of the Spiritual Ocean Tier, and every single one of them could very possibly break through to the Spiritual Pedestal Tier at any time."
A dragon had nine sons, and indeed, each one was different. Ao Yang Ming was only in the Element Gathering Tier, but his brothers were already about to break through to the Spiritual Pedestal Tier. Perhaps there were some that were even more pitiful and still stuck in the Body Refining Tier.
Ling Han rubbed his chin and asked, "Who are these seven people?"
Gu Feng Hua shook his head and said, "Ao Feng has too many illegitimate children; who could remember all of them? Those seven are the most outstanding of the bunch, and are thus separately named as Ao Eldest, Ao Second, Ao Third, all the way to Ao Seventh."
This… Ling Han felt a cold sweat gather on his body. He had too many children, outsiders couldn't even clearly remember their names anymore.
If he crippled these seven people, Ao Feng would probably be heartbroken, wouldn't he?
When he remembered the pain that Ling Dong Xing had suffered, Ling Han could not help but gnash his teeth with hatred. Ao Feng definitely had to be left as the last one to be killed, so as to allow him to have a taste of the kind of agony that bored into one's heart before he died.
His idea was very successful, and he managed to sell off a large amount of hundred-year-old ginsengs and ganoderma, which helped him earn a crazy sum of close to 400,000 Origin Crystals. One had to understand, even with so many people from the Nine Nations of the Desolate North, they had only managed to spend just over 100,000 Origin Crystals, but there were only more than ten people here, yet they had managed to buy close to 400,000 Origin Crystals' worth of ginsengs and ganoderma, which proved how wealthy these people from the north region were.
If one was to compare himself to another, he'd just die from ire.
Everyone chatted with one another, updating each other on their present situation, and soon left afterwards. Ling Han too made a trip to the Star Brilliance Palace Hall, and paid off the Origin Crystals that he had borrowed from Long Yong Chang and the others. He had initially thought that if there was not enough, he'd use the Seven Turns Break Crisis Pill to cover the remaining amount, but did not think that the people of the north region would be so impressive.
After Cheng Fei Jun had disappeared for two days, it had finally attracted the attention of the Star Brilliance Palace Hall and they sent out people to search for this young Grandmaster alchemist, but how could they possibly find him? In the beginning, there were some who suspected that his disappearance was connected to Ling Han, but it was soon clearly found out that Cheng Fei Jun had been called out by Luo Ji Feng's scholar boy.
Yet now, not only Cheng Fei Jun had disappeared, even Luo Ji Feng and his scholar boy had vanished as well. Thus, it was naturally not related to Ling Han.
Ling Han decided to add fuel to the fire and reveal the fact that Luo Ji Feng was a disciple of the Thousand Corpse Sect, which would make the world vigilant against this evil sect. The Thousand Corpse Sect could even do something like destroying the Desolate North, so it was not impossible that they would think of destroying the whole Northern region, or even the whole world.
He had Guang Yuan, Zhu Wu Jiu, and the others spread out the rumors. As long as they carelessly mentioned a word about it at places like tea houses and inns, this kind of rumor would definitely quickly spread throughout the world as if it had grown wings.
Indeed, it was only a few days, and the gossip about the Thousand Corpse Sect had spread throughout the small town—about how terrifying this party was, and about how they planned to turn the whole world into a corpse land.
...In the process of spreading gossip, the rumor would only be added upon, and thus, the Thousand Corpse Sect was described as more and more evil as the gossip continued to spread. They were practically ****** by all.
However, Ling Han thought that this was a very good thing. There was indeed a need to increase the sense of vigilance against the Thousand Corpse Sect. This party was really too evil.
5 Best Chinese Romance Books of 2018 So Far
Table of Contents | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '47', 'language_id_whole_page_fasttext': "{'en': 0.9860464334487916}", 'metadata': "{'Content-Length': '18492', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RNDNEMVPIPL6U45HHRLPKVEJQ2DAHT4I', 'WARC-Concurrent-To': '<urn:uuid:e8258a1d-c34d-4e5f-aa3d-d1a3c898166e>', 'WARC-Date': datetime.datetime(2019, 12, 8, 22, 50, 20), 'WARC-IP-Address': '104.27.188.173', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AGOWBQ2WV6MA22WSGUSZHZ2FZM2WUPTH', 'WARC-Record-ID': '<urn:uuid:5ad7adb8-f3f0-48e8-9789-657082c0e20f>', 'WARC-Target-URI': 'https://www.romanticlovebooks.com/chinese/352_chapter_314.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:adac9b8c-f6a1-4818-b034-d969362bccd0>', 'WARC-Truncated': None}", 'previous_word_count': '1812', 'url': 'https://www.romanticlovebooks.com/chinese/352_chapter_314.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-73.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07347536087036133', 'original_id': 'eee22d3ff23bd31ff9848cfc20870e191def4db461275b631ac7b70a74fa6d75'} |
It was a warm Saturday morning, and I was looking forward to going out in the 60-degree weather, an uplifting prospect after a brutally cold Boston winter. But before heading out I had to make a quick call to DISH Network. Little did I realize that the joys of Spring would have to be put on hold for just a while longer.
Let me briefly share my experience.
I’ve been a customer of DISH Network for 24 years. It is the only television service that offers Japan TV, a subscriber channel that broadcasts only Japanese programming. My wife is Japanese and we like the programming. Generally, my customer experience with DISH has been positive (though I haven’t demanded a lot).
A month ago, DISH Network dropped Japan TV and it was picked up by DirectTV. So, after all this time, we decided to cancel DISH in favor of DirectTV. On Saturday morning I called DISH to cancel my service. The customer service rep who answered the phone told me that I had signed a new contract last November with a new receiver that locked me into 24 months with DISH. If I cancelled now, it would cost me $400. Nice.
The Customer Rep referred me to her Manager, who got on the phone. I asked if he had reviewed my contract. He had not. I asked if he could send me the contract I had signed so that we could review and discuss it on the phone, but he could not. He told me that this was the responsibility of another department. So, we couldn’t really start our conversation from the facts, which in this case was my contract—which he could not review!
It wasn’t a pleasant conversation – I expressed frustration, arguing that I was a good customer of DISH for 24 years. He agreed. After some heated exchanges, I asked him why, after 24 years, can you not forgive all or at least part of this fee to a long-time customer. The fact of the matter was that DISH had cancelled the primary programming (Japan TV) that had kept me with them for many years.
At this point the conversation shifted, when he acknowledged that he wanted to help me. We finally started talking as human beings, not as a dissatisfied customer and defensive corporate employee. The tone of our voices settled down and I asked him how he would feel if he was in my position. He acknowledged the irony in his role - the Manager of Customer Service who was not allowed to make this type of decision for the customer. Though he represented customer service, he had no real flexibility to act based on specific customer situations. He could only follow the “rule book.” He expressed frustration. And I realized that this was actually a pretty good guy, trying to do his best in the face of poor corporate policy.
I reflected on this experience in the context of lean, and in light of what I learned while working at Toyota. Two things that occurred during my call were fundamentally different than core Toyota principles:
Each person in Toyota, no matter what their job, is asked to think about how they ensure quality for the customer – the end user driving the car and the person who is the next process. Respect for People is a primary pillar of the Toyota Way. One way that Toyota demonstrates that is by driving decision making authority to the lowest level in the organization as much as possible. This allows each employee to build quality into their own work and do what is best for the customer (end user or next process).Yes, there are rules, guidelines, standards in Toyota. But each situation with each customer is unique. How can we build quality into the process while delighting the customer?
And this is one of the fundamental problems with many retailers or service providers today – the focus of the company is on defining how the employee serves the employer, not the customer. What if the Manager was given flexibility in such a situation as our phone call to in fact make his own decision on how to handle this type of sticky customer interaction? Maybe he would reprieve half the amount. Or a gift card as compensation.
This incident that disrupted my Saturday made me reflect on the impact poor customer service had on my behavior over the last couple decades:
I rarely change my services. DISH Network – 24 years. Sprint – 20+ years. Sprint’s service has been particularly poor, but I dread a) the potentially terrible experience of transitioning my service and b) doubting that the service will be much better elsewhere. So I do nothing. I have gradually stopped going to malls and many department stores. I actually used to enjoy shopping, but my personal experience in many of the department stores that are now struggling like Sears, Macy’s, Kohls is that I am generally completely ignored as a customer. I cannot find help and, if I do, most people can’t answer my question.
In her book The Good Jobs Strategy, author Zeynep Ton clearly details this phenomenon, and goes on to state, "despite all the investment in the scripts and technologies, the most important driver of customer satisfaction in a call center still seems to be the individual who takes the call and makes you feel like someone wants to help you, not just deal with you.” She notes that the rabid pursuit of profit and cost reduction by many companies has come at the expense of the employee. And as employees struggle with low wages and poor working conditions, the customer suffers. Which ultimately hurts company performances. A vicious cycle.
There are actually companies that get this right. We know them – Costco, Trader Joes, Apple – because our experience is different there. Clearly, these companies train their people to know their products and set them up to effectively serve the customer.
Lean provides us with a different approach to this vicious cycle. Build a management system in your company that allows employees to make the best decisions for the customer (end user and next process). This shows respect for your people. | mini_pile | {'original_id': '52cf1c9ca6d8eb99c0d46623197093bb6b3e1bc2c14c801e9dfb404f68a02f03'} |
[Practical training in primary care for nursing students: evaluation assessment by nurses' satisfaction].
To show that nursing skills and activities are acquired by third-year nursing students while they are doing their Primary Care practicals in the Health Centres and to discover the level of satisfaction of the students after these practicals. A descriptive study, using a questionnaire on the level of satisfaction. Huerta del Rey Health Centre, Valladolid. Twenty-four third-year nursing students doing Primary Care practicals during the teaching year 1991-2. Before their practical studies in the Health Centre, 50% or more of the students defined as unknown or little-known the following nursing skills: taking out ear-plugs, extraction of blood, respiratory physiotherapy and stitching. After the nurses had finished the practicals, the items which reflected general satisfaction obtained positive percentages above 72.2%. Nursing skills and activities which are specific to Primary Care are unknown to most nursing students before their period of practical work in a Health Centre. The same occurs with certain basic nursing skills and activities. Students were highly satisfied. | mini_pile | {'original_id': '80a309004e55dd99e089451c829894e0bc61357c52058e8879915e31b6a0c464'} |
VISITORS to Manor Park are being urged to be on their guard after a knife was found hidden in the bushes.
The weapon, thought to be a craft knife, was discovered during a litter pick by Friends of Manor Park on Saturday morning.
It is believed to belong to one of the many youths who congregate in the park to drink during the evenings.
Joyce Ashley, who found the knife, said: "We have quite regular clean-ups and I've never found anything like that before - it was quite startling.
"On the surface the park looks quite tidy but once you lift the branches and look in the bushes there are all sorts, including lots of broken glass bottles.
"We just think people need to be aware that some of the children could be carrying things like this."
The offensive weapon was found stashed in bushes near the bowling green in a makeshift 'den.' Volunteers also collected bags full of smashed glass from bottles of alcohol and the door of the toilets had been vandalised.
Police say this is the latest in a long line of incidents of anti-social behaviour and vandalism at the park.
Joyce added: "The police are doing the best they can and so are we to keep the park clean and tidy. We are justwarning people to be extra careful when they visit."
A spokesman for Glossop Police said: "There is a problem with nuisance youths in the park, especially over the school holidays.
"We have been putting our resources into it and other problem areas and will continue to do so." | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9825994968414308}", 'metadata': "{'Content-Length': '113274', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LY7EIPJCSTWBNMO4P47M3IYJQWB5PUHC', 'WARC-Concurrent-To': '<urn:uuid:19c684b3-9933-4668-b33c-fad7c1bba3be>', 'WARC-Date': datetime.datetime(2017, 1, 19, 4, 24, 39), 'WARC-IP-Address': '184.28.17.211', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:4RO6BBADOMCBIT5OGVGOZ5ALGO3SOMVC', 'WARC-Record-ID': '<urn:uuid:4c361945-ec96-4cfc-abb6-5bdb87d44f66>', 'WARC-Target-URI': 'http://www.manchestereveningnews.co.uk/news/local-news/manor-park-knife-alert-1086369', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4e2d81da-24a1-4bc8-9e82-04f1d90d486a>', 'WARC-Truncated': None}", 'previous_word_count': '257', 'url': 'http://www.manchestereveningnews.co.uk/news/local-news/manor-park-knife-alert-1086369', 'warcinfo': 'robots: classic\r\nhostname: ip-10-171-10-70.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-04\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for January 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018371641635894775', 'original_id': 'b8acd21f38a761ede9b1921856358631a13cd5bd0c24ac3e04f0470c9cb0b961'} |
An Pseudyrias perusta in uska species han Lepidoptera nga ginhulagway ni William James Kaye hadton 1907. An Pseudyrias perusta in nahilalakip ha genus nga Pseudyrias, ngan familia nga Noctuidae. Waray hini subspecies nga nakalista.
Mga kasarigan
Pseudyrias | common_corpus | {'identifier': 'https://war.wikipedia.org/wiki/Pseudyrias%20perusta', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'Pseudyrias perusta', 'creator': 'https://war.wikipedia.org/w/index.php?title=Pseudyrias perusta&action=history', 'language': 'Waray', 'language_type': 'Spoken', 'word_count': '37', 'token_count': '64', '__index_level_0__': '44468', 'original_id': 'f973ce7c047060dcd091e7ddfbfa3c342d72248915d875a91324d3239ee77c5e'} |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width">
<title>Humanise UI Source: Graph.js</title>
<!--[if lt IE 9]>
<script src="//html5shiv.googlecode.com/svn/trunk/html5.js"></script>
<![endif]-->
<link type="text/css" rel="stylesheet" href="styles/sunlight.default.css">
<link type="text/css" rel="stylesheet" href="styles/site.cosmo.css">
</head>
<body>
<div class="navbar navbar-default navbar-fixed-top navbar-inverse">
<div class="container">
<div class="navbar-header">
<a class="navbar-brand" href="index.html">Humanise UI</a>
<button class="navbar-toggle" type="button" data-toggle="collapse" data-target="#topNavigation">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
</div>
<div class="navbar-collapse collapse" id="topNavigation">
<ul class="nav navbar-nav">
<li class="dropdown">
<a href="namespaces.list.html" class="dropdown-toggle" data-toggle="dropdown">Namespaces<b class="caret"></b></a>
<ul class="dropdown-menu ">
<li><a href="hui.html">hui</a></li><li><a href="hui.animation.html">hui.animation</a></li><li><a href="hui.array.html">hui.array</a></li><li><a href="hui.browser.html">hui.browser</a></li><li><a href="hui.cls.html">hui.cls</a></li><li><a href="hui.cookie.html">hui.cookie</a></li><li><a href="hui.dom.html">hui.dom</a></li><li><a href="hui.drag.html">hui.drag</a></li><li><a href="hui.ease.html">hui.ease</a></li><li><a href="hui.effect.html">hui.effect</a></li><li><a href="hui.form.html">hui.form</a></li><li><a href="hui.frame.html">hui.frame</a></li><li><a href="hui.location.html">hui.location</a></li><li><a href="hui.position.html">hui.position</a></li><li><a href="hui.selection.html">hui.selection</a></li><li><a href="hui.string.html">hui.string</a></li><li><a href="hui.style.html">hui.style</a></li><li><a href="hui.test.html">hui.test</a></li><li><a href="hui.ui.html">hui.ui</a></li><li><a href="hui.ui.Flash.html">hui.ui.Flash</a></li><li><a href="hui.ui.Graph.D3.html">hui.ui.Graph.D3</a></li><li><a href="hui.ui.MarkupEditor.MSIE.html">hui.ui.MarkupEditor.MSIE</a></li><li><a href="hui.ui.MarkupEditor.util.html">hui.ui.MarkupEditor.util</a></li><li><a href="hui.ui.MarkupEditor.webkit.html">hui.ui.MarkupEditor.webkit</a></li><li><a href="hui.window.html">hui.window</a></li>
</ul>
</li>
<li class="dropdown">
<a href="classes.list.html" class="dropdown-toggle" data-toggle="dropdown">Classes<b class="caret"></b></a>
<ul class="dropdown-menu ">
<li><a href="hui.animation.Item.html">hui.animation.Item</a></li><li><a href="hui.animation.Loop.html">hui.animation.Loop</a></li><li><a href="hui.Color.html">hui.Color</a></li><li><a href="hui.Event.html">hui.Event</a></li><li><a href="hui.Preloader.html">hui.Preloader</a></li><li><a href="hui.ui.Alert.html">hui.ui.Alert</a></li><li><a href="hui.ui.Bar.html">hui.ui.Bar</a></li><li><a href="hui.ui.Bar.Button.html">hui.ui.Bar.Button</a></li><li><a href="hui.ui.Bar.Text.html">hui.ui.Bar.Text</a></li><li><a href="hui.ui.BoundPanel.html">hui.ui.BoundPanel</a></li><li><a href="hui.ui.Box.html">hui.ui.Box</a></li><li><a href="hui.ui.Button.html">hui.ui.Button</a></li><li><a href="hui.ui.Buttons.html">hui.ui.Buttons</a></li><li><a href="hui.ui.Calendar.html">hui.ui.Calendar</a></li><li><a href="hui.ui.Chart.html">hui.ui.Chart</a></li><li><a href="hui.ui.Checkboxes.html">hui.ui.Checkboxes</a></li><li><a href="hui.ui.Checkboxes.Items.html">hui.ui.Checkboxes.Items</a></li><li><a href="hui.ui.Clipboard.html">hui.ui.Clipboard</a></li><li><a href="hui.ui.CodeInput.html">hui.ui.CodeInput</a></li><li><a href="hui.ui.ColorInput.html">hui.ui.ColorInput</a></li><li><a href="hui.ui.ColorPicker.html">hui.ui.ColorPicker</a></li><li><a href="hui.ui.Columns.html">hui.ui.Columns</a></li><li><a href="hui.ui.Component.html">hui.ui.Component</a></li><li><a href="hui.ui.DatePicker.html">hui.ui.DatePicker</a></li><li><a href="hui.ui.DateTimeInput.html">hui.ui.DateTimeInput</a></li><li><a href="hui.ui.Diagram.html">hui.ui.Diagram</a></li><li><a href="hui.ui.Diagram.Box.html">hui.ui.Diagram.Box</a></li><li><a href="hui.ui.Diagram.Icon.html">hui.ui.Diagram.Icon</a></li><li><a href="hui.ui.Dock.html">hui.ui.Dock</a></li><li><a href="hui.ui.Drawing.html">hui.ui.Drawing</a></li><li><a href="hui.ui.DropDown.html">hui.ui.DropDown</a></li><li><a href="hui.ui.Editable.html">hui.ui.Editable</a></li><li><a href="hui.ui.Editor.html">hui.ui.Editor</a></li><li><a href="hui.ui.Editor.Header.html">hui.ui.Editor.Header</a></li><li><a href="hui.ui.Editor.Html.html">hui.ui.Editor.Html</a></li><li><a href="hui.ui.Emotion.html">hui.ui.Emotion</a></li><li><a href="hui.ui.Finder.html">hui.ui.Finder</a></li><li><a href="hui.ui.FontInput.html">hui.ui.FontInput</a></li><li><a href="hui.ui.FontPicker.html">hui.ui.FontPicker</a></li><li><a href="hui.ui.Form.html">hui.ui.Form</a></li><li><a href="hui.ui.Form.Field.html">hui.ui.Form.Field</a></li><li><a href="hui.ui.Form.Group.html">hui.ui.Form.Group</a></li><li><a href="hui.ui.Foundation.html">hui.ui.Foundation</a></li><li><a href="hui.ui.Fragment.html">hui.ui.Fragment</a></li><li><a href="hui.ui.Gallery.html">hui.ui.Gallery</a></li><li><a href="hui.ui.Graph.html">hui.ui.Graph</a></li><li><a href="hui.ui.Icon.html">hui.ui.Icon</a></li><li><a href="hui.ui.IFrame.html">hui.ui.IFrame</a></li><li><a href="hui.ui.ImageInput.html">hui.ui.ImageInput</a></li><li><a href="hui.ui.ImageViewer.html">hui.ui.ImageViewer</a></li><li><a href="hui.ui.InfoView.html">hui.ui.InfoView</a></li><li><a href="hui.ui.Input.html">hui.ui.Input</a></li><li><a href="hui.ui.Layout.html">hui.ui.Layout</a></li><li><a href="hui.ui.Link.html">hui.ui.Link</a></li><li><a href="hui.ui.LinkInput.html">hui.ui.LinkInput</a></li><li><a href="hui.ui.Links.html">hui.ui.Links</a></li><li><a href="hui.ui.List.html">hui.ui.List</a></li><li><a href="hui.ui.LocationInput.html">hui.ui.LocationInput</a></li><li><a href="hui.ui.LocationPicker.html">hui.ui.LocationPicker</a></li><li><a href="hui.ui.MarkupEditor.html">hui.ui.MarkupEditor</a></li><li><a href="hui.ui.MediaSimulator.html">hui.ui.MediaSimulator</a></li><li><a href="hui.ui.Menu.html">hui.ui.Menu</a></li><li><a href="hui.ui.ModelEditor.html">hui.ui.ModelEditor</a></li><li><a href="hui.ui.NumberInput.html">hui.ui.NumberInput</a></li><li><a href="hui.ui.NumberValidator.html">hui.ui.NumberValidator</a></li><li><a href="hui.ui.ObjectInput.html">hui.ui.ObjectInput</a></li><li><a href="hui.ui.ObjectList.html">hui.ui.ObjectList</a></li><li><a href="hui.ui.ObjectList.Object.html">hui.ui.ObjectList.Object</a></li><li><a href="hui.ui.Overflow.html">hui.ui.Overflow</a></li><li><a href="hui.ui.Overlay.html">hui.ui.Overlay</a></li><li><a href="hui.ui.Pages.html">hui.ui.Pages</a></li><li><a href="hui.ui.Panel.html">hui.ui.Panel</a></li><li><a href="hui.ui.Picker.html">hui.ui.Picker</a></li><li><a href="hui.ui.Presentation.html">hui.ui.Presentation</a></li><li><a href="hui.ui.ProgressBar.html">hui.ui.ProgressBar</a></li><li><a href="hui.ui.ProgressIndicator.html">hui.ui.ProgressIndicator</a></li><li><a href="hui.ui.Radiobuttons.html">hui.ui.Radiobuttons</a></li><li><a href="hui.ui.Rendering.html">hui.ui.Rendering</a></li><li><a href="hui.ui.RevealingToolbar.html">hui.ui.RevealingToolbar</a></li><li><a href="hui.ui.Rows.html">hui.ui.Rows</a></li><li><a href="hui.ui.SearchField.html">hui.ui.SearchField</a></li><li><a href="hui.ui.Segmented.html">hui.ui.Segmented</a></li><li><a href="hui.ui.Selection.html">hui.ui.Selection</a></li><li><a href="hui.ui.Selection.Items.html">hui.ui.Selection.Items</a></li><li><a href="hui.ui.Slider.html">hui.ui.Slider</a></li><li><a href="hui.ui.Source.html">hui.ui.Source</a></li><li><a href="hui.ui.Split.html">hui.ui.Split</a></li><li><a href="hui.ui.Structure.html">hui.ui.Structure</a></li><li><a href="hui.ui.StyleEditor.html">hui.ui.StyleEditor</a></li><li><a href="hui.ui.StyleLength.html">hui.ui.StyleLength</a></li><li><a href="hui.ui.Tab.html">hui.ui.Tab</a></li><li><a href="hui.ui.Tabs.html">hui.ui.Tabs</a></li><li><a href="hui.ui.TextInput.html">hui.ui.TextInput</a></li><li><a href="hui.ui.Tiles.html">hui.ui.Tiles</a></li><li><a href="hui.ui.TimeLine.html">hui.ui.TimeLine</a></li><li><a href="hui.ui.TokenField.html">hui.ui.TokenField</a></li><li><a href="hui.ui.Toolbar.html">hui.ui.Toolbar</a></li><li><a href="hui.ui.Toolbar.Icon.html">hui.ui.Toolbar.Icon</a></li><li><a href="hui.ui.Toolbar.More.html">hui.ui.Toolbar.More</a></li><li><a href="hui.ui.Upload.html">hui.ui.Upload</a></li><li><a href="hui.ui.Upload.Frame.html">hui.ui.Upload.Frame</a></li><li><a href="hui.ui.Upload.HTML5.html">hui.ui.Upload.HTML5</a></li><li><a href="hui.ui.Upload.Item.html">hui.ui.Upload.Item</a></li><li><a href="hui.ui.VideoPlayer.html">hui.ui.VideoPlayer</a></li><li><a href="hui.ui.Window.html">hui.ui.Window</a></li><li><a href="hui.ui.Wizard.html">hui.ui.Wizard</a></li>
</ul>
</li>
<li class="dropdown">
<a href="global.html" class="dropdown-toggle" data-toggle="dropdown">Global<b class="caret"></b></a>
<ul class="dropdown-menu ">
<li><a href="global.html#reset">reset</a></li>
</ul>
</li>
</ul>
<div class="col-sm-3 col-md-3">
<form class="navbar-form" role="search">
<div class="input-group">
<input type="text" class="form-control" placeholder="Search" name="q" id="search-input">
<div class="input-group-btn">
<button class="btn btn-default" id="search-submit"><i class="glyphicon glyphicon-search"></i></button>
</div>
</div>
</form>
</div>
</div>
</div>
</div>
<div class="container" id="toc-content">
<div class="row">
<div class="col-md-12">
<div id="main">
<h1 class="page-title">Source: Graph.js</h1>
<section>
<article>
<pre
class="sunlight-highlight-javascript linenums">/** A graph
* @constructor
*/
hui.ui.Graph = function(options) {
this.options = options;
this.name = options.name;
this.element = hui.get(options.element);
this.ready = false;
this.defered = [];
this.impl = hui.ui.Graph.D3;
hui.ui.extend(this);
hui.log('Initializing implementation...');
this.impl.init(this);
if (options.source) {
options.source.listen(this);
}
};
hui.ui.Graph.prototype = {
setData : function(data) {
this._defer(function() {
this.impl.setData(data);
}.bind(this));
},
_defer : function(func) {
if (this.ready) {
func();
} else {
hui.log('Defering function');
this.defered.push(func);
}
},
/** @private */
$objectsLoaded : function(data) {
hui.log('Data loaded');
this.setData(data);
},
/** @private */
implIsReady : function() {
hui.log('Implementation is ready!');
this.ready = true;
for (var i=0; i < this.defered.length; i++) {
this.defered[i]();
}
},
/** @private */
implNodeWasClicked : function(node) {
this.fire('clickNode',node);
},
/** @private */
$sourceShouldRefresh : function() {
return hui.dom.isVisible(this.element);
},
refresh : function() {
if (this.options.source) {
this.options.source.refresh();
}
},
show : function() {
this.element.style.display='block';
this.refresh();
},
hide : function() {
this.element.style.display='none';
},
/** @private */
$visibilityChanged : function() {
if (this.options.source && hui.dom.isVisible(this.element)) {
// If there is a source, make sure it is initially
this.options.source.refreshFirst();
}
},
/** @private */
$$layout : function() {
hui.log('graph.layoutChanged');
window.setTimeout(function(){
this.impl.resize(this.element.parentNode.clientWidth,this.element.parentNode.clientHeight);
}.bind(this),100);
}
};
/** @namespace */
hui.ui.Graph.D3 = {
init : function(parent) {
this.parent = parent;
var self = this;
hui.require(hui.ui.getURL('lib/d3.v3/d3.v3.js'),function() {
self._init();
parent.implIsReady();
});
},
resize : function(width,height) {
if (this.vis) {
this.vis.attr('width',width);
this.vis.attr('height',height);
}
if (this.layout) {
this.layout.size([width,height]);
this.layout.start();
}
},
_init : function() {
hui.log('Creating visualization...');
var w = this.parent.element.clientWidth,
h = this.parent.element.clientHeight,
fill = d3.scale.category20();
this.vis = d3.select(this.parent.element)
.append("svg:svg")
.attr("width", w)
.attr("height", h);
},
_onClickNode : function(node) {
this.parent.implNodeWasClicked(node);
},
_findById : function(nodes,id) {
for (var i = nodes.length - 1; i >= 0; i--){
if (nodes[i].id===id) {
return i;
}
}
return null;
},
_convert : function(data) {
var nodes = data.nodes;
data.links = data.edges;
for (var i = data.links.length - 1; i >= 0; i--){
var link = data.links[i];
link.source = this._findById(nodes,link.from);
link.target = this._findById(nodes,link.to);
}
return data;
},
clear : function() {
if (this.layout) {
this.layout.stop();
this.vis.remove();
this._init();
}
},
setData : function(data) {
this.clear();
var w = this.parent.element.clientWidth,
h = this.parent.element.clientHeight;
var json = this._convert(data);
var force = this.layout = d3.layout.force()
.charge(-200)
.gravity(0.10)
.distance(100)
.nodes(json.nodes)
.links(json.links)
.size([w, h]);
var link = this.vis.selectAll("line.link")
.data(json.links)
.enter().append("svg:line")
.attr("class", "hui_graph_link")
.style("stroke-width", function(d) { return d.label=='Friends' ? 3 : 1; })
.attr("x1", function(d) { return d.source.x; })
.attr("y1", function(d) { return d.source.y; })
.attr("x2", function(d) { return d.target.x; })
.attr("y2", function(d) { return d.target.y; });
var node = this.vis.selectAll("circle.node")
.data(json.nodes)
.enter()
.append("svg:g")
.attr('class','hui_node')
.attr("cx", function(d) { return d.x; })
.attr("cy", function(d) { return d.y; })
.style("fill",'none')
.call(force.drag);
node.on('click',this._onClickNode.bind(this));
var self = this;
node.each(function(individual) {
var x = d3.select(this);
var icon = self.buildIcon(individual.icon,x);
});
// node.attr("transform", "translate("+(w*Math.random())+","+(h*Math.random())+")")
/*var circle = node
.append('svg:circle').attr('r',10)
.attr("class", "node")
//.attr("cx", function(d) { return d.x; })
//.attr("cy", function(d) { return d.y; })
.style("fill", function(d) { return fill(d.group); })
;*/
var text = node
.append('svg:text')
.attr('class','hui_graph_label')
.attr("dx", "13")
.attr("dy", "5")
.text(function(d) { return d.label; });
node.append("svg:title").text(function(d) { return d.name; });
this.vis.style("opacity", 1e-6)
.transition()
.duration(2000)
.style("opacity", 1);
force.on("tick", function() {
link.attr("x1", function(d) { return d.source.x; })
.attr("y1", function(d) { return d.source.y; })
.attr("x2", function(d) { return d.target.x; })
.attr("y2", function(d) { return d.target.y; });
node.attr("transform", function(d) { return "translate("+d.x+","+d.y+")"; });
});
force.start();
hui.log('Starting...');
},
buildIcon : function(icon,parent) {
var node;
if (icon=='monochrome/person') {
node = parent.append('svg:path').attr('class','hui_graph_icon');
node.attr('d','M-9.315,10c0,0-0.575-2.838,1.863-3.951c1.763-0.799,2.174-0.949,2.512-1.2 c0.138-0.087,0.263-0.198,0.438-0.351c0.661-0.561,0.562-1.324,1.038-1.562c0.474-0.225,0.424,0.238,0.524,0 c0.101-0.225-0.075-1.799,0-1.551c0.062,0.252-0.863-1.636-0.901-2.611C-3.888-2.439-4.702-2.99-4.613-3.651 c0.212-1.513,1.472-2.322,1.472-2.322s-2.423-0.454-1.36-1.478c1.062-1.012,1.474-1.4,2.6-2.076c1.138-0.663,2.674-0.599,4.163,0 C3.749-8.914,4.124-8.489,4.61-7.602c0.425,0.762,0.45,1.326,0.413,1.813C4.986-5.314,5.049-4.926,5.049-4.926 s0.499,0.112,0.513,0.837c0.013,0.687-0.175,1.699-0.551,2.162C4.861-1.752,4.599-1.114,4.197-0.264 C3.812,0.574,3.3,1.898,3.3,1.898s0.012,0.725,0,0.926c-0.039,0.45,0.649,0.012,0.962,0.512c0.312,0.501,0.1,0.85,0.799,1.162 c0.688,0.312,2.639,1.562,3.588,2.151C9.762,7.337,9.262,10,9.262,10H-9.315z').attr('fill-rule','evenodd');
} else if (icon=='monochrome/folder') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:polygon').attr('fill','#fff').attr('points','9.464,-3.309 9.464,-6.384 -0.354,-6.384 -3.433,-9.462 -9.462,-9.462 -9.462,-3.309 -11.153,-3.309 -9.329,9.462 9.331,9.462 11.153,-3.309');
node.append('svg:polygon').attr('points','-9.999,-2.309 -8.461,8.462 8.464,8.462 10.001,-2.309');
node.append('svg:polygon').attr('points','8.464,-5.384 -0.769,-5.384 -3.846,-8.462 -8.461,-8.462 -8.461,-5.384 -8.461,-3.846 8.464,-3.846');
//node.append('svg:rect').attr('cx','0').attr('cy','0').attr('r','12').attr('fill','#fff');
//node.append('svg:polygon').attr('points','-10,-2 -8.461,8 8.461,8 10,-2');
//node.append('svg:polygon').attr('points','8,-5 -0.77,-5 -3.846,-8 -8,-8 -8,-5.384 -8,-4 8,-4');
} else if (icon=='monochrome/image') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:rect').attr('x','-11').attr('y','-9').attr('width','22').attr('height','18').attr('fill','#fff');
node.append('svg:path').attr('d','M8-6V6H-8V-6H8 M10-8h-20V8h20V-8L10-8z');
node.append('svg:circle').attr('cx','-2.818').attr('cy','-2.693').attr('r','1.875');
node.append('svg:path').attr('d','M-7,5H7v-5.033L4.271-3.625L1.585,2.18L0,0.561c0,0-2.193,0.814-2.917,2.064c-1.151-0.625-1.776,0-1.776,0L-7,5z');
} else if (icon=='monochrome/news') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:path').attr('d','M10.523-9.273l-1.25-1.25C8.967-10.831,8.559-11,8.125-11s-0.842,0.169-1.148,0.477L5.625-9.173 l-1.352-1.351C3.968-10.83,3.56-11,3.125-11c-0.367,0-0.727,0.126-1.014,0.354L0-8.956l-2.109-1.688 C-2.396-10.873-2.757-11-3.124-11c-0.435,0-0.843,0.169-1.149,0.477l-1.352,1.351l-1.352-1.351C-7.283-10.831-7.691-11-8.125-11 s-0.842,0.169-1.148,0.477l-1.25,1.25C-10.831-8.967-11-8.559-11-8.125v16.25c0,0.434,0.169,0.841,0.477,1.148l1.25,1.25 c0.307,0.307,0.715,0.476,1.148,0.476s0.842-0.169,1.148-0.476l1.352-1.351l1.352,1.351c0.309,0.308,0.716,0.476,1.149,0.476 c0.366,0,0.726-0.125,1.012-0.354L0,8.956l2.109,1.688C2.394,10.873,2.755,11,3.125,11c0.44,0,0.852-0.172,1.157-0.485l1.343-1.342 l1.352,1.351c0.307,0.307,0.715,0.476,1.148,0.476s0.842-0.169,1.148-0.476l1.25-1.25C10.831,8.966,11,8.559,11,8.125v-16.25 C11-8.559,10.831-8.967,10.523-9.273z').attr('fill','#fff');
node.append('svg:path').attr('d','M9.816-8.566l-1.25-1.25c-0.244-0.244-0.639-0.244-0.883,0L5.625-7.759L3.566-9.816c-0.225-0.226-0.583-0.245-0.832-0.047 L0-7.675l-2.734-2.188c-0.248-0.198-0.606-0.179-0.832,0.047l-2.059,2.058l-2.059-2.058c-0.244-0.244-0.639-0.244-0.883,0 l-1.25,1.25C-9.934-8.449-10-8.291-10-8.125v16.25c0,0.166,0.066,0.324,0.184,0.441l1.25,1.25c0.244,0.244,0.639,0.244,0.883,0 l2.059-2.058l2.059,2.058c0.226,0.225,0.584,0.244,0.832,0.047L0,7.676l2.734,2.188C2.85,9.956,2.987,10,3.125,10 c0.161,0,0.321-0.061,0.441-0.184l2.059-2.058l2.059,2.058c0.244,0.244,0.639,0.244,0.883,0l1.25-1.25 C9.934,8.449,10,8.291,10,8.125v-16.25C10-8.291,9.934-8.449,9.816-8.566z M-1.25,3.75H-7.5V-2.5h6.25V3.75z M7.5,3.75H0V2.5h7.5 V3.75z M7.5,1.25H0V0h7.5V1.25z M7.5-1.25H0V-2.5h7.5V-1.25z M7.5-3.75h-15V-5h15V-3.75z');
} else if (icon=='monochrome/warning') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:path').attr('d','M10.672,7.15L2.321-9.432C1.913-10.386,0.984-11-0.057-11c-0.882,0-1.693,0.445-2.173,1.19 c-0.099,0.156-0.176,0.309-0.234,0.459l-8.152,16.403C-10.867,7.46-11,7.929-11,8.411C-11,9.839-9.841,11-8.416,11H8.416 C9.841,11,11,9.839,11,8.411C11,7.969,10.887,7.533,10.672,7.15z').attr('fill','#fff');
node.append('svg:path').attr('d','M9.8,7.639L1.411-9.013C1.175-9.592,0.607-10-0.057-10c-0.558,0-1.049,0.291-1.333,0.731 c-0.062,0.1-0.116,0.206-0.156,0.316L-9.744,7.543C-9.908,7.795-10,8.091-10,8.411C-10,9.286-9.294,10-8.416,10H8.416 C9.291,10,10,9.286,10,8.411C10,8.13,9.928,7.867,9.8,7.639 M1.613-5.456L1.166,3.906H-1.15l-0.444-9.362H1.613z M0.009,8.869 h-0.02c-1.077,0-1.808-0.792-1.808-1.855c0-1.1,0.751-1.855,1.827-1.855c1.077,0,1.788,0.756,1.81,1.855 C1.818,8.077,1.107,8.869,0.009,8.869');
} else if (icon=='monochrome/globe') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:circle').attr('cx','0').attr('cy','0').attr('r','11').attr('fill','#fff');
node.append('svg:path').attr('d','M0.048-9.91c-5.496,0-9.955,4.456-9.955,9.954S-5.448,10,0.048,10 S10,5.542,10,0.044S5.544-9.91,0.048-9.91 M6.974-5.686C7.083-5.721,7.47-5.287,7.556-5.406c0.113-0.149-0.407-0.515-0.407-0.668 c0-0.21,0.978,0.964,1.032,1.057c0.013,0.021-0.27-0.136-0.276-0.108C7.883-4.966,7.852-4.809,7.813-4.65 C7.402-4.612,6.57-5.55,6.974-5.686 M2.82,4.227c-0.755,0.929-0.313,1.975-1.71,2.39C0.392,6.831,0.7,8.332-0.506,7.959 c0.069,0.07,0.069,0.171,0.239,0.28c-0.266,0.19-0.57,0.228-0.885,0.322c0.077,0.088,0.285,0.672,0.468,0.605 C-2.344,10-2.666,6.858-3.027,6c-0.271-0.653-1.199-0.954-1.596-1.555C-4.869,4.069-5.025,3.651-5.262,3.27 c-0.565-0.908,0.843-1.993,0.208-2.791C-5.307,0.159-5.762,0.667-6.25,0.026c-0.127-0.167-0.172-0.534-0.226-0.732 C-6.811-0.622-7.312-1.351-7.42-1.242c-0.375,0.375-0.934-0.514-0.891-0.845c0.128-0.971-0.375-1.522,0.148-2.444 c0.793-1.392,1.738-2.674,3.156-3.475c0.827-0.467,2.369-1.355,3.358-1.085C-1.83-9.02-3.658-8.137-3.457-8.079 c0.175,0.052,0.582-0.202,0.69,0.064c0.003,0.118-0.025,0.225-0.089,0.323c0.203,0.299,1.448-0.978,1.707-1.078 c0.506-0.2,0.744,0.327,1.312,0.132c0.396-0.135,0.213,0.623,0.172,0.623c0.066,0,0.53-0.203,0.503,0.042 C0.77-7.379-1.377-8.058-1.604-7.367c-0.061,0.188,0.697-0.175,0.82-0.063c-0.051,0.083-0.109,0.16-0.173,0.236 c0.059,0.117,0.523,0.265,0.573,0.158C-0.434-6.93-1.781-6.76-2.012-6.664c-0.393,0.162-1.07,0.585-1.436,0.911 c-0.217,0.197-0.126,0.482-0.376,0.659c-0.274,0.194-0.561,0.381-0.811,0.608C-4.96-4.19-4.667-3.286-5.028-3.119 c0.102-0.047-0.356-1.584-0.97-0.84C-6.243-3.661-6.733-3.787-7.11-3.42c-0.335,0.327-0.454,0.969-0.391,1.412 c0.149,1.05,0.815-0.293,1.221-0.293c0.271,0-0.46,0.972-0.247,1.128C-6.086-0.85-5.801-1.399-5.96-0.417 c-0.236,1.433,2.149,0.1,2.071-0.053c0.112,0.226-0.282,0.441-0.009,0.629c0.11,0.075,0.096-0.386,0.17-0.464 c0.24-0.251,0.339,0.118,0.551,0.202c0.269,0.11,1.516,0.09,1.595,0.495c0.206,1.011,2.215,0.385,1.633,1.951 c0.065-0.041,0.134-0.066,0.208-0.078c0.485,0.127,0.933,0.55,1.366,0.498C2.539,2.651,3.563,3.32,2.82,4.227 M7.309,0.806 c-1.176-1.099-1.178-3.391-0.12-4.486c-0.12-0.761,0.75-0.87,1.163-0.548c0.3,0.23,0.628,0.978,0.741,1.332 c0.683,2.116,0.578,4.827-0.563,6.78C8.935,3.006,8.911,2.22,9.108,1.319C9.436-0.147,7.744,1.213,7.309,0.806');
} else if (icon=='monochrome/dot') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:circle').attr('cx','0').attr('cy','0').attr('r','11').attr('fill','#fff');
node.append('svg:circle').attr('cx','0').attr('cy','0').attr('r','10');
} else if (icon=='monochrome/page') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:polygon').attr('fill','#fff').attr('points','-9,11 -9,-11 3,-11 9,-5 9,11');
node.append('svg:polygon').attr('points','3,-9.5 3,-5 7.5,-5');
node.append('svg:polygon').attr('points','-8,-10 2,-10 2,-4 8,-4 8,10 -8,10');
node.append('svg:rect').attr('x','-6').attr('y','-8').attr('width','6').attr('height','1').attr('fill','#fff');
node.append('svg:rect').attr('x','-6').attr('y','-5').attr('width','6').attr('height','1').attr('fill','#fff');
node.append('svg:rect').attr('x','-6').attr('y','-2').attr('width','12').attr('height','1').attr('fill','#fff');
node.append('svg:rect').attr('x','-6').attr('y','7').attr('width','12').attr('height','1').attr('fill','#fff');
node.append('svg:rect').attr('x','-6').attr('y','4').attr('width','12').attr('height','1').attr('fill','#fff');
node.append('svg:rect').attr('x','-6').attr('y','1').attr('width','12').attr('height','1').attr('fill','#fff');
} else if (icon=='monochrome/hierarchy') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:path').attr('fill','#fff').attr('d','M8.574,4L3.527,0.971V-11h-7V0.939L-8.575,4H-11v7h22V4H8.574z');
node.append('svg:polygon').attr('points','8.297,5 2.526,1.537 2.526,-2.5 0.651,-2.5 0.651,-5 2.526,-5 2.526,-10 -2.474,-10 -2.474,-5 -0.599,-5 -0.599,-2.5 -2.474,-2.5 -2.474,1.505 -8.298,5 -10,5 -10,10 -5,10 -5,5 -5.868,5 -1.702,2.5 -0.599,2.5 -0.599,5 -2.474,5 -2.474,10 2.526,10 2.526,5 0.651,5 0.651,2.5 1.702,2.5 5.869,5 5,5 5,10 10,10 10,5');
} else if (icon=='monochrome/email') {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:path').attr('fill','#fff').attr('d','M10.727-1.695C10.727-7.086,6.645-11,1.02-11c-6.696,0-11.746,5.137-11.746,11.949 C-10.727,7.549-5.713,11-0.76,11c2.283,0,3.872-0.314,5.668-1.121L5.707,9.52L4.701,6.158C8.271,5.922,10.727,2.76,10.727-1.695z');
node.append('svg:path').attr('d','M4.498,8.967C2.773,9.742,1.281,10-0.76,10c-4.771,0-8.967-3.418-8.967-9.051C-9.727-4.912-5.445-10,1.02-10 c5.086,0,8.707,3.479,8.707,8.305c0,4.225-2.355,6.869-5.459,6.869c-1.35,0-2.328-0.719-2.471-2.211H1.74 C0.82,4.398-0.445,5.174-1.996,5.174c-1.84,0-3.219-1.408-3.219-3.764c0-3.535,2.613-6.695,6.754-6.695 c1.262,0,2.699,0.314,3.391,0.688L4.066,0.748c-0.258,1.695-0.059,2.473,0.748,2.5c1.234,0.057,2.787-1.523,2.787-4.855 c0-3.766-2.414-6.639-6.867-6.639c-4.426,0-8.248,3.42-8.248,8.938c0,4.828,3.045,7.529,7.328,7.529 c1.467,0,3.045-0.318,4.193-0.893L4.498,8.967z M1.969-2.9C1.74-2.957,1.422-3.016,1.078-3.016c-1.898,0-3.391,1.867-3.391,4.08 c0,1.092,0.488,1.781,1.408,1.781c1.092,0,2.213-1.35,2.443-3.018L1.969-2.9z');
} else {
node = parent.append('svg:g').attr('class','hui_graph_icon');
node.append('svg:polygon').attr('fill','#fff').attr('points','0.09,-11 -9.182,-11 -9.182,11 9.182,11 9.182,-1.909');
node.append('svg:polygon').attr('points','0.91,-8.182 0.91,-2.727 6.365,-2.727');
node.append('svg:polygon').attr('points','-8.182,-10 -0.91,-10 -0.91,-0.909 8.182,-0.909 8.182,10 -8.182,10');
}
}
};</pre>
</article>
</section>
</div>
</div>
<div class="clearfix"></div>
</div>
</div>
<div class="modal fade" id="searchResults">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title">Search results</h4>
</div>
<div class="modal-body"></div>
<div class="modal-footer">
<button type="button" class="btn btn-default" data-dismiss="modal">Close</button>
</div>
</div><!-- /.modal-content -->
</div><!-- /.modal-dialog -->
</div>
<footer>
<span class="copyright">
DocStrap Copyright © 2012-2015 The contributors to the JSDoc3 and DocStrap projects.
</span>
<span class="jsdoc-message">
Documentation generated by <a href="https://github.com/jsdoc3/jsdoc">JSDoc 3.6.7</a>
on Wed Dec 29th 2021
using the <a href="https://github.com/docstrap/docstrap">DocStrap template</a>.
</span>
</footer>
<script src="scripts/docstrap.lib.js"></script>
<script src="scripts/toc.js"></script>
<script type="text/javascript" src="scripts/fulltext-search-ui.js"></script>
<script>
$( function () {
$( "[id*='$']" ).each( function () {
var $this = $( this );
$this.attr( "id", $this.attr( "id" ).replace( "$", "__" ) );
} );
$( ".tutorial-section pre, .readme-section pre, pre.prettyprint.source" ).each( function () {
var $this = $( this );
var example = $this.find( "code" );
exampleText = example.html();
var lang = /{@lang (.*?)}/.exec( exampleText );
if ( lang && lang[1] ) {
exampleText = exampleText.replace( lang[0], "" );
example.html( exampleText );
lang = lang[1];
} else {
var langClassMatch = example.parent()[0].className.match(/lang\-(\S+)/);
lang = langClassMatch ? langClassMatch[1] : "javascript";
}
if ( lang ) {
$this
.addClass( "sunlight-highlight-" + lang )
.addClass( "linenums" )
.html( example.html() );
}
} );
Sunlight.highlightAll( {
lineNumbers : true,
showMenu : true,
enableDoclinks : true
} );
$.catchAnchorLinks( {
navbarOffset: 10
} );
$( "#toc" ).toc( {
anchorName : function ( i, heading, prefix ) {
return $( heading ).attr( "id" ) || ( prefix + i );
},
selectors : "#toc-content h1,#toc-content h2,#toc-content h3,#toc-content h4",
showAndHide : false,
smoothScrolling: true
} );
$( "#main span[id^='toc']" ).addClass( "toc-shim" );
$( '.dropdown-toggle' ).dropdown();
$( "table" ).each( function () {
var $this = $( this );
$this.addClass('table');
} );
} );
</script>
<!--Navigation and Symbol Display-->
<!--Google Analytics-->
<script type="text/javascript">
$(document).ready(function() {
SearcherDisplay.init();
});
</script>
</body>
</html>
| the_stack | {'hexsha': 'd2cf25bea6745f1eea6d7f254521560d34331be5', 'size': '30148', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'api/Graph.js.html', 'max_stars_repo_name': 'Humanise/hui', 'max_stars_repo_head_hexsha': '5b159a1fe81bea82383ac472d13f8efe671debdd', 'max_stars_repo_licenses': "['Unlicense']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'api/Graph.js.html', 'max_issues_repo_name': 'Humanise/hui', 'max_issues_repo_head_hexsha': '5b159a1fe81bea82383ac472d13f8efe671debdd', 'max_issues_repo_licenses': "['Unlicense']", 'max_issues_count': '10', 'max_issues_repo_issues_event_min_datetime': '2021-01-13T17:46:08.000Z', 'max_issues_repo_issues_event_max_datetime': '2021-12-29T12:49:58.000Z', 'max_forks_repo_path': 'api/Graph.js.html', 'max_forks_repo_name': 'Humanise/hui', 'max_forks_repo_head_hexsha': '5b159a1fe81bea82383ac472d13f8efe671debdd', 'max_forks_repo_licenses': "['Unlicense']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '59.8174603175', 'max_line_length': '6395', 'alphanum_fraction': '0.6199416213', 'original_id': '6fa9bbd55fb1e5f857fffd25ca62f20878077b9392199d765e4f63f4b01ad7f2'} |
No screen time - thoughts?
I would like no screen time for my current 16 month old. However we do show her videos and photos of herself on our phones, sometimes she watches us on our phones, sometimes we turn on the news/Netflix in the background while we play/lie in bed waiting for her to fall asleep. I am really strict with screen time. Especially involving other people that aren’t her parents. I don’t want them being the ones giving screen time and spoiling her. Recently she wants us to hold our phones and show her stuff. She throws fits when we don’t. But normally she is showing signs of extreme interest. Husband has let her watch YouTube videos of dancing kids while his mom watched her and we had date night. But normally, no/limited screen time. I understand we live in a technology world and half my job and half my me-time is done on my phone. I worked an event at work tonight and came home to husband watching Coco with her. I got so mad and anxious. Am I too controlling? Should I let him watch a Disney movie with her when she’s single daddy-ing it? Is that a sign of lazy parenting on his part? If we introduce screen time to her, should I only allow it when we are home with her? And keep to no screen time with caretakers, She’s currently at home with grandmas at my house during the work day. I don’t know how to manage this. I really want the best for her. I don’t want her screen addicted. I also have control issues hahaha advice anyone?
• Jenn
Nov 14
I try to limit my 18 month old TV time to 1 hour a day. But now that I'm pregnant and it's getting colder, she may get more, especially on the weekend. Also, she has been sick so TV has been a lifesaver to calm a cranky kid. I think as long as it is in moderation, it will be fine. My LO will still play and interact with us when the TV is on, so that is also good.
• Kieli
Nov 15
I believe in moderation is fine. My 2 yr old likes to watch stuff, YouTube/tv. If I put something on for her while I’m cooking or something, she will watch for a few minutes and then go play. And same as Jenn, she will talk and play when tv is on so I don’t think she is “addicted”. But some children do have a problem, with the tv. So it’s definitely something to keep an eye on, but with all of the technology now a days it’s very difficult to have 0 screen time. There are a lot of educational shows and videos as well. My daughter has learned a lot of songs and even ABCs from watching things
• anonymous mom
Nov 15
I understand where you’re coming from but I think you need to sit down and talk to your husband about what your expectations are and what his are and try to negotiate a boundary you’re both comfortable with. We never have tv on for background noise. Ever. We play music if we need noise on. Having said that, we let our daughter watch videos of herself often and she’s seen Sesame Street a few times. She’s 2 and doesn’t get more than an hour a week total of screen time, usually a lot less. So you need to work it out with your husband and then set a personal goal to trim it down if you think it’s too much. That’s what I would do. Good luck 😃
• Cindy
Nov 15
I was like you when my son was about your daughters age. But with time I started easing up because as a single working mom, sometimes the only me time I have is when he is watching some cartoons. This is when I can clean & cook. Also, I noticed when I was making a bigger deal of it, my son would have more tantrums over screen time. As I let go, so did he. So here are my new guidelines: -Preferably No youtube if I can help it. If you like you tube, sit there with your daughter so you can monitor what she is watching. They advertise WAY TOO MUCH to children -I have done my homework and am ok with Netflix, PBS, and for apps Kahn Academy Kids. These have no advertisements and are educational. (Netflix bc he loves robots, im ok with that bc that the way of the future) -We have a long commute so sometimes in the car I let him watch netflix - I realized that the more he sees me on my phone, the more he wants to be on the phone, so I limit MY screen time. -If I’m really tired, we watch movies together and it gives us time for cuddles -I make sure we get outside Like others have said, moderation is key. They are going to be surrounded by screens so all we can do is try to guide them in the right direction. My son is 3 now. He has a wild imagination and learned his colors, some numbers & letters from the cartoons. So overall he is doing well.
• A
Nov 15
You are an awesome Mom for wanting to get rid of screen time. For me, I think it would be really hard and stressful to be so strict about it. We do limit TV time and try to stick to high quality stuff. (No YouTube lol) I do feel like my kids have learned from the TV at times. For example we watch a lot of Daniel Tiger, which teaches all kinds of life lessons. My daughter will actually pull quotes from episodes of that show when she s I a pickle. “Mom Danielle Tiger says when your mad take a deep breathe and count to three..” Also, that hour a day gives me some sanity. Ie: I can shower, fold laundry, make dinner in peace. My twins are 3 now, and we just started letting them watch full movies on occasion. I feel like it’s nice to sit down as a family, cuddle and watch a Disney flic.
• Gi
Nov 18
I have a 4 yo and a 22mo. They have virtually no screen time except from facetime with family and watching the occasional videos of themselves. They both been to part-time daycare with no screens. My 4 yo is fully bilingual and is learning how to read now mostly by himself (obviously I teach him how the letters sound, but I work so we have limited time for "academics" as when we are together I try to play)... He entertains his younger brother by singing, telling him stories... Everyone compliments us how they "behave" at restaurants and flights without screens but it is just their reality. I think it may be difficult to enforce if this is not something your family embrace... We model it so they don't know otherwise. Whatever you decide, choose something it aligns with your values not with other's opinions though.
• Jenn
Nov 21
I have a 4 and 6 year old. We do not own tablets, they don’t have phones. I let them watch tv on weekends. We do a 2 hr limit on weekend days. I am definitely more strict but that’s because it’s a strong belief and value of mine. I see how addicted my husband is to his phone, and Tv and I use my phone too much and I know that while it can be educational, they love learning the old fashion way, reading books and playing. They’ve had tablets at school and I know they do a fair amount of screen time at school these days so that’s just my value. Not everyone will feel the same. When I see babies glued to tablets or parents phones just strolling through a store I can’t....I don’t want my kids addicted to it before they are even teenage years. I know I’ll have to give in more as they get older but honestly they have to have time to be kids and not become zombies in front of a screen. So just sharing my two cents, everyone is different the main thing is do what works for you, do what feels right for you! There are a lot of studies on screen time and kids. So just take some time to figure out what your feelings are and maybe have that conversation with your husband, ect so they can be on the same page and it won’t make you feel so anxious. Good luck!!
• Katie
Nov 21
I think the most important thing is to not let screen time be the default. I regularly witness people who hand over their phone at the slightest delay or inconvenience. Going to a restaurant? Phone. Waiting at the doctor? Phone. Riding in the car? Phone. Slightest bit of wait for mom/dad? Phone. That type of behavior robs kids of their imagination and downtime. Instead of letting them have free thinking and daydreaming you are constantly feeding them “lessons” or what to think. I regularly hear my girls chatting about fun clouds they see or weird signs when we’re driving. I look at screens as a reward for good behavior not a bandaid or preventative to bad behavior. When my daughter has been good and eaten her dinner she gets some iPad play or a TV show in the evenings. Neither of my kids has ever touched my phone while it was unlocked (the one likes to take pics from the lock screen). As soon as she throws attitude when the time limit is up then it goes away for a whole week. Was it painful at first? Yup. But now I regular get compliments when we go out in public over how well the kids behave. I don’t look at it as controlling, just not letting it become a big part of our lives. Kids don’t need constant stimulation and it’s better if they don’t have it. This is just my 2 cents but I think ur spot on to try and reduce screen time.
• Beverly Vantine
Nov 21
My two quick takes: 1. Come to an agreement with your husband, write it on a piece of paper, and stick to it. My 4yo wakes up at 630am everyday, and I refuse to move that early on a Saturday/Sunday. And since he's in pre-k, he needs something to do in the morning while dad and I get ready for work. (and also while we are getting diner ready). So the agreement is 630-830 in the morning max, 515-6 when we get home, and if he's been good, he gets an extra 30 minutes. It is way more than I want, less than what my son and husband thin, but it's the agreement, and it works. Stick to it. If it's a rainy weekend or he's sick, we'll allow a little more time. 2. Under no circumstances should you give a kid that's pitching a fit what they want. If it's bad at 16month, I can assure you it'll be worse at 2, worse at 4, and waaaay worse at 14. Once you or dad say something, that's it. Period. Throw the biggest tantrum in the world, don't care, still not getting what you want. We've done htis since he was itty bitty, and I swear our kids tantrums last no longer than a minute and aren't bad at all because he KNOWS it's not going to work. If she pitches a fit for 5 minutes and you give in, well, you just sportively reinforced that if she freaks out for 5+ minutes she'll eventually get what she wants. It's hard at first, but after the 3rd time it'll click.
• Nana
Nov 21
I think you are doing a great job. My heart breaks when I see all kids on devices as baby sitters. I love “Little Baby Bum” or similar for a few minutes each day. The biggest issue is what they see you and others doing. Put devices away. But I think dad is ok once in a while to enjoy a movie with his girl. Maybe you could decide together on what it is. Daniel Tiger is great. Looking at pics of family is fine if you are enjoying memories and talking about them, but limit the time. Preschoolers on devices are lacking fine motor skills and social skills. This is my observation from teaching preschool over the years. Keep it up momma you are doing well.
• Mar
Nov 21
I do the same as you! The less Screen Time the better! I wish more people did this, they’re gonna have enough screen time once They start school as is 💗🤷🏻♀️
• Z
Nov 21
Not too controlling, IMO. You aren’t hurting your child or anyone else, so anyone who judges you can be ignored.
• Madeleine
Nov 21
Do whatever feels right to you and your husband! I've been super controlling about my kids' screen time, and it's been amazing for us (so far). My reasons sound similar to yours: I am addicted to mindless technology, and I don't want my kids to follow down the same path. Until age 2 we did no screen time at all except video chats with family. I've been very happy with our choice of no screens. I feel like mild boredom has encouraged their imaginations and increased their attention spans. Instead of screens, I played them educational music to learn their abc's, numbers, and days of the week, which worked really well. Then at age 2 we started using images and short videos to expose them to interesting stuff about the world a few times a week. The best part about no screens is that when/if you do later introduce screens in moderation, they will be fascinated by whatever you show them, even if it's just a picture of the Eiffel tower or a video of penguins swimming underwater. Our kids probably watch a total of 10-30 minutes of YouTube videos per week, mostly nature videos and marble machines, and for us that's just the right amount. As we show them videos I always narrate what's happening and ask and answer questions, to make sure they are understanding what they are seeing. I can't tell you how much I enjoy and treasure this way of interacting with my kids. Really, there is no wrong answer. Just do what feels right for your family!
• Stacey
Nov 21
My son just turned 2. We do watch YouTube but it almost always kids music videos and we always watch so we know what is being shown. It’s about a hour or so during most days. More on the weekend. Or if he is getting restless at a restaurant YouTube on the phone can sometimes help. He doesn’t quite like non music shows but might watch half an episode of Sesame Street or Daniel Tiger. We also have a old iPad that I downloaded some kid apps on. He will bring it to me sometimes so I can unlock it and get him to his folder. Then he picks the app, will play for maybe 10 minutes then give the iPad back to me and he is off the play with something else. He is pretty much regulating his own screen time so that’s great.
• Lindsey
Nov 22
I have my first on the way, so I can't speak from experience yet, but my husband and I have already talked about screen time. My plan is to raise her like I was raised and to be a good example when I'm around her. My first thing will be no videos on the phone (except now that you mention it, showing her videos of herself sounds fun and harmless.) I am ok with some TV shows occasionally, because I know I loved sesame street on the weekend mornings when I was a kid, but ONLY occasionally. I don't watch TV too much myself, so I don't see it being a hard rule to stick to. Keeping videos on the TV also limits it to when we're home, and only in the living room. We don't have TVs in our bedrooms. My second plan is to limit my own interaction with my phone while I'm around her. I plan to keep it out of sight, out of mind. Kids always want to mimic what they see their parents doing, so I'm sure if I have my phone out, she'll want to reach for it too. You sound like you're doing a great job!! I have lots of friends with little kids and they all tell me I'll cave and give my kids the phone because it makes their lives so much easier, but I think it's really important not to do that. Good job not taking the easy way out! Don't be hard on yourself.
• Vonda
You are not too controlling. But just make sure you and your husband are on the same page. We don’t do screens for our son either. I show him photos and he FaceTimes with his grandparents. But no tv or movies. I don’t put tv on in the background. Just music or read aloud. It’s hard for us to not do something we do all the time in this day and age. It took me a while to purge it out of my system and not check my phone all the time. My son has seen one movie and I was ok with it because it was something I knew was real life (not animated), didn’t have violence, no language and no one died. Not even a slap on the face. Lol. And I needed to watch something. Pride and Prejudice with Kiera Knightly. It’s good to find a balance. Does she need screen time. Absolutely not. But it is up to you. Just make sure you are on the same page with all caregivers and parents involved. Cause trust me it’s really annoying when you say no screen time and your mother decides it’s fine if it’s a documentary. (Not frustrated at all) 🤦♀️ | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9772822856903076}", 'metadata': "{'Content-Length': '60380', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IN2LVBS3C6E6SKIPQWX2YOR2D75GM35P', 'WARC-Concurrent-To': '<urn:uuid:6ce0d75a-4307-4e3a-8338-ed9ca9372159>', 'WARC-Date': datetime.datetime(2019, 12, 8, 21, 52, 48), 'WARC-IP-Address': '34.209.194.136', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:PKVCPJJXHM2PJBYECHFCH2LPHKGDF2KN', 'WARC-Record-ID': '<urn:uuid:3fe6cd16-502d-432d-9f10-19366a2ca9c8>', 'WARC-Target-URI': 'https://winnie.com/post/no-screen-time-thoughts-1d172f95', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:071057fa-35d0-4780-8ec6-8569780ee9cc>', 'WARC-Truncated': None}", 'previous_word_count': '3026', 'url': 'https://winnie.com/post/no-screen-time-thoughts-1d172f95', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-159.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025979936122894287', 'original_id': '782fc85b2b1d3d8b2caaeb9fb4cace4a5c2638f0c4277885721020b00db706bd'} |
Nutrients for Anemia
By Jonny Bowden, PhD, CNS
If you constantly feel run-down and tired, you may have anemia. Here are three supplements that can help.
Anemia is the most common blood disorder in the country. According to the Mayo Clinic, more than 3.4 million Americans suffer with some form of anemia, the symptoms of which often include fatigue, weakness, shortness of breath, pale skin, and cold or numb hands and feet. Headaches are another symptom, as are nails that break easily.
So what is this condition, anyway? How do we get it and how do we treat it? Let’s start with the basics. Your blood consists of a liquid (called plasma) and three different types of cells; white blood cells fight infection; platelets help your blood to clot; and red blood cells (also called erythrocytes) transport oxygen. Anemia is a condition in which there are fewer than normal healthy red blood cells.
This is serious stuff, because those red blood cells have important work to do. Their job is to take oxygen away from the lungs via the bloodstream and into all tissues of your body, such as your brain and other organs. “Oxygenated” blood is what gives you energy. It also makes your skin glow.
Iron-Deficiency Anemia
The most well-known kind of anemia is the type caused by too little iron, or “iron-deficiency” anemia. This is because hemoglobin, the actual protein in red blood cells that does the heavy lifting in the oxygen department, is utterly dependent on iron. Iron deficiency is the main reason your blood test shows a low level of hemoglobin.
Approximately one-fifth of women, half of pregnant women, and 3 percent of men are iron deficient. Pregnant women are at especially high risk for anemia precisely because the growing fetus demands so much iron that there’s often not enough left for the mother. Menstruating women are also at risk, due to the monthly loss of iron in the blood.
If you are indeed iron deficient, your doctor will probably prescribe iron supplements. Most people with mild or moderate iron deficiency anemia can correct the problem over a period of about three months, but if iron stores remain low, a few more months of supplementation may be recommended.
Iron: A Double-Edged Sword
As a nutritionist, I’m always cautious about prescribing iron to either men or to postmenopausal women. Although iron deficiency can certainly present problems, too much iron presents a whole different set of potentially serious dangers. As iron builds up in the system, it can easily reach toxic levels and increase risk of both cancer and heart disease. As Andrew Weil, MD, wisely counsels, “Unless you’re a menstruating woman or have had a significant blood loss, you should never take an iron supplement except when advised by a physician after blood tests show you have iron-deficiency anemia.” Don’t forget that there’s plenty of iron in red meat—especially liver—as well as egg yolks, molasses, dried apricots, clams, beans, and lentils.
Your doctor can determine if you’re anemic with a basic blood test called a complete blood count (CBC), which will give you a reading of both your hemoglobin levels and your hematocrit (the actual percentage of red blood cells found in a blood sample). Normal ranges vary with age and gender.
Other Forms of Anemia
Another common form of anemia is known as megaloblastic anemia. The most common causes of megaloblastic anemia are deficiencies of either vitamin B12 or folic acid, both of which play essential roles in the production of red blood cells. You can get folic acid from green leafy vegetables and liver, and most cereals are fortified with it. But it’s a very important nutrient—especially for women of child-bearing age—and most nutritionists don’t think the recommended daily allowance is enough. Try to get at least 800 mcg a day in your multivitamin, or take a folic acid supplement. Folic acid is a member of the B-vitamin family, and is always found in B complex as well as in multivitamins. It’s also one of the few vitamins that is better absorbed from supplements than from foods.
Vitamin B12 is another matter. First of all, it’s not always well absorbed. Second, the main sources of vitamin B12 in the diet are meat, eggs, and dairy products—all animal products. Vegetarians almost certainly don’t get enough of this vitamin, which is not only important for red blood cells but also for the entire nervous system. If you’re a vegetarian you should definitely be taking vitamin B12 supplements, even if you don’t have the symptoms of anemia.
There are an awful lot of causes for feeling run-down and fatigued; in fact, I recently wrote a book about it, The 150 Most Effective Ways to Boost Energy Naturally. But you shouldn’t always rule out anemia as a cause, and if in fact it’s the culprit in your fatigue, be sure to treat it right away. Anemia can really compromise the quality of your life. The good news is that the most common types are pretty easy to fix with the right nutrients.
One-Two-Three Punch for Anemia
Try three of our top picks for reversing anemia with supplements (from left to right):
Solaray Vitamin B-12 Sublingual Lozenges contain a hefty 2,000 mcg of vitamin B12, and they come in cherry-flavored tablets (sugar-free) that dissolve under your tongue. Most important, this formula features methylcobalamin—the best-absorbed form of vitamin B12.
Floradix FloraVital Iron + Herbs is now available in a yeast- and gluten-free formula. The iron is naturally derived from herbs and foods, which means you won’t experience side effects common with iron supplements, such as constipation. This tasty liquid is also rich in B vitamins and vitamin C—all your bases are covered.
Maximum Living Folic Acid ODT (orally disintegrating tablets) boasts an advanced delivery system that promises enhanced absorption and utilization by the body. Each tablet contains 800 mcg of folic acid and 120 mcg of vitamin B12.
Related Articles: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.94308602809906}", 'metadata': "{'Content-Length': '17089', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LWELJJMJTG47J3O6UNRZMD3QUQCV26NS', 'WARC-Concurrent-To': '<urn:uuid:0dbbfbf9-7b97-48e5-8c63-be58c80779fa>', 'WARC-Date': datetime.datetime(2014, 8, 1, 22, 28, 2), 'WARC-IP-Address': '107.22.227.107', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LQQXZNFRWCVKKL2JFWGVZYMBYKAEVVDB', 'WARC-Record-ID': '<urn:uuid:ace2f733-0eb2-4db3-afd0-66e57c29aaa9>', 'WARC-Target-URI': 'http://www.betternutrition.com/nutrientsanemia/columns/askthenaturopath/740', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ec6ab89d-fc42-4329-9608-251ac3ad1cd6>', 'WARC-Truncated': None}", 'previous_word_count': '979', 'url': 'http://www.betternutrition.com/nutrientsanemia/columns/askthenaturopath/740', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04867875576019287', 'original_id': '50bf4691d00deab81d432f99da1adbd0a5d9c96c99de8ddbb287d69ef505d013'} |
Browse By
Yearly Archives: 2016
Review: Moana
Not only a film targeted at children, but a musical as well? Will Moana be able to melt our film correspondent’s cold heart?
Review: Rogue One: A Star Wars Story
James was defiant in his position on The Force Awakens, but it still reaped more in profits than he is likely to earn in his lifetime. Does the latest Star Wars film ease tensions between James and the franchise? | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9665588140487672}", 'metadata': "{'Content-Length': '83366', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:353QYYF6TRZU7MTBRGCDDBO3IXRWAW6K', 'WARC-Concurrent-To': '<urn:uuid:5d793745-48bc-48ae-9b33-fbf50f6dc7f1>', 'WARC-Date': datetime.datetime(2021, 9, 24, 9, 1, 29), 'WARC-IP-Address': '80.82.117.174', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:Q7O6M4MQJFAZZ5GJMFNB43SYY7O7QRYT', 'WARC-Record-ID': '<urn:uuid:b8216c6b-9029-42cd-8470-c45f9448f578>', 'WARC-Target-URI': 'https://www.berkeleysquares.co.uk/2016/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2f045cb9-d4de-4cb1-8355-bd0cdbf57925>', 'WARC-Truncated': None}", 'previous_word_count': '76', 'url': 'https://www.berkeleysquares.co.uk/2016/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-248\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05774569511413574', 'original_id': '35067b9eb32dc485411eba4e394834d18cb2807bb565a8155052ba46fb58f401'} |
Benchmark Validation File - DO NOT MODIFY! If you do, it will fail validation.
Validation Version: 1.3
Program: y-cruncher v0.7.8 Build 9507
Tuning: 17-SKX ~ Kotori
User: Amazon Web Services (i3en.24xlarge)
Operating System: Linux 5.4.58-32.125.amzn2.x86_64 x86_64
Processor(s):
Name: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz
Logical Cores: 96
Physical Cores: 48
Sockets: 2
NUMA Nodes: 2
Base Frequency: 2,499,990,432 Hz
Motherboard:
Manufacturer: Amazon EC2
Model:
Version:
Serial Number: Suppressed - Personally identifiable information is opt-in only.
Memory:
Usable Memory: 802,914,627,584 ( 748 GiB)
Total Memory: Unable to Detect
Constant: Custom - Cosine of 1
Algorithm: 2 Cos(1/2)^2 - 1
Decimal Digits: 25,000,000
Hexadecimal Digits: 20,762,051
Computation Mode: Ram Only
Threading Mode: Push Pool -> 96 / ? (randomization off)
Working Memory: 814,055,616 ( 776 MiB)
Total Memory: 921,932,864 ( 879 MiB)
Configuration Dump:
{
Constant : {
Constant : "custom"
NameShort : "Cos(1)"
NameLong : "Cosine of 1"
AlgorithmShort : "Half Angle Formula"
AlgorithmLong : "2 Cos(1/2)^2 - 1"
Formula : {
LinearCombination : [
[
2
{
Power : [
{
SeriesHyperdescent : {
CoefficientP : 1
CoefficientQ : 1
CoefficientD : 1
PolynomialP : [1]
PolynomialQ : [0 8 -16]
}
}
2
]
}
]
[-1 1]
]
}
}
ComputeSize : {
DecimalDigits : 25000000
EnableHexDigits : "true"
}
Output : {
Path : ""
OutputEnable : "false"
}
OutputVerify : "true"
Mode : "ram"
Parallelism : {
TaskDecomposition : 96
Framework : "pushpool"
WorkerThreads : 0
Randomization : "false"
MaxSequentialDispatch : 96
}
Allocator : {
Allocator : "interleave-libnuma"
LockedPages : "forced"
Nodes : [0 1]
}
}
Start Date: Sun Oct 4 20:10:01 2020
End Date: Sun Oct 4 20:10:02 2020
Total Computation Time: 0.109 seconds
Start-to-End Wall Time: 1.018 seconds
CPU Utilization: 4212.75 % + 302.88 % kernel overhead
Multi-core Efficiency: 43.88 % + 3.15 % kernel overhead
Last Decimal Digits:
1461269184 7782667234 8916085006 6151133155 8116142472 : 24,999,950
6823345918 6085600599 5819304939 5517500442 5320890486 : 25,000,000
Last Hexadecimal Digits:
93e5dd822c 82381676f0 f3550d7122 f07ffe8432 83a2205f51 : 20,762,050
2
SHA256-dec(25,000,001 - 25,000,100): 81d9b8fe40f4430efaf566348d2e176182205da9aa6bb156e6ba6a3ec645a505
Dec Counts: {2497533,2500550,2498836,2500124,2501111,2500525,2500133,2498059,2502885,2500244}
Hex Counts: {1298467,1293780,1297567,1297190,1298030,1297263,1299133,1296191,1297698,1298601,1298109,1298364,1299286,1297636,1297174,1297562}
Dec Hash: Floor(|x| * 10^dec) mod (2^61 - 1) = 482292006598889899
Hex Hash: Floor(|x| * 16^hex) mod (2^61 - 1) = 994314656329034119
Spot Check: Not Available
Timer Sanity Check: Passed
Frequency Sanity Check: Disabled in this version of y-cruncher
Reference Clock: TSC
Reference Clock 0: 0
Reference Clock 1: 120,012,145
Reference Clock 2: 1,437,378
Is Debugger Present: Unknown
Is Contiguous: Yes
ECC Recovered Errors: 0
Colors: Yes
Event Log:
Sun Oct 4 20:10:02 2020 0.524 Working Memory
Sun Oct 4 20:10:02 2020 0.808 Working Memory: 777 MiB (locked, spread: 99%/2)
Sun Oct 4 20:10:02 2020 0.808 Twiddle Tables
Sun Oct 4 20:10:02 2020 0.876 Twiddle Tables: 103 MiB (locked, spread: 100%/2)
Sun Oct 4 20:10:02 2020 0.876 Begin Computation
Sun Oct 4 20:10:02 2020 0.876 Series Hyperdescent... 1,936,559 terms (Expansion Factor = 1.000)
Sun Oct 4 20:10:02 2020 0.925 Finishing Series
Sun Oct 4 20:10:02 2020 0.926 Large Division
Sun Oct 4 20:10:02 2020 0.953 Squaring
Sun Oct 4 20:10:02 2020 0.959 Processing Hexadecimal Digits
Sun Oct 4 20:10:02 2020 0.959 Base Converting
Sun Oct 4 20:10:02 2020 0.985 Processing Decimal Digits
Sun Oct 4 20:10:02 2020 0.986 Verifying Base Conversion
Sun Oct 4 20:10:02 2020 1.006 Verifying Binary Output
Sun Oct 4 20:10:02 2020 1.019 End Computation
----
Checksum0: b4c1c1af83f42b662939c9119e87c1d16b1ef065e91e3a957764ad7acfbc7462b67a78b3068b267854435ba77a453f1a5b5ec8c886592bfbd512f8336948e930
Checksum1: fda9203580723585ca78f39d1fd78e5b8c310e4f23140954c14f970590c904013870df6647e2338169b1ec1180c874a4b9d279bcb37577691f8c1a8dbd1eb057
| the_stack | {'hexsha': '2cf56de8f0af27c1bb064ca04943428203584e7a', 'size': '5391', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'y-cruncher/results/Amazon Web Services/i3en.24xlarge/Cos(1) [Half Angle Formula]/Cos(1) - 20201004-201002.txt', 'max_stars_repo_name': 'greghogan/benchmark', 'max_stars_repo_head_hexsha': '8d7197b565aa45304a087dd03d315073a6ada5df', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'y-cruncher/results/Amazon Web Services/i3en.24xlarge/Cos(1) [Half Angle Formula]/Cos(1) - 20201004-201002.txt', 'max_issues_repo_name': 'greghogan/benchmark', 'max_issues_repo_head_hexsha': '8d7197b565aa45304a087dd03d315073a6ada5df', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'y-cruncher/results/Amazon Web Services/i3en.24xlarge/Cos(1) [Half Angle Formula]/Cos(1) - 20201004-201002.txt', 'max_forks_repo_name': 'greghogan/benchmark', 'max_forks_repo_head_hexsha': '8d7197b565aa45304a087dd03d315073a6ada5df', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '35.4671052632', 'max_line_length': '142', 'alphanum_fraction': '0.5804117974', 'original_id': 'ac61b34315eb3d5a3f84c51827dc6faf456a002317470cd1951a49916ef0a267'} |
<form action="$Url.FrontUrl().PageUrl("search")" method="get">
<input type="text" name="key" id="searchBox" />
<button type="submit">
Search</button>
</form>
#set( $key = $Page_Context.Current.PageRequestContext.AllQueryString.get_Item("key"))
#set( $pageIndex = $Page_Context.Current.PageRequestContext.AllQueryString.get_Item("pageIndex"))
#if( ! $pageIndex )
#set($pageIndex=1)
#else
$pageIndex = $int.Parse($pageIndex)
#end
#set( $results = $SearchHelper.Search($Repository,$key,1,10))
#foreach($item in $results)
#each
<div class="block">
<h4 class="title">
<a href='$item.Url'>$Html.Raw($item.HighlightedTitle)</a></h4>
<p>$Html.Raw($item.HighlightedBody)</p>
</div>
#end
$Html.FrontHtml().Pager($results) | the_stack | {'hexsha': '3af5212c8138f0cace4557a96d2e88bfc8209099', 'size': '768', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'Kooboo.CMS/KoobooModule/Areas/Sites/CodeSnippets/NVelocity/Forms/Search.txt', 'max_stars_repo_name': 'syberside/CMS', 'max_stars_repo_head_hexsha': '9b4e785e7f6324c9ade56f79a81dac33ec4292e7', 'max_stars_repo_licenses': "['BSD-3-Clause']", 'max_stars_count': '288', 'max_stars_repo_stars_event_min_datetime': '2015-01-02T08:42:16.000Z', 'max_stars_repo_stars_event_max_datetime': '2021-09-29T14:01:59.000Z', 'max_issues_repo_path': 'Kooboo.CMS/KoobooModule/Areas/Sites/CodeSnippets/NVelocity/Forms/Search.txt', 'max_issues_repo_name': 'syberside/CMS', 'max_issues_repo_head_hexsha': '9b4e785e7f6324c9ade56f79a81dac33ec4292e7', 'max_issues_repo_licenses': "['BSD-3-Clause']", 'max_issues_count': '45', 'max_issues_repo_issues_event_min_datetime': '2015-01-13T13:32:02.000Z', 'max_issues_repo_issues_event_max_datetime': '2021-05-03T23:33:52.000Z', 'max_forks_repo_path': 'Kooboo.CMS/KoobooModule/Areas/Sites/CodeSnippets/NVelocity/Forms/Search.txt', 'max_forks_repo_name': 'syberside/CMS', 'max_forks_repo_head_hexsha': '9b4e785e7f6324c9ade56f79a81dac33ec4292e7', 'max_forks_repo_licenses': "['BSD-3-Clause']", 'max_forks_count': '171', 'max_forks_repo_forks_event_min_datetime': '2015-01-03T15:00:36.000Z', 'max_forks_repo_forks_event_max_datetime': '2021-01-08T01:52:47.000Z', 'avg_line_length': '26.4827586207', 'max_line_length': '97', 'alphanum_fraction': '0.6575520833', 'original_id': '43e0ed303476d84e923be23b798be08b86d4ed16ed41ef0ac96ee1251bc1a95e'} |
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Getting Started — DeepLearning 0.1 documentation</title>
<link rel="stylesheet" href="_static/pygments.css" type="text/css" />
<link rel="stylesheet" href="_static/sphinxdoc.css" type="text/css" />
<script id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script>
<script src="_static/jquery.js"></script>
<script src="_static/underscore.js"></script>
<script src="_static/doctools.js"></script>
<link rel="index" title="Index" href="genindex.html" />
<link rel="search" title="Search" href="search.html" />
<link rel="next" title="Classifying MNIST digits using Logistic Regression" href="logreg.html" />
<link rel="prev" title="Deep Learning Tutorials" href="index.html" />
<script type="text/javascript">
var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-168290-9']);
_gaq.push(['_trackPageview']);
</script>
</head><body>
<div class="related" role="navigation" aria-label="related navigation">
<h3>Navigation</h3>
<ul>
<li class="right" style="margin-right: 10px">
<a href="genindex.html" title="General Index"
accesskey="I">index</a></li>
<li class="right" >
<a href="logreg.html" title="Classifying MNIST digits using Logistic Regression"
accesskey="N">next</a> |</li>
<li class="right" >
<a href="index.html" title="Deep Learning Tutorials"
accesskey="P">previous</a> |</li>
<li class="nav-item nav-item-0"><a href="contents.html">DeepLearning 0.1 documentation</a> »</li>
<li class="nav-item nav-item-this"><a href="">Getting Started</a></li>
</ul>
</div>
<div class="document">
<div class="documentwrapper">
<div class="bodywrapper">
<div class="body" role="main">
<div class="section" id="getting-started">
<span id="gettingstarted"></span><h1>Getting Started<a class="headerlink" href="#getting-started" title="Permalink to this headline">¶</a></h1>
<p>These tutorials do not attempt to make up for a graduate or undergraduate course
in machine learning, but we do make a rapid overview of some important concepts
(and notation) to make sure that we’re on the same page. You’ll also need to
download the datasets mentioned in this chapter in order to run the example code of
the up-coming tutorials.</p>
<span class="target" id="download"></span><div class="section" id="index-0">
<span id="id1"></span><h2>Download<a class="headerlink" href="#index-0" title="Permalink to this headline">¶</a></h2>
<p>On each learning algorithm page, you will be able to download the corresponding files. If you want to download all of them at the same time, you can clone the git repository of the tutorial:</p>
<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">git</span> <span class="n">clone</span> <span class="n">https</span><span class="p">:</span><span class="o">//</span><span class="n">github</span><span class="o">.</span><span class="n">com</span><span class="o">/</span><span class="n">lisa</span><span class="o">-</span><span class="n">lab</span><span class="o">/</span><span class="n">DeepLearningTutorials</span><span class="o">.</span><span class="n">git</span>
</pre></div>
</div>
<p>On Linux or Mac systems, after cloning, all datasets can be downloaded at once with:</p>
<blockquote>
<div><p>cd DeepLearningTutorials/data
./download.sh</p>
</div></blockquote>
<span class="target" id="datasets"></span></div>
<div class="section" id="index-1">
<span id="id2"></span><h2>Datasets<a class="headerlink" href="#index-1" title="Permalink to this headline">¶</a></h2>
<div class="section" id="mnist-dataset">
<span id="index-2"></span><h3>MNIST Dataset<a class="headerlink" href="#mnist-dataset" title="Permalink to this headline">¶</a></h3>
<p>(<a class="reference external" href="http://deeplearning.net/data/mnist/mnist.pkl.gz">mnist.pkl.gz</a>)</p>
<blockquote>
<div><p>The <a class="reference external" href="http://yann.lecun.com/exdb/mnist">MNIST</a> dataset consists of handwritten
digit images and it is divided in 60,000 examples for the training set and
10,000 examples for testing. In many papers as well as in this tutorial, the
official training set of 60,000 is divided into an actual training set of 50,000
examples and 10,000 validation examples (for selecting hyper-parameters like
learning rate and size of the model). All digit images have been size-normalized and
centered in a fixed size image of 28 x 28 pixels. In the original dataset
each pixel of the image is represented by a value between 0 and 255, where
0 is black, 255 is white and anything in between is a different shade of grey.</p>
<p>Here are some examples of MNIST digits:</p>
<blockquote>
<div><p><img alt="0" src="_images/mnist_0.png" /> <img alt="1" src="_images/mnist_1.png" /> <img alt="2" src="_images/mnist_2.png" /> <img alt="3" src="_images/mnist_3.png" /> <img alt="4" src="_images/mnist_4.png" /> <img alt="5" src="_images/mnist_5.png" /></p>
</div></blockquote>
<p>For convenience we pickled the dataset to make it easier to use in python.
It is available for download <a class="reference external" href="http://deeplearning.net/data/mnist/mnist.pkl.gz">here</a>.
The pickled file represents a tuple of 3 lists : the training set, the
validation set and the testing set. Each of the three lists is a pair
formed from a list of images and a list of class labels for each of the
images. An image is represented as numpy 1-dimensional array of 784 (28
x 28) float values between 0 and 1 (0 stands for black, 1 for white).
The labels are numbers between 0 and 9 indicating which digit the image
represents. The code block below shows how to load the dataset.</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="kn">import</span> <span class="nn">cPickle</span><span class="o">,</span> <span class="nn">gzip</span><span class="o">,</span> <span class="nn">numpy</span>
<span class="c1"># Load the dataset</span>
<span class="n">f</span> <span class="o">=</span> <span class="n">gzip</span><span class="o">.</span><span class="n">open</span><span class="p">(</span><span class="s1">'mnist.pkl.gz'</span><span class="p">,</span> <span class="s1">'rb'</span><span class="p">)</span>
<span class="n">train_set</span><span class="p">,</span> <span class="n">valid_set</span><span class="p">,</span> <span class="n">test_set</span> <span class="o">=</span> <span class="n">cPickle</span><span class="o">.</span><span class="n">load</span><span class="p">(</span><span class="n">f</span><span class="p">)</span>
<span class="n">f</span><span class="o">.</span><span class="n">close</span><span class="p">()</span>
</pre></div>
</div>
<p>When using the dataset, we usually divide it in minibatches (see
<a class="reference internal" href="#opt-sgd"><span class="std std-ref">Stochastic Gradient Descent</span></a>). We encourage you to store the dataset into shared
variables and access it based on the minibatch index, given a fixed
and known batch size. The reason behind shared variables is
related to using the GPU. There is a large overhead when copying data
into the GPU memory. If you would copy data on request (each minibatch
individually when needed) as the code will do if you do not use shared
variables, due to this overhead, the GPU code will not be much faster
then the CPU code (maybe even slower). If you have your data in
Theano shared variables though, you give Theano the possibility to copy
the entire data on the GPU in a single call when the shared variables are constructed.
Afterwards the GPU can access any minibatch by taking a slice from this
shared variables, without needing to copy any information from the CPU
memory and therefore bypassing the overhead.
Because the datapoints and their labels are usually of different nature
(labels are usually integers while datapoints are real numbers) we
suggest to use different variables for label and data. Also we recommend
using different variables for the training set, validation set and
testing set to make the code more readable (resulting in 6 different
shared variables).</p>
<p>Since now the data is in one variable, and a minibatch is defined as a
slice of that variable, it comes more natural to define a minibatch by
indicating its index and its size. In our setup the batch size stays constant
throughout the execution of the code, therefore a function will actually
require only the index to identify on which datapoints to work.
The code below shows how to store your data and how to
access a minibatch:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">def</span> <span class="nf">shared_dataset</span><span class="p">(</span><span class="n">data_xy</span><span class="p">):</span>
<span class="sd">""" Function that loads the dataset into shared variables</span>
<span class="sd"> The reason we store our dataset in shared variables is to allow</span>
<span class="sd"> Theano to copy it into the GPU memory (when code is run on GPU).</span>
<span class="sd"> Since copying data into the GPU is slow, copying a minibatch everytime</span>
<span class="sd"> is needed (the default behaviour if the data is not in a shared</span>
<span class="sd"> variable) would lead to a large decrease in performance.</span>
<span class="sd"> """</span>
<span class="n">data_x</span><span class="p">,</span> <span class="n">data_y</span> <span class="o">=</span> <span class="n">data_xy</span>
<span class="n">shared_x</span> <span class="o">=</span> <span class="n">theano</span><span class="o">.</span><span class="n">shared</span><span class="p">(</span><span class="n">numpy</span><span class="o">.</span><span class="n">asarray</span><span class="p">(</span><span class="n">data_x</span><span class="p">,</span> <span class="n">dtype</span><span class="o">=</span><span class="n">theano</span><span class="o">.</span><span class="n">config</span><span class="o">.</span><span class="n">floatX</span><span class="p">))</span>
<span class="n">shared_y</span> <span class="o">=</span> <span class="n">theano</span><span class="o">.</span><span class="n">shared</span><span class="p">(</span><span class="n">numpy</span><span class="o">.</span><span class="n">asarray</span><span class="p">(</span><span class="n">data_y</span><span class="p">,</span> <span class="n">dtype</span><span class="o">=</span><span class="n">theano</span><span class="o">.</span><span class="n">config</span><span class="o">.</span><span class="n">floatX</span><span class="p">))</span>
<span class="c1"># When storing data on the GPU it has to be stored as floats</span>
<span class="c1"># therefore we will store the labels as ``floatX`` as well</span>
<span class="c1"># (``shared_y`` does exactly that). But during our computations</span>
<span class="c1"># we need them as ints (we use labels as index, and if they are</span>
<span class="c1"># floats it doesn't make sense) therefore instead of returning</span>
<span class="c1"># ``shared_y`` we will have to cast it to int. This little hack</span>
<span class="c1"># lets us get around this issue</span>
<span class="k">return</span> <span class="n">shared_x</span><span class="p">,</span> <span class="n">T</span><span class="o">.</span><span class="n">cast</span><span class="p">(</span><span class="n">shared_y</span><span class="p">,</span> <span class="s1">'int32'</span><span class="p">)</span>
<span class="n">test_set_x</span><span class="p">,</span> <span class="n">test_set_y</span> <span class="o">=</span> <span class="n">shared_dataset</span><span class="p">(</span><span class="n">test_set</span><span class="p">)</span>
<span class="n">valid_set_x</span><span class="p">,</span> <span class="n">valid_set_y</span> <span class="o">=</span> <span class="n">shared_dataset</span><span class="p">(</span><span class="n">valid_set</span><span class="p">)</span>
<span class="n">train_set_x</span><span class="p">,</span> <span class="n">train_set_y</span> <span class="o">=</span> <span class="n">shared_dataset</span><span class="p">(</span><span class="n">train_set</span><span class="p">)</span>
<span class="n">batch_size</span> <span class="o">=</span> <span class="mi">500</span> <span class="c1"># size of the minibatch</span>
<span class="c1"># accessing the third minibatch of the training set</span>
<span class="n">data</span> <span class="o">=</span> <span class="n">train_set_x</span><span class="p">[</span><span class="mi">2</span> <span class="o">*</span> <span class="n">batch_size</span><span class="p">:</span> <span class="mi">3</span> <span class="o">*</span> <span class="n">batch_size</span><span class="p">]</span>
<span class="n">label</span> <span class="o">=</span> <span class="n">train_set_y</span><span class="p">[</span><span class="mi">2</span> <span class="o">*</span> <span class="n">batch_size</span><span class="p">:</span> <span class="mi">3</span> <span class="o">*</span> <span class="n">batch_size</span><span class="p">]</span>
</pre></div>
</div>
</div></blockquote>
<p>The data has to be stored as floats on the GPU ( the right
<code class="docutils literal notranslate"><span class="pre">dtype</span></code> for storing on the GPU is given by <code class="docutils literal notranslate"><span class="pre">theano.config.floatX</span></code>).
To get around this shortcoming for the labels, we store them as float,
and then cast it to int.</p>
<div class="admonition note">
<p class="admonition-title">Note</p>
<p>If you are running your code on the GPU and the dataset you are using
is too large to fit in memory the code will crash. In such a case you
should store the data in a shared variable. You can however store a
sufficiently small chunk of your data (several minibatches) in a shared
variable and use that during training. Once you got through the chunk,
update the values it stores. This way you minimize the number of data
transfers between CPU memory and GPU memory.</p>
</div>
</div>
</div>
<div class="section" id="notation">
<span id="index-3"></span><h2>Notation<a class="headerlink" href="#notation" title="Permalink to this headline">¶</a></h2>
<div class="section" id="dataset-notation">
<span id="index-4"></span><h3>Dataset notation<a class="headerlink" href="#dataset-notation" title="Permalink to this headline">¶</a></h3>
<p>We label data sets as <span class="math">\mathcal{D}</span>. When the distinction is important, we
indicate train, validation, and test sets as: <span class="math">\mathcal{D}_{train}</span>,
<span class="math">\mathcal{D}_{valid}</span> and <span class="math">\mathcal{D}_{test}</span>. The validation set
is used to perform model selection and hyper-parameter selection, whereas
the test set is used to evaluate the final generalization error and
compare different algorithms in an unbiased way.</p>
<p>The tutorials mostly deal with classification problems, where each data set
<span class="math">\mathcal{D}</span> is an indexed set of pairs <span class="math">(x^{(i)},y^{(i)})</span>. We
use superscripts to distinguish training set examples: <span class="math">x^{(i)} \in
\mathcal{R}^D</span> is thus the i-th training example of dimensionality <span class="math">D</span>. Similarly,
<span class="math">y^{(i)} \in \{0, ..., L\}</span> is the i-th label assigned to input
<span class="math">x^{(i)}</span>. It is straightforward to extend these examples to
ones where <span class="math">y^{(i)}</span> has other types (e.g. Gaussian for regression,
or groups of multinomials for predicting multiple symbols).</p>
</div>
<div class="section" id="math-conventions">
<span id="index-5"></span><h3>Math Conventions<a class="headerlink" href="#math-conventions" title="Permalink to this headline">¶</a></h3>
<ul class="simple">
<li><p><span class="math">W</span>: upper-case symbols refer to a matrix unless specified otherwise</p></li>
<li><p><span class="math">W_{ij}</span>: element at i-th row and j-th column of matrix <span class="math">W</span></p></li>
<li><p><span class="math">W_{i \cdot}, W_i</span>: vector, i-th row of matrix <span class="math">W</span></p></li>
<li><p><span class="math">W_{\cdot j}</span>: vector, j-th column of matrix <span class="math">W</span></p></li>
<li><p><span class="math">b</span>: lower-case symbols refer to a vector unless specified otherwise</p></li>
<li><p><span class="math">b_i</span>: i-th element of vector <span class="math">b</span></p></li>
</ul>
</div>
<div class="section" id="list-of-symbols-and-acronyms">
<span id="index-6"></span><h3>List of Symbols and acronyms<a class="headerlink" href="#list-of-symbols-and-acronyms" title="Permalink to this headline">¶</a></h3>
<ul class="simple">
<li><p><span class="math">D</span>: number of input dimensions.</p></li>
<li><p><span class="math">D_h^{(i)}</span>: number of hidden units in the <span class="math">i</span>-th layer.</p></li>
<li><p><span class="math">f_{\theta}(x)</span>, <span class="math">f(x)</span>: classification function associated with a model <span class="math">P(Y|x,\theta)</span>, defined as <span class="math">{\rm argmax}_k P(Y=k|x,\theta)</span>.
Note that we will often drop the <span class="math">\theta</span> subscript.</p></li>
<li><p>L: number of labels.</p></li>
<li><p><span class="math">\mathcal{L}(\theta, \cal{D})</span>: log-likelihood <span class="math">\cal{D}</span>
of the model defined by parameters <span class="math">\theta</span>.</p></li>
<li><p><span class="math">\ell(\theta, \cal{D})</span> empirical loss of the prediction function f
parameterized by <span class="math">\theta</span> on data set <span class="math">\cal{D}</span>.</p></li>
<li><p>NLL: negative log-likelihood</p></li>
<li><p><span class="math">\theta</span>: set of all parameters for a given model</p></li>
</ul>
</div>
<div class="section" id="python-namespaces">
<span id="index-7"></span><h3>Python Namespaces<a class="headerlink" href="#python-namespaces" title="Permalink to this headline">¶</a></h3>
<p>Tutorial code often uses the following namespaces:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="kn">import</span> <span class="nn">theano</span>
<span class="kn">import</span> <span class="nn">theano.tensor</span> <span class="k">as</span> <span class="nn">T</span>
<span class="kn">import</span> <span class="nn">numpy</span>
</pre></div>
</div>
</div>
</div>
<div class="section" id="a-primer-on-supervised-optimization-for-deep-learning">
<h2>A Primer on Supervised Optimization for Deep Learning<a class="headerlink" href="#a-primer-on-supervised-optimization-for-deep-learning" title="Permalink to this headline">¶</a></h2>
<p id="stoch-grad-label">What’s exciting about Deep Learning is largely the use of unsupervised learning
of deep networks. But supervised learning also plays an important role. The
utility of unsupervised <em>pre-training</em> is often evaluated on the basis of what
performance can be achieved after supervised <em>fine-tuning</em>. This chapter
reviews the basics of supervised learning for classification models, and covers
the minibatch stochastic gradient descent algorithm that is used to fine-tune
many of the models in the Deep Learning Tutorials. Have a look at these
<a class="reference external" href="http://www.iro.umontreal.ca/~pift6266/H10/notes/gradient.html">introductory course notes on gradient-based learning</a>
for more basics on the notion of optimizing a training criterion using the gradient.</p>
<div class="section" id="learning-a-classifier">
<span id="opt-learn-classifier"></span><h3>Learning a Classifier<a class="headerlink" href="#learning-a-classifier" title="Permalink to this headline">¶</a></h3>
<div class="section" id="zero-one-loss">
<span id="index-8"></span><h4>Zero-One Loss<a class="headerlink" href="#zero-one-loss" title="Permalink to this headline">¶</a></h4>
<p>The models presented in these deep learning tutorials are mostly used
for classification. The objective in training a classifier is to minimize the number
of errors (zero-one loss) on unseen examples. If <span class="math">f: R^D \rightarrow
\{0,...,L\}</span> is the prediction function, then this loss can be written as:</p>
<div class="math">
<p><span class="math">\ell_{0,1} = \sum_{i=0}^{|\mathcal{D}|} I_{f(x^{(i)}) \neq y^{(i)}}</span></p>
</div><p>where either <span class="math">\mathcal{D}</span> is the training
set (during training)
or <span class="math">\mathcal{D} \cap \mathcal{D}_{train} = \emptyset</span>
(to avoid biasing the evaluation of validation or test error). <span class="math">I</span> is the
indicator function defined as:</p>
<div class="math">
<p><span class="math">I_x = \left\{\begin{array}{ccc}
1&\mbox{ if $x$ is True} \\
0&\mbox{ otherwise}\end{array}\right.</span></p>
</div><p>In this tutorial, <span class="math">f</span> is defined as:</p>
<div class="math">
<p><span class="math">f(x) = {\rm argmax}_k P(Y=k | x, \theta)</span></p>
</div><p>In python, using Theano this can be written as:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># zero_one_loss is a Theano variable representing a symbolic</span>
<span class="c1"># expression of the zero one loss ; to get the actual value this</span>
<span class="c1"># symbolic expression has to be compiled into a Theano function (see</span>
<span class="c1"># the Theano tutorial for more details)</span>
<span class="n">zero_one_loss</span> <span class="o">=</span> <span class="n">T</span><span class="o">.</span><span class="n">sum</span><span class="p">(</span><span class="n">T</span><span class="o">.</span><span class="n">neq</span><span class="p">(</span><span class="n">T</span><span class="o">.</span><span class="n">argmax</span><span class="p">(</span><span class="n">p_y_given_x</span><span class="p">),</span> <span class="n">y</span><span class="p">))</span>
</pre></div>
</div>
</div>
<div class="section" id="negative-log-likelihood-loss">
<span id="index-9"></span><h4>Negative Log-Likelihood Loss<a class="headerlink" href="#negative-log-likelihood-loss" title="Permalink to this headline">¶</a></h4>
<p>Since the zero-one loss is not differentiable, optimizing it for large models
(thousands or millions of parameters) is prohibitively expensive
(computationally). We thus maximize the log-likelihood of our classifier given
all the labels in a training set.</p>
<div class="math">
<p><span class="math">\mathcal{L}(\theta, \mathcal{D}) =
\sum_{i=0}^{|\mathcal{D}|} \log P(Y=y^{(i)} | x^{(i)}, \theta)</span></p>
</div><p>The likelihood of the correct class is not the same as the
number of right predictions, but from the point of view of a randomly
initialized classifier they are pretty similar.
Remember that likelihood and zero-one loss are different objectives;
you should see that they are correlated on the validation set but
sometimes one will rise while the other falls, or vice-versa.</p>
<p>Since we usually speak in terms of minimizing a loss function, learning will
thus attempt to <strong>minimize</strong> the <strong>negative</strong> log-likelihood (NLL), defined
as:</p>
<div class="math">
<p><span class="math">NLL(\theta, \mathcal{D}) = - \sum_{i=0}^{|\mathcal{D}|} \log P(Y=y^{(i)} | x^{(i)}, \theta)</span></p>
</div><p>The NLL of our classifier is a differentiable surrogate for the zero-one loss,
and we use the gradient of this function over our training data as a
supervised learning signal for deep learning of a classifier.</p>
<p>This can be computed using the following line of code:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># NLL is a symbolic variable ; to get the actual value of NLL, this symbolic</span>
<span class="c1"># expression has to be compiled into a Theano function (see the Theano</span>
<span class="c1"># tutorial for more details)</span>
<span class="n">NLL</span> <span class="o">=</span> <span class="o">-</span><span class="n">T</span><span class="o">.</span><span class="n">sum</span><span class="p">(</span><span class="n">T</span><span class="o">.</span><span class="n">log</span><span class="p">(</span><span class="n">p_y_given_x</span><span class="p">)[</span><span class="n">T</span><span class="o">.</span><span class="n">arange</span><span class="p">(</span><span class="n">y</span><span class="o">.</span><span class="n">shape</span><span class="p">[</span><span class="mi">0</span><span class="p">]),</span> <span class="n">y</span><span class="p">])</span>
<span class="c1"># note on syntax: T.arange(y.shape[0]) is a vector of integers [0,1,2,...,len(y)].</span>
<span class="c1"># Indexing a matrix M by the two vectors [0,1,...,K], [a,b,...,k] returns the</span>
<span class="c1"># elements M[0,a], M[1,b], ..., M[K,k] as a vector. Here, we use this</span>
<span class="c1"># syntax to retrieve the log-probability of the correct labels, y.</span>
</pre></div>
</div>
</div>
</div>
<div class="section" id="stochastic-gradient-descent">
<span id="opt-sgd"></span><span id="index-10"></span><h3>Stochastic Gradient Descent<a class="headerlink" href="#stochastic-gradient-descent" title="Permalink to this headline">¶</a></h3>
<p>What is ordinary gradient descent? it is a simple
algorithm in which we repeatedly make small steps downward on an error
surface defined by a loss function of some parameters.
For the purpose of ordinary gradient descent we consider that the training
data is rolled into the loss function. Then the pseudocode of this
algorithm can be described as:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># GRADIENT DESCENT</span>
<span class="k">while</span> <span class="kc">True</span><span class="p">:</span>
<span class="n">loss</span> <span class="o">=</span> <span class="n">f</span><span class="p">(</span><span class="n">params</span><span class="p">)</span>
<span class="n">d_loss_wrt_params</span> <span class="o">=</span> <span class="o">...</span> <span class="c1"># compute gradient</span>
<span class="n">params</span> <span class="o">-=</span> <span class="n">learning_rate</span> <span class="o">*</span> <span class="n">d_loss_wrt_params</span>
<span class="k">if</span> <span class="o"><</span><span class="n">stopping</span> <span class="n">condition</span> <span class="ow">is</span> <span class="n">met</span><span class="o">></span><span class="p">:</span>
<span class="k">return</span> <span class="n">params</span>
</pre></div>
</div>
<p>Stochastic gradient descent (SGD) works according to the same principles as
ordinary gradient descent, but proceeds more quickly by estimating the gradient from just
a few examples at a time instead of the entire training set. In its purest
form, we estimate the gradient from just a single example at a time.</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># STOCHASTIC GRADIENT DESCENT</span>
<span class="k">for</span> <span class="p">(</span><span class="n">x_i</span><span class="p">,</span><span class="n">y_i</span><span class="p">)</span> <span class="ow">in</span> <span class="n">training_set</span><span class="p">:</span>
<span class="c1"># imagine an infinite generator</span>
<span class="c1"># that may repeat examples (if there is only a finite training set)</span>
<span class="n">loss</span> <span class="o">=</span> <span class="n">f</span><span class="p">(</span><span class="n">params</span><span class="p">,</span> <span class="n">x_i</span><span class="p">,</span> <span class="n">y_i</span><span class="p">)</span>
<span class="n">d_loss_wrt_params</span> <span class="o">=</span> <span class="o">...</span> <span class="c1"># compute gradient</span>
<span class="n">params</span> <span class="o">-=</span> <span class="n">learning_rate</span> <span class="o">*</span> <span class="n">d_loss_wrt_params</span>
<span class="k">if</span> <span class="o"><</span><span class="n">stopping</span> <span class="n">condition</span> <span class="ow">is</span> <span class="n">met</span><span class="o">></span><span class="p">:</span>
<span class="k">return</span> <span class="n">params</span>
</pre></div>
</div>
<p>The variant that we recommend for deep learning is a further twist on
stochastic gradient descent using so-called “minibatches”.
Minibatch SGD (MSGD) works identically to SGD, except that we use more than
one training example to make each estimate of the gradient. This technique reduces
variance in the estimate of the gradient, and often makes better use of the
hierarchical memory organization in modern computers.</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">for</span> <span class="p">(</span><span class="n">x_batch</span><span class="p">,</span><span class="n">y_batch</span><span class="p">)</span> <span class="ow">in</span> <span class="n">train_batches</span><span class="p">:</span>
<span class="c1"># imagine an infinite generator</span>
<span class="c1"># that may repeat examples</span>
<span class="n">loss</span> <span class="o">=</span> <span class="n">f</span><span class="p">(</span><span class="n">params</span><span class="p">,</span> <span class="n">x_batch</span><span class="p">,</span> <span class="n">y_batch</span><span class="p">)</span>
<span class="n">d_loss_wrt_params</span> <span class="o">=</span> <span class="o">...</span> <span class="c1"># compute gradient using theano</span>
<span class="n">params</span> <span class="o">-=</span> <span class="n">learning_rate</span> <span class="o">*</span> <span class="n">d_loss_wrt_params</span>
<span class="k">if</span> <span class="o"><</span><span class="n">stopping</span> <span class="n">condition</span> <span class="ow">is</span> <span class="n">met</span><span class="o">></span><span class="p">:</span>
<span class="k">return</span> <span class="n">params</span>
</pre></div>
</div>
<p>There is a tradeoff in the choice of the minibatch size <span class="math">B</span>. The
reduction of variance and use of SIMD instructions helps most when increasing
<span class="math">B</span> from 1 to 2, but the marginal improvement fades rapidly to nothing.
With large <span class="math">B</span>, time is wasted in reducing the variance of the gradient
estimator, that time would be better spent on additional gradient steps.
An optimal <span class="math">B</span> is model-, dataset-, and hardware-dependent, and can be
anywhere from 1 to maybe several hundreds. In the tutorial we set it to 20,
but this choice is almost arbitrary (though harmless).</p>
<div class="admonition note">
<p class="admonition-title">Note</p>
<p>If you are training for a fixed number of epochs, the minibatch size becomes important
because it controls the number of updates done to your parameters. Training the same model
for 10 epochs using a batch size of 1 yields completely different results compared
to training for the same 10 epochs but with a batchsize of 20. Keep this in mind when
switching between batch sizes and be prepared to tweak all the other parameters according
to the batch size used.</p>
</div>
<p>All code-blocks above show pseudocode of how the algorithm looks like. Implementing such
algorithm in Theano can be done as follows:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># Minibatch Stochastic Gradient Descent</span>
<span class="c1"># assume loss is a symbolic description of the loss function given</span>
<span class="c1"># the symbolic variables params (shared variable), x_batch, y_batch;</span>
<span class="c1"># compute gradient of loss with respect to params</span>
<span class="n">d_loss_wrt_params</span> <span class="o">=</span> <span class="n">T</span><span class="o">.</span><span class="n">grad</span><span class="p">(</span><span class="n">loss</span><span class="p">,</span> <span class="n">params</span><span class="p">)</span>
<span class="c1"># compile the MSGD step into a theano function</span>
<span class="n">updates</span> <span class="o">=</span> <span class="p">[(</span><span class="n">params</span><span class="p">,</span> <span class="n">params</span> <span class="o">-</span> <span class="n">learning_rate</span> <span class="o">*</span> <span class="n">d_loss_wrt_params</span><span class="p">)]</span>
<span class="n">MSGD</span> <span class="o">=</span> <span class="n">theano</span><span class="o">.</span><span class="n">function</span><span class="p">([</span><span class="n">x_batch</span><span class="p">,</span><span class="n">y_batch</span><span class="p">],</span> <span class="n">loss</span><span class="p">,</span> <span class="n">updates</span><span class="o">=</span><span class="n">updates</span><span class="p">)</span>
<span class="k">for</span> <span class="p">(</span><span class="n">x_batch</span><span class="p">,</span> <span class="n">y_batch</span><span class="p">)</span> <span class="ow">in</span> <span class="n">train_batches</span><span class="p">:</span>
<span class="c1"># here x_batch and y_batch are elements of train_batches and</span>
<span class="c1"># therefore numpy arrays; function MSGD also updates the params</span>
<span class="nb">print</span><span class="p">(</span><span class="s1">'Current loss is '</span><span class="p">,</span> <span class="n">MSGD</span><span class="p">(</span><span class="n">x_batch</span><span class="p">,</span> <span class="n">y_batch</span><span class="p">))</span>
<span class="k">if</span> <span class="n">stopping_condition_is_met</span><span class="p">:</span>
<span class="k">return</span> <span class="n">params</span>
</pre></div>
</div>
</div>
<div class="section" id="regularization">
<span id="index-11"></span><h3>Regularization<a class="headerlink" href="#regularization" title="Permalink to this headline">¶</a></h3>
<p>There is more to machine learning than optimization. When we
train our model from data we are trying to prepare it to do well on <em>new</em>
examples, not the ones it has already seen. The training loop above for MSGD
does not take this into account, and may overfit the training examples.
A way to combat overfitting is through regularization.
There are several techniques for regularization; the ones we will explain
here are L1/L2 regularization and early-stopping.</p>
<div class="section" id="l1-and-l2-regularization">
<span id="l1-l2-regularization"></span><span id="index-12"></span><h4>L1 and L2 regularization<a class="headerlink" href="#l1-and-l2-regularization" title="Permalink to this headline">¶</a></h4>
<p>L1 and L2 regularization involve adding an extra term to the loss function,
which penalizes certain parameter configurations. Formally, if our loss function is:</p>
<div class="math">
<p><span class="math">NLL(\theta, \mathcal{D}) = - \sum_{i=0}^{|\mathcal{D}|} \log P(Y=y^{(i)} | x^{(i)}, \theta)</span></p>
</div><p>then the regularized loss will be:</p>
<div class="math">
<p><span class="math">E(\theta, \mathcal{D}) = NLL(\theta, \mathcal{D}) + \lambda R(\theta)\\</span></p>
</div><p>or, in our case</p>
<div class="math">
<p><span class="math">E(\theta, \mathcal{D}) = NLL(\theta, \mathcal{D}) + \lambda||\theta||_p^p</span></p>
</div><p>where</p>
<div class="math">
<p><span class="math">||\theta||_p = \left(\sum_{j=0}^{|\theta|}{|\theta_j|^p}\right)^{\frac{1}{p}}</span></p>
</div><p>which is the <span class="math">L_p</span> norm of <span class="math">\theta</span>. <span class="math">\lambda</span> is a hyper-parameter which
controls the relative importance of the regularization parameter. Commonly used values for p
are 1 and 2, hence the L1/L2 nomenclature. If p=2, then the regularizer is
also called “weight decay”.</p>
<p>In principle, adding a regularization term to the loss will encourage smooth
network mappings in a neural network (by penalizing large values of the
parameters, which decreases the amount of nonlinearity that the
network models). More intuitively, the two terms (NLL and <span class="math">R(\theta)</span>)
correspond to modelling the data well (NLL) and having “simple” or “smooth”
solutions (<span class="math">R(\theta)</span>). Thus, minimizing the sum of both will, in
theory, correspond to finding the right trade-off between the fit to the
training data and the “generality” of the solution that is found. To follow
Occam’s razor principle, this minimization should find us the simplest
solution (as measured by our simplicity criterion) that fits the training
data.</p>
<p>Note that the fact that a solution is “simple” does not mean that it will
generalize well. Empirically, it was found that performing such regularization
in the context of neural networks helps with generalization, especially
on small datasets.
The code block below shows how to compute the loss in python when it
contains both a L1 regularization term weighted by <span class="math">\lambda_1</span> and
L2 regularization term weighted by <span class="math">\lambda_2</span></p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># symbolic Theano variable that represents the L1 regularization term</span>
<span class="n">L1</span> <span class="o">=</span> <span class="n">T</span><span class="o">.</span><span class="n">sum</span><span class="p">(</span><span class="nb">abs</span><span class="p">(</span><span class="n">param</span><span class="p">))</span>
<span class="c1"># symbolic Theano variable that represents the squared L2 term</span>
<span class="n">L2</span> <span class="o">=</span> <span class="n">T</span><span class="o">.</span><span class="n">sum</span><span class="p">(</span><span class="n">param</span> <span class="o">**</span> <span class="mi">2</span><span class="p">)</span>
<span class="c1"># the loss</span>
<span class="n">loss</span> <span class="o">=</span> <span class="n">NLL</span> <span class="o">+</span> <span class="n">lambda_1</span> <span class="o">*</span> <span class="n">L1</span> <span class="o">+</span> <span class="n">lambda_2</span> <span class="o">*</span> <span class="n">L2</span>
</pre></div>
</div>
</div>
<div class="section" id="early-stopping">
<span id="opt-early-stopping"></span><span id="index-13"></span><h4>Early-Stopping<a class="headerlink" href="#early-stopping" title="Permalink to this headline">¶</a></h4>
<p>Early-stopping combats overfitting by monitoring the model’s performance on a
<em>validation set</em>. A validation set is a set of examples that we never use for
gradient descent, but which is also not a part of the <em>test set</em>. The
validation examples are considered to be representative of future test examples.
We can use them during training because they are not part of the test set.
If the model’s performance ceases to improve sufficiently on the
validation set, or even degrades with further optimization, then the
heuristic implemented here gives up on much further optimization.</p>
<p>The choice of when to stop is a
judgement call and a few heuristics exist, but these tutorials will make use
of a strategy based on a geometrically increasing amount of patience.</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="c1"># early-stopping parameters</span>
<span class="n">patience</span> <span class="o">=</span> <span class="mi">5000</span> <span class="c1"># look as this many examples regardless</span>
<span class="n">patience_increase</span> <span class="o">=</span> <span class="mi">2</span> <span class="c1"># wait this much longer when a new best is</span>
<span class="c1"># found</span>
<span class="n">improvement_threshold</span> <span class="o">=</span> <span class="mf">0.995</span> <span class="c1"># a relative improvement of this much is</span>
<span class="c1"># considered significant</span>
<span class="n">validation_frequency</span> <span class="o">=</span> <span class="nb">min</span><span class="p">(</span><span class="n">n_train_batches</span><span class="p">,</span> <span class="n">patience</span><span class="o">/</span><span class="mi">2</span><span class="p">)</span>
<span class="c1"># go through this many</span>
<span class="c1"># minibatches before checking the network</span>
<span class="c1"># on the validation set; in this case we</span>
<span class="c1"># check every epoch</span>
<span class="n">best_params</span> <span class="o">=</span> <span class="kc">None</span>
<span class="n">best_validation_loss</span> <span class="o">=</span> <span class="n">numpy</span><span class="o">.</span><span class="n">inf</span>
<span class="n">test_score</span> <span class="o">=</span> <span class="mf">0.</span>
<span class="n">start_time</span> <span class="o">=</span> <span class="n">time</span><span class="o">.</span><span class="n">clock</span><span class="p">()</span>
<span class="n">done_looping</span> <span class="o">=</span> <span class="kc">False</span>
<span class="n">epoch</span> <span class="o">=</span> <span class="mi">0</span>
<span class="k">while</span> <span class="p">(</span><span class="n">epoch</span> <span class="o"><</span> <span class="n">n_epochs</span><span class="p">)</span> <span class="ow">and</span> <span class="p">(</span><span class="ow">not</span> <span class="n">done_looping</span><span class="p">):</span>
<span class="c1"># Report "1" for first epoch, "n_epochs" for last epoch</span>
<span class="n">epoch</span> <span class="o">=</span> <span class="n">epoch</span> <span class="o">+</span> <span class="mi">1</span>
<span class="k">for</span> <span class="n">minibatch_index</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="n">n_train_batches</span><span class="p">):</span>
<span class="n">d_loss_wrt_params</span> <span class="o">=</span> <span class="o">...</span> <span class="c1"># compute gradient</span>
<span class="n">params</span> <span class="o">-=</span> <span class="n">learning_rate</span> <span class="o">*</span> <span class="n">d_loss_wrt_params</span> <span class="c1"># gradient descent</span>
<span class="c1"># iteration number. We want it to start at 0.</span>
<span class="nb">iter</span> <span class="o">=</span> <span class="p">(</span><span class="n">epoch</span> <span class="o">-</span> <span class="mi">1</span><span class="p">)</span> <span class="o">*</span> <span class="n">n_train_batches</span> <span class="o">+</span> <span class="n">minibatch_index</span>
<span class="c1"># note that if we do `iter % validation_frequency` it will be</span>
<span class="c1"># true for iter = 0 which we do not want. We want it true for</span>
<span class="c1"># iter = validation_frequency - 1.</span>
<span class="k">if</span> <span class="p">(</span><span class="nb">iter</span> <span class="o">+</span> <span class="mi">1</span><span class="p">)</span> <span class="o">%</span> <span class="n">validation_frequency</span> <span class="o">==</span> <span class="mi">0</span><span class="p">:</span>
<span class="n">this_validation_loss</span> <span class="o">=</span> <span class="o">...</span> <span class="c1"># compute zero-one loss on validation set</span>
<span class="k">if</span> <span class="n">this_validation_loss</span> <span class="o"><</span> <span class="n">best_validation_loss</span><span class="p">:</span>
<span class="c1"># improve patience if loss improvement is good enough</span>
<span class="k">if</span> <span class="n">this_validation_loss</span> <span class="o"><</span> <span class="n">best_validation_loss</span> <span class="o">*</span> <span class="n">improvement_threshold</span><span class="p">:</span>
<span class="n">patience</span> <span class="o">=</span> <span class="nb">max</span><span class="p">(</span><span class="n">patience</span><span class="p">,</span> <span class="nb">iter</span> <span class="o">*</span> <span class="n">patience_increase</span><span class="p">)</span>
<span class="n">best_params</span> <span class="o">=</span> <span class="n">copy</span><span class="o">.</span><span class="n">deepcopy</span><span class="p">(</span><span class="n">params</span><span class="p">)</span>
<span class="n">best_validation_loss</span> <span class="o">=</span> <span class="n">this_validation_loss</span>
<span class="k">if</span> <span class="n">patience</span> <span class="o"><=</span> <span class="nb">iter</span><span class="p">:</span>
<span class="n">done_looping</span> <span class="o">=</span> <span class="kc">True</span>
<span class="k">break</span>
<span class="c1"># POSTCONDITION:</span>
<span class="c1"># best_params refers to the best out-of-sample parameters observed during the optimization</span>
</pre></div>
</div>
<p>If we run out of batches of training data before running out of patience, then
we just go back to the beginning of the training set and repeat.</p>
<div class="admonition note">
<p class="admonition-title">Note</p>
<p>The <code class="docutils literal notranslate"><span class="pre">validation_frequency</span></code> should always be smaller than the
<code class="docutils literal notranslate"><span class="pre">patience</span></code>. The code should check at least two times how it
performs before running out of patience. This is the reason we used
the formulation <code class="docutils literal notranslate"><span class="pre">validation_frequency</span> <span class="pre">=</span> <span class="pre">min(</span> <span class="pre">value,</span> <span class="pre">patience/2.)</span></code></p>
</div>
<div class="admonition note">
<p class="admonition-title">Note</p>
<p>This algorithm could possibly be improved by using a test of statistical significance
rather than the simple comparison, when deciding whether to increase the
patience.</p>
</div>
</div>
</div>
<div class="section" id="testing">
<span id="index-14"></span><h3>Testing<a class="headerlink" href="#testing" title="Permalink to this headline">¶</a></h3>
<p>After the loop exits, the best_params variable refers to the best-performing
model on the validation set. If we repeat this procedure for another model
class, or even another random initialization, we should use the same
train/valid/test split of the data, and get other best-performing
models. If we have to choose what the best model class or the best
initialization was, we compare the best_validation_loss for each model. When
we have finally chosen the model we think is the best (on validation data), we
report that model’s test set performance. That is the performance we expect on
unseen examples.</p>
</div>
<div class="section" id="recap">
<h3>Recap<a class="headerlink" href="#recap" title="Permalink to this headline">¶</a></h3>
<p>That’s it for the optimization section.
The technique of early-stopping requires us to partition the set of examples into three sets
(training <span class="math">\mathcal{D}_{train}</span>,
validation <span class="math">\mathcal{D}_{valid}</span>,
test <span class="math">\mathcal{D}_{test}</span>).
The training set is used for minibatch stochastic gradient descent on the
differentiable approximation of the objective function.
As we perform this gradient descent, we periodically consult the validation set
to see how our model is doing on the real objective function (or at least our
empirical estimate of it).
When we see a good model on the validation set, we save it.
When it has been a long time since seeing a good model, we abandon our search
and return the best parameters found, for evaluation on the test set.</p>
</div>
</div>
<div class="section" id="theano-python-tips">
<h2>Theano/Python Tips<a class="headerlink" href="#theano-python-tips" title="Permalink to this headline">¶</a></h2>
<div class="section" id="loading-and-saving-models">
<h3>Loading and Saving Models<a class="headerlink" href="#loading-and-saving-models" title="Permalink to this headline">¶</a></h3>
<p>When you’re doing experiments, it can take hours (sometimes days!) for
gradient-descent to find the best parameters. You will want to save those
weights once you find them. You may also want to save your current-best
estimates as the search progresses.</p>
<p><strong>Pickle the numpy ndarrays from your shared variables</strong></p>
<p>The best way to save/archive your model’s parameters is to use pickle or
deepcopy the ndarray objects. So for example, if your parameters are in
shared variables <code class="docutils literal notranslate"><span class="pre">w,</span> <span class="pre">v,</span> <span class="pre">u</span></code>, then your save command should look something
like:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="gp">>>> </span><span class="kn">import</span> <span class="nn">cPickle</span>
<span class="gp">>>> </span><span class="n">save_file</span> <span class="o">=</span> <span class="nb">open</span><span class="p">(</span><span class="s1">'path'</span><span class="p">,</span> <span class="s1">'wb'</span><span class="p">)</span> <span class="c1"># this will overwrite current contents</span>
<span class="gp">>>> </span><span class="n">cPickle</span><span class="o">.</span><span class="n">dump</span><span class="p">(</span><span class="n">w</span><span class="o">.</span><span class="n">get_value</span><span class="p">(</span><span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">),</span> <span class="n">save_file</span><span class="p">,</span> <span class="o">-</span><span class="mi">1</span><span class="p">)</span> <span class="c1"># the -1 is for HIGHEST_PROTOCOL</span>
<span class="gp">>>> </span><span class="n">cPickle</span><span class="o">.</span><span class="n">dump</span><span class="p">(</span><span class="n">v</span><span class="o">.</span><span class="n">get_value</span><span class="p">(</span><span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">),</span> <span class="n">save_file</span><span class="p">,</span> <span class="o">-</span><span class="mi">1</span><span class="p">)</span> <span class="c1"># .. and it triggers much more efficient</span>
<span class="gp">>>> </span><span class="n">cPickle</span><span class="o">.</span><span class="n">dump</span><span class="p">(</span><span class="n">u</span><span class="o">.</span><span class="n">get_value</span><span class="p">(</span><span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">),</span> <span class="n">save_file</span><span class="p">,</span> <span class="o">-</span><span class="mi">1</span><span class="p">)</span> <span class="c1"># .. storage than numpy's default</span>
<span class="gp">>>> </span><span class="n">save_file</span><span class="o">.</span><span class="n">close</span><span class="p">()</span>
</pre></div>
</div>
<p>Then later, you can load your data back like this:</p>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="gp">>>> </span><span class="n">save_file</span> <span class="o">=</span> <span class="nb">open</span><span class="p">(</span><span class="s1">'path'</span><span class="p">)</span>
<span class="gp">>>> </span><span class="n">w</span><span class="o">.</span><span class="n">set_value</span><span class="p">(</span><span class="n">cPickle</span><span class="o">.</span><span class="n">load</span><span class="p">(</span><span class="n">save_file</span><span class="p">),</span> <span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">)</span>
<span class="gp">>>> </span><span class="n">v</span><span class="o">.</span><span class="n">set_value</span><span class="p">(</span><span class="n">cPickle</span><span class="o">.</span><span class="n">load</span><span class="p">(</span><span class="n">save_file</span><span class="p">),</span> <span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">)</span>
<span class="gp">>>> </span><span class="n">u</span><span class="o">.</span><span class="n">set_value</span><span class="p">(</span><span class="n">cPickle</span><span class="o">.</span><span class="n">load</span><span class="p">(</span><span class="n">save_file</span><span class="p">),</span> <span class="n">borrow</span><span class="o">=</span><span class="kc">True</span><span class="p">)</span>
</pre></div>
</div>
<p>This technique is a bit verbose, but it is tried and true. You will be able
to load your data and render it in matplotlib without trouble, years after
saving it.</p>
<p><strong>Do not pickle your training or test functions for long-term storage</strong></p>
<p>Theano functions are compatible with Python’s deepcopy and pickle mechanisms,
but you should not necessarily pickle a Theano function. If you update your
Theano folder and one of the internal changes, then you may not be able to
un-pickle your model. Theano is still in active development, and the internal
APIs are subject to change. So to be on the safe side – do not pickle your
entire training or testing functions for long-term storage. The pickle
mechanism is aimed at for short-term storage, such as a temp file, or a copy to
another machine in a distributed job.</p>
<p>Read more about <a class="reference external" href="http://deeplearning.net/software/theano/tutorial/loading_and_saving.html">serialization in Theano</a>, or Python’s <a class="reference external" href="http://docs.python.org/library/pickle.html">pickling</a>.</p>
</div>
<div class="section" id="plotting-intermediate-results">
<h3>Plotting Intermediate Results<a class="headerlink" href="#plotting-intermediate-results" title="Permalink to this headline">¶</a></h3>
<p>Visualizations can be very powerful tools for understanding what your model or
training algorithm is doing. You might be tempted to insert <code class="docutils literal notranslate"><span class="pre">matplotlib</span></code>
plotting commands, or <code class="docutils literal notranslate"><span class="pre">PIL</span></code> image-rendering commands into your model-training
script. However, later you will observe something interesting in one of those
pre-rendered images and want to investigate something that isn’t clear from
the pictures. You’ll wished you had saved the original model.</p>
<p><strong>If you have enough disk space, your training script should save intermediate models and a visualization
script should process those saved models.</strong></p>
<p>You already have a model-saving function right? Just use it again to save
these intermediate models.</p>
<p>Libraries you’ll want to know about: Python Image Library (<a class="reference external" href="http://www.pythonware.com/products/pil">PIL</a>), <a class="reference external" href="http://matplotlib.sourceforge.net">matplotlib</a>.</p>
</div>
</div>
</div>
<div class="clearer"></div>
</div>
</div>
</div>
<div class="sphinxsidebar" role="navigation" aria-label="main navigation">
<div class="sphinxsidebarwrapper">
<h3><a href="contents.html">Table of Contents</a></h3>
<ul>
<li><a class="reference internal" href="#">Getting Started</a><ul>
<li><a class="reference internal" href="#index-0">Download</a></li>
<li><a class="reference internal" href="#index-1">Datasets</a><ul>
<li><a class="reference internal" href="#mnist-dataset">MNIST Dataset</a></li>
</ul>
</li>
<li><a class="reference internal" href="#notation">Notation</a><ul>
<li><a class="reference internal" href="#dataset-notation">Dataset notation</a></li>
<li><a class="reference internal" href="#math-conventions">Math Conventions</a></li>
<li><a class="reference internal" href="#list-of-symbols-and-acronyms">List of Symbols and acronyms</a></li>
<li><a class="reference internal" href="#python-namespaces">Python Namespaces</a></li>
</ul>
</li>
<li><a class="reference internal" href="#a-primer-on-supervised-optimization-for-deep-learning">A Primer on Supervised Optimization for Deep Learning</a><ul>
<li><a class="reference internal" href="#learning-a-classifier">Learning a Classifier</a><ul>
<li><a class="reference internal" href="#zero-one-loss">Zero-One Loss</a></li>
<li><a class="reference internal" href="#negative-log-likelihood-loss">Negative Log-Likelihood Loss</a></li>
</ul>
</li>
<li><a class="reference internal" href="#stochastic-gradient-descent">Stochastic Gradient Descent</a></li>
<li><a class="reference internal" href="#regularization">Regularization</a><ul>
<li><a class="reference internal" href="#l1-and-l2-regularization">L1 and L2 regularization</a></li>
<li><a class="reference internal" href="#early-stopping">Early-Stopping</a></li>
</ul>
</li>
<li><a class="reference internal" href="#testing">Testing</a></li>
<li><a class="reference internal" href="#recap">Recap</a></li>
</ul>
</li>
<li><a class="reference internal" href="#theano-python-tips">Theano/Python Tips</a><ul>
<li><a class="reference internal" href="#loading-and-saving-models">Loading and Saving Models</a></li>
<li><a class="reference internal" href="#plotting-intermediate-results">Plotting Intermediate Results</a></li>
</ul>
</li>
</ul>
</li>
</ul>
<h4>Previous topic</h4>
<p class="topless"><a href="index.html"
title="previous chapter">Deep Learning Tutorials</a></p>
<h4>Next topic</h4>
<p class="topless"><a href="logreg.html"
title="next chapter">Classifying MNIST digits using Logistic Regression</a></p>
<div role="note" aria-label="source link">
<h3>This Page</h3>
<ul class="this-page-menu">
<li><a href="_sources/gettingstarted.txt"
rel="nofollow">Show Source</a></li>
</ul>
</div>
<div id="searchbox" style="display: none" role="search">
<h3 id="searchlabel">Quick search</h3>
<div class="searchformwrapper">
<form class="search" action="search.html" method="get">
<input type="text" name="q" aria-labelledby="searchlabel" />
<input type="submit" value="Go" />
</form>
</div>
</div>
<script>$('#searchbox').show(0);</script>
</div>
</div>
<div class="clearer"></div>
</div>
<div class="related" role="navigation" aria-label="related navigation">
<h3>Navigation</h3>
<ul>
<li class="right" style="margin-right: 10px">
<a href="genindex.html" title="General Index"
>index</a></li>
<li class="right" >
<a href="logreg.html" title="Classifying MNIST digits using Logistic Regression"
>next</a> |</li>
<li class="right" >
<a href="index.html" title="Deep Learning Tutorials"
>previous</a> |</li>
<li class="nav-item nav-item-0"><a href="contents.html">DeepLearning 0.1 documentation</a> »</li>
<li class="nav-item nav-item-this"><a href="">Getting Started</a></li>
</ul>
</div>
<div class="footer" role="contentinfo">
© Copyright 2008--2010, LISA lab.
Last updated on Feb 05, 2021.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.4.3.
</div>
<script type="text/javascript">
(function() {
var ga = document.createElement('script');
ga.src = ('https:' == document.location.protocol ?
'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
ga.setAttribute('async', 'true');
document.documentElement.firstChild.appendChild(ga);
})();
</script>
</body>
</html> | the_stack | {'hexsha': 'ee2b5a25ead739177f6f2766030350748090ef93', 'size': '60596', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'doc/_build/gettingstarted.html', 'max_stars_repo_name': 'mwong009/DeepLearningTutorials', 'max_stars_repo_head_hexsha': 'a9e2e8db3c8f4b3f47b15993329a480417af6e3c', 'max_stars_repo_licenses': "['BSD-3-Clause']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'doc/_build/gettingstarted.html', 'max_issues_repo_name': 'mwong009/DeepLearningTutorials', 'max_issues_repo_head_hexsha': 'a9e2e8db3c8f4b3f47b15993329a480417af6e3c', 'max_issues_repo_licenses': "['BSD-3-Clause']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'doc/_build/gettingstarted.html', 'max_forks_repo_name': 'mwong009/DeepLearningTutorials', 'max_forks_repo_head_hexsha': 'a9e2e8db3c8f4b3f47b15993329a480417af6e3c', 'max_forks_repo_licenses': "['BSD-3-Clause']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '81.9972936401', 'max_line_length': '633', 'alphanum_fraction': '0.6871410654', 'original_id': '21fa1c9c326e72ce7b6d87ebad956229467bf59452f14549aa18a46755ad1997'} |
Incidence and geographic distribution of adult acute leukemia in the state of Georgia.
We investigated an apparent increase in acute lymphoblastic leukemia (ALL) referrals from northern Georgia to a tertiary care center located in Atlanta. Cases reported to the Georgia Comprehensive Cancer Registry and the national Surveillance Epidemiology and End Results cancer registry between 1999 and 2008 were analyzed. Age-adjusted incidence rates were calculated for all of the counties and public health regions and were compared with national rates calculated using Surveillance Epidemiology and End Results 17 data. Cases of adult acute myeloid leukemia served as controls. Age-adjusted incidence rates of adult ALL (0.8/100,000) and acute myeloid leukemia (4.6/100,000) were comparable to the national rates (0.9 and 5.2, respectively). The age-adjusted incidence rate of ALL in northern Georgia was 1.1 (95% confidence interval 0.8-1.5) and was not affected by race. The observed increase in cases of ALL at our tertiary center results from a referral pattern rather than heterogeneous distribution of adult ALL across Georgia. | mini_pile | {'original_id': 'b9fe2776715f3703f8d09a6750461bc9e547e2ebc403b760fc59183e1d5b59cf'} |
Friday, December 12, 2008
cancel your cable
the internet has made it easier and easier for people to give up their cable television.
but have many people actually done this?
probably not.
you say you want to save money... but you just can't drop that tivo.
i have not had my own cable television since i was living with my parents.
so it's been probably 6 or 7 years.
it was hard to give up at first, but i realized that i just could not afford it at the time.
and i realized there are cheaper alternatives.
when i first started my no-cable lifestyle, i watched a lot of dvd and vhs movies.
most of them i owned a just kept watching over and over again.
i wouldn't suggest this route.
go to the library and pick out some dvds that interest you.
are you a movie junky and can't be motivated enough to go to the library?
netflix is also a better option to cable.
it's still way cheaper and you can rent seasons of your favorite tv series on dvd.
in most recent times, i utilize my library's website to request dvds to check out.
i also subscribe to netflix when i can afford it.
when i can't afford it, i put my account on hold.
putting my netflix account on hold still allows me full access of their website, but i don't have to rent from them until i am ready to.
i also found the joys of about 6 months ago.
hulu offers you a queue option (much like netflix) of your favorite tv programs and movies.
all you do is subscribe to your favorite show, and hulu will update your queue as new episodes become available.
it usually updates the day after the episode has aired on television.
my queue is always updated with shows that interest me most.
doesn't mean that i actually get around to watching them though.
here are my favs on hulu: the family guy, it's always sunny in philadelphia, madtv, the office, the colbert report, the daily show, late night with conan obrien, psych, my name is earl. is good for random stuff and so is miro.
don't want to watch tv on your computer tiny screen?
another simple solution, buy hdmi cables to connect to your computer.
i use a mini-dvi cable to connect to my hdmi cable.
but then again, i use a macbook, so every computer will be a bit different.
but i can watch movies and tv programs from my laptop, on my tv.
okay, so what do you do without that weather channel with it's soothing music?
you go to!
the website is just as accurate as the tv and you don't have to listen to the music or watch any advertisements.
i am a addict.
i don't dare step outside until i see just how cold it is.
what about the news?!
find your local news channel's website and surf it!
okay, i honestly can't help ya there.
i'm not a sports fan, so i don't have to deal with that.
any ideas?
and if all else fails, pick up a book.
it's more mentally stimulating for you.
sure, it's not instant gratification, but good things are worth waiting for.
any other suggestions on how to make the switch from cable television?
1 comment:
ZombieKitteh said...
o0o0oh I also found Hulu. I like how the commercials are so short.
I lived without cable at my old trailer for like 2 months and about died. I watched numerous dvd's over and over again and read 4 or so of my books. My overpacked bookshelf thanked me. But I must say that I would rather have cable than internet. At the trailer, I didn't have internet though, so that made it worse. I want to be frugal but I really like my cable. >_< Why does life have to be so hard. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9649255275726318}", 'metadata': "{'Content-Length': '41743', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EL72ZFOMLMOZLNQOU2XC6QOLUB7GTRPQ', 'WARC-Concurrent-To': '<urn:uuid:85d7ac12-3faa-40f3-8052-f32bd263f053>', 'WARC-Date': datetime.datetime(2014, 10, 31, 8, 55, 2), 'WARC-IP-Address': '74.125.228.10', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:6L6LGZAURKDBBBAZ3QH35AQQIWBZBKOL', 'WARC-Record-ID': '<urn:uuid:a410fa27-91b5-421f-b10b-7988527506ec>', 'WARC-Target-URI': 'http://sunnysavings.blogspot.com/2008/12/cancel-your-cable.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2a6e64d8-9d87-4d55-85be-a094e00437a1>', 'WARC-Truncated': 'length'}", 'previous_word_count': '656', 'url': 'http://sunnysavings.blogspot.com/2008/12/cancel-your-cable.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-16-133-185.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-42\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for October 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1408182978630066', 'original_id': 'ea9062492a57901f5cd3405e453fac0e9ea29d16b9894d915689d0e36f5c4d6f'} |
Huntington Town (North) PUMA, NY has a population of 103,125 people with a median age of 42.6 and a median household income of $104,679. Between 2015 and 2016 the population of Huntington Town (North) PUMA, NY declined from 103,455 to 103,125, a 0.32% decrease and its median household income grew from $102,136 to $104,679, a 2.49% increase.
The population of Huntington Town (North) PUMA, NY is 72.4%White, 18.6%Hispanic, and 4.65%Black. 22% of the people in Huntington Town (North) PUMA, NY speak a non-English language, and 92.2% are U.S. citizens.
The median property value in Huntington Town (North) PUMA, NY is $483,500, and the homeownership rate is 81.7%. Most people in Huntington Town (North) PUMA, NY commute by Drove Alone, and the average commute time is 31.9 minutes. The average car ownership in Huntington Town (North) PUMA, NY is 2 cars per household.
Median household income in Huntington Town (North) PUMA, NY is $104,679. Males in Huntington Town (North) PUMA, NY have an average income that is 1.42 times higher than the average income of females, which is $79,297. The income inequality of Huntington Town (North) PUMA, NY (measured using the Gini index) is 0.525 which is higher than the national average.
Households in Huntington Town (North) PUMA, NY have a median annual income of $104,679, which is more than the median annual income in the United States. Look at the chart to see how the median household income in Huntington Town (North) PUMA, NY compares to that in it's parent locations.
In 2016 the highest paid race/ethnicity of Huntington Town (North) PUMA, NY workers was White. These workers were paid 1.45 times more than Asian workers, who made the second highest salary of any race/ethnicity.
This chart shows the race- and ethnicity-based wage disparities in the 5 most common occupations in Huntington Town (North) PUMA, NY.
In 2016, the income inequality in Huntington Town (North) PUMA, NY was 0.525 according to the GINI calculation of the wage distribution. Income inequality had a 4.24% growth from 2015 to 2016, which means that wage distribution grew somewhat less even.
7.87% of the population for whom poverty status is determined in Huntington Town (North) PUMA, NY (8,029 out of 102,042 people) live below the poverty line, a number that is lower than the national average of 14%. The largest demographic living in poverty is Female 35-44, followed by Female 55-64 and then Male 45-54.
The Census Bureau uses a set of money income thresholds that vary by family size and composition to determine who classifies as impoverished. If a family's total income is less than the family's threshold than that family and every individual in it is considered to be living in poverty.
The most common racial or ethnic group living below the poverty line in Huntington Town (North) PUMA, NY is White, followed by Hispanic or Latino and Unknown.
The Census Bureau uses a set of money income thresholds that vary by family size and composition to determine who classifies as impoverished. If a family's total income is less than the family's threshold than that family and every individual in it is considered to be living in poverty.
From 2015 to 2016, employment in Huntington Town (North) PUMA, NY grew at a rate of 1.74%, from 50,910 employees to 51,794 employees.
The most common employment sectors for those who live in Huntington Town (North) PUMA, NY, are Healthcare & Social Assistance, Educational Services, and Professional, Scientific, Tech Services. This chart shows the share breakdown of the primary industries for residents of Huntington Town (North) PUMA, NY, though some of these residents may live in Huntington Town (North) PUMA, NY and work somewhere else. Census data is tagged to a residential address, not a work address.
Insurance and Medicare coverage combined with state and county level health and safety statistics for Huntington Town (North) PUMA, NY. In New York the age groups most likely to have health care coverage are 55-64 and 55-64, men and women, respectively. The location has a 1 to N/A primary care clinician to patient ratio and a Medicare reimbursement average per patient per year of N/A. Bronx County, NY has the highest prevalence of homicides of any county in New York.
New York residents 55-64 years of age are the largest age group with Healthcare Coverage in New York. The age groups most likely to have health care coverage are 55-64 and 55-64, for men and women respectively. Nationally, 6-17 (for men) and 6-17 (for women) are the age groups most likely to have coverage.
Medicare Reimbursements per Enrollee in N/A were N/A in N/A, but N/A in N/A. These numbers represent a N/A growth during that year. Medicare Reimbursements per Enrollee in N/A are $N/A N/A the national average.
Medicare is a Federal program which provides health benefits to older Americans. This chart shows how per enrollee amounts have changed in Huntington Town (North) PUMA, NY compared to national reimburesments.
Medicare enrollees between the ages of 65 and 75 that have had treatment related to their diabetes and been categorized with the racial labels, either Black or non-Black, from the Dartmouth Atlas.
In N/A, the Medicare enrollees in N/A between the ages of 65 and 75 had N/A eye exams, N/A hemoglobin tests, and N/A lipid tests as part of their diabetes care. Here is a breakdown of each test by race as a percentage of enrollees with diabetes.
Female Medicare enrollees between the ages of 67 and 69 that have been classified with the racial labels, either Black or non-Black, from the Dartmouth Atlas.
In N/A, out of the N/A women in N/A between the ages of 67 and 69 enrolled in medicare, N/A had mammograms. This chart looks at the change in percentage of Black and non-Black Medicare enrollees who had mammograms from N/A to N/A.
West Virginia has a Opioid Overdose Death Rate (Age-Adjusted) value of 43.4, followed by New Hampshire with 35.8 and Ohio with 32.9. The following map shows all of the states colored according to their Opioid Overdose Death Rate (Age-Adjusted).
According to the 2017 County Health Rankings, Bronx County, NY has a Diabetes Prevalence value of 12.3%, the highest value of any county in New York. This represents a 16.3% decline from the previous year, which had a value of 14.7%.
The following map shows all of the counties in New York colored according to their Diabetes Prevalence.
According to the 2017 County Health Rankings, Franklin County, NY has a Adult Smoking Prevalence of 21.7%, the highest value of any county in New York. This represents a 19.2% growth from the previous year, which had a value of 18.2%.
The following map shows all of the counties in New York colored according to their Adult Smoking Prevalence.
According to the 2017 County Health Rankings, Bronx County, NY has a Homicide Deaths per 100,000 People of 8.1, the highest rate of any county in New York. This represents a 2.41% decline from the previous year, which had a value of 8.3.
The following map shows all of the counties in New York colored according to the number of Homicide Deaths per 100,000 People.
Huntington Town (North) PUMA, NY is home to a population of 103,125 people, from which 92.2% are citizens. The ethnic composition of the population of Huntington Town (North) PUMA, NY is composed of 74,632White residents (72.4%), 19,182Hispanic residents (18.6%), 4,791Black residents (4.65%), 2,709Asian residents (2.63%), and 1,086Two+ residents (1.05%). The most common foreign languages in Huntington Town (North) PUMA, NY are Spanish (13,633 speakers), Italian (1,025 speakers), and Chinese (689 speakers), but compared to other places, Huntington Town (North) PUMA, NY has a relative high number of Italian (1,025 speakers), Serbo-Croatian (249 speakers), and German (658 speakers).
In 2016, the median age of all people in Huntington Town (North) PUMA, NY was 42.6. Native-born citizens, with a median age of 42, were generally younger than foreign-born citizens, with a median age of 44. But people in Huntington Town (North) PUMA, NY are getting getting older. In 2015, the average age of all Huntington Town (North) PUMA, NY residents was 42.4.
In 2016, the most common birthplace for the foreign-born residents of Huntington Town (North) PUMA, NY was El Salvador, the natal country of 5,632 Huntington Town (North) PUMA, NY residents, followed by Honduras with 1,008 and Guatemala with 784.
When compared to other public use microdata areas, Huntington Town (North) PUMA, NY has a relatively high number of residents that were born in El Salvador. In 2016, there were 5,632 people from El Salvador living in Huntington Town (North) PUMA, NY, approximately 12.99 times more than would be expected based on national averages.
As of 2016, 92.2% of Huntington Town (North) PUMA, NY residents were US citizens, which is lower than the national average of 93%. In 2015, the percentage of US citizens in Huntington Town (North) PUMA, NY was 92.6%, meaning that the rate of citizenship has been declining in that location.
The following chart shows US citizenship percentages in Huntington Town (North) PUMA, NY compared to it's parent geographies.
In 2016, there were 3.89 times more White residents (74,632 people) in Huntington Town (North) PUMA, NY than any other race or ethnicity. There were 19,182Hispanic and 4,791Black residents, the second and third most common racial or ethnic groups.
The following bar chart shows the 8 races and ethnicities represented in Huntington Town (North) PUMA, NY as a share of the total population.
19,991 of Huntington Town (North) PUMA, NY citizens are speakers of a non-English language, which is higher than the national average of 21.1%. In 2015, the most common non-English language spoken in Huntington Town (North) PUMA, NY was Spanish. 13.2% of the overall population of Huntington Town (North) PUMA, NY are native Spanish speakers. 0.99% speak Italian and 0.67% speak Chinese, the next two most common languages.
When compared to other public use microdata areas, Huntington Town (North) PUMA, NY has a relatively high number of residents that are native Italian speakers. In 2015, there were 1,025 native Italian speakers living in Huntington Town (North) PUMA, NY, approximately 4.72 times more than would be expected based on the language's frequency in the US more broadly.
The closest comparable data for the public use microdata area of Huntington Town (North) PUMA, NY is from the state of New York.
Most common student race or ethnicity
1.White165,067
2.Hispanic or Latino42,715
3.Black or African American40,182
In 2015 the majority of students graduating from institutions in New York were White. These 165,067 graduates mean that there were 3.86 times more White graduates than the next closest race/ethnicity group, Hispanic or Latino, with 42,715 graduates.
The median property value in Huntington Town (North) PUMA, NY is $483,500, which is 2.36 times larger than the national average of $205,000. Between 2015 and 2016 the median property value increased from $477,600 to $483,500, a 1.24% increase. The homeownership rate of Huntington Town (North) PUMA, NY is 81.7%, which is higher than the national average of 63.6%. People in Huntington Town (North) PUMA, NY have an average commute time of 31.9 minutes, and they commute by Drove Alone. Car ownership in Huntington Town (North) PUMA, NY is approximately the same as the national average, with an average of 2 cars per household.
Please note that the buckets used in this visualization were not evenly distributed by ACS when publishing the data.
$104,679
Median Household Income
±$3,398
34,851
Number of Households
±486
In 2016, the median household income of the 34,851 households in Huntington Town (North) PUMA, NY grew to $104,679 from the previous year's value of $102,136.
The following chart displays the households in Huntington Town (North) PUMA, NY distributed between a series of income buckets compared to the national averages for each bucket. The largest share of households have an income in the $200k+ range.
In 2016, the median property value in Huntington Town (North) PUMA, NY grew to $483,500 from the previous year's value of $477,600.
The following charts display, first, the property values in Huntington Town (North) PUMA, NY compared to other geographies and, second, owner-occupied housing units distributed between a series of property value buckets compared to the national averages for each bucket. In Huntington Town (North) PUMA, NY the largest share of households have a property value in the $500k-$750k range.
This chart shows the households in Huntington Town (North) PUMA, NY distributed between a series of property tax buckets compared to the national averages for each bucket. In Huntington Town (North) PUMA, NY the largest share of households pay taxes in the $3k+ range.
The following chart displays the households in Huntington Town (North) PUMA, NY distributed between a series of car ownership buckets compared to the national averages for each bucket. The largest share of households in Huntington Town (North) PUMA, NY have 2 cars, followed by 3 cars.
Using averages, employees in Huntington Town (North) PUMA, NY have a longer commute time (31.9 minutes) than the normal US worker (25 minutes). Additionally, 9.4% of the workforce in Huntington Town (North) PUMA, NY have "super commutes" in excess of 90 minutes.
The chart below shows the average travel time in Huntington Town (North) PUMA, NY compared to its parent geographies. | mini_pile | {'original_id': 'ee97b42a6749de7f316c3da039c0a9e1bf7349fa9885017471add0bce83f4706'} |
Welcome Visitor: Login to the siteJoin the site
Having Read Teen Poems
Short story By: Ava Rosien
Submitted:Oct 26, 2012 Reads: 83 Comments: 14 Likes: 5
I am a new comer to Booksie; but in the short time I have been here, I have become aware of the tremendous amount of poetry written by young people. In so much of their writings I hear anguish and pain; self-loathing and self injury.
It alarms me and saddens me to know that so many teens and young adults are experiencing these feelings; apparently not sharing them with parents or seeking other adults to help them through the depression.
To take a blade and cut themselves; to think of suicide as a way out of their pain is frightening to me as a mother of three. Yet, when I read their sad stories and poems, all I can do is encourage them to keep writing and hopefully they can release the pain on paper.
I feel so useless to them; with decades of experience and wisdom that comes from a long life, this is all I offer in way of advice? There are many things I want to say to them; but fear holds back the words. I think they will see me as meddlesome or just another adult trying to tell them what to do.
So, I have decided to write this to address the issue without getting personal with one individual; perhaps if I can reach one or even two young people; I will feel less guilty about my useless responses to their works. I see comments of others saying, "That was so heartfelt…great poem!" Once again, their pain is ignored and their cry unheard.
To those young people who feel alone; or depressed, or simply confused in a relationship; please know that the feelings you have are normal; and are the unfortunate by product of growing up. I'm not making light of your feelings or your pain; it is real for you, I know that.
At your age, you feel things so intensely; partly due to the changing of your bodies and the hormones that take it over and partly due to the fact that it is all brand new to you. There is also the fact that school and peers are the largest part of your lives right now; therefore making them the single most important thing in the world to you. Acceptance and being part of a group is everything to you right now.
All of that is perfectly natural and a part of growing up. For the first time, you are making decisions on your own; and that can be scary. You give your heart to someone; trusting in a way you have never done before and when that person breaks your heart, the pain feels instant and unbearable. But know that pain will go away; and you will find another person sooner that you think.
Many kids have dysfunctional families; parents who are alcoholics; drug addicts; or who abuse or neglect them. There are extended family members; counselors, teachers and pastors out there to talk to. You do not have to go through it alone; don't be afraid to seek help from them. If you're being abused; tell someone and keep telling it over and over until you find the one person who will hear you and believe you. Most importantly, know that it is NOT your fault; and telling someone isn't a betrayal, its self survival and its the right thing to do.
Others have good and loving parents; but fear talking to them because they think their parents will think less of them; or be disappointed, angry or judgmental of them. Understand, these people brought you into the world; they love you more than anyone ever will. There is nothing you could ever do or say to make them stop loving you. If they have shown anger in the past, it is likely because they are scared, and anxious and don't understand why their child has distanced themselves from them. They are frustrated by the lack of communication between them and their child.
All it takes is opening that line of communication up; trusting they love you. Believe me; they want to help you through whatever you are going through.
In trying to become independent and making decisions on your own; you may find yourself resenting your parents for their advice or for the rules they impose on you. Those feelings are normal; but instead of being angry and screaming at them, try to relay your feelings in a calm and constructive way with them. You might be surprised at how much more freedom they allow you; if you behave in a mature way in discussing things with them. They (parents) are NOT the enemy; they are the biggest allies you have! The advice and rules are not there to make you feel like a prisoner; they are there to insure your safety and help you, in the beginning stages of decision making, to make the best choices. After time, when they see and are assured that you are making good decisions and abiding by the rules; you will gain the freedom you want.
They have been where you are now; believe it or not. They've made mistakes along the way and they want to spare you the pain of making the same mistakes in your life. The friends you choose have great Influence on you right now; whether you want to admit it or recognize it.
Your friend's; values and/or lack of values; can rub off on you; causing you to do things you might not do otherwise. You will tend to immolate the ones you admire and like; parent know that, and are concerned when your friends dress and act in a way that is not appropriate. Perhaps they are really nice and they are simply wanting attention from others, or attempting to be cool; but appearances are the thing that most people look at first, and parents know you are painted with the same brush if you are with them.
There is a medical fact that states the brain is not fully complete at your age. The part of the brain that makes us able to use logic in solving complex problems doesn't finish forming for several years yet. Even though you may feel mature right now; real maturity comes from experience and good problem solving; giving yourself time to reach this stage is so important.
As for boy/ girl relationships' they can be terrifying; confusing and generally frustrating to even grownups, so know that there will be disappointments and heartbreaks along the way. Though it seems you are alone in the pain; you are not, as many have felt it and survived it. Don't allow yourself to wallow in self pity; talk about your feelings with a best friend or someone you trust in to help you sort out the feelings you have. Know that you are a good person with alot to offer the right someone; if the person you want rejects you, then that person is the loser NOT you. There will be someone in the future who will share your compassion; and can recognize the great qualities you have.
Girls can be fickle and be lured away with the next gorgeous guy who smiles at them.That's a fact of life; they don't do it to be mean or hurtful; they are just learning to deal with attention from boys.Guys are much the same, except looking for the "score" is often more important than the girl herself to them. Not saying that both can't feel emotions such as love at your age; but more often than not, the feeling confusing you is more lust than love. Many of us don't learn that though until we have made the mistake of confusing the two. Girls are more about emotion in a relationship and boys are visual in them; therefore misunderstandings are bound to occur. Teen guy's emotions tend to be centered around things like sports and cars. Romance and talking about their feelings is not something that comes naurally to guys.Having sex, to many girls, is a silent statement of love from that boy to them. These are all things you need to know before getting into a deep and involved relationship. Love is complex at its best; for adults as well as for teens.
There's no standard formula for success in love; if there were, I'd bottle it and make millions. More songs are written about heartbreak for a reason; but don't let it stop you from looking for it; and don't let the heartbreaks that come with the search for it makeyou think of giving up on it all together.You have a whole life time in front of you.
Reading some of the writing on here, I see one disturbing trait that breaks my heart and I want to address it as best I can with those who participate in it. It is cutting; which to me is a cry for help from someone who is in such pain; they have no other way of expressing it. Some will say its an emo thing to do; other say it is a bid for attention, and some think its crazy. You're not crazy first of all; you need to know that. You're hurting and you want someone to notice your pain and do something about it.
Some feel numb; to life, to emotions, and to hope of anything good happening in their lives. They want desperately to "feel" something, anything; that they resort to inflicting pain on themselves. This practice is an act self degradation, coming from a deep low self esteem from the individual. It can and often does escalate to thoughts of suicide; which is a permanent solution to a temporary problem. That "numbness: is depression; and cutting one's self is not going to make it better.
There is nothing sadder than a young person giving up on life before he/she has lived even a fraction of it. These years of high school are only four years out of a possible life span of seventy-five to eigthty-five years of your life.You have no way of knowing what tomorrow brings; it could be that everything you are feeling at the moment will be turned around, and life will be made worth living again. You will never know though, if you do something radical and impulsive today. There are so very many days ahead; full of wonderment and joy; give yourself time to find and live those days. Again, talk to parents and let them help you; nothing is so bad that it cannot be changed for the better.
Perhaps you think that by dying people will realize what pain you were in at last; well, that is a two-sided coin. Yes, they might certainly validate your pain, but they will be plunged into the deepest darkest place of thier lives. They will be in anguish and question themselves; they will take the blame upon themselves and now you have left them with a shattered and empty life without thier child.You leave them in greater pain than you suffered.Is that really something you want to do to them?
You are special; you are cherished, and you are loved by so many people. Depression can rob you of logic and reasoning; causing irational thoughts; making you feel isolated and completely alone. That is the nature of it and many have experienced the same thoughts as you; but there is light at the end of that tunnel and there is hope to your despair.
So many of us have been where you are; we know what it's like and we have come to realize there is help available to overcome it. Please, reach out to someone; it really can make all the difference.
I am not a professional; I am just a person that has lived through many painful times; and is grateful for the friends and family that I finally let into my despair, allowing them to help set my feet on solid ground again when I could not do it for myself.
If a stranger is the only way you feel comfortable reaching out; then I offer to listen, encourage and lift your spirits in any way I possibly can. My goal will be to help you to the point where you will seek out your parent's and the love that they have waiting for you. I will not offer solutions or give advice; that is for you and your parents to do together.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.9786106944084167}", 'metadata': "{'Content-Length': '25082', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FGDCNLBA46VUIXDOOBX42HQGRKODJH4K', 'WARC-Concurrent-To': '<urn:uuid:3c96170a-b249-4c4d-b7df-9420a94a13c5>', 'WARC-Date': datetime.datetime(2015, 3, 1, 13, 3, 51), 'WARC-IP-Address': '173.231.33.115', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:P644HM6GRTOQMVMU342OCUHTELHGGSQ3', 'WARC-Record-ID': '<urn:uuid:84177796-ee07-4f06-b170-42d41aca70ed>', 'WARC-Target-URI': 'http://www.booksie.com/non-fiction/short_story/ava_rosien/having-read-teen-poems', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b6cba86c-532c-43ee-ad07-812f3052de9f>', 'WARC-Truncated': 'length'}", 'previous_word_count': '2153', 'url': 'http://www.booksie.com/non-fiction/short_story/ava_rosien/having-read-teen-poems', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05969053506851196', 'original_id': '1bd655d327e9fb40427363a3d21fc37dcb8831cc3bcafc298635550ef2236dcf'} |
Allen Park — The Detroit Lions have lost their longest tenured assistant coach.
Kris Kocurek, who had worked with the team’s defensive line since 2009, is taking the same job with the Miami Dolphins, according to wife Amy Kocurek’s Facebook page.
It was reported Tuesday night that Kocurek had been granted permission to interview with the Dolphins. The move reconnects him with defensive tackle Ndamukong Suh, who was with the Lions from 2010-14. It also reunites Kocurek with Dolphins defensive coordinator Matt Burke, who coached the Lions linebackers from 2009-13.
Kocurek was one of a handful of assistants retained from Jim Schwartz’s staff by Jim Caldwell. Only offensive assistant Evan Rothstein remains from that group.
Kocurek is the third Lions assistant to take another job this offseason. Defensive coordinator Teryl Austin made a lateral move, taking on the same role in Cincinnati. He was joined by Matt Raich, who worked as a quality control and defensive line assistant in Detroit the past four years. | mini_pile | {'original_id': '2e45ff938f28f9e87c6a0cdfcbc5cf04aeb79f1aaecd4260066ed2aa3f54bb4a'} |
Vorlage:Navigationsleiste Ortsteile von Marlow
Wikimedia-Vorlage
Vorlage:Navigationsleiste Ortsteile von Marlow ist ein(e) Wikimedia-Navigationsleiste | common_corpus | {'identifier': 'https://www.wikidata.org/wiki/Q124218127', 'collection': 'Wikidata', 'open_type': 'Semantic data', 'license': 'CC0', 'date': '', 'title': 'Vorlage:Navigationsleiste Ortsteile von Marlow', 'creator': 'None', 'language': 'Multilingual', 'language_type': 'Semantic data', 'word_count': '12', 'token_count': '46', '__index_level_0__': '17949', 'original_id': 'ee7781e618121f5a9699303f0290bb87a82fd51b11c5b21abaa34737fd2b1b06'} |
Single incision mid-urethral sling for treatment of female stress urinary incontinence.
To present the longitudinal outcomes in an observational cohort of patients who had undergone treatment of stress urinary incontinence with a single incision mid-urethral sling (MUS). A prospective, observational study of all female patients who had undergone surgical intervention with the MiniArc MUS was performed. The surgical candidates underwent history and physical examination and urodynamic testing, as indicated. Quality of life questionnaires (Urogenital Distress Inventory [UDI-6] and Incontinence Impact Questionnaire [IIQ-7]) were administered preoperatively. The salient operative data were recorded. The patients were followed up postoperatively for evidence of treatment success and adverse events. The patients completed the UDI-6, IIQ-7, and Female Sexual Function Index questionnaires at 1 and 12 months after treatment. From September 2007 to October 2008, 120 patients underwent placement of the MiniArc MUS for the treatment of stress urinary incontinence. The mean patient age was 58.4 years. The mean body mass index was 27.2 kg/m(2). The mean preoperative daily pad use was 2.4. The mean preoperative IIQ-7 and UDI-6 score was 86.58 and 62.5, respectively. Of the 120 patients, 108 (90%) completed a minimum follow-up period of 12 months. Of these 108 patients, 101 (94%) were cured/dry. The mean postoperative pad use was 0.2 (P < .001). The mean IIQ-7 and UDI-6 score was 13.32 (P < .001) and 12.5 (P < .001), respectively. The Female Sexual Function Index results demonstrated no discomfort with intercourse in 49%, occasional discomfort in 9%, and frequent discomfort in 2%. The remaining 40% of our patients were not sexually active. Our results have shown that the MiniArc MUS offers excellent outcomes that are durable at 1 year after treatment. | mini_pile | {'original_id': 'e45c0593c3c702026b87f736aa66ccba0b7861dee42428ff507c434721d12278'} |
How I Started Running at Age 45
I'm no spring chicken, slow, and prone to injury.
And I'm training for a half marathon!
While that seems like a nonsensical combination, let me back up a bit. I've tried, many times over the years, to "be a runner" with mixed results. Either pain, injury, or the busyness of life would end up sidelining me. Being married to a military guy who runs for fun like a big weirdo doesn't really help me. God bless him, he tries, but sometimes his encouragement can go something like this scenario from when I first began:
(Us running together, a term I will use loosely. Really more like me shuffling, him running ahead, realizing I'm way behind and looping back to call out a few "encouraging" words):
Me: Puff, puff, try to breathe, try to breathe...
Him: How's it going, babe?
Me: ...
Him: "You should try to breathe more deeply."
Me: pant, pant, pant
Him: "Like this.."
* demonstrates breathing deeply*
"You're huffing."
Me: Between breaths: "I wish I was huffing, it'd be a lot more fun than THIS."
Him: "What's that?"'
Me: Concentrates on imaginary point on the horizon, tries to keep from passing out.
A friend asked me recently what motivated me to try running again after all the times I've tried and failed. Thinking about it, I realized it was a combination of a couple of things: a nagging Achilles injury and seeing a photo of myself last spring.
A couple of years ago, after months in a walking cast after I'd injured my Achilles hiking, I said off-handedly to my podiatrist, Well, I guess that cuts out running, snicker-snicker-har-har.
He looked at me seriously and said to my surprise, "Absolutely not."
Darnit, there went my free pass! An avid runner himself, he went on to give me some stretches and strengthening exercises, referred me to physical therapy, and said there was no reason I couldn't run if I just realized I'd always need to baby my stubborn Achilles. Honestly, I put that in the back of my mind and was just thankful to be able to walk and hike again without pain.
Fast forward several months, past another military-mandated move and my usual emotional eating and weight gain that typically go along with any big change. About a year ago, I saw a pie-faced photo of myself and couldn't believe it was me. (While this seems to fly in the face of my recent post Why Your Life Doesn't Need a Makeover, bear with me!)
Feeling like I was unrecognizable and realizing that my typical tactics of skipping lunch and walking more were no longer cutting it on this middle-aged bod, I knew it was time to try again. And apart from appearance, I didn't like how I felt and didn't want to keep feeling that way.
So I came up with the crazy notion to start running at age 45.
It was not easy. In fact, it sucked. Thankfully, I stumbled upon Alexandra Heminsley's book, Running Like a Girl.
Even though she is much younger than me, what she described about her running beginnings--the embarrassment of running in front of other people, the physical pain, doing too much too soon, etcetc--was exactly where I found myself. When I began running, I would only run round and round my block, in my black yoga pants, and only after dark. I'd walk if I saw a car or another person approaching because I was so self conscious.
So if you're a beginner at running, no matter what your age, here are a few tips that worked for me.
Look for a community. If you know some runners in person, ask if you can pick their brains about trails, paces, and so on. I found great online communities through Facebook and Instagram as well, and their support and encouragement helped me SO much in the beginning.
Take your time. My goals were very, very small. I couldn't even run 1/4 mile without stopping for breath or to walk when I first began. So I made small goals: try to go a little further each time. Then, run a whole mile. Run a mile and a half, run two miles, and so on. This process took MONTHS and I gave myself permission to walk when I needed to or skip if I didn't feel like running. Last fall, when I surprised myself by running 5 miles one day, I suddenly realized I could probably do a 10K. So I did! I signed up for and completed the Super Woman Run through the Women's Running Community I'd discovered on Instagram.
Don't compare. I was so embarrassed to run outside, as if anyone driving by would realize how out of shape and what a bad runner I was. I also live on a military base, so there are lots of amazingly fit people. I was the lady shuffling along in an oversized tee and yoga pants. Now when I see other obviously beginner runners, the ones usually avoiding eye contact, I want to high-five them and say, "You get it, girl!" Because I realize no one was really thinking about me at all. Runners are some of the most supportive people I've come across. And let's be honest, when they're running, they're usually so focused on their own breathing, pace, or even thoughts that they aren't considering what someone else looks like. (And if they are, I just don't care anymore!)
Get the right gear. My podiatrist recommended Saucony for my foot issues, and I went through several pairs of those. Unfortunately, they stopped making my favorite shoe, and I recently jumped on the Brooks bandwagon. So far, so good! Good shoes are expensive, but so worth it. For big chested gals, I cannot recommend enough the Enell High Impact Sports Bra. These are not dainty or pretty, but I haven't found anything else that works as well.
But don't complicate it. Sure, you need good footwear and comfy clothes. That's enough to start! Don't worry about fancy water or weight belts, fuel, Garmins, or any of that right now. Just go!
Set goals. My initial goal was to be able to run a mile. Then longer. The 10K in December gave me a training goal for the fall. I've been running consistently for almost a year now, and I'll be doing my first half marathon this spring. That is keeping me from sitting on my rear too much over the winter. I know I've got to put in the miles between now and then! I'm a task-oriented, goal-oriented person, so that works for me. Running a race might not be it for you, but what might be? New shoes? A shopping day? Some other reward for getting further in your running? Figure out your own motivation and then run after it! (haha)
Embrace the suck. I am not a cute runner and I am not a fast runner. I get ridiculously red-faced and sweaty, regardless of the weather, and someone usually passes me when I'm out on the trail. BUT, if I've learned anything as a military spouse, it's that hard times come and go and to embrace the suck. When I don't fight against it, the time passes more quickly and sometimes I even forget I'm running for a mile or two! (I would not have believed this months ago).
Find encouragement. I don't know very many in-real-life runners, but there is loads of support to be found out there: podcasts, blogs, or just do a quick search on Facebook or Instagram and you'll come up with tons. A few of my favorites (I get nothing for these endorsements; these truly helped me!):
The time will pass anyway. In 6 months, will you wish you'd started now instead of putting it off? The time is going to pass anyway. Why not go ahead and give it a try!
Me after running my 10K. I toldya I get red and sweaty! I cried when I finished the 6.2 miles, as this had seemed like an impossibility such a short time before.
Here's the purty medal I got for finishing it. Yay, me!
No excuses!! This was a 20 degree day and I made myself get out there. I'm not a fan of the treadmill, and I will run on the indoor track if I need to, but I'd much prefer to be outside.
If you've thought of starting running and hesitated, I hope you will try it out. As a self-pronounced running hater in the past, I'm surprised by how much it's grown on me and how much I enjoy the solitude of running and the clear-headedness I have after. Even if you're over 40, you can do this!
Did you start running a bit later in life? I'd love to hear your tips!
This post contains some affiliate links. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9769910573959352}", 'metadata': "{'Content-Length': '101190', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3JO6PWV6JJKQN5SCSHBAH3J6EHUOF6MI', 'WARC-Concurrent-To': '<urn:uuid:600b4bb9-c989-4c69-80b1-d8e30ad5d246>', 'WARC-Date': datetime.datetime(2019, 6, 16, 3, 27, 34), 'WARC-IP-Address': '198.185.159.144', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:UJM7OGEJV5R4T6OPSRI4BNVB3UPJMXSB', 'WARC-Record-ID': '<urn:uuid:57188da1-7223-4fb6-ae38-857399db522b>', 'WARC-Target-URI': 'https://jenmcdonald.net/jen-mcdonald/2016/01/25/started-running-age-45', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e49012cb-e0a3-4a6c-838f-1c0013fe1cb3>', 'WARC-Truncated': None}", 'previous_word_count': '1451', 'url': 'https://jenmcdonald.net/jen-mcdonald/2016/01/25/started-running-age-45', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-187-26-184.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030147850513458252', 'original_id': '81ab68a317d03f15afb5e21c165075c00d27cce9ca4e39dd65eacc24f7c00470'} |
Donald Trump
Trump supporters celebrate as election returns come in at Republican US presidential nominee Donald Trump's election night rally in Manhattan, New York, US, 8 November 2016. REUTERS/Mike Segar
The presidential match-up between Democratic nominee Hillary Clinton and her Republican rival Donald Trump was hard-fought, particularly in the key battleground of Florida. The state, which boasts a large Latino population, initially appeared to be going the way of Clinton, but ultimately gifted Trump the simplest of paths to the White House.
With more than 99% of precincts reporting, Trump was declared victorious in the Sunshine State. According to The Guardian, the Republican nominee took home 49.1% of the votes compared to Clinton's 47.7%. Florida's 29 electoral votes gave Trump an important edge over Clinton and put him on the road to the key figure of 270.
However early voting in the state gave analysts a wildly different picture of who would win on 8 November. Latino voters outpaced their 2012 early voting numbers, casting about 14% of the state's 5.7 million early and absentee ballots by Friday (4 November).
Florida was not the only battleground state to go to Trump. The real estate mogul turned presidential nominee also claimed victory in North Carolina and Ohio, giving him an additional 33 electoral votes. Those wins made it nearly impossible for Clinton to claim the 270 electoral votes needed to win the general election.
At last count, Trump led 238 to Clinton's 209 electoral votes. Clinton has no clear path to victory, despite Maine, Minnesota, Nevada and Pennsylvania leaning blue. Trump, on the other hand, needs just 32 electoral votes, which he can easily win by taking home Alaska, Arizona, Michigan, New Hampshire and Wisconsin.
Trump's continued victories on his way to the White House have also caused financial markets abroad and at home to plummet. According to The New York Times, Asian markets traded sharply lower. Japan's Nikkei 225 traded down around 5.3% at the time of publishing, while China's Hang Seng traded down around 2.8%. Meanwhile in the US, Dow Jones futures dropped by as much as 600 points in after-hours trading. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9627500176429749}", 'metadata': "{'Content-Length': '149778', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PBQSCO5PLS3FICSSY4BC264IHKAT5RJW', 'WARC-Concurrent-To': '<urn:uuid:4ad891a0-0b55-4aa5-b837-6252407cadc1>', 'WARC-Date': datetime.datetime(2019, 4, 24, 5, 57, 34), 'WARC-IP-Address': '52.4.238.183', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:64FHEMCTORI7MXHLSR3JAEWRVGOMUJCF', 'WARC-Record-ID': '<urn:uuid:1884099d-7157-43f8-b318-8470a79832f5>', 'WARC-Target-URI': 'https://www.ibtimes.co.uk/trump-wins-florida-sending-global-markets-spiraling-1590581', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6d836fd4-64ee-4b05-8a8c-3a5be508ed05>', 'WARC-Truncated': None}", 'previous_word_count': '352', 'url': 'https://www.ibtimes.co.uk/trump-wins-florida-sending-global-markets-spiraling-1590581', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-143-100-67.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05567890405654907', 'original_id': '018cbf5ada20011749f4c4721e2c65e10b382c0f3c4ec91c7be76a98f569f64f'} |
Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The current practice for biometric identification is to use a single mode or multi-mode biometric methods such as: fingerprints, palm prints, face recognition, iris recognition, vein recognition, gait or other bodily characteristics. These methods have significant limitations, including unacceptable False Acceptance Rates and False Rejection Rates. Some of these methods are strongly affected by environmental lighting conditions, others by aging effects, physical conditions, cosmetics, etc. or can be easily fooled or deceived by a substitution. Most of these methods require direct human interaction, which brings additional inconsistencies and errors into the identification process. As an example facial recognition is significantly more complicated because of the size and complexity of human faces. Uncontrolled environmental factors are always associated with facial recognition, such as varying lighting conditions. Additionally, a face may appear at different scales, positions and orientations. Facial expressions significantly differ due to facial hair, make-up, tattoos and glasses. In case of fingerprints, Japanese researchers were able to lift fingerprints from glass and to fool fingerprint scanners using fake fingers made from household ingredients. Iris recognition, based on imaging and analysis of colored protein of the eye, is widely used at border control in countries such as the United States, United Arab Emirates and the United Kingdom, but strongly affected by aging.
With today's e-commerce, information-rich environment, and global computer and information networks, one of the critical needs is to ensure that only authorized individuals gain access to critical devices, restricted or confidential information, or proprietary data. With the availability of ready-to-use “sniffers” and access code (password/PIN) cracking tools, the standard password, passcodes, or PIN combinations are no longer adequate for secure personal identification and authentication. Even sophisticated users of sensitive and proprietary information networks not only fail to change their passwords or PINs, but also assign the same value to all their online access codes. For current and future information networks, it is critical to establish the most reliable security capabilities to establish identity and allow only authorized access to information assets. There is also a need for data integrity, to ensure that no unauthorized changes have been made to the sensitive, private, or restricted information; confidentiality, to restrict information or network access strictly to authorized individual(s); and nonrepudiation, to ensure authorized users do not disavow actual authorized access.
During the last decade, there has been significant demand for development of reliable biometrical authentication for security applications, i.e. verification or identification of a person by using biometrical features. The most commonly used method for authentication is the presentation of a Personal Identification Number (PIN) or a password. Significantly more reliable protection against unauthorized use can be achieved, however, via implementation of biometrical authentication applied as an addition or as an alternative to the knowledge-based authentication methods. Biometric authentication methods have the general advantage over knowledge-based methods in that it is not possible to give the biometric feature to someone else (either intentionally or unintentionally). A password can be given to another person and can be used in the same way as the legal owner, but a biometric feature can only be used by the legal owner. Static biometric features have the critical advantage that they cannot be lost or forgotten because they are always present with a person.
An ideal biometric solution must satisfy many, often competing, criteria. Accuracy is one criterion. A low false acceptance rate (FAR) is crucial to security; it is critical that unauthorized individuals are not misidentified as authorized. The FAR depends on several factors, such as the distinctiveness of the chosen biometric between individuals (essentially, its uniqueness), the ability to capture the biometric information accurately, and the ability to match it correctly. From this point of view, the iris is a good biometric; there is a high degree of randomness and complexity in iris patterns that underpins its uniqueness and distinctiveness between individuals. However, the FAR covers only one side of accuracy. The false rejection rate (FRR—incorrectly rejecting individuals who are actually authorized) also matters. Most currently used or proposed biometric identification methods present a compromise in areas of security, accuracy, practicality or resistance to forgery. | mini_pile | {'original_id': '9ee631b1aa47d0b65db1518e97d2d62ad41aae707fc6b8b8fa590bd9f80c0c39'} |
In operation, the iSCSI chimney may comprise a plurality of control structures that may describe the flow of data between an initiator and the hardware in order to enable a distributed implementation. The SCSI construct may be blended on the iSCSI layer so that it may be encapsulated inside TCP data before it is transmitted to the hardware for data acceleration. There may be a plurality of read and write operations, for example, three read operations and a write operation may be performed to transfer a block of data from the initiator to a target. The read operation may comprise information, which describes an address of a location where the received data may be placed. The write operation may describe the address of the location from which the data may be transferred. The SCSI request list 301 may comprise a set of command descriptor blocks 302, 304, 306 and 308 for read and write operations and each CDB may be associated with a corresponding buffer B4 310, B3 312, B2 314 and B1 316 respectively. The driver may be adapted to recode the information stored in the SCSI request list 301 into the iSCSI command chain 319. The iSCSI command chain 319 may comprise a set of command sequence blocks (CSBs) 320, 322, 324 and 326 and each CSB may be converted into a PDU in the iSCSI PDU chain 327, which may comprise a set of CDBs 328, 330, 332 and 334, respectively.
The iSCSI command chain CDB 320 may be utilized to send a read command to the SCSI command block 350 and simultaneously updates the TCP transition table sequence block 390 and the iSCSI request table command sequence block 364. The iSCSI request table 363 may be associated with the same set of buffers as the SCSI request list in the iSCSI upper layer. The iSCSI command chain CDB 322 may be utilized to update the iSCSI request table command sequence block 366 associated with buffer B2 314, create a header and may send out a write command to the SCSI command block 352. The iSCSI command chain CDB 324 may be utilized to send a read command to the SCSI command block 354 and simultaneously updates the TCP transition table sequence block 392 and the iSCSI request table command sequence block 368.
The data in block 372 may indicate receipt of data from the initiator and compare the received data with the data placed in the buffer B1 316 associated with the iSCSI request table CSB 364 and place the received data in the buffer B1 316. The status indicator block 374 may send a status signal to the iSCSI completion chain status block 342, which indicates the completion of the read operation and free the iSCSI request table CSB 364. The data in block 376 may indicate the receipt of data from the initiator and compare the received data with the data placed in the buffer B3 312 associated with the iSCSI request table CSB 368 and place the received data in the buffer B3 312. The status indicator block 378 may be utilized to send a status signal to the iSCSI completion chain status block 344, which indicates the completion of the read operation and free the iSCSI request table CSB 368.
When handling the iSCSI write commands, the iSCSI host driver may submit the associated buffer information with the allocated ITT to the iSCSI offload hardware. The iSCSI host driver may deal with the completion of the iSCSI write command, when the corresponding iSCSI response PDU is received. The iSCSI target may request the write data at any pace and at any negotiated size by sending the initiator one or multiple iSCSI ready to transfer (R2T) PDUs. In iSCSI processing, these R2T PDUs may be parsed and the write data as specified by the R2T PDU may be sent in the iSCSI data out PDU encapsulation. With iSCSI chimney, R2T PDUs may be handled by the iSCSI offload hardware that utilizes ITT in R2T PDU to locate the outstanding write command, and use offset and length in R2T PDU to formulate the corresponding data out PDU. The processing for the iSCSI host driver may be reduced by not involving the host driver.
The R2T block 380 may be adapted to send a R2T signal to the iSCSI data out chain block 396 with DataSn value 0, for example, which may be adapted to send a data out signal to the data out block 356 with DataSn value 0 and final F value 0, for example. The R2T block 380 may be adapted to simultaneously update the iSCSI data out chain block 396 and the iSCSI request table command sequence block 366. The iSCSI request table command sequence block 366 may compare the received data with the data placed in the buffer B2 314 and transmit the data to be written to the data out block 356. The iSCSI data out chain 395 may be adapted to record write commands being transmitted and compare it with a received R2T signal. The R2T block 380 may be adapted to send a R2T signal to the iSCSI data out chain block 398 with DataSn value 1, for example, which may be utilized to send a data out signal to the data out block 358 with DataSn value 1 and final (F) value 0, for example. The R2T block 380 may be further adapted to send a R2T signal to the iSCSI data out chain block 399, which may have DataSn value 2, for example. The R2T block 380 may further send a data out signal to the data out block 360, which may have DataSn value 2 and final (F) value 1, for example.
The iSCSI command chain CDB 326 may be utilized to send a read command to the SCSI command block 362, which may simultaneously update the TCP transition table sequence block 394 and the iSCSI request table command sequence block 370. The data in block 382 may indicate the receipt of data from the initiator and compare the received data with the data placed in the buffer B4 310 associated with the iSCSI request table CSB 370 and place the received data in the buffer B4 310. The status indicator block 384 may send a status signal to the iSCSI completion chain status block 346, which may indicate the completion of the read operation and free the iSCSI request table CSB 370. The status indicator block 388 may send a status signal to the iSCSI completion chain status block 348, which may indicate completion of the write operation and free the iSCSI request table CSB 366. When the CPU enters idle mode, the iSCSI completion chain 341 may receive the completed status commands for the read and write operations and the corresponding buffers and entries in the iSCSI request table 363 may be freed for the next set of operations.
FIG. 4 is a block diagram illustrating iSCSI offload of data over a TCP offload engine (TOE) including support for a cyclic redundancy check (CRC), in accordance with an embodiment of the invention. Referring to FIG. 4, there is shown a storage stack 400. The storage stack 400 may comprise a SCSI driver block 402, an iSCSI driver block 404, a TOE/RDMA wrapper block 410, a TCP/IP block 406, a NDIS block 408, a network driver block 412, a virtual base driver block 414, a hardware block with iSCSI digest 416 and an iSCSI chimney 418.
The SCSI driver block 402 may comprise a plurality of functional blocks, for example, a disk class driver block 218 [FIG. 2 a] and the iSCSI software initiator block 222 that may be adapted to support the use of accelerated network adapters to offload TCP overhead from a host processor to the network adapter. The iSCSI driver block 404 may comprise a plurality of port drivers that may be adapted to manage different types of transport, depending on the type of adapter, for example, USB, SCSI or Fibre Channel (FC) in use. The TCP/IP block 406 utilizes transmission control protocol/internet protocol to provide communication across interconnected networks. The network driver interface specification NDIS block 408 may comprise a device-driver specification that may be adapted to provide hardware and protocol independence for network drivers and offer protocol multiplexing so that multiple protocol stacks can coexist on the same host.
The network driver block 412 may comprise routines utilized to interface with the storage adapter's hardware and may be coupled to the NDIS block 408 and the virtual base driver block 414. The iSCSI chimney 418 may comprise a plurality of control structures that may describe the flow of data between the iSCSI driver block 404 and the hardware block 416 in order to enable a distributed implementation. The virtual base driver block 414 may comprise a plurality of drivers that facilitate the transfer of data between the iSCSI driver block 404 and the hardware block 416 via the iSCSI chimney 418. The hardware block 416 may comprise suitable logic and/or circuitry that may be adapted to process received data from the drivers and other devices coupled to the hardware block 416. The hardware block 416 may also be adapted to perform a cyclic redundancy check (CRC) to check the integrity of a block of data. A CRC character may be generated at the transmission end. The transmitting device may calculate a digest value and append it to the data block. The receiving end may make a similar calculation and compare its results with the added character and if there is a difference, the receiving end may request retransmission of the block of data.
The SCSI driver block 402 may be coupled to the iSCSI driver block 404. The iSCSI driver block 404 may be coupled to the TOE/RDMA wrapper block 410 and the hardware block with iSCSI digest 416 via the iSCSI chimney 418. The TOE/RDMA wrapper block 410 may be coupled to the virtual base driver block 414. The TCP/IP block may be coupled to the NDIS block 408 and the network driver block 412. The network driver block 412 may be coupled to the virtual base driver block 414. The virtual base driver block 414 may be coupled to the hardware block with iSCSI digest 416.
FIG. 5 is a flowchart illustrating exemplary steps for performing a SCSI read operation over a TCP offload engine (TOE) including support for a cyclic redundancy check (CRC), in accordance with an embodiment of the invention. Referring to FIG. 5, the exemplary steps begin with step 502. In step 504, the driver may send an iSCSI read command to the target. The iSCSI read command may comprise an initiated task tag (ITT), a SCSI read command descriptor block (CDB) and the length of the data stream. In step 506, the target may receive the iSCSI read command from the initiator, process it and fetch data from a storage device. In step 508, the hardware may zero copy the data to the initiator and retransmit TCP to the initiator. The data sent to the initiator may comprise an ITT, a data sequence number (DataSn) and a buffer offset value. In step 510, the initiator checks if the received data is the first frame in the protocol data unit (PDU). If not, the control passes to step 512, where the initiator checks if the buffer has been posted. If the buffer has been posted, control passes to step 514, where the hardware may utilize the accumulated digest value in a storage buffer, for example, a temporary storage buffer TEMP, and continue digest calculation.
In step 516, the hardware may process the TCP and zero copy data into an iSCSI buffer. In step 518, the final digest value may be passed to the driver. Control then passes to step 540. If the buffer is not posted, control passes to step 520, where the hardware processes the TCP. If the received data is the first frame in the protocol data unit in step 510, control passes to step 520. In step 522, the protocol data unit (PDU) may be parsed to determine the basic header structure (BHS), the additional header structure (AHS) and the payload boundaries. In step 524, the header digest for the PDU may be calculated and passed on to the driver. In step 526, the data digest for the PDU may be stored in a storage buffer, for example, a temporary storage buffer TEMP and the payload may be placed in a driver buffer.
In step 528, the driver may process the iSCSI PDU header and in step 530 the driver may check if the header digest has failed. If the header digest has failed, in step 532, a recovery procedure may be invoked. The recovery procedure may involve a set of operations to be performed in hardware and/or software to recover from an out-of-order (OOO) situation. If the header digest has not failed in step 530, then in step 534, the iSCSI header may be stripped and data may be placed in an iSCSI buffer. The hardware may strip any markers previously placed. In step 536, the iSCSI protocol may provide a buffer for the next frame in the PDU and in step 538, the driver may post the buffer to hardware. In step 540, the initiator may check if the received data frames are in the correct order. If not, in step 542, the driver may indicate an out-of-order (OOO) message and in step 544, hardware may pass a temporary digest value to driver and control then passes to end step 550. If the received data frames are in the correct order, in step 546, the target may transmit a SCSI status signal to the initiator. In step 548, the initiator may process the received SCSI status signal from the target, verify the received data and control then passes to the end step 550.
FIG. 6 is a block diagram of an exemplary iSCSI chimney on the target side, in accordance with an embodiment of the invention. Referring to FIG. 6, there is shown, an iSCSI request list 601 received from the initiator on this TCP connection, a set of buffers B1 616, B2 614, B3 612 and B4 610, each buffer, for example, B4 610 has a list of physical buffers addresses and lengths associated with it, a iSCSI command chain 619, an iSCSI PDU chain 627, an iSCSI Rx message chain 635 an iSCSI completion chain 642 in the iSCSI upper layer representing state maintained by a software driver or on HBA in some cases. Also shown in FIG. 3 is the state maintained by the hardware: an iSCSI request table 663, a set of SCSI command blocks 650, 652, 654 and 662, a set of data out blocks 656, 658 and 660, a TCP transition table 689, an iSCSI R2T chain 695, a set of data in blocks 672, 676, 678, 682, a set of status indicator blocks 674 and 688, a request to transmit (R2T) block 680 and an asynchronous message block 686 in the data acceleration layer.
The SCSI request list 601 may comprise a set of command descriptor blocks (CDBs) 602, 604, 606 and 608 received from the Initiator. The iSCSI command chain 619 may comprise a set of command sequence blocks 620, 621, 622, 623, 624, 625 and 626. The iSCSI PDU chain 627 may comprise a set of CDBs 628, 630, 632 and 634. The iSCSI message chain 635 may comprise a set of fixed size buffers 636, 638, 640 and 641. The iSCSI completion chain 642 may comprise a set of status blocks 643, 644, 646 and 648. The iSCSI request table 663 may comprise a set of command sequence blocks 664, 666, 668 and 670. The TCP transition table 689 may comprise a set of sequence blocks 690, 692 and 694 and the iSCSI R2T chain 695 may comprise a set of R2T blocks 696, 698 and 699.
The command descriptor block (CDB) 602 has an initiator task tag (ITT) value 4, corresponding to CDB4 and performs an unsolicited write operation, for example. The CDB 304 has an ITT value 3, corresponding to CDB3 and performs a read operation, for example. The CDB 306 has an ITT value 2, corresponding to CDB2 and performs a solicited write operation, for example and the CDB 308 has an ITT value 1, corresponding to CDB1 and performs a read operation, for example. Each of the CDBs 602, 604, 606 and 608 may be mapped to a corresponding buffer B4 610, B3 612, B2 614 and B1 616 respectively. Each of the buffers B4 610, B3 612, B2 614 and B1 616 may be represented as shown in block 618 with an address of a data sequence to be stored and its corresponding length. The ITT is managed by data acceleration layer on the initiator while TTT is managed by the data acceleration layer on the target. Before an iSCSI upper layer submits a R2T to the initiator, it requests the data acceleration layer for the TTT value. TTT uniquely identifies the R2T command associated with a future data out received from the initiator. TTT is chosen such that when a corresponding iSCSI PDU, for example, an iSCSI data out PDU arrives, the data acceleration layer can readily identify the entry inside iSCSI request table 663 using TTT or portion of TTT.
The iSCSI command chain 619 may comprise a set of exemplary command sequence blocks (CSBs) 620, 621, 622, 623, 624, 625 and 626. The CSB 620 has associated ITT value 1, command sequence (CmdSn) value 101, buffer B1 616 and is a read operation, for example. The CSB 621 has associated ITT value 1, and is the status response for the read operation, for example. The CSB 622 has associated ITT value 3, command sequence (CmdSn) value 103, buffer B3 612 and is a read operation along with its status, for example. The CSB 623 has associated ITT value 2, CmdSn value 102, buffer B2 614 and is a R2T corresponding to a write operation, for example. The CSB 624 has associated ITT value 4, CmdSn value 104 and is a status response for a read operation, for example. The CSB 625 is a asynchronous message, for example. The CSB 626 has associated ITT value 2, and is the Status response for the solicited write operation, for example. The iSCSI PDU chain 627 may comprise a set of exemplary CDBs 628, 630, 632 and 634. The CDB 628 has associated ITT value 1, CmdSn value 101 and read operation, for example. The CDB 630 has associated ITT value 2, CmdSn value 102 and write operation, for example. The CDB 632 has associated ITT value 3, CmdSn value 103 and read operation, for example. The CDB 634 has associated ITT value 4, CmdSn value 104 and is a read operation, for example. The iSCSI message chain 635 may comprise a set of exemplary fixed size buffers 636, 638, 640 and 641. The iSCSI completion chain 642 may comprise a set of status blocks 643, 644, 646 and 648 and may have corresponding ITT value 1, ITT value 3, ITT value 4 and ITT value 2 respectively, for example.
The iSCSI request table 663 may comprise a set of command sequence blocks 664, 666, 668 and 670. The CSB 664 with TTT value of 1 is associated with ITT value 2, CmdSn value 102, data sequence (DataSn) and buffer B2, for example. By arranging the commands in the iSCSI request table 663, the whole TTT or portion of the TTT may be chosen as the index to the entry inside iSCSI request table 663. Since only data bearing commands, R2T pointing to a data out are given TTT values, all other commands may not be addressed by the data acceleration layer saving search time and hardware resources. When a command is completed, the corresponding iSCSI request table entry may be marked as completed without re-arranging other commands. Commands 620, 622, 624 and 626 may be completed in any order. Once the iSCSI request table entry is marked completed, data acceleration layer will stop any further data placement into associated buffer.
The SCSI command blocks 650, 652, 654 and 662 has associated exemplary ITT value 1, ITT value 2, ITT value 3 and ITT value 4 respectively. The data out block 656 has associated ITT value 2, DataSn value 0 and final (F) value 0, for example. The data out block 658 has associated ITT value 2, DataSn value 1 and final (F) value 0, for example. The data out block 660 has associated ITT value 2, DataSn value 2 and final (F) value 1, for example.
The TCP transition table 689 may comprise a set of sequence blocks 690, 692 and 694. It may be corresponding to the transmit iSCSI PDU. The sequence block 690 may correspond to a sequence 2000 and length 800, for example. The sequence block 692 may correspond to a sequence 2800 and length 3400, for example. The sequence block 694 may correspond to a sequence 6200 and length 200, for example. There may not be a fixed association between a SCSI PDU and a TCP bit, and a bit may have a fixed value associated with it.
The TCP transition table 689 may be adapted to store a copy of requests sent to the iSCSI request table 663, to enable it to retransmit the TCP bits. The iSCSI R2T chain 695 may comprise a set of corresponding data out blocks 696, 698 and 699. The data out block 696 has associated TTT value 1, ITT value 2, final (F) value 0, DataSn value 0 and offset value 0, for example. The data out block 698 has associated TTT value 1, ITT value 2, final (F) value 0, DataSn value 1 and offset value 1400, for example. The data out block 699 has associated TTT value 1, ITT value 2, final (F) value 0, DataSn value 2 and offset value 2400, for example. The iSCSI R2T chain 695 may be adapted to receive a signal from the DataOut block 656 and 658, for example, compare it with previously stored data and associate it with the iSCSI Request Table 663 to find the buffer to store the payload of the DataOut right location inside buffer B2 614. Handling of R2T is done at data acceleration layer. The TTT field or portion of it of the R2T PDU 680 may be used to lookup the iSCSI Request Table 663. Request 664 may be identified and so is the associated buffer B2. Data acceleration layer may strip off the headers of the DataOut PDU 656, 658 and 660 and places them in the right offset inside buffer B2. The iSCSI request table 663 utilizes cells in the iSCSI R2T chain 695 to store the control information for pieces of data out that has been received so far. The iSCSI upper layer may not be involved in any placement of data associated with solicited data out.
The data in block 672 has associated ITT value 1, DataSn value 0 and final F value 1, for example. The data in block 676 has associated ITT value 3, DataSn value 0 and final (F) value 0, for example. The data in block 678 has associated ITT value 3, DataSn value 1, final (F) value 1 and a status signal (Status), for example. The data in block 682 has associated ITT value 4, DataSn value 0 and final (F) value 0, for example. The data in block 684 has associated ITT value 4, DataSn value 1, final (F) value 1 and a status signal (Status), for example. The status indicator block 674 has associated ITT value 1 and a status signal (Status), for example, and the status indicator block 688 has associated ITT value 2 and a status signal Status, for example. The ready to transfer (R2T) block 680 may be adapted to send a signal to the iSCSI request table block 664, for example, as 664 records the association of TTT value 1 with ITT value 2 and specific offset and length requested by the target. When the target sends out its ready to transfer (R2T) block 680, it may signal iSCSI request table 663 to help it allocate the right entry in the iSCSI request table 663. The asynchronous message block 625 may be adapted to send an asynchronous message signal to the fixed size buffer 636, for example. An unsolicited data out from the initiator may also send a signal to the iSCSI Rx Message Chain 635.
In operation, the iSCSI chimney may comprise a plurality of control structures that may describe the flow of data between a target and the hardware in order to enable a distributed implementation. The SCSI construct (e.g. for status) may be blended on the iSCSI layer so that it may be encapsulated inside TCP data before it is transmitted to the hardware for data acceleration. There may be a plurality of read and write operations, for example, two read operations, one solicited write operation and one unsolicited write operation may be performed to transfer blocks of data from the initiator to a target and vice versa. The read operation may comprise information, which describes an address of a location from which the data may be transmitted. The solicited write operation may describe the address of the location where received data may be placed. The unsolicited write operation may describe the fixed size buffer in the iSCSI Rx Message chain 635 where received data may be placed. The SCSI request list 301 may comprise a set of command descriptor blocks 602, 604, 606 and 608 for read and write operations and each CDB may be associated with a corresponding buffer B4 610, B3 612, B2 614 and B1 616 respectively. Since 602 is an unsolicited request from the initiator, the target may have not allocated any named buffer for it, so B4 610 may or may not be associated with 602. The driver may be adapted to recode the information stored in the SCSI request list 601 into the iSCSI command chain 619. The iSCSI command chain 619 may comprise a set of command sequence blocks (CSBs) 620, 621, 622, 623, 624, 625 and 626 and each CSB may be converted into a PDU in the iSCSI PDU chain 627, which may comprise a set of CDBs 628, 630, 632 and 634, respectively.
The iSCSI command chain CDB 620 may be utilized to format a Data In response to the SCSI command block 650 and simultaneously updates the TCP transition table sequence block 690. The iSCSI request table 663 may be associated with the same set of buffers as the SCSI request list in the iSCSI upper layer. The iSCSI command chain CDB 621 may be utilized to format a status reply to the SCSI command block 650 and simultaneously updates the TCP transition table sequence block 690. The iSCSI command chain CDB 622 may be utilized to format a data in response along with status reply to the SCSI command block 654 and simultaneously updates the TCP transition table sequence block 690. The iSCSI command chain CDB 623 may be utilized to update the iSCSI request table command sequence block 666 associated with buffer B2 614, create a header and may send out an R2T command in response to the SCSI command block 652. The iSCSI command chain CDB 624 may be utilized to send a Data In response to the SCSI command block 654 and simultaneously update the TCP transition table sequence block 692 and the iSCSI request table command sequence block 668.
The data in block 650 may be recorded into the iSCSI message chain 635. The driver may check the iSCSI message chain 635 and create 608 data block and allocate a buffer B1. The driver may construct 620 data block in the iSCSI command chain 619. The hardware may use the enclosed information to format a Data In PDU and send data block 672 to the initiator. When the hardware signals the driver a successful completion of transmission of data block 672, by placing a completion indication 643 into the iSCSI completion chain 642. The driver may post block 621 that triggers the hardware sending of block 674 SCSI status PDU to the initiator. The hardware may post another completion into 642 that may trigger the driver to free up the resources associated with blocks 608 and buffer 616. When the data in block 652 is received, it may be recorded into block iSCSI message chain 635. The driver in turn allocates an entry 606 in the SCSI request list 601, allocate a buffer B2 614 and ask the hardware to allocate an entry in the iSCSI request table 663. Simultaneously, the hardware may receive block 654 and post it to the iSCSI receive message chain 635. The driver acts on the command, creates entry 604 and allocates a buffer B3 612. The driver may construct 622 data block in iSCSI command chain 619. The hardware may use the enclosed information to format a Data In PDU and send 676 to the initiator. As the data may be longer than what fits in one PDU the hardware creates block 678 as well. The driver may have included in 622 an indication for the hardware to use collapsed status. The last Data In PDU may also include the SCSI status information. A completion may be posted by the hardware to 642 when the transmission is completed successfully.
At this point the hardware may send to the driver a TTT value 1, in response to its request relating to 652. The driver may now complete the operation started on behalf of reception of 652 and complete the creation of 606 and the allocation of B2 614. The driver may now post block 623 into 619 as a command for the hardware to send an R2T message to the initiator. Prior to sending the message 680, the hardware populates entry 664 in the iSCSI request table 663, using TTT value 1 as index. This entry includes the allocation of TTT value 1 to the operation and its association with the initiator parameters found in 652. Next block 680 containing the R2T PDU may be sent to the initiator by the hardware.
The initiator replies to 680, by sending 656, 658 and 660. The target uses the TTT value 1 embedded in these messages to associate them with entry 664 in the iSCSI request table 663. As each of the incoming Data Out massages may constitute a plurality of TCP segments the hardware uses 695 to store the information till the whole task with Data Out is completed. At this point the entries inside 695 may be cleared and the hardware posts a completion indication into 642.
When the data in block 662 is received, it is also recorded into 635. As the data in 662 is un-solicited no buffer may be pre allocated for it. The hardware stores the data along with the command in 635. The driver may create entry 602 and allocate a named buffer B4 610 for the data in a later time. The driver may process the PDU, copy the data in 635 into 610. The drive creates entry 624 containing SCSI Status response to be sent to the initiator. The hardware creates the data block 684 and transmits it to the initiator.
The driver may create another entry 625 that causes the hardware to send block 686 to the initiator, corresponding to the asynchronous message. Finally the completion posted on 642 for the request stored in 664 reaches the driver, the driver posts entry 626 on 619. When the hardware processes entry 626, it creates block 688 and sends it to the initiator. When the initiator acknowledges reception of 688, the hardware clears its entry 664 in the iSCSI request table 663 making TTT value 1 available for another operation.
FIG. 7 is a flowchart illustrating detailed steps involved in performing SCSI write operations on a target via a TCP offload engine (TOE) adapted to support iSCSI chimney, in accordance with an embodiment of the invention. Referring to FIG. 7, the exemplary steps may start at step 702. In step 704, a driver may send an iSCSI write command to a target. The iSCSI write command may comprise an initiated task tag (ITT), a SCSI write command descriptor block (CDB) and the length of the data requested. In step 706, the target processes the command and may allocate resources including a buffer for buffering the data. The target may reply by sending back an R2T message including the target's target transfer tag (TTT) to the initiator. In step 708, the initiator processes the R2T command and prepares the relevant data for transmission. Depending on size, data may be encapsulated in one or more PDUs and in one or more TCP segments. In step 710, the target's hardware may receive a TCP segment from the initiator. In step 712, the target hardware may check whether the TCP segment received is in order and whether it comprises the PDU header. The PDU header may be required to decode the required operation as well as to be able to delineate iSCSI header and payload in the PDU. If the TCP segment is in order then control passes to step 714. In step 714, the hardware may consult its tables for entries like 364 in the iSCSI request table 363 holding information for the TTT and ITT cited in the initiator's data out message. If the buffer is posted, control passes to step 716. In step 716, the hardware may strip the headers and zero copy the data to the pre-posted buffers. If the buffer is not posted, control passes to step 718. If the received TCP segment is not the first TCP segment in PDU, control passes to step 718. In step 718, the hardware may only perform TCP level processing. The hardware may place the payload in a temporary buffer. U.S. application Ser. No. 10/652,270 (Attorney Docket No. 15064US02) filed Aug. 29, 2003, discloses the handling of out-of-order TCP segments, and is hereby incorporated herein by reference. In step 720, the hardware may store the TCP sequence number of the next byte to be received. In case of header and/or data digest, the hardware may also calculate the digest and compare it to those stored inside the TCP segment. Since the PDU maybe longer than one TCP segment the hardware may store the partial digest results and continue the computation when the next in order TCP segment containing the continuation of the current PDU is received. Control is then passed to step 728. In step 728, it may be determined whether this was the last segment in this PDU, as may be determined by its length. If this was not the last segment in the current PDU control passes to step 730. If this was the last segment in the current PDU, control passes to step 732. In step 732, the target transmits a status reply to the initiator based on the iSCSI protocol. In step 734, the initiator may receive the status reply and verifies that all data written is acknowledged. In case there are more TCP segments that are part of this write command that have not been received yet, in step 728 control passes to step 730 waiting for another segment to be received and continues until the next TCP segment is received. Control then passes to end step 736.
Certain embodiments of the invention may be found in a method and system for performing SCSI read operations with a cyclic redundancy check via a TCP offload engine. Aspects of the method may comprise receiving an iSCSI read command from an initiator. Data may be fetched from a buffer based on the received iSCSI read command. The fetched data may be zero copied from the buffer to the initiator and a TCP sequence may be retransmitted to the initiator. A digest value may be calculated, which may be communicated to the initiator. The calculated digest value may be the cyclic redundancy check value. An accumulated digest value stored in a temporary buffer may be utilized to calculate a final digest value, if the buffer is posted. The retransmitted TCP sequence may be processed and the fetched data may be zero copied into an iSCSI buffer, if the buffer is posted. The calculated final digest value may be communicated to the initiator.
The retransmitted TCP sequence may be processed, if the buffer is not posted. An iSCSI protocol data unit may be parsed to identify additional header and a base header. The digest value for a header of the iSCSI protocol data unit may be calculated. The calculated digest value may be communicated to the initiator. The communicated calculated digest value of the header of the iSCSI protocol data unit may be placed in a temporary buffer. The zero copied fetched data may be placed into the buffer. If the calculated digest value of the header of the iSCSI protocol data unit has failed, a recovery procedure may be invoked. If the calculated digest value of the header of the iSCSI protocol data unit has not failed, the header may be stripped from the iSCSI protocol data unit and the zero copied fetched data may be placed in an iSCSI buffer. The iSCSI buffer may be allocated for next frame of the zero copied fetched data in the iSCSI protocol data unit. The iSCSI buffer may be posted to hardware. If the frames of the zero copied fetched data are not in order, an out of order message may be generated. The calculated digest value may be communicated to the initiator. If the frames of the zero copied fetched data are in order, a SCSI status signal may be communicated to the initiator. The transmitted SCSI status signal may be processed and the zero copied fetched data may be verified.
Another embodiment of the invention may provide a machine-readable storage, having stored thereon, a computer program having at least one code section executable by a machine, thereby causing the machine to perform the steps as described above for performing SCSI read operations with a cyclic redundancy check via a TCP offload engine.
In accordance with another embodiment of the invention, a system for performing a SCSI read operation via a TCP offload engine may be provided. In this regard, the system may comprise a target, for example, a iSCSI target 122 [FIG. 1] that receives an iSCSI read command from an initiator, for example an iSCSI software initiator 222 [FIG. 2 a]. At least one driver may be adapted to fetch data from a buffer based on the received iSCSI read command. The fetched data may be zero copied from the buffer to the initiator 222 and a TCP sequence may be retransmitted to the initiator 222. The at least one driver may calculate a digest value, which may be communicated to the initiator 222. The driver may be adapted to store an accumulated digest value in a temporary buffer that may be utilized for calculating a final digest value, if the buffer is posted. The driver may process the retransmitted TCP sequence and the fetched data may be zero copied into an iSCSI buffer, for example, B1 316, if the buffer is posted. The driver may be adapted to communicate the calculated final digest value to the initiator 222. The driver may process the retransmitted TCP sequence, if the buffer is not posted.
| common_corpus | {'identifier': 'US-15620605-A_2', 'collection': 'USPTO', 'open_type': 'Open Government', 'license': 'Public Domain', 'date': '2005.0', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '6623', 'token_count': '8418', '__index_level_0__': '8648', 'original_id': 'c6001568b8f22071f466929de31f04768a0155864d2d73ea1559a70ac5f6a9a6'} |
As a Libra born on October 22nd, you are characterized by your analytical mind, social nature and loyalty. While there are some people who choose to keep their thoughts to themselves, you never fail to take a chance to share your mind's inner workings. You have a gift for communication, which is reflected in your quick whit and clever observations. Your friends and family appreciate your cleverness, almost as much as they appreciate your undying loyalty.
Your sign's paired element is air and in fact, you are the only zodiac sign with a cardinal relationship with the element. Air's subtle influence is responsible for the curiosity that often stirs within you like a gentle breeze. As a self-starter, you turn your curiosity into a focused quest for knowledge and understanding. Embracing these active qualities of air will help you meet your future goals, but free yourself from the more stagnant qualities of air, which materialize in unemotional and aloof moods.
The Libra's planetary ruler is Venus, but as you were born on the last day of the third Decan, or part, of the sign, Mercury also lends you a generous helping of planetary power. As Venus is the planet of harmony, it is responsible for your social and cooperative nature. Similarly, Mercury is the planet of communication, which explains for your agile mind and gift of gab. Your unique planetary influences combine to make you more analytically focused than other Libra Decans. You will find the most satisfaction from life when you embrace your need to find meaning and understanding. Luckily, you cannot commit all your efforts to your quest for knowledge, as you also need close, loving relationships to feel complete. In love, find a partner that shares in your value of commitment, faithfulness and devotion, as this will bring you the most happiness.
While narrowing your career options down to one path may be very difficult, you are lucky enough to be naturally suited for success in numerous careers. Your analytical abilities may lead you down a career path in science, research or education. Similarly, your natural social skills and curiosity may translate well into a career in media, journalism or public relations. If the entertainment world is alluring, you may find satisfaction in entertaining others, much like Curly Howard, who was also born on October 22nd. If you are more musically inclined, look to the success of Zac Hanson, another of your celebrity birthday twins, for motivation.
The Sabian Symbol for your birthday is three mounds of knowledge on a philosopher's head. While the importance of academic knowledge is obviously important, you should not neglect your philosophical understanding. There is much spiritual meaning to be found in every day objects and situations, but it is your job to find it.
Here are a few Libra celebrities born on October 22nd and their past or present romantic connections:
Jeff Goldblum (Libra) and Geena Davis (Aquarius)
Saffron Burrows (Libra) and Alan Cumming (Aquarius)
Oct 22
October 22 is associated with Birthday Number 5
October 22 is associated with Tarot Card 4 of Wands | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '54', 'language_id_whole_page_fasttext': "{'en': 0.9632481932640076}", 'metadata': "{'Content-Length': '17994', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TCTZ26MTPWWJQSDXK7SWYSUOJ3TLV7J3', 'WARC-Concurrent-To': '<urn:uuid:e0315f97-7709-4f15-b444-b76c2a66b63a>', 'WARC-Date': datetime.datetime(2015, 3, 2, 7, 20, 51), 'WARC-IP-Address': '190.93.245.80', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LZBRIZZ5EIIKSQAPJ2RJC37LLN2LPJME', 'WARC-Record-ID': '<urn:uuid:696c8a8f-db37-4f5a-bd7a-244ed4b5c54e>', 'WARC-Target-URI': 'http://www.famousbirthdays.com/horoscope/october22.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4a200b61-1bb2-4000-b6d9-905dac284525>', 'WARC-Truncated': 'length'}", 'previous_word_count': '511', 'url': 'http://www.famousbirthdays.com/horoscope/october22.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02299422025680542', 'original_id': '6fad2ba8180a111abc556b12a80537e3bcf555ad343994e68ef5cb173dcab9b5'} |
Macedonian Americans (Multicultural America:)
After 1945, most Macedonian immigrants arrived from Yugoslavia and Greece. Earlier immigrants came from the western region of the Balkan peninsular. The identification of immigrants as is confusing, because immigrants prior to World War II identified themselves Bulgarians or Macedonian Bulgarians. The confusion reflects several changes of the geographic boundaries of Macedonia, a country in the former Yugoslavia that was originally the ancient kingdom of Philip and Alexander the Great. Macedonia is generally defined as the region bounded on the south by the Aegean Sea, Mount Olympus, the Viatritsa River and the Pindud Mountains; on the north by the Sar, Osogovske, and Rila Dagh mountains; on the east by the Rhodope Mountains and the Mesta River: and on the west by Lake Ohrid, the Drin River and the Korab Mountains.
Macedonian Americans settled in the industrial center of the north, such as Ft. Wayne, Indiana, where the wedding of "Immigrant Macedonian Wedding" takes place. Other industrial centers with significant Macedonian populations include New York, Michigan, Ohio, Illinois, Pennsylvania, Wisconsin, Washington and Missouri. Some Macedonian Americans also settled in California. Cities such as Detroit, Chicago, Cleveland, Cincinnati and Syracuse have established communities of Macedonian Americans. Since the 1950s, immigrants from Yugoslavia's Socialist Republic of Macedonia sought to...
(The entire section is 9705 words.)
Want to Read More?
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '8', 'language_id_whole_page_fasttext': "{'en': 0.9266321063041688}", 'metadata': "{'Content-Length': '25420', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:54WKBHAU7KH3OLQOL4J7ALJAL34QURNT', 'WARC-Concurrent-To': '<urn:uuid:9ab687d9-ad88-497f-aa5d-7d0a9df84196>', 'WARC-Date': datetime.datetime(2013, 12, 13, 12, 49, 14), 'WARC-IP-Address': '184.73.254.63', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:UBGHRS4O77USMOYAUYLPOPTQYDAVIR5K', 'WARC-Record-ID': '<urn:uuid:f1dc51c7-4bb7-4244-a86f-71bef53d937a>', 'WARC-Target-URI': 'http://www.enotes.com/topics/macedonian-americans', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cdc81dae-1e2d-4960-bf8b-0bf636f86bfe>', 'WARC-Truncated': 'length'}", 'previous_word_count': '234', 'url': 'http://www.enotes.com/topics/macedonian-americans', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06352877616882324', 'original_id': '331409a57c8a05f73bf848391b14c7c7944aa00b858a30c6a591682cf148b206'} |
Warren Buffett's encouraging words for America - mikeyanderson
https://medium.com/@mikeyanderson/warren-buffetts-encouraging-words-for-america-404815e323b8
======
mikeyanderson
One word sums up our country’s achievements: miraculous. From a standing start
240 years ago – a span of time less than triple my days on earth – Americans
have combined human ingenuity, a market system, a tide of talented and
ambitious immigrants, and the rule of law to deliver abundance beyond any
dreams of our forefathers. You need not be an economist to understand how well
our system has worked. Just look around you. See the 75 million owner-occupied
homes, the bountiful farmland, the 260 million vehicles, the hyper-productive
factories, the great medical centers, the talent-filled universities, you name
it – they all represent a net gain for Americans from the barren lands,
primitive structures and meager output of 1776. Starting from scratch, America
has amassed wealth totaling $90 trillion. It’s true, of course, that American
owners of homes, autos and other assets have often borrowed heavily to finance
their purchases. If an owner defaults, however, his or her asset does not
disappear or lose its usefulness. Rather, ownership customarily passes to an
American lending institution that then disposes of it to an American buyer.
Our nation’s wealth remains intact. As Gertrude Stein put it, “Money is always
there, but the pockets change.” Above all, it’s our market system – an
economic traffic cop ably directing capital, brains and labor – that has
created America’s abundance. This system has also been the primary factor in
allocating rewards. Governmental redirection, through federal, state and local
taxation, has in addition determined the distribution of a significant portion
of the bounty. America has, for example, decided that those citizens in their
productive years should help both the old and the young. Such forms of aid –
sometimes enshrined as “entitlements” – are generally thought of as applying
to the aged. But don’t forget that four million American babies are born each
year with an entitlement to a public education. That societal commitment,
largely financed at the local level, costs about $150,000 per baby. The annual
cost totals more than $600 billion, which is about 31⁄2% of GDP. However our
wealth may be divided, the mind-boggling amounts you see around you belong
almost exclusively to Americans. Foreigners, of course, own or have claims on
a modest portion of our wealth. Those holdings, however, are of little
importance to our national balance sheet: Our citizens own assets abroad that
are roughly comparable in value. Early Americans, we should emphasize, were
neither smarter nor more hard working than those people who toiled century
after century before them. But those venturesome pioneers crafted a system
that unleashed human potential, and their successors built upon it. This
economic creation will deliver increasing wealth to our progeny far into the
future. Yes, the build-up of wealth will be interrupted for short periods from
time to time. It will not, however, be stopped. I’ll repeat what I’ve both
said in the past and expect to say in future years: Babies born in America
today are the luckiest crop in history. ____________America’s economic
achievements have led to staggering profits for stockholders. During the 20th
century the Dow-Jones Industrials advanced from 66 to 11,497, a 17,320%
capital gain that was materially boosted by steadily increasing dividends. The
trend continues: By yearend 2016, the index had advanced a further 72%, to
19,763. American business – and consequently a basket of stocks – is virtually
certain to be worth far more in the years ahead. Innovation, productivity
gains, entrepreneurial spirit and an abundance of capital will see to that.
Ever-present naysayers may prosper by marketing their gloomy forecasts. But
heaven help them if they act on the nonsense they peddle. Many companies, of
course, will fall behind, and some will fail. Winnowing of that sort is a
product of market dynamism. Moreover, the years ahead will occasionally
deliver major market declines – even panics – that will affect virtually all
stocks. No one can tell you when these traumas will occur – not me, not
Charlie, not economists, not the media. Meg McConnell of the New York Fed
aptly described the reality of panics: “We spend a lot of time looking for
systemic risk; in truth, however, it tends to find us.” During such scary
periods, you should never forget two things: First, widespread fear is your
friend as an investor, because it serves up bargain purchases. Second,
personal fear is your enemy. It will also be unwarranted. Investors who avoid
high and unnecessary costs and simply sit for an extended period with a
collection of large, conservatively-financed American businesses will almost
certainly do well. As for Berkshire, our size precludes a brilliant result:
Prospective returns fall as assets increase. Nonetheless, Berkshire’s
collection of good businesses, along with the company’s impregnable financial
strength and owner-oriented culture, should deliver decent results. We won’t
be satisfied with less.
| mini_pile | {'original_id': 'd5e23ed8a4ddb6eb54fa1af39ebd59ff12a8dfb6bcb47a745ea2697a295f308a'} |
November 2010, Haiti. A large crowd gathers at a United Nations base 250 km (155 miles) north of Port-au-Prince, following reports that the Nepalese soldiers stationed there have brought with them the Cholera epidemic to the earthquake-stricken island. The 170 soldiers, serving with UN peacekeeping forces, call for help, and a special force of 21 Italian and Israeli troops responds on the scene with Armored Personnel Carriers.
Humanitarian Aid Israeli doctors on way to Japan Ronen Medzini Doctors heading to Japan following Japanese request; earlier, Israel sent Geiger counters Israeli doctors on way to Japan
"They were about to be lynched. The sights reminded me of the intifada at its worst," says Chief Superintendent Meir Namir, who headed the police delegation that stayed in Haiti for three and a half months, and received considerable praise for its achievements.
"The violence was brutal; stones, arson and shootings," he recalls. "We used crowd dispersal means and even tear gas. Even though we were only 14 Israelis, we were worth many times more. After we left, the foreign soldiers asked the force commander if he can bring more Israelis."
The police delegation that was sent to Haiti is just one example of the Foreign Ministry's efforts in recent years, which aim to increase Israel's involvement global affairs. For a state that views the UN as a hostile body, Israel's involvement in international crises is not to be taken for granted. "Forget the UN; it doesn’t matter what the gentiles say, it matters what the Jews do," Israel's first prime minister, David Ben-Gurion, famouly said. This attitude has not changed much for decades.
Israeli flag in Haiti, post-quake
So why should a nation that often has a prime spot on the UN agenda, largely under negative circumstances, associate itself with such an organization? It appears that the slogan that stands at the heart of Foreign Ministry efforts to move from separatism to involvement is "If you can't beat them, join them."
"We have reached the conclusion that the UN is not a body that makes only anti-Israeli decisions, but also does many other things," said Eviatar Manor, who heads the Ministry's International Organizations division. "There are issues such as epidemics, desertification and climate change, which the government cannot solve alone and there's a need for a global effort.
"We see the UN as an instrument to promote Israeli expertise and financial activity. It's not a crime to use the positive things that we do to enhance our 'soft power,' and show that we are not just a burden on the UN. We provide positive aspects as well."
Political 'Snakes and Ladders'
Israel's international standing is directly affected by its political actions. At times of calm, regional integration and scientific and financial achievements, Israel naturally manages to reach higher degrees of international cooperation. In times of escalating conflict and stalled negotiations, Israel grows isolated.
Within the Foreign Ministry, the phenomenon is dubbed "Snakes and Ladders." Currently, while Israel is in one of its worst political slumps, state officials are trying every measure to leverage its international initiatives to improve its global status.
"We are paying $44 million in member fees to the UN and the peacekeeping forces – 0.382% of the UN budget," says Merav Eilon-Shahar, the director of the Foreign Ministry's UN Political Affairs Department. "We are ranked 32nd out of 192 nations, and that's a lot."
According to Eilon-Shahar, Israel's investment does yield returns. Starting in 2012, Israel will be on the United Nations Development Program's executive board for the first time, and in 2013, it will join the executive board of the United Nations Children's Fund (UNICEF).
Another UN division that the Foreign Ministry has got its eye on is UN Women , an organization dedicated to gender equality and the empowerment of women. It has already been decided to pay 10 times the fees Israel currently pays for membership in the organization, in hopes of being elected for its executive board as early as 2014.
Other divisions on the Foreign Ministry's target list are UNESCO, and even the UN Security Council. Eilon-Shahar notes that six years ago Israel applied for coucil membership for 2019-2020. The elections are to be held in 2018
"The Security Council is the world's government," she says. "It is the most exclusive body."
Empowering developing nations
"Politics are like a swamp; if you're in but can't find a rope, you drown," explains Tibor Shalev Schlosser, a director at the Division for International Organizations. "Our rope is integration in the global agenda, and we are using all the leverage we have.
"In the World Health Organization, for example, we have a great reputation. A few years ago we joined the UN's international group of disaster experts who are spread around the world, ready to be called for duty. Currently, we have five such experts who are available 24 hours a day."
One of the Foreign Ministry's most significant "Ladders" is Mashav, the Center for International Cooperation. The center is one of the world's oldest bodies that provide aid to developing countries, and is considered one of the state's biggest sources of pride. Recently the Israeli team in Haiti laid the cornerstone for a new emergency room that will have both Israeli financing and technology – as per the local government's request. In fact, the Israeli delegation is one of the last to remain on the island following the earthquake that claimed the lives of over 200,000 people.
"We didn't start these activities yesterday, but in the 1950s, when Israel was still a nation that needed aid," said Mashav Deputy Director General Haim Dibon. "This is the legacy of Ben-Gurion, who said that what one has should be shared with others."
Golda Meir at women's center, '60s. (Photo: Itzik Yona)
These days, Mashav is active in almost every developing nation in the world, primarily in the fields of agriculture, irrigation, medicine and education. Mashav is also taking steps to empower women; in 1961, Golda Meir , then foreign minister, founded the Mount Carmel International Training Center, which trains women from developing nations and transitional societies to this day.
"It's important for Israel to be seen not only as the source of conflict, but as a contributor to the world," Dibon says.
The Foreign Ministry is aware that Israel's rebranding process is still in its infancy, and will take a long time to take effect. "We want to show a multifaceted state," Shalev Schlosser and Eilon-Shahar conclude.
"Beyond the conflict, which is important and should be dealt with, there are many other facets. The police officers that we sent to Haiti are an example of collective responsibility. To integrate as much as possible is in our political interest, because if we remain in the 'conflict box,' we sin against ourselves.
”We must do the most to be a nation like other nations. We no longer are the scorned kid in the corner, but sit firmly on the class seat." | mini_pile | {'original_id': 'd9f3eae6b2fef597031f90dda6fe18900d14fa8952d3430013b4e23bae5e2817'} |
\left\lbrack \begin{matrix}
U \\
V \\
\end{matrix} \right| = \left| \begin{matrix}
U \\
V \\
\end{matrix} \right\rbrack
| mini_pile | {'original_id': 'ef1f5e6388673154d7858c7c63a1d33610b2848447edd16bad95534a5604f714'} |
Little Black Number..
The sexy Little Black Dress has been a symbol of glamour and allure since Hollywood cast its first couch. So in one sense it is a good symbol to bite its hand, but wasn’t it men who ‘measured their starlets’ to squeeze them in? I might be missing a deliberate double irony here, but the abuse upon which the protest stands may have been better served by eschewing this ‘man-measured’ glamour garment?
The protest is talking for all women commonly abused in any work place, but from such a filthy rich lofty Beverley Hill of exclusive privilege and status, it rings about as sincere as a Weinstein apology.
Plastic bags fished from the sea and sown together might have made a better fit of it and would have highlighted two favoured protests in one go…That aside, Daniel Day Lewis has been fished out of exile, once again just in time for the Oscars, and in a film nobody has seen! To tickle the irony further, he is nominated for a playing a man who designs little black frocks. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9542962312698364}", 'metadata': "{'Content-Length': '39917', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TBWPCLSIN3R7NC5ZLPWLI6FFQLJXYYLO', 'WARC-Concurrent-To': '<urn:uuid:97fee0b9-d8e9-4905-830e-89e609eb950b>', 'WARC-Date': datetime.datetime(2018, 8, 18, 22, 26, 1), 'WARC-IP-Address': '139.162.255.207', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:HNSZTMFBSXX2IBWMN6NCYSV2YRBNBRTD', 'WARC-Record-ID': '<urn:uuid:0f01c441-276b-4013-934e-ad46abbd03db>', 'WARC-Target-URI': 'http://therexberkhamsted.com/little-black-number/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ef1174d5-c7a5-43fa-84db-f46505f91163>', 'WARC-Truncated': None}", 'previous_word_count': '177', 'url': 'http://therexberkhamsted.com/little-black-number/', 'warcinfo': 'isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-142-246-207.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.032602012157440186', 'original_id': '3e54a19cc84bbe87f0c0d7aeb2f86d5c1e28fb0b2cb6c0948de820bb4064e80b'} |
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou .
OF AND INTEGRALS
ADRIEN SAUVAGET
Abstract. In the 80’s H. Masur and W. Veech defined two numerical invariants of strata of abelian differentials: the volume and the Siegel-Veech constant. Based on numerical experiments, A. Eskin and A. Zorich proposed a series of conjectures for the large genus asymptotics of these invariants. By a careful analysis of the asymptotic behavior of quasi-modular forms, D. Chen, M. Moeller, and D. Zagier proved that this conjecture holds for strata of differentials with simple zeros. Here, with a mild assumption of existence of a good metric, we show that the conjecture holds for the other extreme case, i.e. for strata of differentials with a unique zero. Our main ingredient is the expression of the numerical invariants of these strata in terms of Hodge integrals on moduli spaces of curves. Contents 1. Introduction 2. Volumes and integrals of canonical classes 3. Induction formula for integrals of canonical classes 4. Large genus asymptotics References 1 7 10 16 20
1. Introduction 1.1. The Hodge bundle and its stratification. Let g and n be nonnegative integers satisfying 2g − 2 + n > 0. We denote by Mg,n (respectively Mg,n ) the moduli space of smooth (respectively stable nodal) curves of genus g with n marked points. Let π : C g,n → Mg,n be the universal curve and σi : Mg,n → C g,n the sections associated to marked points for 1 ≤ i ≤ n. The Hodge bundle p : Hg,n → Mg,n is the rank g vector bundle whose sheaf of sections is R0 π∗ (ωC g,n /Mg,n ). Its total space is the space of tuples (C, x1,..., xn, α): stable curves endowed with an abelian differential. We also denote by p : PHg,n → Mg,n its projectivization and by p : Hg,n → Mg,n the restriction of the Hodge bundle to the locus of smooth curves. The total space of the Hodge bundle is stratified according to the orders of zeros of the differential. Let μ = (k1,..., kn ) be a partition of (2g − 2). We denote by Date: July 13, 2018. 2010 Mathematics Subject Classification. 14H15, 14N10, 30F30, 30F60, 14C17. Key words and phrases. Moduli space of curves, translation surfaces, Masur-Veech volumes, Hodge integrals. H(μ) ⊂ Hg the locus of curves endowed with an abelian differential with zeros of order k1,..., kn (here the zeros are not marked). The dimension of H(μ) is 2g−1+n and the Hodge bundle is the disjoint union of the H(μ) for all partitions μ of 2g − 2. The locus H(μ) is invariant under the C∗ -action. We denote by PH(μ) its projectivization. Besides, we denote by H(μ) (respectively PH(μ)) the Zariski closure of H(μ) in Hg (respectively of PH(μ) in PHg ). The space PH(μ) is a compact (singular) DM stack that has been precisely described in [2]. In the present paper we are mainly interested in the strata H(2g − 2) of differentials with a unique zero. 1.2. Mazur-Veech Volumes. Fix g, n and μ as above. Let (C, α) be a point in H(μ). We denote by x1,..., xn the zeros of α. Consider the relative cohomology group H = H 1 (C, {x1,..., xn }, Z). The space H ⊗C provides a system of local coordinates of H(μ) at the neighborhood of (C, α) called the period coordinates. The transition maps between two such system of coordinates are given by matrices with integer coefficients. Therefore the space H(μ) is endowed with an affine structure and with a volume form ν on : in period coordinates, this volume form is the Lebesgue volume form normalized in such a way that the lattice H ⊗ (Z ⊕ iZ) has volume 1. We denote by H1 (μ) ⊂ H(μ) (respectively H≤1 (μ)) the subspace defined by Z i α ∧ α = 1 (respectively ≤ 1). 2 C The volume form on H(μ) induces a form ν1 on H1 (μ), by a disintegration of ν (see [5] for definition). The total volume of H1 (μ) for ν1 is finite (see [11] and [16]). This is the Masur-Veech volume (or simply the volume) of H1 (μ). We denote it by Vol(μ). 1.3. Siegel-Veech constants. The spaces H(μ) and H1 (μ) are endowed with an action of SL(2, R). This action is defined in period coordinates: the group SL(2, R) acts simultaneously on all coordinates. The diagonal sub-group t e 0, t ∈ R 0 e−t endows H1 (μ) with an ergodic flow with finite measure. This action lifts to the real vector bundle whose fiber at (C, α) is given by H 1 (C, R). This vector bundle is also endowed with an equivariant measure. This set-up allows to define the 2g Lyapunov exponents of the vector bundle. These 2g invariants are of the following form: λ1 ≥ λ2... ≥ λg
≥
0
≥
λg
+1 = −
λ
g ≥... ≥ λ2g = −λ1
(see [5]). We define the Siegel-Veech constant of H1 (μ) as
3 1 X ki (ki + 2) carea (μ) = 2 λ1 +... + λg −. π 12 ki + 1 ki ∈μ
Remark 1.1. This definition of carea (μ) is actually a theorem (see [5]). The SiegelVeech constant has an inner geometrical interpretation in terms of the number of families of closed geodesics of a general curve in H(μ).
VOLUMES AND SIEGEL-VEECH CONSTANTS OF H(2g − 2) 3
1.4. Intersection numbers on strata of differentials. In the present text, unless otherwise mentioned, we consider cohomology classes with rational coefficients. We use the following cohomology classes in Mg,n : • for all 1 ≤ i ≤ n, let Łi = σi∗ ωC g,n /Mg,n → Mg,n be the line cotangent line bundle at the i-th marked point. We denote by ψi = c1 (Łi ) ∈ H 2 (Mg,n ); • for all 1 ≤ i ≤ g, we denote by λi = ci (Hg,n ) ∈ H 2i (Mg,n ) (we will no longer mention Lyapunov exponents, therefore the notation λi will only stand for these Chern classes); • δ0 ∈ H 2 (Mg,n ) is the Poincaré-dual class of the divisor whose generic point is a curve with a self-intersecting node. If no confusion arises, we use the same notation for classes in H ∗ (Mg,n ) and their pull-back to H ∗ (PHg,n ) under p. We denote by L = ‰(1) → PHg,n the dual of the canonical line bundle and by ξ = c1 (L) the canonical class (beware that here canonical class does not refer to the determinant of the cotangent bundle). We recall that the splitting principle implies H ∗ (PHg,n )'H ∗ (Mg,n )[ξ]/(ξ g + λ1 ξ g−1 +... + λg ). The top cohomology group H 2(4g−4+n) (PHg,n ) is canonically identified with Q by Poincaré-duality. We consider the following intersection numbers Z ξ 2g−2+n ∈ Q. PH(μ) We will see that the intersection number We will denote by Z g ag = (−1) R PH(μ) ξ 2g−2+n vanishes if μ 6= (2g − 2). ξ 2g−1. PH(2g−2) The line bundle ‰(1) is endowed with a natural singular hermitian metric (see Section 2). In all the paper we will make the same assumption as in [9]. Assumption 1.2. There exists a desingularization
φ : X → PH(μ) such that the curvature form associated to the hermitian metric on φ∗ ‰(1) is good in the sense of [13] Under this assumption, we have the following relation between ag and Vol(2g−2). Proposition 1.3. For all g ≥ 1, we have (1) Vol(2g − 2) = 2(2π)2g ag. (2g − 1)! Remark 1.4. The assumption 1.2 should be proved soon. The authors of [2] have announced the existence of the desingularization of PH(μ). This desingularization is essentialy obtained by a refinement of the data defining the stratification of PH(μ). Besides, for a general μ, there exists a cohomology class β ∈ H 2(2g−3+n) (PH(μ), R) such that R δ ∧β 1 PH(μ) 0 carea (μ) = − 2 · R. 4π ξ∧β PH(μ) 4 ADRIEN SAUVAGET In the specific case of μ = (2g − 2), under the Assumption 1.2 the cocycle β is a multiple of ξ 2g−2 (see [9]). Therefore, if we denote by Z dg = (−1)g−1 δ0 ξ 2g−2, PH(2g−2) then we have the relation carea (2g − 2) = (2) dg. 4π 2 ag Remark 1.5. Volumes and Siegel-Veech constants are positive, therefore ag and dg are positive (this explains our sign convention). 1.5.
Statement
of the
results
. We define the following formal series X F(t) = 1 +
(2g − 1)ag t2g, g>0 ∆(t) = X (2g − 1)dg t2g, g>0 t/2. sin(t/2)
The main theorem of the paper is the following. S(t) = Theorem 1.6. For all g > 0, we have [t2g ]S(t) = (3) 1 [t2g ]F(t)2g. (2g
)
! and
[t2g−2 ]S(t) = (4) 2 [t2g ] ∆ · F(t)2g−1. (2g − 1)! (where the notation [tn ] stands for the n-th coefficient of the formal series). In particular, the above equality implies that the ag ’s and dg ’s can be computed inductively using the coefficients of S. 1.6. Asymptotic behavior for large genera. In the past few years, algebraic geometers started to study the large genus asymptotic behavior of numerical invariants associated to moduli spaces of curves. For example, M. Mirzakhani and P. Zograf identified the large genus asymptotics of the Weil-Petersson volumes (see [12]). For strata of differentials, A. Eskin and A. Zorich proposed the following conjectures. Conjecture 1.7 (see
[7]). Volumes of
strata
satisfy
4 Vol(k1,..., kn ) = (1 + 1 (μ)) (k1 + 1)(k2 + 1)... (kn + 1) where lim max |1 (μ)| = 0. g→∞ μ`2g−2 Conjecture 1.8. We have carea (μ) = where lim g→∞ max |2 (μ)| = 0. μ`2g−2 1 + 2 (μ) 2 VOLUMES AND SIEGEL-VEECH CONSTANTS OF H(2g − 2) 5
We will use the induction Formulas (3) and (4) to compute the asymptotic expansion of ag ’s and dg ’s. Then, using Formulas (1) and (2), we will deduce the following result. Theorem 1.9. For all R ≥ 1, we have (2g − 2) cR π2 24π 2 − π 4 +... + R + O Vol(2g − 2) = 1 − + 2 4 12g 288g g 1 g R+1, and carea (2g − 2) = 1 1 c0 +O − +... + R 2 4g gR 1 g R+1, where the coefficients ck and c0k lie in Q[π 2 ] and can be effectively computed. In particular conjectures 1.7, and 1.8 hold for H(2g − 2). Remark 1.10. For g ≥ 4, the space H(2g − 2) has three connected components: hyperelliptic, odd and even (see [10]). Our formulas do not separate the volumes and Siegel-Veech constants of these three components. The volume is the sum of volumes of the connected components and the Siegel-Veech constant is a mean of the Siegel-veech constants of the connected components that is weighted by the volumes. The hyperelliptic component has an explicitly computable volume and SiegelVeech constants (see [1]). We will check that the volume of the hyperelliptic component is asymptotically negligible in comparison to the total volume. It remains to separate the volumes (and Siegel-Veech constants) of the odd and even components. These are conjectured to be equivalent as g goes to infinity (see [7]).
1.7
.
Some comments on Theorem 1.9.
In [4], D. Chen, M. Möller and D. Zagier computed the asymptotic expansion of volumes and Siegel-Veech constants of strata of differentials with simple zeros: 1 60π 2 − π 4 π2 Vol 1, 1,..., 1 ∼ + +..., 1− | {z } g→+∞ 4g−1 24g 1152g 2 2g−2 and 1 1 − +.... 2 8g Therefore Conjectures 1.7 and 1.8 also hold for these strata. Their proof relies on a careful analysis of the formula of Eskin and Okounkov for volumes of strata. The main ingredient of this formula is the generating function of the number of ramified coverings of the punctured torus. These formal series are quasi-modular forms and the volumes (and Siegel-Veech constants) of strata are expressed using the asymptotic of the coefficients (see [6]). By numerical experiments, one observes that, for a fixed value of g, |1 (μ)| and |2 (μ)| are maximal for μ = (2g − 2) and minimal for μ = (1,..., 1) (see Figure 1).
carea (1,..., 1) =
We can observe that the dominating term of 1 (2g − 2) is −π 2 /12g which is twice the leading term in the expansion of 1 (1,..., 1) (the same holds for 2 ). This leads us to the following straightening of the conjecture of Eskin and Zorich (see Figure 2).
6 ADRIEN SAUVAGET 1 0.9 0.8 0.7 0.6 0.5 0.4 2 4 6 8 10 12
Figure 1. Absolute value of g.1 (μ) in function of g. The broken lines correspond respectively to μ = (2g − 2), (2, 2,..., 2), and (1,..., 1). Conjecture 1.11. The functions 1 and 2 satisfy −1 (μ) = −2 (μ) = π2 (1 + 01 (μ)), 6 dim(H(μ)) 1 (1 + 02 (μ)), 2 dim(H(μ)) where 01 and and 02 tends uniformly to 0 as g goes to infinity. g=6,7 g=8,9 g=10,11 g=12 0.9
0.8 0.7
0.6 0.5 0.4
0 0.2
0.4 0.6 0.8
1 Figure 2. Absolute value of g.1 (μ) in function of len(μ)/(2g − 2) for g = 6, 7,..., 12. In black, the graph of y = π 2 /12(1 + x). 1.8. Plan of the paper.
We will follow linearly the general strategy of the introduction. In Section 2 we show how to express the volumes of the strata H1 (2g − 2) in terms of integrals of ξ-classes. In Section 3 we prove the induction formula for the integrals of ξ-classes (Theorem 1.6). The main ingredient in this proof is the computation of the cohomlogy classes Poincaré-dual to [PH(μ)] ∈ H ∗ (PHg ) as in [15] (we will recall a simplified version of this computation here). Finally, in VOLUMES AND SIEGEL-VEECH CONSTANTS OF H(2g − 2) 7 Section 4 we analyze the asymptotic behavior of the integrals of ξ-classes to deduce Theorem 1.9. Acknowledgement. I would like to thank Dimitri Zvonkine, Martin Moëller, Dawei Chen, Xavier Blot, Siarhei Finski and Felix Janda for very useful conversations on intersection of tautological classes over spaces of differentials. I am also very thankful to Anton Zorich and Charles Fougeron for having introduced me to the topic of large-genus invariants (and for having provided tables of numerical computations that allowed me to understand part of the results of the paper). Finally, I am very grateful to Elie de Panafieu for his precious help to handle the asymptotic analysis. 2.
Volumes and integrals of canonical classes 2g 2(2π) ag for all g ≥ 1 (i.e. PropoIn this section we prove that Vol(2g − 2) = (2g−1)! sition 1.3). This identity may be known to experts. However, we could not find a reference to cite so we give the details of the proof. 2.1. The symplectic affine structure on H(2g − 2). Let g ≥ 1. Let (C, α) ∈ H(2g−2). Let x ∈ C be the unique zero of α. We have seen that a local parametrization of H(2g − 2) is given by the relative cohomology group H 1 (C, {x}, C). This space is isomorphic to H 1 (C, C). Moreover, this space contains the lattice H 1 (C, Z⊕ iZ). We choose a symplectic basis of H1 (C, Z) made of closed curves (Ai, Bi )1≤i≤g on C. With this basis, the coordinates on H 1 (C, C) are given by Z Z zAi = α and zBi = α. Ai Bi Therefore the space H(2g − 2) is endowed with an affine structure whose transition map are matrices in Sp(2g, Z). Besides, the reciprocity law defines a hermitian metric on H 1 (C, C) given by Z g i iX 0 0 (5) hα, α i = α∧α = (zAi z 0Bi − z 0Ai zBi ). 2 C 2 i=1
The lattice H 1 (C, Z ⊕ iZ) ⊂ H 1 (C, C) defines a volume form ν in H 4g (H(2g − 2), R) (normalized in such a way that the volume of a unit cube is 1). Both the volume form and the hermitian metric are independent of the choice of the basis (Ai, Bi )1≤i≤g. Now, for all R ∈ R+, we denote by H≤R (2g − 2) the space of (C, α) with ||α|| ≤ R. 2.2. Two volume forms on PH(2g − 2). Using the period coordinates we define the following volume forms. • Let us consider the complex projectivization of the space of period coordinates PH 1 (C, C). The line bundle ‰(−1) → PH 1 (C, C) is endowed with the hermitian metric h induced by the above hermitian metric h·, ·i on H 1 (C, C). This hermitian metric extends to a singular hermitian metric on ‰(−1) → PH(2g − 2). We define ω to be the curvature form associated to h in PH(2g − 2), i.e. 1 ω= ∂∂ log (h(σ)) 2iπ 8 ADRIEN SAUVAGET for any local holomorphic non-vanishing section σ of ‰(−1). With this 2-form we define νh = ω 2g−1. The form ω is a closed 2-form on PH(2g − 2). However, this form cannot be extended to a regular form on the whole boundary of PH(2g−2). Indeed, the function h is ill-defined along the divisor of pairs (C, α) with infinite area; i.e. when C has at least one non-seperating node and the form α has a pole of order exactly 1 at the two branches of this node. This obstruction is the motivation for Assumption 1.2. • The second volume form on PH(2g − 2), νe, is obtained by disintegration of ν. We have a projection map p : H(2g − 2) → PH(2g − 2) whose fibers are isomorphic to C∗. Let D ⊂ PH(2g − 2) be an open domain. Then the volume of D for νe is the total volume of p−1 (D) ∩ H≤1 (2g − 2).
Lemm
a
2.1. We have (6) νh = − (2g − 1)! dimR (H(2g − 2))e ν. 2(2iπ)2g
Proof. Let us fix a point (C, α) ∈ H(2g − 2) (respectively in PH(2g − 2)). An open neighborhood of this point is of the form is of the form U/Aut(C, α) for some open set U in H 1 (C, C) (respectively in PH 1 (C, C)). This open set is included in the positive cone C = {v ∈ H 1 (C, C), s.t. h(v) > 0} (respectively in PC). The volume forms νh and νe can be defined on PC and we will prove that the relation (6) holds in PC. In H 1 (C, C) we have the coordinates (zAi, zBi )1≤i≤g obtained from the symplectic structure on C. We introduce the following coordinates 1 zai = (zAi − izBi ), 2 1 zbi = (zAi + izBi ). 2 With these coordinates, the hermitian metric h is given by h(zai, zbi ) = g X zai z ai − zbi z bi i=1 and it has signature (g, g). We will also consider the standard metric on H 1 (C, C) given by g X hst (zai, zbi ) = |zai |2 + |zbi |2. i=1
Using this hermitian metric, we can define the curvature of ‰(−1) on PH 1 (C, C) using the Laplace-Beltrami operator and the top intersection of this form νst. Besides one can also construct νest by the same procedure as νe. The volume forms νst and νest are proportional (see [17], Chapter 3 for example). Let us define the two following functions on PH 1 (C, C) with value in R>0. νe νh, and fe =.
νst νest
We have two groups U (g, g) and U (2g) (for the standard metric) acting on PH 1 (C, C). The functions f and fe are invariant under the action of γ ∈ U (g, g) ∩ f= VOLUMES AND SIEGEL-VEECH CONSTANTS OF H(2g − 2) 9 U (2g). Indeed νh is U (g, g)-equivariant and νst is U (2g)-equivariant thus f is invariant under U (g, g) ∩ U (2g). Besides the function fe is equal to 2g h(v) fe(v) = hst (v) for any vector v 6= 0 which is invariant under the action of U (g, g)∩U (2g). Therefore νh /e ν is invariant under the action of U (g, g) ∩ U (2g). The group U (g, g) ∩ U (g) contains the matrices of the form U 0, with U and U 0 in U (g). 0 U0 For all a and b in R≥0, these matrices act transitively on the subspace ( ) g g X
X H
1 (C, C)
⊃
Ea
,b
= (za
1
, zb1,...), |zai |2 = a and |zbi |2 = b. i=1 i=1
Therefore, we only need to compare the volume forms νh and νe at the points of the form (za1, zb1, 0, 0,..., 0). We consider the chart Ua1 ⊂ PH 1 (C, C) defined by za1 6= 0 with its natural identification Ua1'C2g−1. The line bundle ‰(−1) has a natural section σa1 over Ua1 given by σa1 (zb1, za2, zb2,...) = (1, zb1, za2, zb2,...). In this chart, the volume form νe is given by 2(2π) i2g−1 dimR (H(2g − 2)) · h(σa1 )2g! dzb1 ∧ dz b1 ∧ Y (dzai ∧ dz ai ∧ dzbi ∧ dz bi ).
i>1
Note the factor 2 in this formula, it comes from the choice of coordinates (zai, zbi ): in coordinates (zAi, zBi ) the expression of νe is the same without this factor 2. At the point (1, zb1, 0,..., 0), the 2-form ω is given by P
1
(1
− |zb1 |2 ) −dzb1 ∧ dz b1 + i>1 dzai ∧ dz ai − dzbi ∧ dz bi − |zb1 |2 dzb1 ∧ dz b1 ω= 2iπ (1 − |zb1 |2 )2 P 1 dzb1 ∧ dz b1 i>1 dzai ∧ dz ai − dzbi ∧ dz bi = −. 2iπ h(σa1 ) h(σa1 )2 We get νh = (2g − 1)! g · (−1) (2iπ)2g−1 h(σa1 )2g = −! dzb1 ∧ dz b1 ∧ Y (dzai ∧ dz ai
∧ dzbi ∧ dz bi ) i>1 (2g − 1)! dimR (H(2g − 2))e ν. 2(2iπ)2g End of the proof of Proposition 3.9 under the assumption 1.2. Let φ : X → PH(2g− 2) be a desingularization of PH(2g −2) such that the hermitian metric on φ∗ (‰(1)) R ∗ 2g−1 is good. Then the intersection number X φ (ξ ) is equal to the total volume of PH(2g − 2) for νh = ω 2g−1. Now using the projection formula and the fact that φ is birational (thus of degree 1) we get Z ξ 2g−1 = νh (PH(2g − 2)). Therefore Propostion 3.9 follows from Lemma 2.1.
3. Induction formula for integrals of canonical classes
Let Z = (k1,..., kn ) be a vector of non-negative integers. From now on in the text, for all vectors of integers we set `(Z) = length(Z) and |Z| = n X ki. i=1 Definition 3.1. The projectivized marked stratum of type Z is the locus Ag (Z) ⊂ PHg,n defined as {(C, α, x1,..., xn ), s.t. xi is a zero of order ki for all 1 ≤ i ≤ n}. It is a smooth substack of PHg,n codimension |Z|. We denote by Ag (Z) the Zariski closure of Ag (Z) in PHg,n. Note that in this definition Z does not need to satisfy |Z| = 2g − 2. However, if |Z| = 2g − 2, then we have Z Z 1 ξ 2g−2+n [PH(Z)] = ξ 2g−2+n [Ag (Z)] |Aut(Z)| PHg PHg,n where Aut(Z) is the group of permutation of [[1, n]] preserving Z (this follows from the projection formula). The purpose of this section is to compute the intersection number on the right-hand side. 3.1. Vanishing for n > 1.
First let us recall the following classical result. Lemma 3.2 (Mumford, [14]). We have the following equality in H ∗ (PMg,n ): ∨ s∗ (Hg,n ) = c∗ (Hg,n )−1 = c∗ (Hg,n ) where s∗ and c∗ stand for the total Segre and Chern classes. In particular λ2g = 0. We use this identity here to simplify the computation of ξ 2g−2+n [Ag (Z)]. The class [Ag (Z)] is equal to 2g−2 X ξ 2g−2−k αgk (Z) k=0 k where the classes αg (Z) are pull-back from H 2k (Mg,n ). Therefore the push-forward of ξ 2g−2+n [Ag (Z)] under p is given by 2g−2 X sg−1+n+k αgk (Z) = k=0 2g−2 X (−1)g−1+n+k λg−1+n+k αgk (Z) k=0 (this follows from the projection formula and Lemma 3.2). However λ2g−2+n+k = 0 for 2g − 2 + n + k > g. Therefore we get Proposition 3.3. The class ξ 2g−2+n [Ag (Z)] vanishes if n > 1. For n = 1 we have: Z Z ξ 2g−1 [Ag (2g − 2)] = (−1)g λg α
g
0 (Z).
PHg,1 Mg,1 VOLUMES AND SIEGEL-VEECH
CONST
ANTS OF H(2g − 2)
11 3.2.
λg
-
Con
je
cture.
We recall the
following
important result
of
Faber and Pandharipande. R Proposition 3.4 (λg -conjecture
, [8]
).
Let bg = Mg,1λg ψ12g−2. Then we have bg = 22g−1 − 1 |B2g |, 22g−1 (2g)! where B2g is the (2g)th Bernouilli number. In particular, we have S(t) = 1 + X bg t2g g>0 t/2 ). (where we recall that S(t) = sin(t/2) 3.3. Stable differentials. The main tool to prove Theorem 1.6 will be the induction formula established in [15] to compute the cohomology classes [Ag (Z)] in H ∗ (PHg,n ). We will state a simplified version of this induction formula because we only need to compute the class λg αg0 (Z) ∈ H ∗ (Mg,n ). The notation of the present text will also be slightly lighter than the one of [15]. Definition 3.5. Let P = (p1,..., pm ) be a vector of positive integers. The space of stable differentials Hg,n,P is the space whose geometric points are tuples (C, x1,..., xn+m, α) where • (C, x1,..., xn+m ) is a pre-stable curve (i.e. a nodal curve with distinct marked points in the smooth locus); • α is a meromorphic differentials with poles of order (pi + 1) at xn+i for all 1 ≤ i ≤ m; • there are finitely many automorphisms of C preserving α. Let p : Hg,n,P → Mg,n+m be the forgetful map of the differential. The space Hg,n,P is naturally equipped with a structure of cone over Mg,n+m. In particular it has a projectivization PHg,n,P. The rank of this cone is m + |P | + g − 1 (if P is not empty). Definition 3.6. Let Z = (k1,..., kn ) be a vector of non-negative integers. We denote by Ag (Z, P ) ⊂ PHg,n,P the locus of differentials with zeros of order ki at xi for all 1 ≤ i ≤ n and residues equal to zero at the poles . We denote by Ag (Z, P ) its Zariski closure. Later, we will need the following lemma in genus 0. Lemma 3.7. We suppose that g = 0 and Z = (k). If k + 1 6= |P |, then we have p∗ A0 ((k), P ) = 0 ∈ H ∗ (M0,m+1 ). If k + 1 = |P |, then this class is equal to 1 ∈ H 0 (M0,m+1 ). Proof. The locus A0 ((k), P ) is of codimension k + m − 1 in PH0,1,P which is of relative dimension m + |P | − 2 over M0,1+m. Thus the class p∗ [A0 ((k), P )] vanishes if k + 1 < |P |. Besides, any meromorphic differential without residues on a genus 0 curve is exact. In other words any such differential can be integrated to get a meromorphic function of degree d = |P |. Thus A0 ((k), P ) is empty if k − 1 > d = |P |. Finally, if k−1 = |P | then p∗ [A0 ((k), P )] = 1. Indeed, for every curve in M0,1+m there exists exactly one differential up to scale with a zero of order k at x1 and poles (without residue) of orders prescribed by P at the other marked points: it is the derivative of the function 1 (z − zi+1 )pi i=1 Qm (the first marked point has coordinate z1 = ∞). 3.4. Twisted graphs.
Let m be a positive integer. We denote by Part(g)m the set of vectors g = (g0, g1..., gm ) of nonnegative integers such that |g| = g and gi 6= 0 for all 1 ≤ i ≤ m. Given such vector g = (g0, g1..., gm ) we denote by Hg ⊂ Hg,1 the space of tuples (C, x1, α) such that: • the dual graph of C is the following g1 g2... gm g0 and the marked point x1 lies on the component of genus g0. • α is identically 0 on the component of genus g0 and non identically 0 on all the other ones. We denote by Hg the closure of Hg. We introduce the following space H
g = Hg0,m+1 × m Y Hgi,1 and Mg = Mg0,m+1 × j=1 m Y Mgi,1. j=1
We have two natural gluing maps ζg : Mg → Mg,1 and ζg# : Hg → Hg,1 (in fact the space Hg is the pull-back of the Hodge bundle under ζg ). Now, we fix a choice of g = (g0, g1..., gm ) ∈ Part(g)m and an integer k ≥ 0. Definition 3.8. A twist for the pair (g, k) is a
vector
I = (i1
,
...
, im )
of
positive integers such that k ≥ g0 − 1 + |I|.
The
multiplic
ity
m(I)
of the
twist I
is the product
of
its
entries. Given g, k, and I we construct the locus Ag,k,I ⊂ PHg of tuples (C, x1, α) such that: • the differential α has a zero of order (ii − 1) at the node of the component of genus gi for all 1 ≤ i ≤ m; • the component C0 of genus g0 of the curve lies in p(Ag0,(k),I ) where p : Hg,1,I → Mg,1 is the forgetful map (i.e. in the image of differentials with poles prescribed by I at the nodes and a zero of order k at the marked point). We denote by Ag,k,I the Zariski closure of Ag,k,I in PHg,1. g Proposition 3.9 ([15], Proposition 3.21). The Poincaré-dual class of Ag,k,I is equal to m Y # ∗ (ξ g0 + λ01 ξ g0 −1 +... + λ0g ) · ζg∗ p p∗ [Ag0,(k),I ], [Agj (ij − 1)] 0 j=1 where λ0i = p∗ (ζg∗ (λi, 1, 1,..., 1)) (we recall that ζg∗ goes from the cohomology ring | {z } Nm H ∗ (Mg )'H ∗ (Mg0,m+1 ) j=1 H ∗ (Mgj,1 ) to H ∗ (Mg,n )).
m
× 0 We denote by αg,k,I ∈ H ∗ (Mg,1 ) the degree 0 coefficient (in ξ) of Ag,k,I. The 0 above lemma implies the following expression for αg,k,I.
Lemma 3.10. The following equality holds in H 2k+2 (Mg,1 ):
m Y 0 αg,k,I = ζg ∗ λg0 p∗ [Ag0,(k),I
],
αg0j (ij − 1). j=1 0 = 0
if g0 6= 0. As a consequence λg · αg,k,I Proof. The first part of the lemma follows from Proposition 3.9. The second part is a consequence of the decomposition Y m λg · ζg∗ (1,..., 1) = ζg∗ λgj. j=0 Indeed, this implies the equality (7) 0 λg · αg,k,I = ζg∗ λ2g0 p∗ [Ag0,(k),I ], m Y λgj αg0j (ij − 1). j=1 Now the second part of the lemma follows from Lemma 3.2: the class λ2g0 = 0 if g0 > 0. 3.5. Induction formula for ag ’s. The main tool to compute the ag ’s and dg ’s is the following proposition. Proposition 3.11 ([15], Theorem 4). For all g, k ≥ 0, the following equality holds in H ∗ (Mg,1 ): X 1 X X 0 , (8) (k + 1)ψ1 · αg0 (k) = αg0 (k + 1) + m(I)αg,k,I m! m≥1 g∈Part(g)m I where the right hand sum runs over all g and all possible twists for the pair (g, k) as in Definition 3.8. Remark 3.12. Note that our definition of twisted graph only includes trees with a unique vertex where the differentials vanishes identically. In the induction formula of [15] the set of twisted graphs is larger (bicolored graphs). However, bicolored graphs that are not trees do not contribute to the degree 0 part of the induction. Indeed the cohomology class associated to any bi-colored graph Γ is of the form ξ b1 (Γ) a0 with a0 ∈ H ∗ (Hg,1 ) where b1 (Γ) is the number of loops of Γ. The induction formula of Propostion 3.11, together with Lemmas 3.4 and 3.10 implies Theorem 3.13. We have
bg = X k≥1 1 k!(2g − k)! X k Y d1 +...+dk =g (2dj − 1)adj . j=1
Remark 3.14. This theorem is a reformulation of Formula (3) of Theorem 1.6. Let us outline the strategy of the proof. • The starting point of the proof is the induction formula of Proposition 3.11 for the classes αg0 (k): for all k, we multiply this formula by λg to reduce the summation on the RHS. • Then we identify the numerical contribution of each term in the reduced sum for all k. • We conclude by summing the contributions for all values of k between 0 and 2g − 3. R Proof. We have seen that ag = Mg,1 λg αg0 (2g − 2). Thus we begin by multiplying equation (8) by λg to obtain (k + 1)ψ1 · λg αg0 (k) = λg αg0 (k + 1) + (9) X g,I,g0 =0 m(I) 0 λg αg,k,I, (`(g) − 1)! where the right-hand sum runs over all g with g0 = 0 and all possible twists. Indeed Lemma 3.10 implies that the terms with g0 6= 0 vanish. Therefore we need to compute the intersection numbers Z 0 ψ12g−3−k λg αg,k,I. Mg,1 We have seen (Formula (7)) that 0 = ζg∗ p∗ [A0,(k),I ], λg · αg,k,I m Y λgj αg0j (ij − 1).
j
=1 Besides the class p∗ [Ag0,(k),I ] is equal to 1 if k + 1 = |I| and 0 otherwise. Therefore, if k + 1 = |I| we have ! m Z Z Z Y 2g−1−k 2g−3−k 0 ψ1 λg αg,k,I = ψ1 × λgj αg0j (ij − 1). Mg,1 M0,m+1 j=1 Mgj,1 For all 1 ≤ j ≤ n, the class λgj αg0j (ij − 1) is not in top degree if ij − 1 6= 2gj − 2 thus we get Z 0 if ij − 1 6= 2gj − 2 0 (10) λgj αgj (ij − 1) = g0 (−1) a otherwise. g0 Mg,1 j Therefore for all g with g0 = 0, we denote by I(g) the twist (2g1 − 1, 2g2 − 1,..., 2gm − 1). Finally, the string equation implies that M0,m+1ψ12g−3−k = 1 if 2g −3−k = m−2 and 0 otherwise. Thus we set m = 2g − 1 − k and we multiply equation (9) by ψ1m−2 to obtain X 1 0 m(I(g))λg ψ1m−1 αg,k,
I
(
g
)
ψ1m−2 λg (k + 1)ψ1 αg0 (k) − αg0 (k + 1) = m! g∈Part(g)m g0 =0 g m Y (−1) (2gj − 1)agj . m! g +...+g =g j=1 = X m 1
Finally we get
(2g − 2)!ψ12g−2 λg = ag + X (2g − 2)(2g − 3)... (2g − k + 1) X k Y k! k>1 g1 +...+gk =g (2gj − 1)agj. j=1 This implies ψ12g−2 λg = X k>0 k Y X 1 (2gj − 1)agj . k!(2g − k)!g +...+g =g j=1 1 k
We use Proposition 3.4 to conclude
bg = X k>0 k Y X 1 (2gj − 1)agj . k!(2g − k)!g +...+g =g j=1 1 k
3.6. Induction formula for the dg ’s. First let us recall that λg · δ0 = 0 (see [14] for example). Besides, we have the following equality Z Z 1 1 δ0 · λg−1 ψ12g−2 = λg−1 ψ12g−2 = bg−1 2 Mg−1,3 2 Mg,1 P2g−2 (see [8] for example). Moreover, if we still denote [Ag (2g − 2)] = k=0 ξ k αk then we have Z Z (−1)g−1 δ0 λg−1 α0. ξ 2g−2 δ0 = Ag (2g−2) Mg,1 Using these equalities, we can prove the following theorem (which is equivalent to Formula (4) in Theorem 1.6).
Theorem 3.15. For
all
g > 0, we have 0
g g−g X
X
bg−1 =
2 0 g =1 k=0 0 (2g − 1)dg0 k!(2g − 1 − k)! Y (2gi −
1)
agi g1
+
...
+gk =g−g 0 . Proof. We follow the same strategy as in the proof of Theorem 3.13: we will multiply the induction formula of Proposition 3.11 by λg−1 δ0 and then identify the numerical contributions of the sum in the RHS. First we fix some g ∈ Partm (g). We recall that we have (δ0 λg−1 ) · ζg (1,..., 1) = m X ζg (λg0,..., δ0 λgj −1,..., λgm ). j=0 Now we fix k ≥ 0 and a twist I for g. We study the intersection number 0 ψ12g−3−k δ0 λg−1 αg,k,I. By the same arguments as before, this intersection number vanishes if g0 6= 0, or if I 6= I(g), or if 2g − 3 − k 6= m − 2. Besides if g0 = 0, I = I(g), and m = 2g − 1 − k then m X Y 0 = ψ12g−3−
k δ
0
λg−1 αg
,
k
,
I
(2
gj − 1)dgj (2gj 0 − 1)agj0
.
j 0
6=
j j
=1 Thus, using the induction Formula (8) for the classes αg0 (k) we get
ψ1m−2 δ0 λg−1 (k + 1)ψ1 αg0 (k) − αg0 (k + 1) m Y X X 1 (2gj 0 − 1)agj0 (2gj − 1)dgj = m!g +...+g =g j=1 0 j 6=j 1 m g m Y X X 1 (2gj − 1)agj , = (2gj − 1)dgj (m − 1)! 0 0 j=1 g =1 g1 +...+gm−1 =g−g
if m = 2g
−
k
−
1. Therefore, if we sum over all 0 ≤ k ≤ 2g − 3, then we get
(2g
− 2)!
ψ12g−2 δ0 λg−1 = dg + X k>0 1≤g 0 ≤g k X Y (2g − 2)! (2gj − 1)agj. (2g 0 − 1)dg0 (k)!(2g − k − 1)! g +...+g =g j=1 1 k
Finally we use the equality ψ12g−2 δ0 λg−1 = bg−1 /2 to conclude.
4. Large genus asymptotics
In this section, we prove Theorem 1.9 using the induction formulas (3), and (4) and the relations (1) and (2). First, let us recall that the Euler-Maclaurin formula gives the following expression for absolute values of Bernouilli numbers ∞ X 2(2g
)! |B2g | = (4k + 1)−2g. (1 − 2
−g
)
π
2
g
k
=
−∞
∗
∗ Therefore, for all R ∈ N and for all i ∈ N we have 2i−1 Y (2π)2g 1 (2g)!bg 1 2i (11) bg = 1+O, and = (2π) (2g−j)+O R 2 gR (2g − 2i)!bg−i g j=0 In particular the dominating term in the right hand side is a polynomial in Q[π 2 ][g]. Theorem 1.9 is a consequence of the following lemma. Lemma 4.1. For all R ∈ N, we have
(2g)!bg = (2g − 1)!bg−1 = R X (2g)!bg (1), cg,i (2g − 2i − 1)ag−i + O g R+1 i=0 R R X X (2g − 1)!bg−1 (2) (3) cg,i (2g − 2i − 1)dg−i + cg,i (2g − 2i − 1)ag−i + O g R+1 i=0 i=1 (i) (the last sum is 0 if R = 0) where Qg (x) = x defined by (i) k k≥0 cg,k x are the formal series in P Q(1) g (x) = 2gF(x)2g−1, Q(2) g (x) = 2F(x)2g−1, Q(3) g (x) = 2(2g − 1)∆(x)F(x)2g−2. End of the proof of Theorem 1.9 under the assumption of Lemma 4.1. The formal (2) (1) (i) series Qg have coefficients in Q[g]. Besides, we have cg = 2g and cg = 2. We fix R ≥ 0. For all 0 ≤ k ≤ R we have (12) (2g − 2k)
!bg−k
= R−k X i=0 (13)(2g − 2k − 1)!bg−k−1 = R−k X (2g)!bg g R+1
(2
g − 1)!bg−1
g R
+1
(1) cg
−
k
,
i
(2(g − k − i) −
1)ag
−
k
−i + O,
(2)
cg−k,i (2(g − k − i) − 1)dg−k−i i=0 + R−k X i=1 (3) cg−k,i (2(g − k − i) − 1)ag−
k
−
i + O. The first set of equations (12) implies that the vector ((2g − 2k)!bg−k )0≤k≤R−1 is the image of the vector (ag−k )0≤k≤R−1 under an upper triangular matrix with R+1 coefficients in Q[g] modulo a term in O (2g)!bg /g. The coefficients on the diagonal of this matrix are equal to (2g − 2k)(2g − 2k − 1) for all 0 ≤ k ≤ R − 1. Therefore this linear system has an inverse in the space of matrices with coefficients in Q(g): R−1 X (1) (2g)!bg ag = e cg,i (2g − 2i)!bg−i + O. g R+1 i=0 Now we use the asymptotic behavior of the bg given in (11) to obtain 2(2g − 2)! π2 24π 2 − π 4 cR 1 ag = 1− + +... + R + O (2π)2g 12g 288g 2 g g R+1 where the coefficients ck lie in Q[π 2 ]. Using Proposition 1.3, we deduce the first part of Theorem 1.9. Now to compute the asymptotic expansion of the Siegel-Veech constants we (2) turn to the second set of linear equations. Once again the coefficients cg−k,i define a triangular matrix with coefficients in Q[g]. All coefficients on the diagonal of this 18 ADRIEN SAUVAGET matrix are equal to 2. Therefore we have
dg
=
R−1 X (2) e cg,i (2g − 2i − 1)!bg−i + i=0 R−1 X (3) e cg,i ag−i + O g R+1 i=1 (2) 1 (3)
where the
coefficients e
c
g
,
i
and
e cg
,
i are in Q[g]. Therefore we get
(2g − 2)! 3 + π2 1 e cR dg = 1 − + O +. + (2π)2g−2 12g
g
R
g
R+1
where the coefficients e ck lie in Q[π 2 ]. Therefore we deduce the second part of Theorem 1.9 by using carea (2g − 2) = dg /(4π 2 ag ). The proof of Lemma 4.1 is essentially borrowed from [3] but we repeat most arguments for completeness. We begin by proving two preliminary lemmas. Lemma 4.2. Let us denote by
B
g
0
= (2
g − 1)!bg
(
with B00 = 0). There exists a positive constant C such that for all g ≥ k ≥ 2, we have k X Y 0 0 Bgi ≤ C
k
−1
B
g−k+1
.
(14) g
1
+...+gk
=
g j
=1 Proof. We have seen that Bg0 is equivalent to 2(2g − 1)!/(2π)2g as g goes to infinity. Thus there exist positive constants C 0 and C such that
g−1 X 0 Bi0 Bg−i ≤ C i=1 0 g−1 X (2i − 1)!(2g − 2i − 1)! (2π)2g i=1 = g−2 X 2g − 2 2+ 2g−3 C 0 (2n − 3)! (2π)2 (2π)2g−2 i=2! 2i−1 0 ≤ 4 C (2n − 3)! 0 ≤ CBg−1. (2π)2 (2π)2g−2
We will prove that the inequalities (14) hold for all g ≥ k ≥ 2 with this constant C. We work by induction on k. We have seen that the inequality (14) holds for k = 2. Suppose that k ≥ 3. Then for all g ≥ k we have X Y k
g1 +...+gk =g j=1 Bg0 j = ≤ g−k+1 X X Bg0 1 g2 +...+gk =g−g1 g1 =1 C k−2 g−k+1 X k−1 Y Bg0 j j=2 0 0 Bg0 1 Bg−g ≤ C k−1 Bg−k+1, 1 −k+2 g1 =1
thus
the inequality (14) holds for any g ≥
k
≥
2. Lemma
4.3
. We have
the
following asympt
otic results
(2
g − 2)!bg (2g − 2)!bg ag = 2dg + O = (2g − 2)!bg + O. g g CONST OF H(2g − 2) 19
Proof of Lemma 4.3. The numbers ag and dg are positive for all g. Therefore, using Theorems 3.13 and 3.15, we deduce the following inequalities for all g ≥ 1 ag ≤ (2g − 2)!bg, 2dg ≤ (2g − 2)!bg−1. | common_corpus | {'identifier': 'hal-01972098-1801.01744v2.txt_1', 'collection': 'French-Science-Pile', 'open_type': 'Open Science', 'license': 'Various open science', 'date': '', 'title': 'Volumes and Siegel–Veech constants of H(2G − 2) and Hodge integrals. Geometric And Functional Analysis, 2018, 28 (6), pp.1756-1779. ⟨10.1007/s00039-018-0468-5⟩. ⟨hal-01972098v2⟩', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '7654', 'token_count': '13223', '__index_level_0__': '17410', 'original_id': 'a81679a03889cd0876f07aec182bc7bc20928e5c827092fa4ef70e62a47d549e'} |
grape
[ɡreip]
n葡萄
| the_stack | {'hexsha': '9c68493bd91b6caad84764b330152e08e165dcb3', 'size': '18', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'pee/meaning/grape.txt', 'max_stars_repo_name': 'gbn48/wordlists', 'max_stars_repo_head_hexsha': '9735b64c3f102a8358e5e506777554ed109ba6ed', 'max_stars_repo_licenses': "['BSD-2-Clause']", 'max_stars_count': '5', 'max_stars_repo_stars_event_min_datetime': '2017-03-15T11:17:31.000Z', 'max_stars_repo_stars_event_max_datetime': '2021-09-14T05:18:51.000Z', 'max_issues_repo_path': 'pee/meaning/grape.txt', 'max_issues_repo_name': 'gbn48/wordlists', 'max_issues_repo_head_hexsha': '9735b64c3f102a8358e5e506777554ed109ba6ed', 'max_issues_repo_licenses': "['BSD-2-Clause']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'pee/meaning/grape.txt', 'max_forks_repo_name': 'gbn48/wordlists', 'max_forks_repo_head_hexsha': '9735b64c3f102a8358e5e506777554ed109ba6ed', 'max_forks_repo_licenses': "['BSD-2-Clause']", 'max_forks_count': '3', 'max_forks_repo_forks_event_min_datetime': '2017-03-15T11:17:32.000Z', 'max_forks_repo_forks_event_max_datetime': '2020-04-05T02:00:53.000Z', 'avg_line_length': '4.5', 'max_line_length': '7', 'alphanum_fraction': '0.7222222222', 'original_id': '100545345bdfe8f29714fa698c2d3a129eb25e3925c00a1a4fd71d4ac59bf360'} |
(require 'package)
(let* ((no-ssl (and (memq system-type '(windows-nt ms-dos))
(not (gnutls-available-p))))
(proto (if no-ssl "http" "https")))
;; Comment/uncomment these two lines to enable/disable MELPA and MELPA Stable as desired
(add-to-list 'package-archives (cons "melpa" (concat proto "://melpa.org/packages/")) t)
;;(add-to-list 'package-archives (cons "melpa-stable" (concat proto "://stable.melpa.org/packages/")) t)
(add-to-list
'package-archives
(cons "org" (concat proto "://orgmode.org/elpa/")))
(when no-ssl
(setq tls-program
;; Defaults:
'("gnutls-cli --insecure -p %p %h"
"gnutls-cli --insecure -p %p %h --protocols ssl3"
"openssl s_client -connect %h:%p -no_ssl2 -ign_eof")
;; '("gnutls-cli -p %p %h"
;; "openssl s_client -connect %h:%p -no_ssl2 -no_ssl3 -ign_eof")
))
(when (< emacs-major-version 24)
;; For important compatibility libraries like cl-lib
(add-to-list 'package-archives '("gnu" . (concat proto "://elpa.gnu.org/packages/")))))
(print (format "
==================================================================
system-type: %s
package-archive: %s
==================================================================
"
system-type
package-archives))
;; See what spell-checker there is, and if it is working.
(load-file "init.el")
(setenv "LANG" "C")
(message "%s: exit status = %s" ispell-program-name (shell-command ispell-program-name))
(message "%s" (shell-command-to-string ispell-program-name))
(message "\n\n-D output: %s" (shell-command-to-string (format "%s -D" ispell-program-name)))
(message "\n\n-d output: %s" (shell-command-to-string (format "%s -d" ispell-program-name)))
(message "LANG: %s" (getenv "LANG") )
| mini_pile | {'original_id': '15e2c8557917e36be32ca3eea61a33df40e4cf544fd1551b63c1a21a7714fb72'} |
Maple Syrup Urine Disease | New Screening Procedures
newborn2Britain’s National Screening Committee has recommended screening every newborn infant for four additional disorders. One of these is maple syrup urine disease, a rare disorder that impacts only about 1 in 185,000 children. But here is a crazy fact. This abnormality occurs with far greater frequently in the Old Order Mennonite population. Who much more frequently? These people have an incidence rate of around 1 in 380 newborns. That is incredible, right? There is also a high frequency in Ashkenazi Jews, although the incidence rate is much lower, approximately 1 in 50,000 (but still an almost four-fold greater risk).
This genetic abnormality creates real risk to the child by disrupting the normal function of amino acids inside the body which can prevent the body from digesting some forms of protein and processing certain amino acids. In fact, these proteins can actually be toxic to the brain. Symptoms range from the mild, such as vomiting, to such severity where the patient will have seizures and coma and, potentially, a brain injury as a result. These symptoms can be turned around with a particular diet, generally one that is low in protein. This often means severe restrictions on meat, fish, eggs, dairy foods, wholegrain flour, beans, and nuts. If untreated, the risk can go up to brain injury and death.
The most common type of this condition manifests itself in the first week of the baby’s life, usually shortly after the baby’s first ingestion of milk. One big sign: the baby’s urine will smell similar to maple syrup, thus the name.
There are misdiagnosis of maple syrup urine disease cases when the doctors fail to identify this problem. This condition can go from quite manageable to a death very quickly if it is not properly diagnosed. It is arguably tough trying to diagnose a disease that is this rare. But that is probably the wrong way to frame the issue. At some point, when doctors rule out everything but a metabolic disorder, there is an easy test out there that can help you rule in or out this problem and the symptoms are pretty easy to read.
Sometimes when treating and misdiagnosing this condition, doctors can go the exact wrong path by giving the infant IV protein before a metabolic disorder had been ruled out. This is tantamount to pouring gasoline on an open flame.
Circling back to the beginning of the article, the UK recommendation also includes screening for Homocystinuria (HCU), Glutaric Aciduria type 1 (GA1) and Isovaleric Aciduria (IVA). My thinking on this is not complicated. If we can test for risk factors to children and the testing is non-invasive or harmful to them, why not do it? It is an all too common trope to say that nothing is good enough for our babies and our military. You always have to balance the risks and the benefits. But in this case, why not just perform the simple and relatively inexpensive tests that can save a child when they are at the most vulnerable time of their lives? | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9246211647987366}", 'metadata': "{'Content-Length': '42550', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2E2H274N4SWZIXUDVGWG2DGHJU4MESGT', 'WARC-Concurrent-To': '<urn:uuid:65e6b114-24f5-4eba-9a01-2ddaf6f62b96>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 12, 48), 'WARC-IP-Address': '99.84.181.13', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NCPB56ADH2L24WXVZ4EDZHWANMLKV44V', 'WARC-Record-ID': '<urn:uuid:2807a879-b8dc-4a2b-ad4b-77d66caa083c>', 'WARC-Target-URI': 'https://www.lawsuit-information-center.com/maple-syrup-urine-disease-new-screening-procedures.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2e28c94b-813c-4771-a174-d14fbc883869>', 'WARC-Truncated': None}", 'previous_word_count': '477', 'url': 'https://www.lawsuit-information-center.com/maple-syrup-urine-disease-new-screening-procedures.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-209-241.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.062036991119384766', 'original_id': '1a0a951893f6e22ca21e26f0de5a3524f90b19700760fcc6efdd70d1ab7d05da'} |
Obama Heads into the AMA Lion’s Den
When President Obama went into the lion’s den of the American Medical Association today, he carried in some red meat: He said he would side with doctors, rather than with the trial lawyers that support his party, by advocating malpractice reform, a hot-button issue with physicians whose premiums can soar to six figures.
Mr. Obama is trying in public appearances to build support for his increasingly problematic health-reform plan, and his advisors see addressing medical liability as a "credibility builder" that might keep doctors in the game.
But the promise is hollow because lawyers simply have too much sway with Democrats. Mr.Obama backed down before he left the AMA podium, saying he would not support a cap on punitive damages — the very policy that has dramatically reduced premiums in Texas and other states.
And the promise also is not likely to counteract doctors’ fears about the juggernaut of a new government-health plan that many fear would dramatically cut into their earnings and even their ability to keep their office doors open.
In his speech, Mr. Obama brushed aside fears that a public plan could be a gateway toward a single-payer system.
"What are not legitimate concerns are those being put forward claiming a public option is somehow a Trojan horse for a single-payer system," he said. "I'll be honest. There are countries where a single-payer system may be working. But I believe — and I've even taken some flak from members of my own party for this belief — that it is important for us to build on our traditions here in the United States. So, when you hear the naysayers claim that I'm trying to bring about government-run health care, know this — they are not telling the truth."
But the evidence simply contracts his claim. Countless economists and other experts have shown that there is no way the government can be a fair player if a public plan were created. The Lewin Group showed that nearly 120 million Americans would lose their private health insurance if the public plan were made available and paid doctors at Medicare rates.
The American Medical Association put out a statement last week that said: "The introduction of a new public plan threatens to restrict patient choice by driving out private insurers, which currently provide coverage for nearly 70 percent of Americans." Medicare generally pays doctors and hospitals at least 15 percent less than their costs of providing care.
The AMA later backed down some from its strong-arm rejection, no doubt following White House pressure. In "clarifying" its earlier statement, it said, "The AMA opposes any public plan that forces physicians to participate, expands the fiscally challenged Medicare program or pays Medicare rates, but the AMA is willing to consider other variations of a public plan that are currently under discussion in Congress."
Reports says the AMA’s retraction of its perceived opposition to a public-insurance option did not sit well with many of its members. While members were generally polite to the president during his speech, the public plan was the hot topic in the hallways and meeting rooms after he left.
Members of Congress are trying to find ways to make the public plan palatable. The Senate Finance Committee plans to present its health-reform bill this week, and it is expected to include a revised public plan in the form of government-organized insurance "co-operatives."
Finance chairman Max Baucus is trying to appease moderates with the idea. "It’s got to be written in a way that accomplishes the objective of the public option, even though it itself is not public," he said in a revealing moment.
The idea is also designed to appease conservative Democrats. They want to make sure that Medicare payment rates are not used as the basis for reimbursement, that the plan is self-sustaining and does not rely on taxpayer dollars, and that it would have to follow the same rules and regulations as the private plans, including establishing a reserve fund. Should subsidies be provided for the purchase of health insurance, they must be available for the purchase of public and private plans equally.
Why, then, would we need a public plan if it is required to follow exactly the same rules as private plans? Many believe that the co-op idea is simply anther Trojan Horse that would quickly morph into a new government entitlement in the hands of Obama administration regulation writers.
Mr. Obama also has trouble with the Left. New York senator Charles Schumer insists that the co-op must meet certain conditions. "It has to have a significant infusion of federal dollars right from the start, so it has the clout to compete against the insurance companies."
House Speaker Nancy Pelosi said House Democrats strongly want a government-run insurance plan to be part of any health-care overhaul and called for a "level playing field" for public and private health-care providers. (See above comment by Schumer. How can it be a level playing field when there is a "significant infusion of federal dollars right from the start"?)
Congress makes these laws and it can change them at will. It’s absolutely vital to be careful and deliberative with this legislation because it will have consequences for millions of Americans for decades to come. Hasty action to rush these bills through this summer could lead to catastrophic mistakes.
Obama Heads into the AMA Lion’s Den
When President Obama went into the lion’s den of the American Medical Association today, he carried in some red meat: He said he would side with doctors, rather than with the trial lawyers that support his party, by advocating malpractice reform, a hot-button issue with physicians whose premiums can soar to six figures.
Mr. Obama is trying in public appearances to build support for his increasingly problematic health-reform plan, and his advisors see addressing medical liability as a "credibility builder" that might keep doctors in the game.
But the promise is hollow because lawyers simply have too much sway with Democrats. Mr.Obama backed down before he left the AMA podium, saying he would not support a cap on punitive damages — the very policy that has dramatically reduced premiums in Texas and other states.
And the promise also is not likely to counteract doctors’ fears about the juggernaut of a new government-health plan that many fear would dramatically cut into their earnings and even their ability to keep their office doors open.
In his speech, Mr. Obama brushed aside fears that a public plan could be a gateway toward a single-payer system.
"What are not legitimate concerns are those being put forward claiming a public option is somehow a Trojan horse for a single-payer system," he said. "I'll be honest. There are countries where a single-payer system may be working. But I believe — and I've even taken some flak from members of my own party for this belief — that it is important for us to build on our traditions here in the United States. So, when you hear the naysayers claim that I'm trying to bring about government-run health care, know this — they are not telling the truth."
But the evidence simply contracts his claim. Countless economists and other experts have shown that there is no way the government can be a fair player if a public plan were created. The Lewin Group showed that nearly 120 million Americans would lose their private health insurance if the public plan were made available and paid doctors at Medicare rates.
The American Medical Association put out a statement last week that said: "The introduction of a new public plan threatens to restrict patient choice by driving out private insurers, which currently provide coverage for nearly 70 percent of Americans." Medicare generally pays doctors and hospitals at least 15 percent less than their costs of providing care.
The AMA later backed down some from its strong-arm rejection, no doubt following White House pressure. In "clarifying" its earlier statement, it said, "The AMA opposes any public plan that forces physicians to participate, expands the fiscally challenged Medicare program or pays Medicare rates, but the AMA is willing to consider other variations of a public plan that are currently under discussion in Congress."
Reports says the AMA’s retraction of its perceived opposition to a public-insurance option did not sit well with many of its members. While members were generally polite to the president during his speech, the public plan was the hot topic in the hallways and meeting rooms after he left.
Members of Congress are trying to find ways to make the public plan palatable. The Senate Finance Committee plans to present its health-reform bill this week, and it is expected to include a revised public plan in the form of government-organized insurance "co-operatives."
Finance chairman Max Baucus is trying to appease moderates with the idea. "It’s got to be written in a way that accomplishes the objective of the public option, even though it itself is not public," he said in a revealing moment.
The idea is also designed to appease conservative Democrats. They want to make sure that Medicare payment rates are not used as the basis for reimbursement, that the plan is self-sustaining and does not rely on taxpayer dollars, and that it would have to follow the same rules and regulations as the private plans, including establishing a reserve fund. Should subsidies be provided for the purchase of health insurance, they must be available for the purchase of public and private plans equally.
Why, then, would we need a public plan if it is required to follow exactly the same rules as private plans? Many believe that the co-op idea is simply anther Trojan Horse that would quickly morph into a new government entitlement in the hands of Obama administration regulation writers.
Mr. Obama also has trouble with the Left. New York senator Charles Schumer insists that the co-op must meet certain conditions. "It has to have a significant infusion of federal dollars right from the start, so it has the clout to compete against the insurance companies."
House Speaker Nancy Pelosi said House Democrats strongly want a government-run insurance plan to be part of any health-care overhaul and called for a "level playing field" for public and private health-care providers. (See above comment by Schumer. How can it be a level playing field when there is a "significant infusion of federal dollars right from the start"?)
Congress makes these laws and it can change them at will. It’s absolutely vital to be careful and deliberative with this legislation because it will have consequences for millions of Americans for decades to come. Hasty action to rush these bills through this summer could lead to catastrophic mistakes. | mini_pile | {'original_id': '05be4c6a5bea6671a4c80b95f7f8e4b85614291faafae49874b23b516867a646'} |
"""Remove deprecated and unused ApiTokens
Revision ID: 6cd62c61bc1a
Revises: d37e30db3df1
Create Date: 2019-10-02 12:05:01.207728
"""
# revision identifiers, used by Alembic.
revision = "6cd62c61bc1a"
down_revision = "d37e30db3df1"
from alembic import op # noqa: E402
import sqlalchemy as sa # noqa: E402
def upgrade():
op.drop_table("apitoken")
def downgrade():
op.create_table(
"apitoken",
sa.Column("id", sa.INTEGER(), autoincrement=True, nullable=False),
sa.Column("user_id", sa.INTEGER(), autoincrement=False, nullable=False),
sa.Column("token", sa.VARCHAR(length=255), autoincrement=False, nullable=False),
sa.Column("secret", sa.VARCHAR(length=255), autoincrement=False, nullable=False),
sa.ForeignKeyConstraint(["user_id"], ["user.id"], name="apitoken_user_id_fkey"),
sa.PrimaryKeyConstraint("id", name="apitoken_pkey"),
sa.UniqueConstraint("secret", name="apitoken_secret_key"),
sa.UniqueConstraint("token", name="apitoken_token_key"),
)
| mini_pile | {'original_id': '8371ac119930a00b26b980dbdcfa6b2cc4db82ad3d784a95f2c75f10554edbc1'} |
How One Invention Idea Can turn Your Life Forever
Most famous inventors did it with a single invention or a single idea. Actually that is all it takes - a person really good idea - to change your life forever!
It is important to note here that individuals don't just stumble onto ideas all time. Many times there is a involving work that enters into it. You can make an environment which isn't conducive to the generation of invention ideas, more so as single idea with regard to capable of changing everything.
You are very likely to stumble on to your big idea within area InventHelp review or industry that you currently extremely familiar offering. A much-loved InventHelp inventions hobby is a great help. There is no denying the fact that chances of your stumbling on the perfect invention idea are much more likely location while you are accomplishing something that you will enjoy doing. Something that you have no problem spending hours on end doing. There are a couple of reasons for this particular. Firstly people get brilliant invention ideas on areas and industries that they understand extremely well. As there are the simple reality chances of you stumbling on a large invention idea improve more time acquire on the related environment. People will spend more and extended effortlessly on something they really enjoy.
Not everybody believes in destiny, nevertheless the truth of the problem is InventHelp company that every human on the world is born having a particular purpose in this particular life and objective will tend to be really close to something you really enjoy doing. In other words, you big idea in this life is hidden in something really close to your heart.
Still, whatever it is that you believe, the fact remains that all it is advisable to change your life is just one brilliant invention idea. Then you need to have enough knowledge on ways to get it from your drawing boards towards waiting world rrn existence. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '155', 'language_id_whole_page_fasttext': "{'en': 0.9588806629180908}", 'metadata': "{'Content-Length': '12868', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AXJWKYI2TUYRZNU47ARH64ON4Z4EEODE', 'WARC-Concurrent-To': '<urn:uuid:e5f7de4b-002c-47f2-ad7e-f3ccb9bb5e8c>', 'WARC-Date': datetime.datetime(2018, 9, 24, 6, 33, 48), 'WARC-IP-Address': '81.4.125.4', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ZU7A3AJLQ2WSAF2EVAHFNJN3T4DDPHYX', 'WARC-Record-ID': '<urn:uuid:2d87fd5d-c098-4b04-9bec-67847d186cb2>', 'WARC-Target-URI': 'http://cittecultqakhe.recentblog.net/how-one-invention-idea-can-turn-your-life-forever', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f4fb76da-abbd-4a11-bfb7-00e28e82b35f>', 'WARC-Truncated': None}", 'previous_word_count': '331', 'url': 'http://cittecultqakhe.recentblog.net/how-one-invention-idea-can-turn-your-life-forever', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-95-180-234.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09956204891204834', 'original_id': 'de29457879e3beb761fdb8a5e029dc916c6505d4e620a705af47a836f68531a3'} |
BIGGI: Milwaukee delivers more than cold weather
BIGGI new1I am from Portland. I can drive 45 minutes and either be at one of the nation’s largest mountains or a Pacific Ocean beach. Being from the west coast, I was only told that the Midwest is cold and flat. When I got to school my freshman year, everyone from Chicago described the Milwaukee city skyline as nothing but a “middle finger.”
Despite my first impression, I have learned to love Milwaukee and all it has to offer. When I got back to school this past fall, I went on a small boat ride down the Milwaukee River into Lake Michigan. Although there is not the massive skyline here like there is in Chicago, I found Milwaukee to have a charm unlike any other city I have ever been to in the United States as I traveled along the water. While the cold winters can be a bummer, the good of the city outshines the frozen tundra.
The weather here is like nothing I have ever experienced. As Milwaukee sunk to its deepest lows this winter, my friends and I went out to lunch and drove past Lake Michigan. The shallow outskirts of Bradford Beach were freezing over and the waves moved at a glacial pace themselves. It was simply one of the most unique nature experiences I have had. And this is coming from a person who practically grew up in a mountainous forest.
Frankly, I am getting tired of the freezing temperatures. The coldest weather I ever felt before college was about 30 degrees. Nonetheless, it gives people the chance to explore the ins and outs of Milwaukee. Just driving down Brady Street or hanging around the Milwaukee Art Museum is a unique way to appreciate the city without getting frostbite.
Speaking of the museum, I never expected the artistic nature of Milwaukee. The music scene in the city is incredibly downplayed, as well as the rich culture in the performing arts. Although not New York, Milwaukee is known for importing actors during their time off from Chicago theatre.
The architecture and shops around the Milwaukee exude a unique European vibe. I also feel Milwaukee’s food scene is extremely underrated. Often considered to be a universal haven for beer lovers, the food palate across the city is pretty diverse. Surely I am not one of those people who describe themselves as a “foodie,” but my freshman 15 seems to speak for itself, and it is not because of the dining halls.
I think that, as a whole, we take Milwaukee for granted. Though it is not necessarily as cosmopolitan as Chicago, or maybe even Portland, it is a place worth exploring. And I think that is why it is important for all of us to get well acquainted with this city while we are here. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9699323177337646}", 'metadata': "{'Content-Length': '116354', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Q5A76ZDHT4K3IUDTYF7GYP72XEWID5NR', 'WARC-Concurrent-To': '<urn:uuid:309a8dde-0c92-49c8-8951-23c3b9ca10bb>', 'WARC-Date': datetime.datetime(2020, 5, 29, 13, 0, 17), 'WARC-IP-Address': '69.16.252.112', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:LWMFIUN2ITNH6GJHAYHB36YN2TDHOYYI', 'WARC-Record-ID': '<urn:uuid:3793d02c-251e-480b-a321-016fcecbdd2c>', 'WARC-Target-URI': 'https://marquettewire.org/3855789/tribune/viewpoints/biggi-milwaukee-delivers-more-than-cold-weather/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4bbf2ace-344e-4462-9735-66e2235a70a9>', 'WARC-Truncated': None}", 'previous_word_count': '471', 'url': 'https://marquettewire.org/3855789/tribune/viewpoints/biggi-milwaukee-delivers-more-than-cold-weather/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-124.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02139413356781006', 'original_id': '1af1019cc79e8570f46928f5f6074000cecefae1db5ade2d7f63ff3edbc1b326'} |
Should I be concerned about carbon monoxide in my home?
Yes. Carbon monoxide is a hidden danger to health and safety in your Livermore house. Heavy amounts can cause extreme health effects or death. Carbon monoxide poison can be detected in any residence unless certain safety measures are put in place. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9161881804466248}", 'metadata': "{'Content-Length': '82785', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:C4EKPTZYK2T5S7UETEHXQMEVRBXUHMDT', 'WARC-Concurrent-To': '<urn:uuid:6ae1e0db-1ba7-4604-8fa2-15bac81d6659>', 'WARC-Date': datetime.datetime(2021, 4, 21, 1, 58, 31), 'WARC-IP-Address': '23.111.9.64', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:Z3NZWJT26UEZBXGMAQY6YGP6KUM4RBTS', 'WARC-Record-ID': '<urn:uuid:41a3e8b3-fec5-4d53-a047-5bea70ccc97a>', 'WARC-Target-URI': 'https://www.comerfordsserviceexperts.com/faq/should-i-be-concerned-about-carbon-monoxide-in-my-home', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c36ba564-2f33-4aa9-8fa9-96f8b29dfd01>', 'WARC-Truncated': None}", 'previous_word_count': '51', 'url': 'https://www.comerfordsserviceexperts.com/faq/should-i-be-concerned-about-carbon-monoxide-in-my-home', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-253.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9771629571914673', 'original_id': '6d2fb00d5204b8dfd85406a348612e48935515bd0a81a8a22c434981121b70c3'} |
<ul class="nav nav-pills nav-justified">
<li role="presentation">
<a class="btn btn-default btn-block"
href="{{ url_for('log_auth.visits') }}">
Back to All Visits
</a>
</li>
</ul>
<div class="table-responsive"> <!-- id="scroller"> -->
<table class="table table-hover table-condensed">
<thead><tr>
<th> IP Address </th>
<th> Visit Dates </th>
<th> Latitude </th>
<th> Longitude </th>
</tr></thead>
<tbody data-link="row" class="rowlink">
{% for ro in form %}
<tr class="prof_row_style">
<td> <a href="#"></a> {{ ro.ip_address }} </td>
<td> {{ ro.date }} </td>
<td> {{ ro.latitude }} </td>
<td> {{ ro.longitude }} </td>
</tr>
{% endfor %}
</tbody>
</table>
</div>
| the_stack | {'hexsha': '291e9f117b472bdc9fad385ef26a46e32f76527e', 'size': '909', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'app/templates/log_auth/adm_INDIvisits_tdata.html', 'max_stars_repo_name': 'carverdo/scrap', 'max_stars_repo_head_hexsha': 'd431095cadc1bc3f60aa0a3f473e726ecace9078', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'app/templates/log_auth/adm_INDIvisits_tdata.html', 'max_issues_repo_name': 'carverdo/scrap', 'max_issues_repo_head_hexsha': 'd431095cadc1bc3f60aa0a3f473e726ecace9078', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'app/templates/log_auth/adm_INDIvisits_tdata.html', 'max_forks_repo_name': 'carverdo/scrap', 'max_forks_repo_head_hexsha': 'd431095cadc1bc3f60aa0a3f473e726ecace9078', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '30.3', 'max_line_length': '63', 'alphanum_fraction': '0.4444444444', 'original_id': 'dcac688246e7889de18876bc24a8d862387240d20c9f7efc50a83734d1df36f7'} |
In power line communications, power lines are used as a transmission medium. Power Line Carrier modems transmit high frequency signals over a power line and the signals may be narrow-band (perhaps a few kHz wide) or up to broad-band (many MHz wide). These devices are usually capacitively or inductively coupled onto the power line so as to minimize or eliminate any 50/60 Hz or other high voltage low frequency signals from being transferred into the modems. It is a common problem, however, that most PLC modem transmitters do not properly match the high-frequency characteristics of the power line and hence, transmit with less than optimal efficiency and transmit in frequency ranges where little power is actually passed onto the power lines. Impedance mismatches can also affect the output amplifier waveform and may introduce undesired distortion, intermodulation products and other undesirable characteristics. Also, PLC modems do not possess any capability of sensing subtle changes in power line characteristics as may be noted by measurement of S-parameters for the power lines. What is needed is an improved PLC modem which addresses these shortcomings. | mini_pile | {'original_id': 'e59c1b0cc4b9d5e601d38d762e5f0e89aeeb587c92f2e800b3ca0d9a73f2529d'} |
Yesterday we went to Universal Studios with the children to check out the new Harry Potter part of the park.
Karl and I had been fortunate to have gone the day before child free as my parents very kindly had the boys for the day so we could have a day to ourselves (I think my mother was generally concerned at our alcohol consumption and thought we needed a break!)
I won’t spoil the surprise for anyone who hasn’t been but essentially you can spend time in Diagon Alley before taking the Hogwarts Express to the park next door ending up in Hogsmeade. There are rides, shops, street shows and a number of places you can buy butterbeer (yummiest drink in the world, I recommend the frozen kind.)
When Karl and I walked into Diagon Alley I wish someone could have taken a picture of our faces. It’s overwhelming, the books come to life, the films come to life and I felt like a child again, excited and a bit too enthusiastic, so much so that Karl kept losing me as I buzzed around looking from shop to shop! Every fine detail had been given attention to so much so that you could spend hours just looking.
I was amazed looking around, it was like some kind of magic spell had been cast over the hundreds of grown adults around us. There were people just like us everywhere staring in wonder, shrieking as things moved in the windows and the dragon breathed fire from overhead. These people like us probably have quite serious, responsible jobs on the outside world but there they were reliving parts of a series of books they have treasured and literally getting lost in the world of their imagination.
It occurred to me when do we lose this? When do we go from viewing the world with wonder and wide eyes to being cynical and seeing only the ordinary and not the potential in everything around us?
My question was answered when we were queuing to get onto the Hogwarts Express with the boys. Both Nate and Leo got themselves into a real tizzy at the prospect of a visit from the dementors on the train. So much so I ended up walking them to Hogsmeade and letting the rest of our group go on the train. No mean feat in 40 degree heat with two moaning children but I digress!
We encourage our children to use their imagination, to see the beautiful around them and never to think they can’t do things. Use your imagination and anything is possible, so why then as adults have we forgotten this? Of course we have the boring things to contend with, bills, work, cars, childcare, cleaning (yuck) but everyone of the adults yesterday allowed themselves to rise above that and just let their imagination run wild just like they did as kids.
Now I’m not saying we should all throw our responsibilities into the wind and become fairy princesses but how much lower would our blood pressures be if we for an hour or so each week allowed ourselves to see the magic all around us?
Have a try and let me know what you think. You may just surprise yourself! Xx
Author: TiredfromWhitstable
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '50', 'language_id_whole_page_fasttext': "{'en': 0.9621286392211914}", 'metadata': "{'Content-Length': '109025', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:W3BFXSSA42HOIUVUPNZ66H7YVOBOSSGR', 'WARC-Concurrent-To': '<urn:uuid:5ad8e25d-6d16-4416-87bf-b5556441e8e3>', 'WARC-Date': datetime.datetime(2020, 5, 29, 16, 21, 6), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RYJYW2ICWZHREUEGXVYLMEMKHZ74FIHH', 'WARC-Record-ID': '<urn:uuid:35840dc0-ac74-4c1b-946a-4a70a2a83275>', 'WARC-Target-URI': 'https://tiredfromwhitstable.com/2016/08/06/imagination/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3a36bdcf-4ec3-4cce-b4ef-544b894f833d>', 'WARC-Truncated': None}", 'previous_word_count': '654', 'url': 'https://tiredfromwhitstable.com/2016/08/06/imagination/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-124.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03166621923446655', 'original_id': 'a3a61e146c3df6b109230bc88a1da3d0ac9688728137b36dfbd4b6ca21b57dde'} |
Missouri's move to the Southeasten Conference was finished Friday, a source confirmed to ESPN.com on Saturday.
The Tigers' move from the Big 12 to the SEC is expected to be announced next week. The source said the SEC and Missouri opted to put off the announcement because they didn't want to upstage the LSU-Alabama football game Saturday night.
The Sporting News first reported the deal's completion Saturday.
Missouri is expected to join the SEC East in football with Florida, Kentucky, Vanderbilt, Georgia, South Carolina and Tennessee, the source said. Fellow Big 12 member Texas A&M will be in the West with Auburn, Alabama, Arkansas, LSU, Ole Miss and Mississippi State.
SEC basketball went to one division this season but it's unclear if that will continue with 14 teams.
Missouri's move to the SEC in 2012 could mirror West Virginia's to the Big 12 in 2012 in its uncertainty. A source said Missouri could have trouble getting out of the Big 12 because the league isn't sure if it can get the Mountaineers in from the Big East next season.
West Virginia filed a lawsuit to get out of the 27-month exit agreement with the Big East. The league has countered with a suit of its own. If West Virginia can't get out of the Big East then the Big 12 will try to keep Missouri for 2012 to avoid dropping below 10 schools.
The Big 12 needs 10 schools to meet television agreements, but more importantly, to fill scheduling dates. The Big 12 already replaced Texas A&M with TCU for 2012. The Horned Frogs went from the Mountain West to the Big 12, bypassing their original plan to go to the Big East.
Missouri's departure to the SEC will follow the league's expansion plan of adding schools in new markets and states (Missouri/St. Louis, Texas/Houston). It also bumps up the SEC's number of Association of American Universities from two to four with the additions of Texas A&M and Missouri. Vandy and Florida were the only two AAU members in the SEC.
Andy Katz is a senior writer for ESPN.com. | mini_pile | {'original_id': '0b7245e82d76caaf8423a2e91c6b30d41b2e0dd23e7a3f3945942b83b2c919df'} |
Map of Jupiter Inlet: View Full Map
Jupiter Inlet
City Jupiter
State Florida
Country United States
Latitude 26° 56" 42'
Longitude -80° 4" 16'
Format DD DMS
Body of water Atlantic Ocean to Jupiter Inlet
Current Conditions
Temperature: 80F
Dewpoint: 80F
Scattered Clouds
High: 88F
Low: 61F
Chance of a Thunderstorm
High: 68F
Low: 52F
Partly Cloudy
High: 73F
Low: 61F
Located 12 miles north of the Lake Worth Inlet and 16 miles south of the St. Lucie River, Jupiter Inlet is the point at which the Loxahatchee River empties into the Atlantic Ocean near Intracoastal Waterway Mile 1005. Jupiter is hub of yachting activity, and there are several good marinas located north and south of the inlet on Jupiter Sound and the south Intracoastal Waterway Route in the town of Jupiter itself.
The image above is a view from the east looking west over the Jupiter Inlet and farther back into the Loxahatchee River. Off to the upper right (northwest) side of the image is the Jupiter Lighthouse right near where the Intracoastal Waterway meets up with the Loxahatchee River. Just opening in the top center of the aerial image is the Jupiter Federal Bridge, which has a closed vertical clearance of 26 feet and operates on a restricted opening schedule.
Spanish explorers named the river running into the inlet the Jobe River, after the Native American tribe that lived here. Later, when English settlers found the area around 1763, Jobe sounded to them like the mythological god Jove, or Jupiter, and the name Jupiter stuck.
The Jupiter lighthouse was erected near the inlet in the 1800s. The Lighthouse stands 146 feet tall on the north shore of the Jupiter Inlet. The land that is now Lighthouse Park was once a part of Fort Jupiter, a military installation that was formed during the Seminole Indian Wars.
Navigating the Water:
Use NOAA Chart 11472.
The Jupiter Inlet, although frequently dredged and the site of many jetty and reclamation projects, experiences constant problems from shifting shoals and shallow areas. The current version of NOAA Chart 11472 advises that the inlet should not be attempted without advance local knowledge of the present hazards and shoals in the inlet channel.
The outer breakwall jetties are marked with fixed lights, but they are no indication of where the deepest water lies.The image above suggests deeper depths toward the south (left) side of the channel on entrance, but this is only a guess as to the channels current position. Only attempt the inlet if your boat has a shoal draft, with advance local knowledge, and preferably behind a locally hailed boat.
Inside the inlet are three different routes. To starboard just after you clear the inlet is the opening to Jupiter Sound, where the Intracoastal Waterway heads north. Straight back from the inlet, the Intracoastal Waterway continues back on the Loxahatchee River until it beds sharply south at the old railroad swing bridge.
Nearby marinas that accept transient guests are JIB Yacht Club, just north of the inlet and Jonathans Landing Marina, which is about two miles south of the inlet.
Local Notices to Mariners:
Local Notices to Mariners are now exclusively available online from the U.S. Coast Guard. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9187108278274536}", 'metadata': "{'Content-Length': '46128', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FRP57SCDOXZKPJZEKMMF67Y3LCDOG52F', 'WARC-Concurrent-To': '<urn:uuid:da5ce96d-f059-4306-a17e-59852f3deac4>', 'WARC-Date': datetime.datetime(2014, 3, 11, 19, 25, 34), 'WARC-IP-Address': '198.41.249.165', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:5HG6M5LF4X5WKAIALC2E624TZ7VVIMGW', 'WARC-Record-ID': '<urn:uuid:83746ec8-99f2-4f09-81c8-de92c7dc85d6>', 'WARC-Target-URI': 'http://marinas.com/view/inlet/48_Jupiter_Inlet_FL_United_States', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:24dbb3e4-f248-41d1-af72-e381a22b2c31>', 'WARC-Truncated': 'length'}", 'previous_word_count': '539', 'url': 'http://marinas.com/view/inlet/48_Jupiter_Inlet_FL_United_States', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02413463592529297', 'original_id': 'f11d88155d6834390e3210adec6e3edecaf889b13840b751386ddbbe27fc7252'} |
Pros and Cons of SIM Cards
SIM cards are the reason I don’t have trust issues anymore. They’ll always store your data and make switching phones a breeze. Except when they don’t. Sometimes SIM cards screw up and make your life as painful as walking on embers. In this article, I’m going to talk about the pros and cons of SIM cards. If you change phone but keep the same carrier, you can easily switch out the SIM card and proceed with using your phone with all the previous data. And, when you go abroad, it’s super simple to buy a SIM card from a local carrier. Just make sure your phone isn’t locked to a specific carrier, or there may be a fee for changing SIM card carriers. And now for the fun part: the drawbacks. Like I mentioned before, it’s difficult for people to switch SIM cards between different phones for different carriers. And if it comes down to it and you absolutely need to, it’s often expensive and confusing, requiring an unlock code. Apple is doing something really cool where, if you buy an iPhone SIM-unlocked, you can add an SIM card from any carrier into it. This is especially useful if you are a frequent international traveler.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.8816207647323608}", 'metadata': "{'Content-Length': '42786', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XBWVQBIFQT6XRAZXUKL4IBXUMVMVWWLE', 'WARC-Concurrent-To': '<urn:uuid:a08beebb-fdac-4b88-9690-e8ff74aff12b>', 'WARC-Date': datetime.datetime(2017, 10, 18, 7, 31, 55), 'WARC-IP-Address': '192.0.78.12', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RLVKMGVT7IMHD4LDVDNWRYETC5JJTTLE', 'WARC-Record-ID': '<urn:uuid:685991eb-a59c-42fc-afa0-1e7d8ff86290>', 'WARC-Target-URI': 'https://morganhowellwrtc352.wordpress.com/2017/03/20/pros-and-cons-of-sim-cards/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:218669d9-3492-49b6-9f9a-6f0f03d0259e>', 'WARC-Truncated': 'length'}", 'previous_word_count': '268', 'url': 'https://morganhowellwrtc352.wordpress.com/2017/03/20/pros-and-cons-of-sim-cards/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-232-73-119.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08197450637817383', 'original_id': '30abc7fe77c96c3435ebeed15f933bdef53e18ca6767add1f8e1e70210f8c7eb'} |
Review: Hell Yeah! Wrath of the Dead Rabbit
Hell Yeah! Wrath of the Dead Rabbit (PSN [Reviewed], XBLA, PC)Developer: Arkedo Studio
Publisher: SEGA
Genre(s): 2D Platformer
Release Date: September 25, 2012 (PSN), September 26, 2012 (XBLA), October 2, 2012 (PC)
ESRB Rating: T – Teen
Hell Yeah! takes players on bizarre trip through Hell as the Prince of Hell, a rabbit named Ash. The evil rabbit was minding his own business taking a bath with rubber duckies when the paparazzi show up and snap some pictures. The naked bath time photos are posted on the Hellternet where they’ve been viewed by a whopping 100 creatures. Ash is of course completely embarrassed by this and sets out to do the only thing a ruler of Hell can really do, kill everyone who has viewed the pictures.
Yeah, that’s the story. And while it has some often funny writing (no voice acting), the story here is really secondary and non-important. You’re not going to care about Ash as a character. It’s the gameplay that’s going to keep you playing, not the drive to push the story forward to see what happens. And that’s okay because this is a 2D platformer with a serious old-school feel in the same vein as a Metroid or Castlevania (in that it has huge levels where you move side to side and up and down, and generally back track your around levels).
You’ll acquire various weapons and abilities as you work your through murdering monsters. Guns, rocket launchers, grenades, and saws are all here. Throughout the levels there are locked doors telling you how many monsters you need to have killed to be able to pass through. The 100 monsters range in difficulty, some are really easy (all you have to do is shoot them) but there are some that are quite challenging as well (they require you to play with the environment some, which can lead to a lot of deaths in the process of figuring it out).
On that note, yes, you will die a lot in Hell Yeah!. A lot of the time you will deserve your death because it will be something you did. This game does require some trial and error, and learning your limits and when to time stuff. That’s good enough, I like a challenge. Then there’s the other times you’ll die a lot that are frustrating. Some of these will be due to the controls, but others will be due to a rather unforgiving checkpoint system that you have no idea where it will be at. If you cross a checkpoint path with very little life left, you can count on dying due to the smallest of things. Scattered around the levels are stations that will feed you blood and restore your health, but getting there from some of these checkpoints with low life can be brutal.
Wrath of the Dead Rabbit’s biggest strength is its design and art-form. The game is a beautifully drawn 2D platformer. The colors are bright and colorfully, and there’s a lot of variance in the levels (which these are things people wouldn’t typically associate with Hell). Even the 100 monsters are varied and look great. The soundtrack compliments everything nicely as well; it’s really a great soundtrack. With everything tied together, the presentation of Hell Yeah! is fantastic. There is one aspect of the presentation that loses its charm though.
Each of the 100 monsters has a health bar that you have to deplete in order to kill them. There’s nothing new with that. However, once you deplete that health bar you’re going to be tasked to complete a quick mini game that involves pressing or holding a button at the right time. If you mess up during the mini game, you’ll take damage and you’ll have to hit the monster a few more times to be able to try the mini game again.
These mini games (think WarioWare) are a great short break from the platforming , and they are initially charming to the game. If you successfully complete the mini game challenge, you’ll be treated to a ridiculous scene of the monster being murdered (launch a shark from space, a T-Rex, all sorts of quirky stuff). The result is a gore filled screen covered in blood and slime. Again, there’s a certain amount of charm to it. So it’s unfortunate to then have that charm lose its appeal by being repeated too many times. You’ll see the same mini-games and death finishers multiple times, and each time it’s less cool than it was the previous time. Eventually you’ll wish you could skip through the murder scene and just get back to the platforming.
There are a few other things to do in Hell Yeah! besides just murdering monsters. There are gems and collectibles in levels that you’ll want to get. Gems are usually inside or behind rocks, so you’ll be drilling or dashing through them to get to the gems, which act as the games currency. You need money in the game because there are shops sprinkled around the levels that allow you buy a number of items; weapons, weapon upgrades, outfits for Ash, health upgrades, etc. Nothing in the store is ridiculously overpriced, so accumulating enough money to buy everything you want won’t be an issue.
The game also incorporates a place called “The Island” where all the monsters Ash has “killed” are at. You’re encouraged to visit the Island frequently to delegate tasks to the killed monsters. You can put the monsters to work mining for money, health upgrades, research, and special rare items. Each resource can have 20 monsters assigned to it. Returning to the Island allows you to get your reward for your minion’s hard mining work. There’s a management system in place here too, you’ll need to send monsters to the beach to relax or the jail to rehabilitate them as they can get sick or angry, which obviously affects production.
Most gamers will ultimately ignore “The Island” though. It’s just not worth it. The game itself isn’t overly long, but it does have some lengthy load times. To make matters worse, you have to quit your game and exit back to the menu to be able to go to the Island. If you’re going to visit the Island, do so when you first start the game up. Otherwise it’s just not worth it when you consider the load times.
Hell Yeah is a quality 2D platformer that could have been really special. As is, it’s good but doesn’t come close to matching its potential. The platforming jumps can occasionally feel floaty, and the controls themselves can often seem to be overly sensitive. The lengthy load times also break the otherwise great pace and take you out of the game for too long. And more than anything the repetition of killing monsters (and I’m talking the mini-games and murder scenes here) grows tiresome like an initially funny joke that you just keep hearing.
Still though, there is an old-school charm here and there’s more than enough to satisfy fans of challenging trial-and-error 2D platformers. Fans of the genre who don’t mind repetition and the trial-and-error play that some might find frustrating should definitely find Hell Yeah an attractive $15 purchase.
A copy of this game was provided for review.
Share This Post:
Like this:
Related
I'm the creator and Editor-in-Chief of VortexEffect.net. I'm usually posting news and reviews, and doing all the back end stuff as well. I'm also the Gaming Expert for Answers.com. I like to play games, watch movies, wrestling, and college football (Roll Tide Roll). | mini_pile | {'original_id': 'b120de12b98616e6959b8a1af19e8f83276345c35e0300c44bd828a3c7031135'} |
Seven Fitness Myths Busted
If I had a dollar for each time someone told me “running is bad for your knees”, I’d have enough money for a pretty nice vacation.
Luckily for me and all of the other runners out there, this information is outdated and inaccurate. It turns out that running may actually protect your knees from health problems, such as degenerative knee issues. A runner’s risk of knee injuries is only increased if they had a previous knee trauma, or if they have a family history of knee problems.
That certainly isn’t the only fitness myth out there. Here are the real stories behind other common exercise misconceptions:
Myth 1: You can eat whatever you want as long as you exercise. This may hold true for professional triathletes, but not for the rest of us. If you weigh 150 lbs. and run 3 miles, for instance, you’ll burn about 300 calories. That’s approximately the number of calories in a cup of oatmeal and a banana. Unfortunately, exercising doesn’t give you a license to eat whatever you like. You need to burn as many calories as you take in if you want to maintain your weight.
Myth 2: Weight training will bulk you up. Not true. Lifting weights will actually help you tone up and slim down: the more muscle you have, the more calories you burn. Only people who do intense strength training workouts and have certain genetic factors are able to build large muscles.
Myth 3: You can “spot reduce” certain areas of your body. Nope! You can do all the crunches you want, but that won’t necessarily get you six-pack abs. You’ll also have to do cardio exercise and eat a healthy diet, losing fat all over your body, before those toned abs will show up.
Myth 4: Yoga is an easy workout. Some styles of yoga, and certain postures, are both mentally and physically challenging. Yoga is generally a safe workout, but injuries can occur, so if you’re new to yoga you should start slowly and respect your body’s limits. Also, if you have any health issues, check with your doctor before you hit the yoga mat. “Hot” or bikram yoga isn’t safe for pregnant women, for example.
Myth 5: You have to exercise intensely to get results. There is no truth behind the “no pain, no gain” mantra. In fact, working out too hard can lead to injuries and burnout. Never exercise through pain. You can gain plenty of benefits through moderate workouts.
Myth 6: It’s always best to stretch before you exercise. Experts have long studied and debated the potential benefits of stretching. One thing is for sure, though: it’s safest to stretch after your muscles are already warm. So take a warm-up lap and then stretch, or save it for after your workout.
Myth 7: Machines are safer than free weights. There is a small but real risk of injury regardless of what type of weights you lift. Machines may seem safer because they put you in the correct starting position, but they’re only effective if they’re adjusted for your weight and height. You can still use incorrect form on many machines. Ask a trainer to show you how to use equipment so you can make sure you have the right technique and settings.
What’s your favorite — or least favorite — fitness myth? | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9411066770553588}", 'metadata': "{'Content-Length': '49975', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HBUCWDBGRGFWSB4RI6EFU2T7MSZ2DLJV', 'WARC-Concurrent-To': '<urn:uuid:0b0c0edc-7f4e-40d3-a12b-3445fe2004d4>', 'WARC-Date': datetime.datetime(2013, 12, 13, 15, 39, 4), 'WARC-IP-Address': '173.230.135.236', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:XHXVKEFP7QV4FBWZQDR2IJ7HTC5SGFQ3', 'WARC-Record-ID': '<urn:uuid:6ac9d3c4-080e-4109-836c-b1094ce0eba4>', 'WARC-Target-URI': 'http://www.livestrongfitness.com/blog/tag/free-weights/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6fbbfe70-46c2-4f98-8d9b-3ec0a46914a6>', 'WARC-Truncated': None}", 'previous_word_count': '545', 'url': 'http://www.livestrongfitness.com/blog/tag/free-weights/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1906672716140747', 'original_id': '732735140760fec9ed02ac975aae8f2f7d8c172340cf7f8cd24b2274f3590267'} |
Marc Girardelli Ski Champion Video
Marc Girardelli ski champion is a 5-time winner of the overall ski World Cup. Girardelli is one of the greatest skiers of all time. Marc was born in Austria, but moved to race for Luxembourg. He was a flatlander, not from one of the famous Alpine villages so opportunities to move up were not available to Marc. His father became his coach and this team of 3 people had to take on the world. It made their task even more challenging especially when it came to events like downhill which require a bigger team to be safe.
Please follow and like us: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.987167477607727}", 'metadata': "{'Content-Length': '70312', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6W2UYTBTXCGM6FDQT46OB53DOJXMHFWU', 'WARC-Concurrent-To': '<urn:uuid:26f0a4ca-4ca0-497b-8639-5b5297a11544>', 'WARC-Date': datetime.datetime(2019, 11, 22, 23, 59, 35), 'WARC-IP-Address': '192.124.249.58', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:G4ANJTJAFXE77JJ35BOI6WSF5KC3ZIWN', 'WARC-Record-ID': '<urn:uuid:51c336a4-6247-4bb8-a286-cb6ee46d5925>', 'WARC-Target-URI': 'https://thesnowmag.com/marc-girardelli-ski-champion-video/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2a9ee754-5fbe-4394-87ec-dad015960a9c>', 'WARC-Truncated': None}", 'previous_word_count': '108', 'url': 'https://thesnowmag.com/marc-girardelli-ski-champion-video/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-135.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09628230333328247', 'original_id': 'bef27e70114f6ac3148a95d45363ec89a4510691c8d863960cb8e51e252f2975'} |
I slept at 4:30am last night! AUSTRALIAN OPEN FINAL!! It was so exciting! Both Tsonga and Djokovic played very well! I'm so glad Djokovic won!! YAY!~
Novak Djokovic 4 6 6 7
Jo-Wilfried Tsonga 6 4 3 6
Ahhhhhhhhhhhhhhh! I'm so sad the Australian Open is over now....I think it's my favorite Grand Slam... | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9216343760490416}", 'metadata': "{'Content-Length': '52224', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OAZGS2KFVR73U633JNVTKCA6DLKES7VP', 'WARC-Concurrent-To': '<urn:uuid:3a7161bf-441b-4724-903f-67a7abd92a5e>', 'WARC-Date': datetime.datetime(2019, 6, 18, 3, 37, 3), 'WARC-IP-Address': '198.185.159.145', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YJXDOKPPJ7CMTJLZGEY34T2ZZ6REXGHB', 'WARC-Record-ID': '<urn:uuid:77990815-ce27-45c1-be14-280ddb16aa91>', 'WARC-Target-URI': 'http://www.hellololo.net/blog-native/316', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:83b3741b-e41a-490a-bcdd-43c2d0a975fd>', 'WARC-Truncated': None}", 'previous_word_count': '56', 'url': 'http://www.hellololo.net/blog-native/316', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-113-175-32.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04396575689315796', 'original_id': 'a7469ef2de0dbe2e6178888df786e28003091b3496f2618f89b76a6e51c94ed2'} |
Email marketing is something that is very important to participate in today. Whether you have a bricks and mortar business or a digital business, email marketing is an effective way to boost sales and get your information to your audience. These eight tips will ensure that you’re using email correctly and in a profitable way.
Pick the Right Autoresponder
When you want to use email to market your business, it’s imperative that you choose the right autoresponder. Every autoresponder platform has their own terms of service and the type of marketing they allow. Some don’t allow affiliate marketing, for example, so if you want to be an affiliate marketer or offer occasional affiliate deals, you’ll want to avoid the platforms that disallow that.
Use Personalization Wisely
Every autoresponder system today offers the ability to add personalization. But remember, if you didn’t collect the information, you can’t use those systems. When you get people to sign up for your list, if you don’t take the first name, don’t use the FNAME personalization option or your emails will look strange. If you want to use those features, collect the right information.
Provide a Usable Freebie
One way to get people on your list, as you’ve probably heard, is to give them something free to download in exchange for their information. But, when you offer freebies, ensure that they are truly valuable and useful to your audience in a very targeted way. If the information you provide isn’t of interest to only your audience, you may end up with people on your list who don’t really care about the rest of the information you provide, so niche down your freebie offer to something very personal and special and usable for your audience.
Send Content Regularly and Consistently
Once you get people on your list, don’t abandon them. Send regular content on a consistent basis so that they get accustomed to getting content from you. Plus, you want to ensure that the content you send is interesting, useful, and relevant so that they get used to wanting to open the email and get the information.
Promote Your Content
When you have people on your list, it’s another place to promote content that you publish elsewhere. Tell your email members about the content in your private group. Tell them about the content you just published on your website. Tell them about your new YouTube video. This is a wonderful way to get repeat viewers.
Cross-Promote Platforms
Remember to promote your email list on your Facebook page and group. Promote your email list to your blog readers, to your YouTube audience, and vice versa. The more you cross-promote, the more your audience will get used to seeing your promotions and answering your calls to action.
Segment Your List
Autoresponders today have so much wonderful technology that can use systems based on the behavior of your list members. If they answer a CTA within an email, you can move them to a different list or segment of a list easily. Ensure that you set that up so that the information they get is very personal to them.
Keep Your List Clean
Email marketing is an investment in your business, but you can cut the cost dramatically by keeping people off your list who aren’t responsive. You can set up automation to remove people from lists when they never open your emails after a season or a specific time frame. Use it. You’ll be glad you did.
When you have the right tools, the right content, and are sending to the right audience, email marketing is a way that you can practically give yourself a raise anytime you want to once you build a healthy list. It may take some time, but you’ll be glad you did it.
Eight Tips for Successful Email Marketing Results
Let's Make Your Website a Success
Wouldn't it be nice to generate some real business?
About Me
What Can I Do For You?
What Will It Cost ?
A discussion about your requirements is completely free of charge.
What Should I Do
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '323', 'language_id_whole_page_fasttext': "{'en': 0.9443981647491456}", 'metadata': "{'Content-Length': '84347', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7YT5GYJNG5QVLZVSPTBIDZMB6XI6HNUP', 'WARC-Concurrent-To': '<urn:uuid:f45df513-2769-45f4-8112-1ca089098682>', 'WARC-Date': datetime.datetime(2018, 12, 10, 23, 51, 21), 'WARC-IP-Address': '162.144.49.226', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:V6TG2WZ3OSSOBOCNFCCLH2ANL6WIAOTS', 'WARC-Record-ID': '<urn:uuid:617eb6d2-c946-4ad7-9d33-25956da380eb>', 'WARC-Target-URI': 'https://website-designs.com/online-marketing/eight-tips-for-successful-email-marketing-results/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d61896d1-ce1d-4294-84d4-cb2154c84d93>', 'WARC-Truncated': None}", 'previous_word_count': '1018', 'url': 'https://website-designs.com/online-marketing/eight-tips-for-successful-email-marketing-results/', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-214-234.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0340765118598938', 'original_id': '40c700efc37957db0b1b3cf5bd4655f1fed04c7ed853603cd186d7c81b8ef012'} |
Petite MISTAKE: Inconsistent Steps
The importance of a wearing step tracker is all about awareness. When you wear one and you monitor your activity, it shows you how active or inactive you are.
Most of us think we are active, until we see start using step counter and we see how far off that 10k really is. And I’ll get to how many steps you should really be taking in just a bit but first I wanna tell you a little story…
I remember when I first started wearing my fitbit charge and found that my steps on the days that I would work as a personal trainer in a gym were always way higher than then days I was off. And what’s worse, was I found my steps were crazy crazy low the days I would work as a substitute teacher. [There’s a fun fact for you. I was actually working 3 part time jobs at the time. The 3rd was painting with a twist and on those days I was pretty active as well. But back to subbing….] You would think that being in a school, standing in front of a classroom full of kids and monitoring them that you were constantly on your feet – especially because at the end of the day I felt so exhausted – but I would come home from a 7 hour day having walking only 3000 steps and sometimes even less. Before wearing a watch, I would come home and veg out on the couch thinking I deserve this after a long day but that’s probably the worst thing I could have done.
That all stopped when I started wearing my Fitbit because it would actually encourage me to try to move around more during the subbing days. And I found that by coming home and going for a walk, not only did I get my steps up, but my energy levels picked up and I felt capable of finishing out the day productively rather than just watching netflix for 6 hours.
And I know most of my clients who have never worn a step tracker have this same amount of shock when they first start monitoring their activity. It just brings this whole new level of self-awareness about how active you really are.
Now the awareness is great. But it’s what you do with that information that matters. You see most people who wear a step tracker because it’s the trending thing to do, tend to not do much with this information. They look at and say “oh cool, I did 9k today” or “oh nice, I did 16k on Saturday, so now it okay that I only hit 4k today.” All that is is collecting data. Which is a great first start to wearing a step tracker, but here’s where you can become the advanced step tracking rockstar you should be…..
It all comes down to consistency. Just like counting macros, just like working out, just like drinking water and taking your supplements and everything else in the health and fitness realm, your steps should be consistent. The reason for this is super simple. Having a consistent amount of steps ensures you have a consistent calorie burn throughout your week or months and so on.
When your steps are consistent, it’s much easier to manipulate the pieces of the weight loss or muscle building puzzle to initiate further response from the body. I think the easiest way to understand this is the same way you understand water intake. If you drink a lot of water one day you might feel water heavy and then if you don’t drink much they next day you’ll feel dehydrated. And if you keep this up and down cycle, you feel different each day. But if you were to drink a consistent amount of water for a few days, you’d feel very much the same all week right?
It’s the same with steps, if you take a lot one day, your step tracker will even show your calorie burn was higher than the day before in which you only took half the amount of steps. Whereas if your steps were consistent throughout the week you’d have a more even amount of constant calorie burn over the course of your days. Which makes your body almost like a well working machine.
When you pair that with a consistent calorie intake, you’re much more likely to be in the correct energy balance in which you could manipulate to be either a deficit, maintenance, or surplus. It’s much easier to manipulate these things when everything like steps and water at a constant and consistent level. When your calorie intake and your calorie output and your water and your supplement and so on are so sporadic and all over the place, it’s so much harder to understand what’s causing hurdles or what’s causing success. But when you have control over them, you become the one in control of your body -and that’s where I want you and all my clients to be.
So when I coach my clients, the first things I have them do is get consistent with these puzzle pieces – the macros, the water, supplements, steps, workouts. And what often happens is it takes them quite a while to fall into the groove. And that’s okay. Having everything consistent takes effort but the more you try, the better and easier it gets. And once everything becomes consistent then I can manipulate the other pieces to push them in the direction they want to go.
But when it comes to steps, I always start them at a realistic number. See if they came to me only having walked 3k steps per day, asking them to do 10k per day like the standard recommendation is going to feel so hard and impossible and when it feels impossible, they are goin to get discouraged and most likely feel like this program is too hard and probably give up before we even get anywhere. I don’t want that to happen because that looks bad for both of us. Instead, I set them up at a challenging but achievable # of steps. In this particular example this client would start at 5-6k steps per day. What this does is increases her calorie expenditure with still room to grow. Rather than if she just started at 10k and stayed there, her body would respond really quickly and then plateau forever.
We don’t want that. We want small changes overtime to keep yielding results. SOOO when she can easily hit 5-6k per day which usually takes 2-3 weeks for most people who are just getting started with this kind of routine, then we can increase her steps a little more. I usually jump up about 1k steps which is like an addition 10 min of walking per day which again is a little bit more challenging but totally achievable. Then I keep progressing clients this way, a little bit more every few weeks. But they have to be consistently reaching their goal before I advance them.
So for you, if you want to know how many steps YOU should be taking I encourage you to try this approach instead of reaching for that unrealistic 10k right off the bat. Now if you’re a superstar and you’re already averaging 12k per day. GO YOU! but let’s just double check. Are you consistently reach 12k everyday? or is it some 9s, some 15s and kinda scattered in between? If so, I want you to try getting as close to you can to 12 every day.
IF you are really close to 12k every day GO YOU FOR REALS! Now try increasing by 1k.
The goal isn’t to keep increasing until you’re at 26k per day. that’s super insane. Honestly, once my clients get to 16k or so, I try to ween them back down while keeping their calories where they are at. The goal is to be at a challenging amount of steps for you! And that varies depending on what stage of life you are in. Maybe you are like me who used to work a very physically demanding job where you were at 16k per day but now working from home at a desk most of the day, 11k is perfectly challenging enough for now. It really all depends on you.
I will say that my most successful petite clients move around a lot each day. Not only do they complete their 30-60 min workouts throughout the week, but they are moving all day long. I’m not talking about a 10-mile hike everyday. But just getting up from your work desk periodically to get water or coffee, standing up when you’re on the phone (instead of sitting on the couch), and parking furthest from the store entrance. You’ll find that all of these things increase your step count. And every step counts towards the overall lean petite product.
So if you’re truly trying to alter your body composition, you definitely don’t want to be that person who’s like “oh I average 12k per day but some days you’re hitting 4k and others 18k.” It’s so inconsistent! And again, when you’re trying to lose or gain weight, that inconsistency makes it much harder to manipulate anything to get your body to change.
But what if you go over? Okay there’s nothing wrong with having some extra steps some days but if you find yourself constantly going way over then maybe it’s time to increase your goal. If it’s just a few random days, give yourself the reward of chilling out on those days. For example, every Sunday my boyfriend and I go on a hike. We usually get anywhere from 8-10k steps before 9am. So on these days, I actually take the rest of the day really easy because I know I’ll easily hit my 11k just by moving around the house like I normally do. I owe myself that rest for how much I do throughout the week and I don’t feel guilty for it because I already met my step goal. But I will also say, it’s not ideal to do everyday like this. And that’s because you want a consistent calorie burn throughout most of your days – especially as a petite – and besides, it helps keep your energy levels up when you’re moving throughout the day. I know you know what I’m talking about because I always feel way more exhausted on the days that I still around inside. [That’s why I could never live in a cold snowy climate. This girl NEEDS TO MOVE! It’s honestly when I feel most creative and I have a clear mind. I take a walk once or twice a day because it helps me think or I listen to a podcast because it helps me learn and be more creative.]
As far as step trackers go, I’m obsessed with my fitbit Versa. It looks very much like an apple watch and has some apps without being a full on phone on my wrist. Some of my clients love their apple watches but I’m just not there yet. Maybe one day. In my opinion, these are both the most accurate options. Plus they sync with my funsized program app so it just makes it easier for the both of us to use one of those brands. Speaking of my program, I do have an app to deliver my clients unique macros and training program and everything else that comes along in my coaching. You can check it all out on my website at HERE and be sure to fill out the application there so we can hop on a phone call to see if we’re a great fit to work together.
P.S. if you have a Fitbit or Apple watch, I suggest you turn the movement reminders on! Every hour your watch will buzz and remind you how many steps you need to take that hour. I love this feature because it’s an accountability partner on your wrist! Just imagine me in your ear next time it buzzes saying “go get your funsized steps!
Happy Stepping!
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9617554545402528}", 'metadata': "{'Content-Length': '74295', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2AQS7VZJD4B24PDKAEGVEJW5C2TU7XP4', 'WARC-Concurrent-To': '<urn:uuid:e9452a42-37dc-4e5c-a70a-5e8f709c8bc3>', 'WARC-Date': datetime.datetime(2020, 9, 27, 11, 23, 12), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KW3QS3M34HCJKE6WLY4RKHGOEGRPGQRK', 'WARC-Record-ID': '<urn:uuid:865a9c8b-f22c-49db-91c0-81075c01148b>', 'WARC-Target-URI': 'https://kierstincifelli.com/2020/08/10/petite-mistake-inconsistent-steps/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4df32f70-b7de-46be-9d49-8cbb1ee5bcdd>', 'WARC-Truncated': None}", 'previous_word_count': '2080', 'url': 'https://kierstincifelli.com/2020/08/10/petite-mistake-inconsistent-steps/', 'warcinfo': 'isPartOf: CC-MAIN-2020-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-206.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0390658974647522', 'original_id': '319b082e4e657b694aff727daa06b6614f7c80f7964382e62b962bdec3997b87'} |
The return of cold temperatures in Wisconsin has brought a resurgence of ice fishing across the state.
Ice breaks and open water have kept some anglers from their usual fishing areas this season.
Aaron Berg, owner of Iceberg Guide Service in Sheboygan, said the season started out slow, with safe ice only recently forming on major lakes in northeastern Wisconsin.
"The cold weather this week is just going to get us out to more fishable areas, especially on the Winnebago system," Berg said Friday. "(Lake) Poygan is finally drivable for a few people. The main lake of Winnebago was not even safe for ATVs prior to this week."
Berg said anglers should keep in mind that the ice is thinner than it normally is at this time of year. He said anyone venturing onto the ice for the first time should avoid cracks and bring along an ice chisel or "spud bar" to test the ice before walking on it.
Wisconsin members of the U.S. Coast Guard who patrol Green Bay and other ice fishing locations along Lake Michigan are working without pay as the federal government shutdown continues. But Berg said any changes in their operations shouldn't impact area anglers.
"We spend a lot of time checking the ice to make sure it's safe for our customers and the other people out there," Berg said. "(The Coast Guard) never had a real big presence. You didn’t see them at the boat launches or anything like that. So I guess it was kind of 'out of sight, out of mind' the same way it is now."
Some anglers on the western side of the state feel the same way about having fewer U.S. Fish and Wildlife Service employees patrolling the national wildlife and fish refuge that encompasses the Mississippi River.
"It really doesn't have an impact on anything we do out here as far as fishing," said Chad Knapmiller, owner of Schafer’s River Rentals, a boat rental and bait shop on Lake Onalaska.
Like northeastern Wisconsin, Knapmiller said anglers along the Mississippi River have seen more ice breaks than usual this season.
"We got unusually cold weather to start the season out with, which made some good ice right away. But then we warmed back up and with that warm up, it's brought some unusual things with how the ice has formed," Knapmiller said.
He said areas on the ice that are usually strong enough to support vehicle traffic have been broken up this winter, forcing anglers to use a more creative approach to access popular fishing locations.
"They’re walking across an island to get out by the (La Crosse Airport) instead of walking the ice like they normally do," Knapmiller said.
As temperatures dip, Knapmiller said he’s seen an influx of first-time anglers coming into his store. He said anyone new to ice fishing should stop into their local bait shop to ask about ice conditions before venturing out. | mini_pile | {'original_id': 'd08bc03b643db4a9b3101c9c6dc1be3950c9c28bea482b79b4989bad1d555478'} |
User interface – How we interface with the technology.
Well it happened just the other day; one of those out of character early morning phone calls you just know is going to be bad news! It was just before 7 o’clock on a Saturday morning when the telephone woke both my wife and I from a deep sleep following a rather late and disturbed night. As I answered in a half comatose and shocked state to hear my elderly father in a panic I immediately feared the worst! Establishing if I was ‘up yet’ he launched into how a message had appeared on his television screen and that he didn’t know what to do! Once my brain got over the initial shock of him being perfectly OK but just having problems with his television, I realised what had happened.
A few weeks earlier he had been complaining that some of the regular TV programmes he enjoyed had ‘disappeared’, and he could no longer find a number of the channels he liked to watch. I asked him if he had ‘re-tuned’ when the ‘new service message’ appeared on his screen. “What new service message” barked the reply! When I had the opportunity to check the TV settings I established that the ‘new service alert’ option had been disabled when the unit was installed, and that he had been unaware of any service upgrades for three years, slowly losing channels and services during that time. It was then that I enabled the alert feature, thereby allowing him to accept new or changed services as they became available, and this was the first time there had been a service change since then.
This little incident made me realise just how alien current day technology is to someone who has limited exposure to it, and the way we take for granted menu structures, binary selections modes, multi-purpose keys and buttons, and words such as ‘select’, ‘enter’, and ‘cursor’. It’s no coincidence that programming video recorders (VCR’s) has become the butt of so many jokes, and those new entrants to this market make a virtue of the simplicity of programming and use. Similarly, trying to remotely visualise the TV menu structure and layout of his handset in order to guide him through the accepting the new service option, over the telephone, was indeed a challenge, and gave me a whole new appreciation of help-desk operations.
Continuing this theme, from personal experience I like using maps and prefer to get a mental picture of a journey and how it relates to the physical landscape, and more specifically a mental ‘shape’ of the journey (i.e. down, across, down again, keep left of the city etc.). This certainly helps when you are faced with commands such as ‘Eastbound’ or other such directional instructions, especially when you are driving and unable to examine the map (it’s how I cope with spatial awareness). So the use of Satellite navigation (SATNAV) has been a challenge. Its adoption, in my case, has been episodic, cautious, and thought provoking. I had used it some years ago in a rental car in the US, and previous use improved confidence. However, I like to get a context for where I’m going but the small screen (even on the built-in versions) is too small to show the complete journey at a sensible scale, and the detailed version too limiting. You can no doubt select preferences but the instruction manual is longer than Harry Potter and the order of the Phoenix! I tend to find SATNAV works best for me switching it on when I’m approaching my destination and the possible combinations or alternative routes it could offer are limited, and the margin for error therefore reduced. However, I did once enter the postcode of an organisation I was visiting only to end up at the local Postal Sorting Office, as this company publishes a postcode relating to the sorting office rather than their own site!
Which brings me full circle to where these missives originally began, a regular article I used to write for a user group publication so apologies to those of you who will have read some of this before (extracts first published in The Post, Volume 22, No: 2. April 2006).
As a frequent promoter of IT to help solve business problems and improve efficiency and effectiveness I understand the benefits of Radio Frequency (or wireless) devices. I applaud the flexibility and mobility they promote, be it instantly passing an order to the kitchen for service in restaurants, or checking stock room inventory when a customer asks for an item not available on the sales floor. But as a user and recipient of the service (or lack of it), I’m acutely aware of the incongruence of the application of technology in some of these situations.
On a visit to Lisbon (Portugal) I had time to visit a well-known ‘coffee house’ known as the ‘Majestic Café’. It boasts a long heritage, fantastic patisserie, traditional values, starched aprons and quality service; you could say “a tradition of excellence”! It was all going well until the waiter taking my order reached for an electronic device ‘slung’ from his waist and then avoid any further eye contact for the remainder of the transaction as he was transfixed by scrolling through menus, the rapid tapping of his pointing device on the glass screen, and repeatedly having to reaffirm what I had just ordered as he wasn’t really listening to me but concentrating hard on the screen and the device. Not only had the old world character of the Café been shattered, but also it felt like I had been in some way ancillary to the whole event. Not a great customer experience!
As ‘chip and pin’ is now embedded in the UK (i.e. the use of a personal identification number to validate the use of a credit card instead of signature verification), the technology is once again taking over. If you pay by card it can now be a completely ‘dialogue free’ transaction (although in some petrol stations I can see how this would be an attraction)! As customer familiarity grows with the devices (and these are many and varied), you can insert your card, and follow the instructions on screen, entering PIN, validating card type and transaction amount, and finally removing your card on command, all in complete silence, giving the attendant yet another excuse to avoid any interaction! Taking this one stage further, when paying for a meal in dimly lit restaurants you are now expected to accept the transaction amount, confirm that you want to give a gratuity (by using the function keys), insert the amount of the gratuity and press enter, accept the new total and press enter, accept the card type (toggle and enter), a total of twelve key stokes on my last count! How long before someone decides what a great opportunity this affords to collect customer information, feedback, socio economic grouping and much more.
It doesn’t matter how fast the processor or how clever the application, if the device is unusable then it is worthless. Clearly many of these devices are designed by engineers – for use by engineers, so what about the rest of us? Human-computer interaction (HCI) can’t be left to engineers alone and requires that we develop more user centric design principles when building such interfaces. Have you ever wondered why we only use fraction of the features available to us? Reduced complexity would be a good starting point.
Tags: , , , ,
Leave a Reply | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9665276408195496}", 'metadata': "{'Content-Length': '16227', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4QXY76WWJSIGFXPWCTDPBR4VICVGCM4A', 'WARC-Concurrent-To': '<urn:uuid:c43eb3dc-6293-4f0d-9e66-f588652ad254>', 'WARC-Date': datetime.datetime(2018, 12, 10, 21, 3, 47), 'WARC-IP-Address': '62.233.121.30', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:ZYA6N2EWXNCDHWUL32V56XJLOBZ3YVYU', 'WARC-Record-ID': '<urn:uuid:a24e5389-324e-451e-afa2-907f407f659d>', 'WARC-Target-URI': 'http://www.thebradleypartnership.com/thinkingaloud/2010/brad/user-interface-how-we-interface-with-the-technology/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5c3e0cb1-1aee-4a47-9656-532f36f0f8de>', 'WARC-Truncated': None}", 'previous_word_count': '1221', 'url': 'http://www.thebradleypartnership.com/thinkingaloud/2010/brad/user-interface-how-we-interface-with-the-technology/', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-150-135-54.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02056884765625', 'original_id': 'd8936945192d8f261d679b6212e7bf276670ca69cfac257626dacf0e09e7b831'} |
Full Scholarships for MSc Students at Delft University of Technology in Netherlands, 2019
The Delft University of Technology is offering Full Scholarships for MSc Students in 2019-2021 session in several departments.
TU Delft is a technology university with a leading global reputation. Our education and research encompass virtually the full range of high-quality disciplines, courses and unique facilities in the engineering sciences. TU Delft wants to be a breeding ground for cutting-edge technological scientific developments to meet the great societal challenges of our age.
To apply for a scholarship at TU Delft you have to apply for a master programme first. If you want to be eligible for a scholarship during your master’s application process, you would simply have to have submitted your master’s application before the scholarship deadline (stated on the specific scholarship’s information). Some scholarships require you to attach a scholarship form together with your master’s application, and others simply need you to have applied for the master’s programme before the deadline.
The benefits vary for each scholarship. Please check the official website for detail benefits.
1) Your original academic degree(s): If a degree is in a language other than English, French, German or Dutch, a certified translation is also required
Or in case you did not yet graduate: A certified statement from your university confirming the type of degree you will obtain and when you are expected to graduate.
2) A copy of your official academic transcript(s), front and back, in the original language. If the degree is in a language other than English, French, German or Dutch, a certified translation is also required. Note: if you are in your last year of your undergraduate studies, please upload a copy of your provisional transcript. If the transcript is in a language other than English, French, German or Dutch, a certified translation is also required.
3)Language Requirement* A TOEFL iBT (Test of English as a Foreign Language Internet-based Test) with an overall band score of at least 90 and a minimum score of 21 for each section. OR
1. * An IELTS (academic version) with an overall Band score of at least 6.5 and a minimum of 6.0 for each section. OR* A Cambridge Assessment English. Only the following are accepted:
• * C1 Advanced (Certificate of Advanced English) with an overall score of 176 and a minimum of 169 for each section.
• * C2 Proficiency (Certificate of Proficiency in English) with an overall score of 180 and a minimum of 169 for each section
Exemptions: Nationals from the USA, U.K., Ireland, Australia, New Zealand, and Canada are exempt from the English language proficiency requirement. Applicants who obtained a bachelor’s or master’s degree IN one of the aforementioned countries are also exempt from the English language proficiency requirement
4) Motivation letter
A clear and relevant essay in English (1,000 – 1,500 words) addressing the following:
* Your motivation for choosing this MSc programme.
* Why you are interested in TU Delft and what you expect to find here
* If this MSc programme has specialisation(s), which specialisation interests you the most and why?
* Describe your hypothetical thesis project: what kind of project would you prefer? What would you want to explore? Please limit your answer to three possible topics.
* Summarize in a maximum of 250 words your thesis work or final assignment/project. Please include information about the workload.
5) An extensive curriculum vitae (resume) written in English.
6) photocopy of the page(s) of your passport showing your name, date of birth, place of birth, passport expiration date, and signature. Your passport needs to be valid at least 6 months after arrival in the Netherlands.
7. Payment application fee
All applicants are required to pay a € 120 application fee . The application fee is only refunded to students who start their MSc programme in Delft.
8. Two reference letters in either English, French, German or Dutch.
These letters must be:
* from either a previous professor or assistant professor. If you have work experience, one of these letters may be from your employer.
* written on the official letterhead /have the official stamp of the university or company.
* signed by the referee and include your complete name.
If your referee is hesitant to provide you with the recommendation letter, he/she can email a scanned PDF of the letter to internationaloffice@tudelft.nl. His/her e-mail must include your complete name and TU Delft student number. You will be given this number upon registering in Studielink.
If you choose this option, please upload a statement under “reference letter” in osiaan.tudelft.nl informing us of this decision. This statement should include the name and e-mail address of your referee.
Eligible Regions: Open for All
• Gather all necessary documents
• Fill out an Application form online before the deadline
• Pay the application fee
• The application process varies for each scholarship. Please check the official website for detail process.
Application Deadline: April 1, 2019
Official Scholarship Website
Get Scholarship Alerts!
Enter your email address below and check your inbox right now
Delivered by FeedBurner | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '72', 'language_id_whole_page_fasttext': "{'en': 0.908341646194458}", 'metadata': "{'Content-Length': '88145', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:K3DQG3CTB5TA2BNFEIAOXBIOZ4IDWQUV', 'WARC-Concurrent-To': '<urn:uuid:7cd8beca-a4a6-4eb0-81f2-48b3f00ffa98>', 'WARC-Date': datetime.datetime(2019, 5, 25, 10, 0, 20), 'WARC-IP-Address': '160.153.138.177', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7DEQU7QMK77WY4HMCQ64FMA7ZMFF5G3S', 'WARC-Record-ID': '<urn:uuid:3542e731-4c4f-4dab-9da5-1191098991e2>', 'WARC-Target-URI': 'http://allscholarships.info/full-scholarships-for-msc-students-at-delft-university-of-technology-in-netherlands-2019/?replytocom=18404', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a50fb35b-29f1-47d7-b970-258bffd80eb6>', 'WARC-Truncated': None}", 'previous_word_count': '854', 'url': 'http://allscholarships.info/full-scholarships-for-msc-students-at-delft-university-of-technology-in-netherlands-2019/?replytocom=18404', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-168-187-224.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.044506192207336426', 'original_id': 'e69d7ec59a25987a2d2f6ff965e0185aa62ab059ff76a4fc85f5c95ed4907f09'} |
Caffeine is a stimulant found in various foods, drinks, and other products. It’s commonly used to keep you awake and alert. Caffeine is technically a drug, and some of the most popular beverages in the United States, such as coffee, tea, and soda, contain significant amounts of caffeine.
According to the Mayo Clinic, the recommended amount of caffeine is usually 400 milligrams per day for healthy adults. Caffeine overdose may occur if you ingest more than this amount. Adolescents should limit themselves to no more than 100 mg of caffeine per day. Pregnant women should limit their daily intake to 200 mg of caffeine, since the effects of caffeine on the baby are not fully known.
The chart below shows how much caffeine is found in a serving size of some common sources of caffeine, according to the Center for Science in the Public Interest.
Serving sizeCaffeine (mg)
Black coffee12 oz.260
Black tea8 oz.30–80
Soda12 oz.30–70
Red Bull8.3 oz.80
Chocolate bar (dark)1.45 oz.20
NoDoz caffeine tablets1 tablet200
Excedrin Migraine1 tablet65
Additional sources of caffeine include:
• candy
• medications and supplements
• any food product that claims to boost energy
• certain chewing gums
A caffeine overdose can be life-threatening in the most severe cases, but many people only notice some unpleasant symptoms that go away once the caffeine is excreted from the body.
Check out a visualization of how caffeine affects the body »
A caffeine overdose occurs when you take in too much caffeine through drinks, foods, or medications. However, some people can ingest well above the daily recommended amount each day without issue. This isn’t recommended because high caffeine doses can cause major health issues, including irregular heartbeat and seizures. Consuming high caffeine doses on a regular basis can also possibly lead to hormonal imbalances.
If you rarely consume caffeine, your body may be especially sensitive to it, so avoid ingesting too much at one time. Even if you regularly consume large amounts of caffeine, you should stop when you feel any unpleasant symptoms.
Several types of symptoms occur with this condition. Some symptoms may not immediately alert you that you have had too much caffeine because they may not seem serious. For example, you may experience:
Other symptoms are more severe and call for immediate medical treatment. These more serious symptoms of caffeine overdose include:
Babies can also suffer from caffeine overdose. This can happen when breast milk contains excessive amounts of caffeine. Some mild symptoms include nausea and muscles that continually tense and then relax. More serious signs of caffeine overdose can accompany these symptoms, including vomiting, rapid breathing, and shock.
If you or a child under your care is experiencing these symptoms, seek a doctor’s help immediately for diagnosis and treatment.
Caffeine allergy »
If you suspect a caffeine overdose, let your doctor know of any caffeinated items you consumed prior to having symptoms.
Your breathing rate, heartbeat, and blood pressure will also likely be monitored. Your temperature may be taken, and you may be given a urine or blood test to identify the drugs in your system.
Treatment is meant to get the caffeine out of your body while managing the symptoms. You may be given activated charcoal, a common remedy for drug overdose, which often prevents the caffeine from going into the gastrointestinal tract.
If the caffeine has already entered your gastrointestinal tract, you may be offered a laxative or even a gastric lavage. A gastric lavage involves using a tube to wash the contents out of your stomach. Your doctor will likely choose the method that works fastest to get the caffeine out of your body.
During this time, your heart will be monitored through an EKG (electrocardiogram). You may also receive breathing support when necessary.
If the symptoms are mild, you may be able to wait until the caffeine is no longer in your body or treat the overdose yourself. Some home treatments for caffeine overdose include drinking water, getting mild exercise, and eating foods high in potassium or magnesium, such as bananas or dark leafy greens.
Home treatment may not always accelerate your body’s metabolism of the caffeine. If you’re unsure of whether you need treatment, call Poison Control at 800-222-1222 and describe your symptoms. If your symptoms sound severe, you’ll likely be advised to go to the local hospital for immediate treatment.
To prevent a caffeine overdose, avoid consuming excessive amounts of caffeine. In most cases, you shouldn’t have more than 400 mg of caffeine per day and even less if you’re particularly sensitive to caffeine.
Caffeine overdose can usually be treated without creating long-term health problems. But this condition can be deadly, especially for younger patients, such as infants and toddlers. Caffeine overdose can also worsen preexisting health conditions, such as anxiety. A review has connected certain effects of excessive caffeine consumption with those of other drugs, such as amphetamines and cocaine.
When treatment is given too late, there may be irreversible health problems and even death. You should at least call the American Association of Poison Control Centers (AAPCC) at 800-222-1222 if you suspect a caffeine overdose.
How you can die from a caffeine overdose » | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '132', 'language_id_whole_page_fasttext': "{'en': 0.9230360984802246}", 'metadata': "{'Content-Length': '110216', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KAXPCUBQG54JCXJ7TMZSVKMKNKNFJ3ME', 'WARC-Concurrent-To': '<urn:uuid:676832e7-c717-4c1b-b95c-958a19f85346>', 'WARC-Date': datetime.datetime(2018, 11, 14, 22, 21, 4), 'WARC-IP-Address': '23.13.152.11', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:G6NYEP2JEKKOZ22YC3UKDN2UXILD47NM', 'WARC-Record-ID': '<urn:uuid:edbb59d5-c2b4-4eb2-9d5c-56adf5824eae>', 'WARC-Target-URI': 'https://www.healthline.com/health/caffeine-overdose', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a703b01d-bc98-44df-8c97-f8c56492a23b>', 'WARC-Truncated': None}", 'previous_word_count': '929', 'url': 'https://www.healthline.com/health/caffeine-overdose', 'warcinfo': 'isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-228-195-45.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01860123872756958', 'original_id': '5e07fa7d7db4982d7f67a24c7b0cc5d56f175e6bf60bb38736d65d6c0cb5bc76'} |
You want to increase sales and enter new markets, and you know that means hiring more salespeople. But how can you be sure these new team members will turn out to be a worthwhile investment for your company?
They will--if you take a disciplined approach to hiring and invest the time and effort to set all your sales reps up for maximum success. That advice comes from Victor Ho, co-founder of FiveStars, a loyalty program platform for small businesses. He speaks from experience. The two-year-old startup has grown from 150 employees to 300 in the last six months--and 100 of those new hires have been sales reps. At the same time, the San Francisco-based company has also opened a new office in Denver. Despite that rapid growth and the perils that could go with it, tripling the size of FiveStar's sales team has paid off. The company is now adding merchants (its paying customers) five times faster than it was a year ago.
How does the company make it work? Here are Ho's insider tips for rapidly building a sales force the right way:
1. Fill sales positions--don't create them.
What do you do when faced with a sales rep candidate who has an incredible track record and potential, but you don't have an opening that's a good fit? Many companies will reconfigure their structure or create a new job so as not to lose that great candidate, Ho says. FiveStars won't.
"We don't want to hire people and churn and burn them as other sales organizations sometimes do," Ho explains. "Attrition is the hidden killer in local. We will pass on somebody if we don't think we have the structure that will make that person successful." This approach can create challenges, he says. "For example, we only allow one new rep per market. We thought if we prioritized setting every salesperson up for success, the results would come--and they have. Local sales attrition benchmarks are anywhere from 30 to 50 percent annual rep turnover. Ours has been less than 3 percent."
2. Treat field offices like new companies.
When you set up a new sales office in a new territory, the people who work there can wind up feeling cut off and far from the center of the action. "It's a big mistake to treat a new office as an extension," Ho says. So when FiveStars opened its Denver office, the founders treated it as if it were a whole new startup. One of the company founders actually moved to Denver for six months to be on hand while the new office was staffed and got up and running.
3. Make training new hires a top priority.
VPs and founders at FiveStars each spend two to four hours a month training new hires. "This investment in training to reduce ramp time is particularly valuable in sales," Ho observes.
Not only that, during the accelerated hiring period when FiveStars tripled its sales team, the company had some of its most experienced and successful sales reps devote all their time to training new hires. "Most companies wouldn't tell their best sales reps to stop selling and focus on training," Ho says. "But for us, making sure every individual rep is set up to succeed will end up being the best for the company. The result is we're getting reps up to speed and productive much faster than we originally thought possible--and our sales results have reflected that."
4. Only hire as many people as you can train--the right way.
"When designing our onboarding system, we prioritized scaling our culture and keeping the training personalized and engaging," Ho says. That means things like flying new hires in the Denver office to the San Francisco headquarters for two weeks of training, and holding new hire dinners and bourbon chats for them with the company's founders.
What if you want to hire new people more quickly than a process like this allows? Don't do it, Ho advises. "Once we had that system, we figured out how many people we could hire per class," he says. To maintain the intimate feel and personal connection, FiveStars determined that maximum was 15.
Most companies would figure out how many people they wanted to hire and then design a training system around that target, he adds. But he believes maintaining the right experience and making sure all new hires fully understand the company culture is too important. "We calculated it would take us six months to double the right way," Ho says. "The outcome has been tripling our sales force and maintaining sales metrics as we've scaled. Most importantly, people are coming out of onboarding with solid knowledge of our founders, our products, and how we talk about the company." | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9720279574394226}", 'metadata': "{'Content-Length': '101835', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QH6O5LZ633KROFAHPPWKV3IW5NHPUZ6K', 'WARC-Concurrent-To': '<urn:uuid:4f064255-cf85-4110-aa52-8c8b618c9446>', 'WARC-Date': datetime.datetime(2021, 9, 24, 11, 37, 29), 'WARC-IP-Address': '151.101.249.54', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:5JAG6GQOJMWHKOAOW2XHQJP347B73UMQ', 'WARC-Record-ID': '<urn:uuid:f7172890-1b97-4123-9fae-8c2b53c9dc05>', 'WARC-Target-URI': 'https://www.inc.com/minda-zetlin/4-secrets-to-hiring-a-remarkably-effective-sales-team.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0aa66c42-7141-49ba-88b2-9808120e023b>', 'WARC-Truncated': None}", 'previous_word_count': '777', 'url': 'https://www.inc.com/minda-zetlin/4-secrets-to-hiring-a-remarkably-effective-sales-team.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04536867141723633', 'original_id': '3121364d64199f718a0b52d7711027fafbf98d4d95d8731ae99609de773a2f4b'} |
More on MF Global
(Such an apt name!) and it’s (intentional?) crash. BE SURE TO LISTEN TO THE BROADCASTS AT THE END OF THE LINK!
We had a COMEX system failure in November. COMEX was ready to default on gold and silver in November. Rather than honor delivery demands in gold and silver- JP Morgan simply stole the money in the accounts that were going to stand for delivery. They had their pockets picked while they were standing in line at the delivery window. Notices of delivery were replaced at stolen accounts!
James R. Granger, Jr.
earned degrees in economics and finance, has a lifelong interest in history and science, and has authored books on Megahistory, the origins and migrations of the races of humanity. This site was established to provide a vehicle for the dissemination of information important to progressive people. | mini_pile | {'original_id': '810536537fa77ae7e277873c6f51a895f6cdea697fd6c510da606b042f3a1e14'} |
Why did Alma baptize himself?
We know that Alma had received the authority to baptize, although we don’t know when. Joseph Fielding Smith concluded from this that Alma had also previously been baptized. … Perhaps the action of immersing himself with Helam was a way of showing his solidarity with the people who were being baptized that day.
Who baptized Alma in the Book of Mormon?
As Alma’s audience agreed, the prophet descended into the waters of Mormon and began his work by first baptizing a man named Helam. During the baptism of Helam, “both Alma and Helam were buried in the water,” as Alma renewed his own covenant with the Lord while also serving as example for his followers.
Why did Ammon consider himself an unworthy servant?
And Ammon declined doing this thing, considering himself an unworthy servant (Mosiah 21:32-33). This passage strongly implies that Ammon did in fact have authority to baptize. The reason he gave for not baptizing them was not a lack of authority but a lack of personal worthiness.
Was Alma a priest of Noah?
The priest Alma
One of the priests of Noah, a young man named Alma, believed Abinadi’s words and pleaded with the king to spare the prophet’s life. Alma was cast out, and was forced to hide so that the servants of the king would not kill him. He taught the words of Abinadi to more of the people, and many believed him.
IT IS INTERESTING: Your question: Who debated Martin Luther?
What did Alma do?
According to the Book of Mormon, Alma (/ˈælmə/) was a Nephite prophet who established the Church of Jesus Christ in the Americas during the reign of the wicked King Noah.
Was Adam baptized?
Who is Alma the elder father?
ALMA, the elder, was an Israelite of the tribe of Manasseh, a direct descendant of Nephi, the son of Lehi. He was born in the land of Lehi-Nephi, or a region contiguous, 173 years before the advent of the Redeemer, when Zeniff was king in that portion of the South American Continent.
How old is Alma the Younger?
Alma the Younger’s experience with the angel happened sometime between 100 BC to 92 BC according to the chapter heading of Mosiah 27, so it was at most 9 years before Alma the Elder died. That means that Alma the Elder was at least 73 years old when the angel came to Alma the Younger.
Where did the Mulekites come from?
Mulek and his nation
The people of Mulek established their capital at Zarahemla, north of where Lehi and his people landed. In the text of the Book of Mormon, the Mulekites are referred to as the “people of Zarahemla.”
How many sons did Alma the Younger have?
Stories. A retelling of the story of Alma the Younger giving counsel to his three sons. A retelling of the story of Alma teaching the Zoramites about faith.
IT IS INTERESTING: What is the Gospel and how is it relevant to our lives?
What happened to Alma the Younger?
After they were visited personally by an angel and rebuked for their actions, Alma fell into an unconscious state where for three days and three nights he lay unable to move until he felt within that he had been forgiven of his sins.
What Alma means?
The exact origin of the name Alma is debated, but it is most likely derived, in the female form, from the Latin word almus, which means “kind”, “fostering”, or “nourishing”.
What does the name Alma mean in Arabic?
The name Alma (Arabic writing : الما) is a Muslim girls Names. The meaning of name Alma is ” Apple “
Protestant community | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '43', 'language_id_whole_page_fasttext': "{'en': 0.9816654920578004}", 'metadata': "{'Content-Length': '67337', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5QPH4OMT5FSB37XPZNFC2Q7E6DJCBX53', 'WARC-Concurrent-To': '<urn:uuid:a30a0d2b-79fb-4b07-968b-4260490d6200>', 'WARC-Date': datetime.datetime(2021, 6, 22, 14, 1, 6), 'WARC-IP-Address': '144.126.138.138', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P4XC27Q7MTV6PJ3Z45LOSG3UUKA6T7GZ', 'WARC-Record-ID': '<urn:uuid:bf9297f5-4819-4c36-a21d-889c86a4e5c3>', 'WARC-Target-URI': 'https://raymundtamayo.com/protestantism-and-currents/why-did-alma-baptize-himself.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d753ba5d-776b-489d-b3be-1fe3043de457>', 'WARC-Truncated': None}", 'previous_word_count': '650', 'url': 'https://raymundtamayo.com/protestantism-and-currents/why-did-alma-baptize-himself.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-171.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.8310074210166931', 'original_id': 'e856aa48a426450fbce87a53e3f977056f04ab911751a74c4d752f9e70a0d06f'} |
Skip to content Skip to navigation menu
Slalom Ski Size Chart
The length of a slalom ski is based on the weight of the skier, and there is a pretty simple formula for figuring the correct length. Higher towing speeds are generally associated with smaller skis and/or slalom skis, while lower towing speeds usually require two skis that are longer, wider, or both. See the chart below.
For shaped skis the sizing is more general with only the lowest range of boat speeds recommended. Under 175 lb: 61"-65" and over 175 lb.: 65"-67". Source: O'Brien Product Catalog
Weight 26-30mph Boat Speed 30-34mph 34-36mph
Under 100lb. 61"-64" 61"-64" 61"-64"
105-120lb. 61"-66" 61"-64" 61"-64"
115-140lb. 61"-66" 61"-66" 63-"66"
135-160lb. 64"-69" 63"-66" 63"-66"
155-180lb. 66"-72" 66"-69" 66"-69"
175-200lb. 68"-75" 68"-72" 66"-70"
200+lb. 70"-75" 68"-75" 68"-72" | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '24', 'language_id_whole_page_fasttext': "{'en': 0.7312525510787964}", 'metadata': "{'Content-Length': '35361', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GMJPFCY3A5FDE56ID5QOSNWVHP5UGQUF', 'WARC-Concurrent-To': '<urn:uuid:fb181cee-06e0-41d1-be00-94c7605ddeaf>', 'WARC-Date': datetime.datetime(2016, 7, 29, 15, 59, 17), 'WARC-IP-Address': '162.242.194.234', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WKGQYIHU75ICGEJFCLEHMLQZCJKIR3QN', 'WARC-Record-ID': '<urn:uuid:3a6e0176-8c5d-49af-928d-3cbd1de0189c>', 'WARC-Target-URI': 'http://www.westmarine.com/WestAdvisor/Slalom-Ski-Size-Chart', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c84de360-d393-48be-aa4f-5d303dd37b72>', 'WARC-Truncated': None}", 'previous_word_count': '132', 'url': 'http://www.westmarine.com/WestAdvisor/Slalom-Ski-Size-Chart', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.027601122856140137', 'original_id': '99f4f422471b55de39dd3a64849d447632dfa7b0c9d48814cf0734fc438fa48e'} |
Q:
Gradle downloading source dependencies
In gradle I have the following build.gradle which results in a lot of JARs being copied to the 'sources' folder, but only the jersey-media-moxy-2.22.2-sources.jar actually contains source code:
defaultTasks 'run'
repositories {
mavenCentral()
}
configurations {
sources {
description = 'sources download'
transitive = true
}
copysource {
extendsFrom sources
}
}
dependencies {
sources group: 'org.glassfish.jersey.media', name: 'jersey-media-moxy', version: '2.22.2', classifier: 'sources'
}
task copySources(type: Copy) {
println 'Copying dependencies to sources directory'
into "sources/"
from configurations.copysource
}
task run (dependsOn: ['copySources']){
println 'Downloading JARs'
}
run << {
println 'Downloads complete. Finished.'
}
How can I modify the build so that all source code (including transitive/dependency sources) are obtained? I don't want non-source jars. I do not understand why the classifier is not applied transitively so please clear up my misunderstanding.
Also, I understand that this is not the best way to use gradle. This is (part of) a temporary step until we migrate the build system.
A:
Primarily we have to remind it that
we need to add 2 things first in idea's module section or eclipse classpath section
idea {
module {
//if you love browsing Javadoc
downloadJavadoc = true
//if you love reading sources :)
downloadSources = true
}
}
or
apply plugin: 'java'
apply plugin: 'eclipse'
eclipse {
classpath {
downloadSources=true
downloadJavadoc = true
}
}
Resource Link:
https://docs.gradle.org/current/dsl/org.gradle.plugins.ide.idea.model.IdeaModule.html
Dependency Management
Secondly,
we need to remove mavenLocal() portion from repositories section and repositories will be placed in top most section. That you have already done it.
repositories {
mavenLocal() // remove this
mavenCentral()
}
Thirdly,
Sometimes you don't see the sources in Eclipse WTP although they're downloaded by gradle. In such case you need to manually push Web App Libraries to the bottom of build path.
For solving, you need to follow
Right click your project, then select "Build Path" --> "Configure
Build Path";
Select "Order and export"
Select "Web App Libraries", and click "Bottom" button, then the "Web
App Libraries" will be on the bottom;
And to get this into the Gradle Eclipse plugin (so you don't need to do it manually every time):
Why is Eclipse not attaching 3rd party libs source files to a WTP-faceted Gradle project?
Credit goes to @jasop
UPDATE:
I want to give you update that now I can download all javadocs and sources jar file. But I cannot copy them in sources folder. My successful try attempt to download javadocs and sources jar are given below:
build.gradle File is given below:
group 'com.waze'
version '1.0-SNAPSHOT'
apply plugin: 'java'
apply plugin: 'eclipse'
sourceCompatibility = 1.8
repositories {
mavenCentral()
}
configurations {
sources {
description = 'sources download'
transitive = true
}
copysource {
extendsFrom sources
}
}
eclipse {
classpath {
downloadSources = true
downloadJavadoc = true
}
}
dependencies {
compile group: 'org.glassfish.jersey.media', name: 'jersey-media-moxy', version: '2.22.2'
sources group: 'org.glassfish.jersey.media', name: 'jersey-media-moxy', version: '2.22.2', classifier: 'javadoc'
sources group: 'org.glassfish.jersey.media', name: 'jersey-media-moxy', version: '2.22.2', classifier: 'sources'
}
task copySources(type: Copy) {
println 'Copying dependencies to sources directory'
into "sources/"
from configurations.copysource
}
task run (dependsOn: ['copySources']){
println 'Downloading JARs'
}
run << {
println 'Downloads complete. Finished.'
}
Output in command prompt: which downloading javadocs and sources jar file
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\PCPC>F:
F:\>cd F:\eclipse\workspace\log4j_sift-master
F:\eclipse\workspace\log4j_sift-master>gradle cleanEclipse eclipse
Copying dependencies to sources directory
Downloading JARs
:cleanEclipseClasspath
:cleanEclipseJdt
:cleanEclipseProject
:cleanEclipse
:eclipseClasspath
Download https://repo1.maven.org/maven2/org/glassfish/jersey/core/jersey-common/
2.22.2/jersey-common-2.22.2-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/jersey/core/jersey-common/
2.22.2/jersey-common-2.22.2-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/jersey/ext/jersey-entity-f
iltering/2.22.2/jersey-entity-filtering-2.22.2-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/jersey/ext/jersey-entity-f
iltering/2.22.2/jersey-entity-filtering-2.22.2-javadoc.jar
Download https://repo1.maven.org/maven2/org/eclipse/persistence/org.eclipse.pers
istence.moxy/2.6.0/org.eclipse.persistence.moxy-2.6.0-sources.jar
Download https://repo1.maven.org/maven2/javax/ws/rs/javax.ws.rs-api/2.0.1/javax.
ws.rs-api-2.0.1-sources.jar
Download https://repo1.maven.org/maven2/javax/ws/rs/javax.ws.rs-api/2.0.1/javax.
ws.rs-api-2.0.1-javadoc.jar
Download https://repo1.maven.org/maven2/javax/annotation/javax.annotation-api/1.
2/javax.annotation-api-1.2-sources.jar
Download https://repo1.maven.org/maven2/javax/annotation/javax.annotation-api/1.
2/javax.annotation-api-1.2-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/jersey/bundles/repackaged/
jersey-guava/2.22.2/jersey-guava-2.22.2-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-api/2.4.0-b34/hk2-
api-2.4.0-b34-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-api/2.4.0-b34/hk2-
api-2.4.0-b34-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/external/javax.inject/
2.4.0-b34/javax.inject-2.4.0-b34-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/external/javax.inject/
2.4.0-b34/javax.inject-2.4.0-b34-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-locator/2.4.0-b34/
hk2-locator-2.4.0-b34-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-locator/2.4.0-b34/
hk2-locator-2.4.0-b34-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/osgi-resource-locator/
1.0.1/osgi-resource-locator-1.0.1-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/osgi-resource-locator/
1.0.1/osgi-resource-locator-1.0.1-javadoc.jar
Download https://repo1.maven.org/maven2/org/eclipse/persistence/org.eclipse.pers
istence.core/2.6.0/org.eclipse.persistence.core-2.6.0-sources.jar
Download https://repo1.maven.org/maven2/javax/validation/validation-api/1.1.0.Fi
nal/validation-api-1.1.0.Final-sources.jar
Download https://repo1.maven.org/maven2/javax/validation/validation-api/1.1.0.Fi
nal/validation-api-1.1.0.Final-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/javax.json/1.0.4/javax.jso
n-1.0.4-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/javax.json/1.0.4/javax.jso
n-1.0.4-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-utils/2.4.0-b34/hk
2-utils-2.4.0-b34-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/hk2-utils/2.4.0-b34/hk
2-utils-2.4.0-b34-javadoc.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/external/aopalliance-r
epackaged/2.4.0-b34/aopalliance-repackaged-2.4.0-b34-sources.jar
Download https://repo1.maven.org/maven2/org/glassfish/hk2/external/aopalliance-r
epackaged/2.4.0-b34/aopalliance-repackaged-2.4.0-b34-javadoc.jar
Download https://repo1.maven.org/maven2/org/javassist/javassist/3.18.1-GA/javass
ist-3.18.1-GA-sources.jar
Download https://repo1.maven.org/maven2/org/javassist/javassist/3.18.1-GA/javass
ist-3.18.1-GA-javadoc.jar
Download https://repo1.maven.org/maven2/org/eclipse/persistence/org.eclipse.pers
istence.asm/2.6.0/org.eclipse.persistence.asm-2.6.0-sources.jar
Download https://repo1.maven.org/maven2/javax/inject/javax.inject/1/javax.inject
-1-sources.jar
Download https://repo1.maven.org/maven2/javax/inject/javax.inject/1/javax.inject
-1-javadoc.jar
:eclipseJdt
:eclipseProject
:eclipse
BUILD SUCCESSFUL
Total time: 7 mins 5.896 secs
F:\eclipse\workspace\log4j_sift-master>
A:
Gradle does not have any API relating to "source" configuration for dependencies. Chapter 7. Dependency Management Basics
The answer is also independent to the Integrated Development Environment. You need to apply the specific IDE plugin if you have not done so already.
IntelliJ
apply plugin: 'idea'
idea{
module {
downloadJavadoc = true // defaults to false
downloadSources = true
}
}
Eclipse
apply plugin: 'eclipse'
eclipse {
classpath {
downloadJavadoc = true
downloadSources = true
}
}
| mini_pile | {'original_id': '5fe8c11a8ecb4968daf59f787245fdc7f093f4f197fc130f50c02e7654789c10'} |
Ácido 4-hidroxifenilglicólico
composto químico
Ácido 4-hidroxifenilglicólico identificador PubChem (CID) 328
Ácido 4-hidroxifenilglicólico número CE 214-839-7
Ácido 4-hidroxifenilglicólico identificador ChemSpider 321
Ácido 4-hidroxifenilglicólico número de registo CAS 1198-84-1
Ácido 4-hidroxifenilglicólico instância de tipo de entidade química
Ácido 4-hidroxifenilglicólico fórmula química C₈H₈O₄
Ácido 4-hidroxifenilglicólico identificador ChEBI 16388, tipo de relação de mapeamento correspondência exata
Ácido 4-hidroxifenilglicólico SMILES C1=CC(=CC=C1C(C(=O)O)O)O
Ácido 4-hidroxifenilglicólico massa
Ácido 4-hidroxifenilglicólico ChEMBL CHEMBL2087618
Ácido 4-hidroxifenilglicólico InChIKey YHXHKYRQLYQUIH-UHFFFAOYSA-N
Ácido 4-hidroxifenilglicólico InChI InChI=1S/C8H8O4/c9-6-3-1-5(2-4-6)7(10)8(11)12/h1-4,7,9-10H,(H,11,12)
Ácido 4-hidroxifenilglicólico identificador Freebase /m/010r7yfh
Ácido 4-hidroxifenilglicólico subclasse de composto químico
Ácido 4-hidroxifenilglicólico identificador UNII HV52GS53BA
4-hydroxymandelic acid
chemical compound
4-hydroxymandelic acid PubChem CID 328
4-hydroxymandelic acid EC number 214-839-7
4-hydroxymandelic acid ChemSpider ID 321
4-hydroxymandelic acid CAS Registry Number 1198-84-1
4-hydroxymandelic acid instance of type of chemical entity
4-hydroxymandelic acid chemical formula C₈H₈O₄
4-hydroxymandelic acid ChEBI ID 16388, mapping relation type exact match
4-hydroxymandelic acid canonical SMILES C1=CC(=CC=C1C(C(=O)O)O)O
4-hydroxymandelic acid mass
4-hydroxymandelic acid ChEMBL ID CHEMBL2087618
4-hydroxymandelic acid InChIKey YHXHKYRQLYQUIH-UHFFFAOYSA-N
4-hydroxymandelic acid InChI InChI=1S/C8H8O4/c9-6-3-1-5(2-4-6)7(10)8(11)12/h1-4,7,9-10H,(H,11,12)
4-hydroxymandelic acid ECHA Substance Infocard ID 100.013.490
4-hydroxymandelic acid Reaxys registry number 2365374
4-hydroxymandelic acid Gmelin number 486823
4-hydroxymandelic acid Human Metabolome Database ID HMDB0000822
4-hydroxymandelic acid SPLASH splash10-014i-1970000000-156d51ef8c0ad0f76d64
4-hydroxymandelic acid DSSTox substance ID DTXSID70862596
4-hydroxymandelic acid DSSTOX compound identifier DTXCID40811334
4-hydroxymandelic acid Freebase ID /m/010r7yfh
4-hydroxymandelic acid Probes And Drugs ID PD102034
4-hydroxymandelic acid subclass of chemical compound
4-hydroxymandelic acid UniChem compound ID 1068628
4-hydroxymandelic acid SureChEMBL ID SCHEMBL352555
4-hydroxymandelic acid UNII HV52GS53BA
4-ヒドロキシマンデル酸
アテノロールの合成に使われる化合物
4-ヒドロキシマンデル酸 PubChem ID (CID) 328
4-ヒドロキシマンデル酸 EC ID 214-839-7
4-ヒドロキシマンデル酸 ChemSpider ID 321
4-ヒドロキシマンデル酸 CAS登録番号 1198-84-1
4-ヒドロキシマンデル酸 分類 化学的実体の種類
4-ヒドロキシマンデル酸 化学式 C₈H₈O₄
4-ヒドロキシマンデル酸 ChEBI ID 16388, マッピング関係型式 完全一致
4-ヒドロキシマンデル酸 SMILES記法 C1=CC(=CC=C1C(C(=O)O)O)O
4-ヒドロキシマンデル酸 質量
4-ヒドロキシマンデル酸 ChEMBL ID CHEMBL2087618
4-ヒドロキシマンデル酸 InChIKey YHXHKYRQLYQUIH-UHFFFAOYSA-N
4-ヒドロキシマンデル酸 InChI InChI=1S/C8H8O4/c9-6-3-1-5(2-4-6)7(10)8(11)12/h1-4,7,9-10H,(H,11,12)
4-ヒドロキシマンデル酸 ECHAインフォカードID 100.013.490
4-ヒドロキシマンデル酸 DSSTOX化合物ID DTXCID40811334
4-ヒドロキシマンデル酸 Freebase識別子 /m/010r7yfh
4-ヒドロキシマンデル酸 上位クラス 化合物
4-ヒドロキシマンデル酸 ユニケム 化合物ID 1068628
4-ヒドロキシマンデル酸 UNII HV52GS53BA
acide 4-hydroxymandélique
composé chimique
acide 4-hydroxymandélique identifiant PubChem (CID) 328
acide 4-hydroxymandélique numéro CE 214-839-7
acide 4-hydroxymandélique identifiant ChemSpider 321
acide 4-hydroxymandélique numéro CAS 1198-84-1
acide 4-hydroxymandélique nature de l’élément type d'entité chimique
acide 4-hydroxymandélique formule chimique C₈H₈O₄
acide 4-hydroxymandélique identifiant ChEBI 16388, lien de concordance équivalence exacte
acide 4-hydroxymandélique SMILES canonique C1=CC(=CC=C1C(C(=O)O)O)O
acide 4-hydroxymandélique masse
acide 4-hydroxymandélique identifiant ChEMBL CHEMBL2087618
acide 4-hydroxymandélique InChIKey YHXHKYRQLYQUIH-UHFFFAOYSA-N
acide 4-hydroxymandélique InChI InChI=1S/C8H8O4/c9-6-3-1-5(2-4-6)7(10)8(11)12/h1-4,7,9-10H,(H,11,12)
acide 4-hydroxymandélique identifiant d'InfoCard ECHA 100.013.490
acide 4-hydroxymandélique numéro Beilstein 2365374
acide 4-hydroxymandélique numéro Gmelin 486823
acide 4-hydroxymandélique identifiant Human Metabolome Database HMDB0000822
acide 4-hydroxymandélique SPLASH splash10-014i-1970000000-156d51ef8c0ad0f76d64
acide 4-hydroxymandélique identifiant DSSTOX DTXSID70862596
acide 4-hydroxymandélique identifiant DSSTOX d'un composé chimique DTXCID40811334
acide 4-hydroxymandélique identifiant Freebase /m/010r7yfh
acide 4-hydroxymandélique identifiant Probes And Drugs PD102034
acide 4-hydroxymandélique sous-classe de composé chimique
acide 4-hydroxymandélique identifiant SureChEMBL SCHEMBL352555
acide 4-hydroxymandélique identifiant Unique Ingredient Identifier HV52GS53BA
4-ஐதராக்சிமாண்டெலிக் அமிலம்
4-ஐதராக்சிமாண்டெலிக் அமிலம் வேதி வாய்பாடு C₈H₈O₄
4-ஐதராக்சிமாண்டெலிக் அமிலம் திணிவு
4-ஐதராக்சிமாண்டெலிக் அமிலம் Freebase அடையாளம் காட்டி /m/010r7yfh
4-ஐதராக்சிமாண்டெலிக் அமிலம் இதன் துணைவகை சேர்மம் | common_corpus | {'identifier': 'https://www.wikidata.org/wiki/Q10395570', 'collection': 'Wikidata', 'open_type': 'Semantic data', 'license': 'CC0', 'date': '', 'title': '4-hydroxymandelic acid', 'creator': 'None', 'language': 'Multilingual', 'language_type': 'Semantic data', 'word_count': '454', 'token_count': '2302', '__index_level_0__': '14366', 'original_id': '6ef93af49bed90e3fa7597d3544b69f5cb5fe2d4fa4797d7078590caa5e4eb95'} |
Bibliographic Search
Obtain the relationships between authors and reputation during runtime from various repositories such as Wipo, DBLP, PubMed, ArXiv, Twitter, DBpedia, Yago!
The Bibliographic Search case study focuses on exploiting information from various data sources (e.g. Cordis, Wipo, DBLP, PubMed, ArXiv, Twitter, DBpedia, Yago).
Bibliographic search is an important aspect of research and technology development worldwide. Its proper use allows companies and researchers to know about the originality and relations of their work with the work of other researchers by means of searching bibliographic and patent repositories such as EPO Patstat, Scopus or Medline. However, it is restricted nowadays to mere keyword search queries launched over one of those huge repositories at a time, with answers being ranked lists of papers. This situation is very limiting because of the huge amount of time and intellect that scientists must spend doing repeated search on different data sources. Also, the complexity and exploitation of relations among the metadata involved in bibliographic repositories (e.g. keywords, authors, papers, citations, and publication venues) are not fully taken into account by the information management technology. Information retrieval systems, on one hand, typically only consider the text in the document, and do not exploit the context. They do not follow the relationships among the metadata fields of the bibliographic items in order to provide customized results, nor continue the exploration of the presented results based on the relations of the metadata fields, or suggest documents/conferences/authorities/etc. based on the user’s interest. On the other hand, relational technology allows for a multidimensional view of the metadata, but it performs deficiently on exploration queries.
In a real scenario of bibliographic and patent data analysis, data is split into multiple repositories based on different technologies. For example, the full text of papers or patents is stored in documental databases; bibliographic metadata is represented in the form of properties in a key-value storage or in a column-store; personal and organization information is stored in a relational database management system; and, finally, the relationships between researchers, organizations, groups and areas of interest are represented as a complex network inside a graph database management system.
In this context it is very useful to use the CoherentPaaS technology to solve queries such as “which are the related papers for an specific european project?” or “who are the most appropriate reviewers for a european project?”. These queries can be solved using a single JDBC statement and the technology is able to integrate the results and provide a single result set. Let’s see the execution plan that solves the potential reviewers.
Specifically, this execution plan shows a query that needs to integrate results from 3 different datastores: Sparksee, LeanXcale and Eutropia.
Moreover, the update process of the data is incrementally and the holistic transaction manager is the responsable to update the databases under the same transaction. Otherwise, it would become very error prone because the developer needs to deal with the data consistency issues.
On top of a cluster of bibliographic data repositories interrelated through the relationships graph, researchers run queries that extract and integrate information from more than one source. A query example is literature review, where a scientist has been asked to start the research for a new line of products in the company she works, or to search for literature (both patent and non-patent) that could invalidate the novelty of the invention claimed by a given patent or patent application. In this case, documental databases are searched to find similar papers or patents, where the graph database relates the documents found by the keywords, the authors or the involved organizations. Another example is reviewer or expert search, where a program committee chair of a conference is searching for good reviewers for a paper submitted. First, similar papers are going to be found by document similarity or by areas of interest extracted from the graph database. Then, the authors are ranked by using the bibliographic metadata associated to their papers. Finally, the final candidates for reviewers are filtered by the conflicts of interest stored into the graph database.
Currently a bibliographic platform as the one presented in this case study doesn’t exist. In general, bibliographic or patent data providers have a single database (relational or XML) where all data is integrated and document retrieval is optimized with the use of specialized indexes. With CoherentPaaS there will not be the necessity to integrate data from multiple data sources and the relationships between authors and reputation will be obtained during runtime from the graph database. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9179954528808594}", 'metadata': "{'Content-Length': '32960', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AJ26PRJKHEAPUG2WXTSJ3WT7W4JVA4AS', 'WARC-Concurrent-To': '<urn:uuid:8f8f73ef-8801-42e2-9af2-1c74c5726c19>', 'WARC-Date': datetime.datetime(2020, 8, 10, 18, 41, 49), 'WARC-IP-Address': '138.100.12.161', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P5YAFORLPB7OLKYXPUMIYPKWN4PLK3HP', 'WARC-Record-ID': '<urn:uuid:1463f525-dc3e-4e72-889c-5de487a7674f>', 'WARC-Target-URI': 'https://coherentpaas.eu/mcm_case-studies/bibliographic-search/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:157945e7-64db-45fe-a951-da8210c23e8d>', 'WARC-Truncated': None}", 'previous_word_count': '745', 'url': 'https://coherentpaas.eu/mcm_case-studies/bibliographic-search/', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-75.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07103270292282104', 'original_id': '18e475324a97255e4237d9f65725ac5b0a05a5202baefb89ac4d5dfcdd7cd06a'} |
The present invention relates to a silent chain, or chain with links having inverted teeth. More particularly, the invention related to a silent chain with a rocker-joint and, in particular, to a rocker joint having improved resistance to fracture as a result of usage and wear.
Generally, silent chains are used with sprockets as the power transmission chain in transmissions, transfer cases, engine timing systems, and the like, for automobiles and motorcycles. Silent chains are formed by the assembly of rows of link plates in transverse and longitudinal directions. Conventionally, the direction along the length of chain as it travels between the sprockets is referred to as the longitudinal direction. The links are interlaced and joined by connecting pins. Each link plate has a pair of teeth and a pair of pin apertures. The links are connected to each other by connecting pins inserted in each pin aperture. Guide links are utilized to maintain the chain on the sprockets when the chain is wrapped around the sprockets during operation. Guide link plates are typically installed in the center or at both outer edges of the row of link plates arranged in the lateral direction. The guide links are conventionally press fit over pins, which connect the interlaced inside or articulating links. Guide links typically do not include inverted teeth.
Conventionally, a rocker joint is used as the connecting pin. The rocker joint is comprised of a pair of long and short pins, i.e., a rocker pin and a joint pin that is longer than the rocker pin and both ends of which are fixed to guide links. The pins connect the links across the width of the chain in the transverse direction, i.e., at right angles to the longitudinal direction.
Damage to a chain may first occur during the press-stress operation, where the newly-assembled chain is subjected to a high load. During the pre-stress operation, cracks may be formed in a link plate or pin shortening the operational life of the chain. After undergoing normal usage and wear, the silent chain typically fails due to fracture of the connecting pin due to the rocker joint structure. This fracture often occurs at the attachment of the guide link to the rocker joint, where the effective cross-sectional area of the rocker joint decreases.
Examined Japanese Patent Application 1-55821 proposes a silent chain in which the joint pin is reinforced by placing one link plate on the inside of the guide link to prevent contact damage or breakage of the joint pin. However, in this case, the overall width of the chain is increased by the thickness of the additional link plate. Therefore, the most effective means to prevent breakage of the joint pin without increasing the chain width is to increase the cross-sectional area of the overall rocker joint and to decrease the shear stress that acts on the joint pin.
Another prior art patent has proposed the silent chain disclosed in Japanese Laid-Open Patent 6-207643. In this silent chain, the pin aperture formed in the link plate has a long-circular shape to increase the cross-sectional area of the overall rocker joint, which includes a rocker pin and joint pin. The aperture results in the increased breaking strength of the joint pin. However, the special shape of the pin aperture must be formed in the link plate.
The present invention provides an improved silent chain by increasing the wear resistance of the joint pin without employing a special pin aperture shape. | mini_pile | {'original_id': 'b01304261f42aa96d6e52580d0131292c24db11350a59e62a0aca4971c411a17'} |
Pages: [1] 2
Order by: Date | Popularity | Show all
Best Metal Albums From 2000-2009
1. Sunn O))) - Black One
2. Cormorant - Metazoa
3. Mastodon - Crack the Skye
4. Wintersun - Wintersun
5. Opeth - Blackwater Park
View entire list ››
Created by FullyOttoMatic on 21.07.2014
Thumbs up: +2
Favorite Albums As Of 20
1. Stratovarius - Visions
2. Opeth - Ghost Reveries
3. Yes - Close to the Edge
4. Omnium Gatherum - New World Shadows
5. Ayreon - 01011001
View entire list ››
Created by Gopherhawk on 10.08.2013
Thumbs up: +11
Epic Album Closers
2. Abigail Williams - Becoming
3. Agalloch - The Mantle
4. Amon Amarth - Versus The World
5. Anekdoten - Vemod
View entire list ››
Created by BigNaughtyV on 02.07.2013
My Enslaved Favorites
I must admit this is one of my favorite bands. I really like every Enslaved Album, from first to last, but some of them are better than others.
1. Enslaved - Axioma Ethica Odini
2. Enslaved - Below The Lights
3. Enslaved - Isa
4. Enslaved - Frost
5. Enslaved - Eld
View entire list ››
Created by Eomer90 on 29.05.2013
Top 20 Albums Of 2008
In no particular order - 20 albums that, for me, stood out above the rest.
1. Steven Wilson - Insurgentes
2. Scar Symmetry - Holographic Universe
3. Abigail Williams - In The Shadow Of A Thousand Suns
4. Moonspell - Night Eternal
5. Swallow The Sun - Plague Of Butterflies
View entire list ››
Created by Aeox on 01.01.2013
Thumbs up: +3
4 to 25: other great stuff (alphabetical order)
1. Textures - Silhouettes
2. Esoteric - The Maniacal Vale
3. Burst - Lazarus Bird
4. ADX - Division Blindée
5. Cynic - Traced In Air
View entire list ››
Created by Darkside Momo on 16.01.2012
Enslaved In Order.
Enslaved's career can be distributed in five different eras:
The first era consists of the first three albums, namely Vikingligr Veldi (1994), Frost (1994) and Eld (1997). All these albums are important releases in Viking Metal's history and they have defined some musical aspects for the whole genre.
1. Enslaved - Isa
2. Enslaved - Vikingligr Veldi
3. Enslaved - Eld
4. Enslaved - Blodhemn
5. Enslaved - Frost
View entire list ››
Created by Drowned on 12.01.2012
Top 20 Metal Albums Of 2008
1. Testament - The Formation Of Damnation
2. Cradle Of Filth - Godspeed On The Devil's Thunder
3. Hollenthon - Opus Magnum
4. Sabaton - The Art Of War
5. Opeth - Watershed
View entire list ››
Created by hellbounddreams on 28.11.2011
Thumbs up: +12
Black Metal Miscellanea
1. Potentiam - Bálsýn
2. Grabnebelfürsten - Dynastie Oder Wie Man Herrschaft Definert
3. Deathspell Omega - Si Monumentum Requires, Circumspice
4. Sigh - Hangman's Hymn- Musikalische Exequien
5. Sigh - Imaginary Sonicscape
View entire list ››
Created by R'Vannith on 05.11.2011
Thumbs up: +13
Top 50 Album Covers (Updated)
My personal top 50 list.
(In no particular order)
1. Decrepit Birth - Polarity
2. Agoraphobic Nosebleed - Agorapocalypse
3. Blue Öyster Cult - Blue Öyster Cult
4. Joe Satriani - Time Machine
5. Earth - The Bees Made Honey In The Lion's Skull
View entire list ››
Created by The Void on 01.10.2011
Thumbs up: +3
My Black Metal
1. ...And Oceans - Cypher
2. A Forest Of Stars - Opportunistic Thieves Of Spring
3. Agathodaimon - Serpent's Embrace
4. Agalloch - Marrow Of The Spirit
5. Alcest - Écailles De Lune
View entire list ››
Created by Amo del Merol on 20.09.2011
Thumbs up: +1
Top 30 Of 00's
This is a list in which I have included the top 30 albums of the decade that has just passed. Of course it's gonna change because I'm sure there is a lot I haven't listened to yet...
1. In Flames - Clayman
2. Moonspell - The Antidote
3. HIM - Love Metal
4. Emperor - Prometheus: The Discipline Of Fire And Demise
5. Nightwish - Once
View entire list ››
Created by stef_v777 on 04.06.2011
Thumbs up: +7
My Favorite 35 Albums Of The 2000's
1. Anubis Gate - The Detached
2. Agalloch - The Mantle
3. Kamelot - The Black Halo
4. Warning - Watching From a Distance
5. Gojira - The Way of All Flesh
View entire list ››
Created by strade on 22.05.2011
Thumbs up: +1
20 Albums - Current Mood
These are 20 albums I have been listening to lately. Will be updated occasionally.
1. Rush - Counter Parts
2. Darkwater - Where Stories End
3. Enslaved - Vertebrae
4. Enslaved - Axioma Ethica Odini
5. Judas Priest - Painkiller
View entire list ››
Created by Carrion Misery on 05.03.2011
Vonpire's 2008 Best
1. Draconian - Turning Season Within
2. Cradle Of Filth - Godspeed On The Devil's Thunder
3. Moonspell - Night Eternal
4. Therion - Live Gothic
5. Heavenwood - Redemption
View entire list ››
Created by Vonpire on 26.10.2010
Pages: [1] 2 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '230', 'language_id_whole_page_fasttext': "{'en': 0.766139805316925}", 'metadata': "{'Content-Length': '94868', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AGVHU5AGOZFDL2DN6AQRABQFK53XU3CH', 'WARC-Concurrent-To': '<urn:uuid:36a61c55-96c4-4391-8108-56ae0b8fbfb1>', 'WARC-Date': datetime.datetime(2014, 12, 22, 22, 59, 55), 'WARC-IP-Address': '194.204.33.12', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:YJJDXPUVT6UY7BSCV7ZP6EGNMGGINJBA', 'WARC-Record-ID': '<urn:uuid:b32cf279-e7ff-4552-8692-1503fbb05cfb>', 'WARC-Target-URI': 'http://www.metalstorm.net/users/lists.php?album_id=26086', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a6fe87c5-24e8-46e6-8665-8d5283a13a5b>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1012', 'url': 'http://www.metalstorm.net/users/lists.php?album_id=26086', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12999755144119263', 'original_id': '7eaa45f8fc8fa73a471e1d814c45cea8c2ee3668e3c3945e00664cf968072f84'} |
The Reference Section
A collection of wealth improvement articles
Taxes and charitable giving
These days, charities need your support more than ever. As you lend a helping hand, keep the following tax facts in mind.
The tax consequences of charitable gifts
• If you itemize, you may deduct cash contributions to qualified charities, as well as the fair market value of donated property.
• Contributions to religious institutions and large, national charities usually qualify for tax deductibility, while contributions to individuals don't. If you have any doubts, check with the IRS to see if your charity is on the list of qualified tax-exempt organizations.
• When you donate brand-new merchandise or stocks and bonds that are publicly traded, it's relatively easy to determine market value. But what's the value of used clothing, furniture, or appliances? According to the IRS, you may take a deduction for used clothing and household items only if they are in "good" or better condition.
• The value of your charitable services is not deductible, but you can deduct out-of-pocket and incidental expenses. Example: You drive to a charity dinner, help out in the kitchen, and donate your favorite casserole. You can deduct the cost of the food and your charitable mileage, but not the value of your time.
• Instead of contributing cash, consider donating stock, mutual funds, artwork, or similar items that have increased in value. You may deduct the full market value of the property, and you'll avoid paying tax on the built-in capital gain.
• With securities that have decreased in value, it's better to sell the securities first and donate the proceeds. That way, you can deduct both your charitable contribution and your capital loss on the sale.
• If you plan to make a large contribution to charity, seek tax advice before rather than after making the gift in order to maximize your tax benefits.
Good recordkeeping is required
If you plan to claim a tax deduction for charitable contributions, you need documentation to support your gift. Here are the IRS requirements:
• Cash, check, and other monetary donations of any amount can be deducted only if substantiated by a bank record or written documentation from the charity.
• If you donate used clothing or household items, you may claim a deduction only if the items are in "good" or better condition.
• If you contribute property with a value above $500, your personal records must also include details of how and when you acquired the property and your cost basis in the property. Always get confirmation of your gift from the charity.
• If you donate an item or a group of similar items worth more than $5,000, all of the previous requirements apply, but you must also obtain a qualified appraisal. There are special exceptions for publicly traded stock and, in some cases, for nonpublic stock.
• If you receive anything of value in return for your donation ("quid pro quo" contributions), your deduction is limited to the difference between what you donate and what you receive. For all quid pro quo donations over $75, the charity must provide you with a written disclosure of the value of the goods or services provided and must indicate that the deduction is limited to the difference between the donation and the value stated. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9410004615783693}", 'metadata': "{'Content-Length': '14204', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FK4J37G3KV65ODSNJTKIC2VKOXAAZUFZ', 'WARC-Concurrent-To': '<urn:uuid:4aea1a7f-e756-43bd-af84-1aa6afb83a52>', 'WARC-Date': datetime.datetime(2019, 3, 22, 8, 5, 23), 'WARC-IP-Address': '174.143.113.64', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YN5TIGAJH64DBUOTTUTMFG3YLI7A7FLB', 'WARC-Record-ID': '<urn:uuid:2c1cf2c0-d8f2-4105-b639-fceaefcb94a2>', 'WARC-Target-URI': 'https://center.resourcesforclients.com/F3jdFWZJKnwl/1/17', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:48fe449f-d02a-4ceb-bae0-4e46e0b60ad4>', 'WARC-Truncated': None}", 'previous_word_count': '535', 'url': 'https://center.resourcesforclients.com/F3jdFWZJKnwl/1/17', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-123-157-4.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03423994779586792', 'original_id': '99608dfe06588b5d75d557dcb0344569216c9805e9a129cd99fe40244a0d5b6f'} |
Definition of Junket
What does the term "junket" mean? What is the definition of the term "junket"?
In the world of politics, a "junket" is a seemingly unnecessary trip that is taken by a politician that is paid for with public funds. A "junket" usually features extravagant spending that is deemed as being unnecessary by a percentage of the voting public.
Definition of the term Junket - PoliticsFor instance - let's say that a sitting President travels to New York to speak at the United Nations. There is obviously nothing wrong with that, but let's say that the President decides to stay for four days and see a show with his wife and hit numerous restaurants for expensive dinners. In order to accommodate the President, the hotel must block off a couple of entire floors. In addition, there are costs for the airplane, Secret Service and more.
While the trip to the United Nations may have been necessary, some voters will furrow their brows at the amount of money that was spent on the trip, as the President could have flown in and out on the same day.
-- Articles That Mention Junket: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9798955917358398}", 'metadata': "{'Content-Length': '16476', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YM5BZMTUVZQUPCYG2XWA7NAP4MRXJFXV', 'WARC-Concurrent-To': '<urn:uuid:7a297252-9da2-4ddb-857a-bdaad624202f>', 'WARC-Date': datetime.datetime(2022, 9, 29, 23, 25, 50), 'WARC-IP-Address': '64.64.9.184', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:OXNFHZNYCS6IJ56L3ABWGXBINFEQQPA7', 'WARC-Record-ID': '<urn:uuid:ebd88f8c-3223-43d1-bf42-d6b3b2ae1dcb>', 'WARC-Target-URI': 'https://www.davemanuel.com/investor-dictionary/junket/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f2ebaa0f-4959-4262-8896-de4071edbb3d>', 'WARC-Truncated': None}", 'previous_word_count': '187', 'url': 'https://www.davemanuel.com/investor-dictionary/junket/', 'warcinfo': 'isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-120\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9010220766067505', 'original_id': '6485d9d5922c3fbbf5beb31ee503a09124ae71497a157ba4a7ff706501eaf9c3'} |
Bernard Lecache
Bernard Lecache (1895–1968) was a French journalist. In 1927, he founded the League Against Pogroms, which the following year, became the International League Against Anti-Semitism, and in 1979, became the International League against Racism and Anti-Semitism. He was the president from 1927 to 1968.
Life and career
Lecache, was born in Paris, France in 1895, the son of Jewish emigrants from Ukraine.
He launched himself into journalism, contributing to La Volonté, the Journal du Peuple, one of the first French Bolshevik publications, and at Le Quotidien. An activist with the Human Rights League, he was equally close to the socialist movement and the future founders of the French Communist Party (French: Parti communiste français, PCF), such as Boris Souvarine. He frequented the home of anarchist journalist Séverine and married her daughter, Denise Montrobert. Lecache applauded the 1917 Russian Revolution and was an early member of the PCF, joining in 1921. He became the editor of L'Humanité where he provided the anti-miliarist section. Obliged to choose between the Freemasons and the Party in 1923, like all the communists, Lecache, who was close to the Masons, refused to choose and was expelled from the PCF. His ideas and his friends did not change, however, and he chaired a meeting for the 10th anniversary of the Russian Revolution in October 1927. The following year, he became a member of the Association of Friends of the Soviet Union.
In May 1926, in the heart of Paris, the Jewish anarchist Sholom Schwartzbard killed Symon Petliura, a nationalist Ukrainian he accused of starting pogroms that devastated his family. Working as a contributor to Le Quotidien, Lecache became interested in the case and asked the socialist lawyer Henry Torrès if he could support the assassin's defense. He was sent to Ukraine to investigate by Henri Dumay.
After three months of investigation, Lecache published the results in February and March 1927. To support the accused, he founded the International League Against Pogroms. He received support from Séverine, the Countess of Noailles, Albert Einstein, Edmond Fleg, Maxim Gorky, Paul Langevin, Victor Basch and Henry Torrès, Schwartzbard's lawyer. Schwartzbard was acquitted on October 26, 1927. The following year, the League changed its name to the International League Against Anti-Semitism.
Lecache was initiated into the Freemasons at the beginning of the 1930s. He was a member of the Grand Orient de France and founded the lodge Abbé Grégoire, addressing the rise of Nazism and European anti-semitism.
Lechache wrote in the newspaper "Droit de Vivre" (December 1938):
'It is our task to organize the moral and cultural blockade of Germany and disperse this nation. It is up to us to start a merciless war.'
Lecache was president of the organization for forty years, until his death in 1968. He was replaced by Jean Pierre-Bloch, who remained president until 1993.
See also
Movement Against Racism and for Friendship between Peoples
References
Category:1968 deaths
Category:1895 births
Category:French Jews
Category:French journalists
Category:French male non-fiction writers
Category:French people of Ukrainian-Jewish descent | mini_pile | {'original_id': '0075eb0d89734d8056842264d429f1bfd264429adfec512b55d5e4eca2cc1aca'} |
So Much Depends...
9 teachers like this lesson
Print Lesson
SWBAT write a short and easy poem that is similar to the one that our character is using in their class.
Big Idea
In the book, Love That Dog by Sharon Creech, our character read a poem that is very short and is free verse. This lesson opens up our unit on poetry by connecting to the character and trying to create our own similar poem.
What is a Poem?
5 minutes
The start of the lesson is creating an anchor chart that defines what a poem is and gives us a good start to our poetry unit. It will also be a chart that we can come back to and add information to. Adding information will make it more complete and be more useful.
I ask the question and add our thinking to the white board before we put it on the chart. I start by asking them to think and write on their own white board all they know about poetry. We discuss what they have written and talk about anything that they might have missed. I remind them to look at their poetry terms to help them find things to add to our discussion.
The Red Wheelbarrow
5 minutes
In our story, Love That Dog by Sharon Creech, our character is introduced and reads poetry. He is not a fan of poems and it is apparent at the beginning of the book. The first poem that is shared is The Red Wheelbarrow by William Carlos Williams.
This short poem gives us a simple look at how poetry can be short and descriptive. I lead the class in a discussion about what they notice about the poem. We use our poetry terms as a checklist to decide if this poem has any or which elements in it. This discussion is trying to focus their attention on how we can look at poetry to understand it better.
I have them read the poem a couple of times and then explain that sometimes it takes multiple readings to understand them. Each time I read as a model, I demonstrate how I can gain more information with each reading.
So Much Depends..... Poem and Sharing
10 minutes
With an in depth look at the poem. I move to talking about the poems structure. We talk about the first line and how it is constructed. I then ask them to write the first line of the poem at the top of a lined piece of paper. I then ask them to choose a topic to write their own "So Much Depends" poem. I have them use the Red Wheelbarrow poem as their example and framework. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9685451984405518}", 'metadata': "{'Content-Length': '100135', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JVAASFEII3E5DHDPDSY2L6TWLIU5TP54', 'WARC-Concurrent-To': '<urn:uuid:b824f9f2-bf81-454c-8efe-418ed95af84d>', 'WARC-Date': datetime.datetime(2021, 5, 12, 8, 46, 39), 'WARC-IP-Address': '52.206.214.7', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:PCNX5WP5ALEC75TZ2VWALWPQWTJA542U', 'WARC-Record-ID': '<urn:uuid:5f85701a-dfbc-4340-bfcd-55d3a5faa2c0>', 'WARC-Target-URI': 'https://betterlesson.com/lesson/591532/so-much-depends', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:721bc043-9df9-44f5-9f0c-e4c1d688f7e3>', 'WARC-Truncated': None}", 'previous_word_count': '453', 'url': 'https://betterlesson.com/lesson/591532/so-much-depends', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-16.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.053900301456451416', 'original_id': 'bb2366f2a40dfb8315c675b5d5c00e67cc6a95e9e9ae2fcc21be8e17a0e68523'} |
<template>
<v-layout>
<v-flex xs9 offset-xs2 class=" search">
<v-text-field
class="search"
prepend-icon="search"
placeholder="Search"
v-model="search">
</v-text-field>
<div class="cart">
<v-icon>shopping_cart</v-icon>
<div
@click="navigateTo({name: 'view-cart'})"
class="ct">   cart ({{cart_number}})</div>
</div>
</v-flex>
</v-layout>
</template>
<script>
import _ from 'lodash'
import BooKmarkService from '../services/BookmarkService'
export default {
components: {
},
data() {
return {
search: '',
cart_number: 0
}
},
methods: {
async findCartProducts() {
const items = this.bookmark = (await BooKmarkService.index({
userId: this.$store.state.user.id
})).data
this.cart_number = items.length
console.log("BAkhungu: ", items)
},
navigateTo(route){
this.$router.push(route)
},
},
async mounted() {
this.findCartProducts()
},
watch: {
search: _.debounce(async function (value) {
let currentRoute = this.$route.name
// console.log('currentRoute: ', currentRoute)
// if (currentRoute == 'browse-product') {
// currentRoute = 'root'
// }
const route = {
name: currentRoute
}
if(this.search !== '') {
route.query = {
search: this.search
}
}
this.$router.push(route)
console.log(value)
}, 700),
'$route.query.search': {
immediate: true,
handler (value) {
this.search = value
}
}
}
}
</script>
<!-- Add "scoped" attribute to limit CSS to this component only -->
<style scoped>
.search {
float: left;
width: 66%;
margin-left: 0.5%;
}
.cart {
display: inline-block;
margin-top: 2.2%;
cursor: pointer;
}
.ct {
float: right;
font-size: 18px;
}
</style>
| common_corpus | {'identifier': 'https://github.com/dominickasanga/CloudStores-FrondEnd/blob/master/src/components/SearchProducts.vue', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'CloudStores-FrondEnd', 'creator': 'dominickasanga', 'language': 'Vue', 'language_type': 'Code', 'word_count': '184', 'token_count': '665', '__index_level_0__': '30876', 'original_id': 'f43f19212dce33c4541a5e8e24d4340ded860347f195b5e2431282fb4896c828'} |
ehealth radio network
Shatter the Yoyo with Dr. Candice Seti
March 6, 2019
Dr. Candice Seti, aka The Weight Loss Therapist, and author of the international bestseller Shatter the Yoyo, A Definitive Guide to Losing Weight and Gaining Self Control While Ending Your Dependence on Diets joins eHealth Radio and the Health News and Weight Management Channels.
Listen to interview with host Eric Michaels & guest Dr. Candice Seti discuss the following:
1. Why is sleep such an important factor to long-term weight management? What tips can help us get a better night’s sleep?
2. We always hear “drink more water.” Why is water important?
3. Can a stress ball really help weight loss? How?
4. You say change your relationship with food. What does that mean?
5. You also recommend that we change our thinking about food. How?
Dr. Candice Seti, aka The Weight Loss Therapist, is the world's leading eating and behavioral change specialist. She is a Licensed Clinical Psychologist, Certified Personal Trainer, Certified Nutrition Coach, Certified Weight Management Specialist, and Certified Expert Life Coach. This very unique combination of education and training provides the backbone for Dr. Seti's unique approach to weight loss and weight management. Dr. Seti is able to go beyond simple diet and exercise plans and address the psychology behind weight loss and weight gain.
Through this approach, she addresses issues like emotional eating, self- sabotage, time management, fear of success, self-monitoring and self-discipline. Dr. Seti applies this knowledge and approach to all of her therapy and coaching clients as well as infusing it into her meal plan and fitness programs.
Dr.Seti's unique services include personalized weight loss programs and counseling on eating or nutrition issues, personalized meal plans, personalized fitness programs or any combination thereof. So, whether you are looking for direct coaching sessions, or just need a plan to follow, you can join the thousands that have benefited from Dr. Seti's unique expertise!
Social Media Links:
Twitter: @WeightTherapist | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9111457467079164}", 'metadata': "{'Content-Length': '90339', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3FWQ4CSULZOGJ2ESCRH3B3OZILN34CZH', 'WARC-Concurrent-To': '<urn:uuid:e6319ec7-55eb-48ff-a0cd-3608ad40c207>', 'WARC-Date': datetime.datetime(2019, 6, 18, 5, 34, 42), 'WARC-IP-Address': '35.170.137.140', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P3OU3RUKIJHTU5UBHYN4ENCRIRHLGXE4', 'WARC-Record-ID': '<urn:uuid:91ef2629-099e-43e2-87aa-20532943ce99>', 'WARC-Target-URI': 'https://ehealthradio.podbean.com/e/shatter-the-yoyo-with-dr-candice-seti', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1ce62e76-ac7b-45ce-81b3-052cdd5f9c2b>', 'WARC-Truncated': None}", 'previous_word_count': '327', 'url': 'https://ehealthradio.podbean.com/e/shatter-the-yoyo-with-dr-candice-seti', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-142-81-83.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10712826251983643', 'original_id': 'e98fdfdbc7ebd1c112e34e4e199c34609fb57a9ca12c4e0d22200f352a5f5406'} |
Beyond Meat is going public. Meat alternatives are going mainstream.
You can now buy a stake in vegan meat.
May 2, 2019
Kelsey Piper
Lexile®: 1200L–1300L
Beyond Meat, the plant-based meat company, started publicly trading Thursday morning, and the stock more than doubled in value right out of the gate—it’s now trading at $60, when just last week the company was estimating it would start selling at $19 to $21.
The company sells burgers that contain no meat but taste like they do. Its stated goal is to fix our food system by making such meat alternatives available everywhere and appealing to everyone. Its initial public offering (IPO) is the latest sign that alt-meat is going mainstream—and that’s a big deal.
Now the company is public, listed on NASDAQ as BYND. The company priced at $25 per share on Wednesday, which was a substantial increase from the expected price it first announced ($19 to $21) last week.
Beyond Meat also decided to offer more shares: 9.6 million, up from an initial planned total of 8.8 million. Between the price increase and the increase in shares, it raised $240 million from the IPO—which the company has said it plans to spend on growth, from expanding its sales to increasing product offerings.
Beyond Meat’s team is taking the striking listing-day performance—it’s exceptionally rare for companies to double their listing price—as a sign that they’ve hit on something big. “I do think it’s a validation of this opportunity,” executive chair Seth Goldman told me.
“It’s easy to be skeptical and say this is a plant-based burger for vegans,” he said, but that niche is too small to support a multibillion-dollar company. Beyond Meat’s valuation, he argued, reflects that it appeals to a much broader audience. “This is about letting people eat what they love, and just doing it with meat made from plants.”
Beyond Meat was founded in 2009 by CEO Ethan Brown, and the Los Angeles-based company’s products first hit supermarket shelves in 2013. Its rapid rise—food is not an easy industry to break into—reflects intense consumer demand and investor interest in meat alternatives. The company has never been profitable, and lost $29 million in 2018, but its rapidly growing revenues have some investors persuaded it’s a good bet—as does its positioning on the frontier of a transformation of our food system.
“Beyond Meat was the first company to really set its sights on creating meat from plants that could compete on the basis of the things that meat eaters like about meat,” Bruce Friedrich of the Good Food Institute, which works on policy and investment surrounding meat alternatives, told me. “Before Beyond Meat and Impossible Foods, there was really this sense that plant-based foods were for vegetarians. People like Ethan Brown said, ‘No, we can make plant-based foods that meat eaters like just as much.’”
Brown now has a $3.4 billion company to prove it. And while Beyond Meat is the first plant-based meat company to go public, it looks likely that it won’t be the last. The trend that brought Beyond Meat racing to its billion-dollar valuation and IPO is just getting started—and that has the potential to be game-changing, not just for the industry but for the world.
Plant-based meat alternatives are getting big
There’s a lot wrong with our food system. Producing meat by raising animals on factory farms produces tons of greenhouse gases, and many analysts think we can’t tackle climate change without tackling the enormous emissions that go into agriculture. Animals in close quarters are fed low-dose antibiotics constantly so they don’t make one another sick, which contributes to antibiotic resistance, a huge threat on the horizon for public health. And animals on factory farms are routinely subjected to intense cruelty and conditions that disgust the average American consumer.
That’s what inspired people to start working on meat alternatives—and it may be what’s inspiring the consumer enthusiasm that has buoyed them in recent years. Products like veggie burgers, fake chicken, and soy and almond milk are growing in popularity and market share. Even better, they’re getting tastier and harder to distinguish from animal products.
New breakthroughs in food science have made it easier to imitate the flavor and texture of real meat. While early veggie burgers were almost exclusively purchased by vegetarians, Brown says that 93 percent of Beyond Meat customers buy regular meat too—suggesting the company has succeeded at making something that appeals to meat eaters.
Beyond Meat was among the pioneers of this new generation of plant-based meat, which aimed to replace bean-based veggie burgers marketed mostly to vegans. Now it’s the first plant-based meat company to have an IPO. It’s a remarkable success for the company. It’s also remarkable because food companies rarely go public, Friedrich told me: “The food industry is highly centralized, and most exits are mergers or acquisitions by large food conglomerates.”
Last year, there were rumors that the industry giant (and Beyond Meat investor) Tyson Foods was considering buying the company. Beyond Meat stayed independent, though. A few months later, the company added the chief financial officers of Coca-Cola and Twitter to its board, signaling that it was bringing on the expertise it needed to become a huge public company.
Goldman said Beyond Meat has seen fast growth in all its channels—grocery stores, where it’s launching Beyond Beef ground beef and Beyond Sausage breakfast sausages; restaurants, with Carl’s Jr. and Del Taco signed on; and internationally, with expansions in Canada and Europe. Their biggest problem, in fact, has been supplying enough burgers to meet demand. “We had tough years both 2017 and 2018 because we weren’t able to keep in stock,” Goldman said. The team hopes raising money will allow them to avoid that problem again.
The rest of the plant-based meat industry has been thriving too. Qdoba announced last week that it will serve Beyond Meat competitor Impossible Foods. Earlier in April, Burger King launched the Impossible Whopper, and it did so well, it’ll soon be available nationwide. Tyson and Purdue are pursuing their own plant-based product lines. A few years ago, the Impossible Burger was available in a handful of restaurants; now it can be found in more than 5,000.
“There’s a sense that there’s a movement going on that’s much bigger than any one company,” Brown told Vox in April.
The interesting thing about that movement is that plant-based meats don’t have to displace all animal meats in order to make a big difference. Every burger replaced with a Beyond Burger has an impact on CO2 emissions and demand for factory farming and antibiotics. The more the plant-based meat industry grows, the more those impacts will be visible—and that might, in turn, fuel more interest in plant-based meats.
Beyond Meat’s team doesn’t just believe they’ve found a niche—they say they’ve figured out the “Future of Protein.” The IPO is a chance for investors to take bets on whether they’re right.
Questions Using Close Reading and Critical Thinking:
3. Seth Goldman, executive chair of Beyond Meat, states that “It’s easy to be skeptical and say this is a plant-based burger for vegans.” What message is he conveying here? What makes Beyond Meat unique and different?
4. Were the results of Beyond Meat going public on Thursday, May 2 positive or negative? It raised $240 million from the IPO (Initial Public Offering). What two factors affected this number? Look for the answers in the article.
5. Who founded Beyond Meat? What city is it based out of? Was the company previously profitable? Why are investors eager to invest in them now?
6. Why is producing meat from animals bad for our environment and what concerns are there about the treatment of animals? Would you personally avoid eating meat for these reasons? Why or why not?
7. Beyond Meat is the first plant-based meat company to have an IPO. According to Bruce Friedrich of the Good Food Institute, why is this significant?
8. If you eat meat, would you be willing to try plant-based meat if it tasted like actual meat? Why or why not? If you are a vegetarian, would you try it although it tasted like meat? Why or why not?
9. In what stores and restaurants can a consumer currently find Beyond Meat products? What company is competing with Beyond Meat?
Read the original article here:
How useful was this post?
Click on a star to rate it!
We are sorry that this post was not useful for you!
Leave a Reply | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '179', 'language_id_whole_page_fasttext': "{'en': 0.9547659158706664}", 'metadata': "{'Content-Length': '53718', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7SP3CUKCBTXE3XH64XPRH7QIKPITX7OQ', 'WARC-Concurrent-To': '<urn:uuid:f893bdc2-aaa8-4d1e-b2c5-815eca59e988>', 'WARC-Date': datetime.datetime(2019, 5, 19, 19, 22, 43), 'WARC-IP-Address': '199.250.205.174', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XLWC52FUEAATAUC5FVLAQMMOK7QIU2G4', 'WARC-Record-ID': '<urn:uuid:d0ea8aad-a826-4679-967e-8ffe244b132a>', 'WARC-Target-URI': 'http://blog.teachersdiscovery.com/ela-weekly-critical-reading/beyond-meat-is-going-public-meat-alternatives-are-going-mainstream/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:40fde431-adf4-401a-924f-266bbdc6fefc>', 'WARC-Truncated': None}", 'previous_word_count': '1508', 'url': 'http://blog.teachersdiscovery.com/ela-weekly-critical-reading/beyond-meat-is-going-public-meat-alternatives-are-going-mainstream/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-47-182-244.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.075386643409729', 'original_id': '23ed7ca79425fe4abe5ab8d3292a10f724415d8e68a8618d4693f1615cb15dae'} |
Blackhawks on the verge
nhl_g_toews1x_576Tonight is the night that all of us Blackhawks fans have been waiting for since the end of the summer of 2010. Tonight, the Blackhawks could win their 5th Stanley Cup in franchise history with a win against the Bruins in Boston. Winning the fourth game of a playoff series, let a lone the Stanley Cup Final, is always the toughest win to get. For some players, it is hard to stay focused on going out and playing the game while knowing that they could win the Cup with a victory. For others, knowing that they’re just one win away provides even more motivation to go out and play with every ounce of energy and focus that they have. This is the type of player that I believe the Blackhawks are made up of.
A big deal is being made of the theory that the Blackhawks might be distracted by what they could potentially accomplish tonight. I’m not buying into that. While only 8 of the dt.common.streams.StreamServercurrent Blackhawks have won the Cup, this is a group of players that won’t lose their focus. When you are on a team led by players such as Toews, Keith, Sharp, Seabrook, Hossa, and so on, it is hard to lose focus on the task at hand. The leadership on the Blackhawks is incredible, and it is a huge reason as to why this team has been so successful this season. The guys who have been in this situation just so happen to be great role models to the younger, less experienced players on the Hawks. For that reason, I am expecting to see the Blackhawks more focused than they have been all season tonight.
As well as the Blackhawks have played and as much effort as they have given over the course of this postseason and these last 2 games, I am confident that tonight will be their best effort yet. They know the Bruins are going to give their own best possible effort to avoid elimination, so they will have to match Boston and probably play with even more effort than the Bruins.
Jonathan Toews said today that he will for sure be playing tonight, which is a very good thing for the Blackhawks for obvious reasons. Patrice Bergeron, however, is still not quite sure whether or not he’ll be playing tonight. Claude Julien said after the Bruins’ morning skate today (Bergeron did not participate) that Bergeron will take part in the warmups tonight, and he hopes that Bergeron will play. So while it sounds like both players will be on the ice tonight, the status of Patrice Bergeron is a bit more up in the air.
So how do the Blackhawks finish off the Bruins tonight? Well, they need to continue doing what they’ve done over the last 2 games. In Games 4 and 5, the Blackhawks really used their speed to their advantage and were able to create a lot of offensive chances by doing so. The Bruins’ biggest weakness in 5-on-5 play is defending fast teams like the Blackhawks. If the Hawks can come out of the gates and dictate the way this game will be played, they should win. If they sit back and let Boston play their own game, then the Bruins will most likely win. In the end, it all comes down to which side wants it more and brings the best effort.
While guys like Kane and Toews have really stepped up this series, I think that tonight may come down to which ever team gets more production from their bottom lines. The Blackhawks are the deeper team and over the course of this series, they have gotten the better production from their depth players. I see no reason as to why this shouldn’t be the tumblr_mobhobDwqu1qj5er8o1_500case again tonight, and it could prove to be the difference. Guys like Saad, Shaw, Bolland, Frolik, Stalberg, and Kruger all need to be at the top of their game tonight and continue providing offense for the Blackhawks.
This is going to be the toughest game of the year for the Blackhawks, and they know it. They are going to have to come out as the more desperate team, and they are going to need to play with 110% effort. The Bruins are not going to go away easily. They will fight until the final horn blows, win or lose.
Like I already said, I am very confident in the Blackhawks and I think they will win tonight. They have that cold-blooded, killer instinct in them that all the great teams in history have had. When your captain is Jonathan Toews and you are one win away from hoisting the Stanley Cup, you are going to be prepared and you are going to do everything you can to win that game. That’s just the type of mentality that Toews instills in his teammates. He is the ultimate competitor, and tonight, I’d expect the Blackhawks to be the ultimate competitors.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9716793298721312}", 'metadata': "{'Content-Length': '71200', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ROCXUVDI6FWF2ZUOBW4IRU5FO2KGT77I', 'WARC-Concurrent-To': '<urn:uuid:a7300250-81f2-4453-a5f7-8bf5ae2a5843>', 'WARC-Date': datetime.datetime(2019, 5, 25, 10, 52, 8), 'WARC-IP-Address': '192.0.78.24', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3EVSBPYXDXXISTCGGT5FJE2TKUATQZCJ', 'WARC-Record-ID': '<urn:uuid:3d984139-28da-4ee4-be67-6d4f212de34e>', 'WARC-Target-URI': 'https://cuethedagger.net/2013/06/24/blackhawks-on-the-verge/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:10ff092b-0346-4ab8-b6eb-5a524ea69339>', 'WARC-Truncated': None}", 'previous_word_count': '892', 'url': 'https://cuethedagger.net/2013/06/24/blackhawks-on-the-verge/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-171-61-111.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.036402106285095215', 'original_id': '6acb9b6b77bcf3d2ba4ef8c666fd05054c1bc8f9fef24ad4add1456a36576703'} |
“This is not your father’s Republican Party,” declared the former vice president. With its “phony populism” and “fake nationalism,” he said, the GOP is “sending a vision of America around the world that is distorted, that’s damaging.”
ADDRESSING THE New York State Democratic convention last week, Joe Biden endorsed Governor Andrew Cuomo for reelection and delivered some blistering criticism of the party that controls Congress and the White House.
But it isn’t only the GOP that has changed so profoundly. So has the Democratic Party.
“We have to take a long look in the mirror and face the hard truth,” Cuomo told the Democratic delegates in his convention speech. That truth, he said, is that Democrats lost the last presidential election “because we lost the connection with who we are and why the middle class and working families made the Democratic Party their home in the first place.”
Cuomo’s concern for middle- and working-class values may be genuine, or it may reflect the fact that he’s facing a primary challenge from actress Cynthia Nixon, whose politics are skewed even more to the left than his. Either way, there’s no denying that the Democratic Party today has far less sympathy for Main Street attitudes it used to embrace.
There was a time, for example, when self-described “pro-life liberals” were welcome in the Democrats’ big tent. Democratic governors like Ella Grasso of Connecticut and Robert Casey of Pennsylvania firmly opposed abortion; as recently as 2009, dozens of House Democrats initially opposed the Affordable Care Act because it lacked restrictions on abortion funding. But no longer is there room in party councils for more than one position on the issue. Democratic Party chairman Tom Perez decreed last year that Democratic candidates must support a woman’s right to choose. “That,” he said, “is not negotiable.”
Dissent is not permitted on other topics as well.
Moderate liberal Joe Lieberman of Connecticut was a rising star in Democratic circles in the 1980s; by 2000 he was the party’s candidate for vice president. But Lieberman strongly supported the Iraq war, a position that by 2006 made him persona non grata in Democrats’ eyes. Lieberman’s ostracism confirmed that the once-robust national-security wing of the Democratic Party — the home of Cold War hawks like Harry Truman, Jack Kennedy, and Scoop Jackson — was defunct. Democrats, the original party of peace through strength, are now the party of disengagement and retreat.
Liberal Democrats in the 1960s believed in color-blindness — they agreed with Thurgood Marshall that “racial criteria are irrational, irrelevant, odious to our way of life.” Liberal Democrats today insist on racial criteria, demanding rigid “diversity” in everything from workplace hiring to college admissions to the Academy Awards.
Your father’s Democratic Party was an ardent defender of Israel, the only democracy in the Middle East. No more: Liberal Democrats today, reports the Pew Research Center, are much less likely to support Israel than to support its Palestinian enemies.
Two decades ago, a popular president fought hard for a North American Free Trade Agreement, signed the Iraq Liberation Act, and kept his promise to “end welfare as we know it.” He not only enacted a Balanced Budget Act, but produced four consecutive federal budget surpluses. He cut the top capital-gains tax rate from 28 percent to 20 percent. He led NATO in liberating Kosovo. He resisted same-sex marriage. He codified economic sanctions against Cuba.
Bill Clinton is still popular with Democrats. But in a party that has shifted sharply leftward, there’s little room for the centrist positions he upheld as president.
Biden is right about the Trump GOP: It is decidedly not your father’s Republican Party. And your father’s Democratic Party? It too, alas, is a thing of the past.
Jeff Jacoby can be reached at jacoby@globe.com. Follow him on Twitter @jeff_jacoby. | mini_pile | {'original_id': '3a8dc3edffe7b3a9dc76a1cff9637fc8e9250b78364e13c85eb2a9672b87ea75'} |
Print Page
Letter to the editor: Economy is basically strong
Arlington Heights
The fed is looking to buy back the home mortgages, that are in these failing banking and brokerage institution. Then the fed will package them up and sell them to solvent and local banks who can monitor them.
Some are in foreign hands, but wouldn't the average American home owner want our government to acquire our mortgages and take them out of the international markets?
Obama's answer to this is to "cut $40 billion from federal contractors."
This is not a good idea during a downturn because of the loss of jobs.
As FDR knew, you use the government projects to employ people during down turns, then cut during upturns so the people can find jobs.
John McCain says: "We are in the most serious crisis since World War II."
His "bipartisan oversite committee to be led by Warren Buffett or other respected business leader" proposal I agree with. I also agree with Mc Cain that "the economy is basically strong."
But the finanical system needs to be fixed.
Print Page | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.962606966495514}", 'metadata': "{'Content-Length': '3266', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AMB6MNTY3QJRDQAUOJ6JOBR5JIRNCBOM', 'WARC-Concurrent-To': '<urn:uuid:f1d911f1-c499-4599-b798-f44a0fe60dad>', 'WARC-Date': datetime.datetime(2015, 3, 2, 7, 33, 52), 'WARC-IP-Address': '74.214.237.235', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:23UNVFUM7OQH3BP4TSDK6ZC4SYZLZM5Q', 'WARC-Record-ID': '<urn:uuid:8dbfa531-ef8f-4e7e-88fe-cdff84f0fe5c>', 'WARC-Target-URI': 'http://www.sunadvocate.com/print.php?tier=1&article_id=14165', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4a200b61-1bb2-4000-b6d9-905dac284525>', 'WARC-Truncated': None}", 'previous_word_count': '183', 'url': 'http://www.sunadvocate.com/print.php?tier=1&article_id=14165', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2856574058532715', 'original_id': 'a963944bb2264e18ffa6cbb90365ac61a993bc4fb72107899920e88f707cbe48'} |
Here Come the Dividend Dynamos
We've had two large dividend increases announced this week. The first was from Microsoft (MSFT), which boosted its quarterly dividend by 22% to $0.28 per share, up from $0.23 per share. Soon after, McDonald's (MCD) announced that it would raise its quarterly dividend by 5.2% to $0.81 per share, up from $0.77 per share.
I have always liked companies that raise dividends for a few reasons, including what can be a step function higher in the stock price or a move higher in their dividend yield if the shares don't move higher....355 more words left in this article. To read them, just click below and try Real Money FREE for 14 days.
Already a Subscriber? Please login.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '218', 'language_id_whole_page_fasttext': "{'en': 0.9351052045822144}", 'metadata': "{'Content-Length': '34493', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IPDI6ZRSG5T6LK6CF5NDRH5GJAOIW52P', 'WARC-Concurrent-To': '<urn:uuid:d19824a2-c1af-449b-844b-5e008e711033>', 'WARC-Date': datetime.datetime(2014, 12, 22, 2, 15, 7), 'WARC-IP-Address': '199.27.76.185', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LLA75GU3LOEL2JTAL6D762QPQVTYPU3B', 'WARC-Record-ID': '<urn:uuid:8d4cd6f9-4758-480b-85c7-3a90e3afef53>', 'WARC-Target-URI': 'http://realmoneypro.thestreet.com/articles/09/19/2013/here-come-dividend-dynamos?puc=cnnmoneyp&cm_ven=CNNMONEYP', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:531a3ab7-7fe4-47c4-ba77-acf3dc28de28>', 'WARC-Truncated': None}", 'previous_word_count': '330', 'url': 'http://realmoneypro.thestreet.com/articles/09/19/2013/here-come-dividend-dynamos?puc=cnnmoneyp&cm_ven=CNNMONEYP', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03893357515335083', 'original_id': '0a2594258f30738cb8867ae4c6e388c471d31a498e915764d8e4faff13ef5413'} |
What is it that Makes GOTJ so Desirable?
Don't ask, don't neigh? He has written for "Vibe," MTV, Rap Rehab, and more. Juggalo Documentary: A Family Underground, Juggalo Paint and More: Examining the ICP in-Concert Experience.
ICP’s "Chicken Huntin’", So tell Mr. Billy Bob I’m a cut his neck up, What can you do with the drunken hillbilly, Cut his fucking eyes out and feed ‘em to his aunt Milly, Willy Willy chicken neck, chicken hunting gotta love it, Hit him with the twelve gauge bucket, chicken nuggets, Horrorcore lyrics from We're doing our best to make sure our content is useful, accurate and safe.If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly. You only need to listen to "Stan" once before realizing that this ill-fated account of a psychotic Eminem worshipper is simply unforgettable. "What's Ya Psycho?" This record also help put the South Park Coalition name on the map due to world wide distribution from Rap-a-Lot. Juggalettes? We'll never know if B.I.G. is a monstrous anthem that can turn a graveyard into a dancehall full of zombie troupes. Lyrics to Horror Movie Rap by Ganksta N-I-P from the The South Park Psycho album - including song video, artist biography, translations and more! And I feed it quarter bags of Doritos Turns out he was staring at his own reflection. After Insane Clown Posse on SNL went Viral, Will Mighty Death Pop sound Different? Write a song about . What Hip Hop Clothing Will Insane Clown Posse Think Up Next? Filter. Mainstream Artist Vanilla Ice Goes the Underground Music Route? "Horror Movie Rap Lyrics." LiveAbout uses cookies to provide you with a great user experience. Think you know music?
Where Juggalos and Juggalettes Enjoy ICP in 2012, Why Psychopathic Records and Twiztid Torrents are Bad for Horror Rap, Why The Fuss? Can an Adult be a Part of the Juggalo Family? Darkness permeates "Dance with the Devil" from start to finish, as Immortal Technique tells an elaborate tale of a man named Billy.
parodied on Saturday Night Live, and the parody has since gone viral on
To learn more about Psychopathic Records artists, please visit http://hatchetgear.com. Dido's ethereal crooning adds more soot to the tale. Old Time Western / Horror Rap Combo Makes for a Hilarious Comedy, Preparing for Your Favorite Music Festival. "It lives inside of me, eating what's in its way," Cage laments. Hatchet Man for Juggalos, Hatchet Girl for Juggalettes? 5 Reasons the Answer is No. 10 Years After ICP’s Wraith, will The Mighty Death Pop! New Developments Surrounding Insane Clown Posse’s New Album, The Mighty Death Pop!
Comparing Insane Clown Posse’s Music Videos with Other Psychopathic Videos, Five Underground Rap Groups With Outrageous Lyrics. Rap Lyrics Generator: This is a powerful rap lyrics generator that can generate countless rap lyrics. I mean, has there ever been a hip-hop artist scarier than this guy? In 1992 he released his debut album South Park Psycho. After all, Insane Clown Posse and Twiztid are arguably Psychopathic Records’ two biggest individual acts. These horrorcore lyrics probably confirmed every thought you held about the horror rap genre and Psychopathic Records. Wish Bone unleashes the fiercest assault towards the end, "A demon told me that Lucifer said meet him at the black hole. The lyrics generator can generate a song about anything, including , by sourcing from original rap lyrics. And pass it out like pieces of candy on Hollow’s After all, Insane Clown Posse and Twiztid are arguably Psychopathic - "Suicidal Thoughts", Immortal Technique - "Dance with the Devil". Like a full moon rising, "Maniac" gradually unfolds with a gothic vibe.
The vertically challenged Bushwick Bill then teams up with 'Face and Willie D to fight off a 7-ft tall enemy. What Psychopathic Records and ICP Gear is the Most Unique?
He also wrote the Geto Boys hit "Chuckie."
Apparently there were some fans who didn’t enjoy the
Dark, street hip hop and horrocore with tales about the darkside.... See all details. artist roster writes. This one gave me shivers when I was a kid. Is it Right to Download Insane Clown Posse Torrents? Below, find a collection of lyrics
If you want to turn up the surreal vibe a few notches, set this one to a strobe light. The Reason" confirmed every thought you held about the horror rap genre and Psychopathic by Omar. There’s more to Psychopathic Records’ horror
Revisit Insane Clown Posse’s Christian Values? more », Sheet Music By using LiveAbout, you accept our, Jazzy Jeff + Fresh Prince - "A Nightmare on My Street", The Notorious B.I.G. Collection Horror Rap. In "Mind Playing Tricks on Me," Paranoia gets the best of Scarface as he stands alone in his four-corner room staring at candles, seeing images.
Fed up with his personal failures, Biggie gives himself a death sentence on "Suicidal Thoughts." Similarly, Psychopathic Records artist
12 Nov. 2020. any song in their recent history. "Your world is black. Dear God, I wonder can you save me? out from horrorcore lyrics and write something a little more sentimental. Web. The Tila Tequila-ICP and ICP-Eminem Feuds Examined, Why Twiztid Albums are Horror Rap, Not Gangster Rap, Why Twiztid’s Lyrics on Heartbroken and Homicidal Perfectly Exemplify Horror Rap. Backed by a gnarly soundtrack, Ras Kass strikes up an intricate conversation with supernatural beings. "Stan" unmasks a vulnerable Eminem, one that turns up the pathos several notches while barely raising his voice.
horror rap, and decide for yourself how to interpret the message presented in ", No Hip-Hop Halloween playlist is complete without at least one song from Gravediggaz, who specialized in blood-thirsty throwdowns. There are at least 10 references to Lucifer in "Hell Sent," which finds Bone Thugs bragging about "taking demons hostages" and starting a riot in hell. We have collected more than 100,000 rap lyrics and classified them as love, truth, birthday (actually the same applies to other topics); rap has obvious features, good Rap always resonates. Today, not only is there a genre of music called horror rap that popular. A lunatic wait "It's f***ed up when your mind's playing tricks on you." Filter tracks. Bon Iver kicks things off with: "I shoot the lights out/Hide til its bright out/Whoa, just another lonely night/Are you willing to sacrifice your life?"
Insane Clown Posse, wrote a song about the miracles in life (far from horror How do Dayton Family Lyrics Compare to Horror Rap Lyrics? https://www.lyrics.com/lyric/1144410/Ganksta+N-I-P. Dissecting the Umbrella and one of its Sub-Genres. Remember When Insane Clown Posse Albums were Actually Vinyl Records? And watch you swing. No need for ghosts and goblins here, the mere thought of dying is terrifying enough for Snoop. Williams is also looked at as one of the godfathers of Horrorcore. How ICP Concerts at The Gathering Have Evolved, How to Do ICP Face Paint Like Shaggy 2 Dope and Violent J, ICP Merchandise for the Adult Juggalo in your Family Underground. I got a pet dead head I stop breathing, damn I see demons.
Now Signed to Hatchet House, Will Dayton Family ever Climb the Ranks to Psychopathic? The reflective grandeur of transcendent emotions overwhelms B.o.B, as he cries out: "I'm terrified, like I've seen a UFO.". of others. N-I-P is a certified psycho who probably deserves his own list.
Horrorcore, also called horror hip hop, horror rap, death hip hop, or death rap, is a subgenre of hip hop music based on horror-themed and often darkly transgressive lyrical content and imagery. And make the carnival noose A black suit and a cane like my own," 'Face rhymes. How Can I Watch Juggalo Championshit Wrestling? Get instant explanation for any lyrics that hits you anywhere on the web!
Insane Clown Posse Tattoos: The Answer for Juggalos with too much ICP Wear, Insane Clown Posse’s Horror Rap – Christianity Connection, Is ICP a Gang? Cudi and Cage add the perfect the touch of horror with lines about a psychotic disturbance deep within. Twiztid’s "Waited ‘til Halloween", I make your body like a pumpkin seed
"Yo Fred, I think you got me all wrong/I ain't partners with nobody with nails that long. Looking for a Halloween rap song to get the party started? eve
Ganksta N-I-P - Horror Movie Rap .
Edible Cookie Dough Near Me, Blackstreet Joy Meaning, Reuben Sandwich Pastrami Or Corned Beef, Furniture Stores Colorado Springs, Accident On 99 Today, Fight Back Song Meaning, Mixing Oil And Water Experiment, 8a Certification Cost, Caoilfhionn Pronunciation Audio, Aviation American Gin Owner, Muesli Vs Oats, Montana Cattle Prices, Salem Meaning In Turkish, Crowsnest Pass Population, Ottolenghi Pomegranate Molasses, Every Successful Person Has A Painful Story Meaning In Tamil, Marty Slang Meaning, Ultra Soft Comforter, Furniture Compliance Requirements, Jmt Network Thailand, Proofs And Refutations Summary, Orgain Protein Powder Probiotics, Makkah Clock Tower Wikipedia, What Trade Should I Learn, Www Elections Tn Gov In Form 001 Online, Past Tense Of Shoot, Care International Impact, Whole30 Coconut Curry Chicken, How To Describe Ambience Of A Place, Hazelnut Creamer Organic, Juice Wallpaper Movie, New Fmla Rules 2020, Samsung Galaxy A20e Screen Size, Is Maya Jama A Twin, Alberta North Map, Half Log Interior Paneling, Funny Cartoons Characters, Ps5 Frame Rate, Hotel Quality Bedding, Cartier Font Generator, Papaya Seeds Powder, Common Spider Crab Uk, Coors Seltzer Where To Buy, House Of The Phoenician Sword Hilt, Velar Por Alguien, Tall Narrow Cabinet, Top 5 Worst Cities In The World, Denied Meaning In Tamil, Compass Directions Degrees, Twin Trundle Bed, Dovetail Template Master, Kitchen Furniture Uk, Mom Incident I Report, Virtual Model United Nations, Officer Pantaleo Verdict, Hey Man Meaning, Request Time Off Calculator, Chocolate Loaf Bread, Mountain Island Lake Kayak Put In, Weber Q 1000 Parts, Articles Of Confederation Pdf, Waring Commercial Blender Parts, Anisole Ir Spectrum Labeled, How To Make Apple Extract Recipe, Scirvir The Wanderer Not Appearing, | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '72', 'language_id_whole_page_fasttext': "{'en': 0.8794824481010437}", 'metadata': "{'Content-Length': '28129', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6CZPSYYJCWSVXGQLPRJLG4B657WSR6P4', 'WARC-Concurrent-To': '<urn:uuid:08dca2e5-ba3e-4725-9807-30f9542ec5c9>', 'WARC-Date': datetime.datetime(2021, 3, 5, 0, 56, 32), 'WARC-IP-Address': '45.40.148.147', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ICRMA5EKNM6VIJ4FO3ZZFIBESEJS77AX', 'WARC-Record-ID': '<urn:uuid:0b145614-90c3-43a9-aa73-e132c2c4c2ae>', 'WARC-Target-URI': 'https://waterwisepoolcare.com/journal/is3z1j8.php?ae0d1b=horror-rap-lyrics', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:bec4893d-ef72-4f30-adab-7507f253017e>', 'WARC-Truncated': None}", 'previous_word_count': '1604', 'url': 'https://waterwisepoolcare.com/journal/is3z1j8.php?ae0d1b=horror-rap-lyrics', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-241.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03387594223022461', 'original_id': '88a67b7fe8be62f74bfaffebb71808840c99bbf6e5495b0e30f1c5822109993e'} |
The dynamics of voluntarism in rural dementia care.
In this article, we contribute to the social sciences literature on voluntarism by examining the dynamics of voluntary service provision for people living with dementia in rural settings. Although volunteer-based organizations provide community support services across a range of Western countries, little attention has been directed towards understanding the organization and actions of volunteers and voluntarism in dementia care. To address this gap, we conducted a case study of Alzheimer support organizations in Ontario, Canada, using questionnaires with service providers (N=20) and semi-structured interviews with people with dementia (N=46) and partners in care (N=43). In our analysis, we identify challenges related to increasing demands for support, partner relations, reaching rural communities, a lack of early stage supports, a lack of volunteers for programs that families have requested, and loss of volunteers in programs families depended on. Moreover, we argue that the current model of voluntary sector service provision for people living with dementia is unevenly developed and potentially unsustainable. | mini_pile | {'original_id': 'f2d976f3f97c982c6edc39eabad8c47e865f40f5eeee57633c109275e2e68964'} |
Testo Take It
Take a little of the reds and the white and the blue
Stir it up in a cup then tell me what you gonna do
Take a little of the piss the angst and the noise
Take a look at the people take a look at the girls and the boys
Out on a rock I am stuck on a shock and I
don't want anyone to mend it
Out on a rock I am stuck on a shock and I'm
like a liar like a thief and a bandit
Can you tell me what it's for what it's good for how it works
Spell it out real clear make it work for the jerks
Can you print it out on paper can you get it here
Can you put it in a circle can you put in a square
Out on a rock I am stuck on a shock and I
don't want anyone to mend it
Out on a rock I am stuck on a shock and I'm
like a liar like a thief and a bandit
Take a little of the tears the fears and the lies
Take a swing at the crowd take a swing the girls and the guys
Don't go with the flow just go with the go
I know how it is you say it aint so.
Out on a rock I am stuck on a shock and I
don't want anyone to mend it
Out on a rock I am stuck on a shock and I'm
like a liar like a thief and a bandit
Out on a rock I am stuck on a shock and I
wanna find somebody to share it
Gonna pack'em up and stay, gonna crack'em up and play
I wanna see it wanna | mini_pile | {'original_id': '8c0ffcbf8cfcfa78e19f1d73c5af4e5cafcdb0b2b8a9951869ae3c1604d93092'} |
9/27/11Follow @gthuang
(Page 3 of 3)
found companies and have a deep intuitive understanding of the challenges and opportunities in the market but aren’t limited by the incumbent beliefs in that market.
Oftentimes we’ll back a founder who’s not directly from the market but they have a connection—to start a company and build a product that doesn’t come from the market but comes from the customer community. Isilon is a wonderful example of that. Paul [Mikesell] and Sujal [Patel] came from RealNetworks and they were buyers of storage. They knew very little about being a storage company, and it was to their credit because they built one like no other one we’ve seen in 20 years. That authenticity can sometimes be missing from founders.
The other thing is, there has to be alignment between the type of company you’re building and the type of market you’re targeting. It’s perfectly fine to build lifestyle businesses. But if you want to build a really big company and you’re focused on a market where not a lot of money changes hands, it’s very difficult to get the flywheel going that builds a truly large, enduring, profitable entity. Also understanding the dynamics before you come and talk to us.
The third area is we don’t expect you to have all the answers. By definition, it could be years before any of us have all those answers. We expect that you as a founder have done the due diligence to know that it’s worth your time. There’s usually one or two first-order questions that when put ourselves in the founder’s shoes, we say, we would have asked that question. As a founder, you want to have those questions answered.
A broad example is a misalignment between, “I want to build a big, long-enduring company,” and focusing on a market, if it’s a consumer business, where only a small portion of the population could really participate. Or if it’s an enterprise market, we’ll talk to folks who are solving very meaningful enterprise problems, and they’ll have even talked to one or two very, very large companies, and we’ll dig into it and find out that out of the Global 2000, only the top 20 care about this. We don’t want to be in the position of identifying those sorts of issues. What it tells us is the founder has not answered his or her own questions terribly well.
X: Switching gears, can you talk about what seems like a mass exodus of venture capitalists from cleantech and alternative energy investing?
GM: A lot of people want to talk about cyclical reasons why cleantech is less attractive than it was two or three years ago. To be certain, there are some cyclical things that are different now, but I sit on the board of a cleantech company [Achates Power]. They make an engine that is considerably more efficient than traditional engines. And there’s more demand than there was three years ago.
What’s happened is the realization that it’s a complex ecosystem that’s almost defined by legacy relationships. Very different from a networking business or other businesses where venture has been successful in building companies. So I think the slowdown in investing has less to do with cycles. It usually takes a venture business about three or four years to figure out whether or not broadly what they’re doing is working. And we’re about three or four years into a broad push into cleantech. Folks are saying, it’s not as easy to get the first dollar of revenue into these companies; raising money is not as easy as we thought; they tend to be more capital intensive; there are different team building challenges here. There’s a little bit of a sobering of the market.
X: What are the lessons learned from this?
GM: There were a lot of mistakes made in the investment community. Venture has never been a great source of funds for pure manufacturing businesses where the output is a commodity. The definition of a commodity is you differentiate on price. A lot of the cleantech companies, at the end of the day, they produce fuel, silicon-based [solar cells], and then what do they run afoul of? Major shifts in the cost infrastructure, whether it’s access to very low-cost silicon, or in the case of liquid fuels, artificial movements in the oil price that create short-term periods where petroleum products appear cheaper than they really are.
We’ve tended to stay away from those categories and focus on the equivalent of the router. Something that leverages a lot of IP and the equivalent of software, and is more of a lever, an enabler in the ecosystem. It’ll still take a while, but we see a potential to build some pretty big and interesting companies, but most importantly, big gross margins. Which is something you wouldn’t have said about most cleantech investments over the last three or four years.
X: So how does it play out from here? You’re still optimistic, it seems.
GM: One thing I want to emphasize is that we don’t have more oil and energy resources today than we did three or four years ago. This is my value-added comment for the day. We don’t have fewer consumers globally looking for those resources. If we had a challenge three or four years ago, we have a bigger challenge today. And if it was hard for the traditional incumbent companies to address those challenges, it’s no easier today. The opportunity to leverage venture into that community was greatly overstated three or four years ago. But it existed then and it exists to a greater degree today. At some point, the decline will catch up with the secular trend, and we’ll have some reasonable balance in the cleantech venture business. It’s not going to go away.
Single PageCurrently on Page: 1 2 3 previous page
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '38', 'language_id_whole_page_fasttext': "{'en': 0.9673224687576294}", 'metadata': "{'Content-Length': '94172', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WHYA4A4UWOCMMOHXA6UTC4QHMOCNTCN3', 'WARC-Concurrent-To': '<urn:uuid:eeb5a0ae-3dc7-45b9-b7b0-d483a6e48a46>', 'WARC-Date': datetime.datetime(2013, 12, 19, 8, 45, 42), 'WARC-IP-Address': '199.193.193.19', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:JONHIPMYABAVFLP2PBBSMCVC5XMJA3Q4', 'WARC-Record-ID': '<urn:uuid:bd051a21-ad1d-4578-8aad-87c3196b7833>', 'WARC-Target-URI': 'http://www.xconomy.com/boston/2011/09/27/sequoia-capitals-greg-mcadoo-on-consumer-web-and-cleantech-trends-boston-vs-new-york-and-recruiting-at-mit/3/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e7bf2dfb-86e4-415b-95d8-da23bd551bce>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1028', 'url': 'http://www.xconomy.com/boston/2011/09/27/sequoia-capitals-greg-mcadoo-on-consumer-web-and-cleantech-trends-boston-vs-new-york-and-recruiting-at-mit/3/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.19571608304977417', 'original_id': '4c4670e784021faaa8c467f1ff23912be0adfaf9902f339b42eddec47546401a'} |
کندیلهای پسسری برآمدگیهای زیر سطحی از استخوان پسسری در مهره داران هستند که در مفصلبندی با وجوه برتر مهرههای اطلس عمل میکنند.
در پایه هر یک از کندیلها، استخوان توسط یک کانال کوتاه، مجرای زیرزبانی به صورت تونل میشود.
در خزندگان و پرندگان
وجود یک کندیل پسسری منفرد در دایناسورها (از جمله پرندگان) و کروکودیلها با وضعیت موجود در دوزیستان و همکمانان (از جمله پستاندارانی مانند هومو ساپینس) که در آن دو کندیل پسسری وجود دارد، در تضاد است. در اینجا کندیل پسسری یک برآمدگی منفرد گرد است که در پشت جمجمه وجود دارد و با اولین مهره گردنی مفصل میشود. از نظر کارکردی به سر اجازه میدهد تا از یک سو به سوی دیگر، و بالا و پایین حرکت کند و همچنین بچرخد. ترکیبی از چندین استخوان کوچکتر (مانند بازیوکسیپیتال و بروناکسیپیتال) در شکلگیری این ساختار شرکت میکنند.
منابع
استخوانهای سر و گردن
مقالههای ویکیپدیا که متن آن از چاپ بیستم آناتومی گری (۱۹۱۸ (میلادی)) بهکارگرفتهاند | common_corpus | {'identifier': 'https://fa.wikipedia.org/wiki/%DA%A9%D9%86%D8%AF%DB%8C%D9%84%20%D9%BE%D8%B3%E2%80%8C%D8%B3%D8%B1%DB%8C', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'کندیل پس\u200cسری', 'creator': 'https://fa.wikipedia.org/w/index.php?title=کندیل پس\u200cسری&action=history', 'language': 'Persian', 'language_type': 'Spoken', 'word_count': '157', 'token_count': '479', '__index_level_0__': '6058', 'original_id': 'fc9f81462e2c5c7ed40b7b70a8d93b01711c4d1063bd1254d089144ec13971c6'} |
People v. Eudy
Annotate this Case
[Crim. No. 4151. In Bank. August 24, 1938.]
THE PEOPLE, Respondent, v. WESLEY E. EUDY et al., Appellants.
Elvin F. Sheehy, Ben D. Frantz, Archibald D. McDougall, Horace E. Dunning and Daniel E. Weyand for Appellants.
U.S. Webb, Attorney-General, and Gordon S. Hughes, Deputy Attorney- General, for Respondent.
The five defendants in this case were jointly charged with the crime of murder. One of them, Robert Lee Cannon, pleaded not guilty; the four others pleaded not guilty and also not guilty by reason of insanity. The issues joined by the pleas of not guilty were presented to a jury in a trial of all defendants. The jury found each of them guilty. Thereafter each of the four who pleaded not guilty by reason of insanity moved the court for a separate trial upon that issue. This motion was denied and upon trial each was found sane at the time of the commission of the offense. The defendants have appealed from an order denying them a new trial and also from the judgment subsequently entered imposing the death penalty. [12 Cal. 2d 44]
The crime of which the defendants stand convicted was committed on September 19, 1937. All of them were then inmates of Folsom State Prison. Clarence Larkin, the warden of the institution was in his office, located just off the prison yard, for the purpose of interviewing prisoners who wished to see him. Each convict waiting to see the warden was allowed to enter this office as his turn came. When the defendant Eudy entered, six other convicts bearing knives and a pistol rushed into the office from the yard. They overpowered the warden and the captain of the guard, who were both unarmed, and marched them into the yard as hostages in an attempt to escape. There two of the convicts were shot and killed by guards in towers on the prison wall. Warden Larkin was then fatally stabbed by the five remaining prisoners; and in a melee between guards and prisoners, in which the latter were subdued, a guard also received injuries from which he died.
[1] The defendants' first point upon which they rely for reversal is that the trial court erred in disallowing certain challenges for cause made by them during the voir dire examination of jurors and in later refusing additional peremptory challenges. The record shows that after the defendants had used all of their peremptory challenges they requested three additional ones to replace those which had been exercised in excusing jurors challenged for cause. The court allowed one additional peremptory challenge, and then, on its own motion, excused the one remaining juror whom the defendants had challenged for cause. Two more jurors were then examined and accepted without objection.
The defendants complain that the jury as then constituted was unsatisfactory to them because it included one juror who would have been excused had the court granted additional peremptory challenges and two jurors whom the defendants could not remove in the absence of evidence showing facts upon which a challenge for cause would lie. They insist that each of the five jurors who was unsuccessfully challenged for cause disclosed a state of mind which would have prevented him "from acting with entire impartiality and without prejudice to the substantial rights of either party". (Sec. 1073, Pen. Code.) However, the record shows that although the prospective jurors admitted that they had read of or heard about the death of Warden Larkin and believed that the convicts [12 Cal. 2d 45] concerned had entered into a conspiracy to escape from prison, each said with positiveness that he could and would decide the case solely upon the evidence introduced in the trial.
[2] One who has formed or expressed an opinion upon the merits of a criminal case is not thereby disqualified from serving as a juror in the trial of the defendant "provided, it appear to the court, upon his declaration under oath or otherwise, that he can and will, notwithstanding such an opinion, act impartially and fairly upon the matters to be submitted to him". (Sec. 1076, Pen. Code.) Whether the challenged person met the requirements of the law was a question for the decision of the trial judge. The fact that all of the answers of each person under examination were not entirely consistent only raised a conflict in the evidence concerning the state of mind of the prospective juror. Upon such a conflict the determination of the trial judge is conclusive upon an appellate court. (People v. Craig, 196 Cal. 19, 25 [235 P. 721]; People v. Edwards, 163 Cal. 752, 757 [127 P. 58].)
[3] Another point raised by the defendants is that the court erred in denying their motions for separate trials on the issue of insanity. They say that it was difficult, if not impossible, for the jurors and the trial judge to keep the evidence concerning each defendant separate in thought from that relating to the others. Their counsel concede that where several defendants are jointly tried upon their pleas of not guilty, there is no statutory provision or judicial authority for severance of trial upon their pleas of not guilty by reason of insanity. They rely, however, upon the English case of Rex v. Lonsdale, 47 Times L. Rep. 80, in which the court held that a defendant charged with being an habitual criminal should be tried separately upon that issue and not with any other person.
In this state, the court in its discretion may order a separate trial of one or more defendants charged with a public offense. (Sec. 1098, Pen. Code.) But a separate trial is not a matter of right. (People v. Rocco, 209 Cal. 68 [285 P. 704]; People v. Tinnin, 136 Cal. App. 301 [28 PaCal.2d 951].) Even where it appears that evidence will be admissible against one of several defendants which the jury cannot consider as against the others the law does not require separate trials [12 Cal. 2d 46] upon demand therefor. (People v. Perry, 195 Cal. 623 [234 P. 890]; People v. Booth, 72 Cal. App. 160 [236 P. 987]; People v. Erno, 195 Cal. 272 [232 P. 710].)
[4] The defendants in this case acted together in attacking the officers of the prison. Apparently, they had carefully planned what each should do. What was said and done at that time was evidence for the jury to consider in determining the sanity of each of the defendants. All of them had been inmates of the institution for some time and had been under the same prison discipline. Although the mental and social background of each of them was different, issues of much greater complexity are commonly submitted to a jury. [5] The determination whether a motion for severance of trial should be granted always rests within the sound discretion of the trial judge. There can be no clearly defined rule for determining when a defendant is entitled to a separate trial because the exercise of discretion means that the decision must be based upon a just and proper consideration of the particular circumstances which are presented to the court in each case. Only where an abuse of discretion is shown will the ruling of the trial court be disturbed upon appeal. (People v. Perry, supra; People v. Tinnin, supra.)
[6] In the present case the defendants have failed to show any inconsiderate action. Furthermore, when the motion for severance was made no facts were stated in support of it and, so far as the record shows, the trial judge was not apprised of the nature or extent of the evidence that each defendant expected to offer to prove insanity. An appellate court, in determining the propriety of a ruling upon a motion for severance of trial, will look only to the facts presented to the court at the time the motion was made and not to events that occurred afterward. (People v. Erno, supra; People v. Friday, 18 Cal. App. 2d 197 [63 PaCal.2d 303]; People v. Pierson, 139 Cal. App. 734 [34 PaCal.2d 755].) The record fully supports the order which was made.
[7] The defendants next contend that the trial judge committed prejudicial error when he made a statement concerning the defense of insanity which, it is claimed, exceeded the bounds of fair comment. Although he told the jurors that an ingenious counterfeit of mental infirmity should never furnish immunity to guilt he also said that the defense of [12 Cal. 2d 47] insanity should be weighed fully, fairly and justly. As a part of his remarks he admonished the jurors that you "are the sole judges of all questions of fact and credibility of the witnesses; you are not to consider any comment of the Court upon the evidence and credibility of witnesses as binding upon you or necessarily to be followed by you. The Court does not intend that the judgment of the Court should be substituted for that of the Jury and you should not consider yourselves bound or influenced against your own judgment by any comment of the Court. Your verdict must represent and reflect your own independent judgment."
Taken as a whole the statement amounts to nothing more than fair and general comment which a trial judge is now authorized to make. (Art. VI, sec. 19, Cal. Const.) [8] Although such remarks should be temperate and unemotional in tenor, he is not confined to specific comments. The right may be exercised in the manner which the judge deems "necessary for the proper determination of the case", and is not confined to a colorless recital of facts. (People v. De Moss, 4 Cal. 2d 469 [50 PaCal.2d 1031]; People v. Ottey, 5 Cal. 2d 714 [56 PaCal.2d 193]; People v. Gosden, 6 Cal. 2d 14 [56 PaCal.2d 211].) Even an expression of his opinion concerning the guilt or innocence of a defendant has been held to be within the scope of comment which may be made, provided the province of the jury is not invaded.
[9] The defendant Kessell also urges that the evidence was insufficient to support the verdict that he was sane at the time of the offense and that the court erred in its rulings on certain evidence pertaining to his sanity. This defendant produced eleven witnesses, all fellow-convicts, who testified concerning his conduct during several months preceding the attempted prison break. Against this evidence was not only the presumption of sanity but also the testimony of five medical experts, each of whom stated that in his opinion the defendant was legally sane at the time he committed the offense. It is true that in answer to a hypothetical question embodying the facts testified to by Kessell's fellow-convicts, these experts testified that if a man had such characteristics he would be considered insane. However, the jury was at liberty to refuse credence to the testimony of the lay witnesses. The doctors made careful clinical examinations of the defendant [12 Cal. 2d 48] after the crime was committed and none of them found the symptoms referred to by the prisoners who testified in behalf of Kessell.
[10] Several rulings of the trial court concerning the introduction of evidence have also been assigned as error. These have been examined and considered but they do not require detailed discussion. While some of them may be open to question none presents points which would justify a reversal of the judgment. The trial as a whole was conducted with fairness and impartiality, and all counsel were allowed full latitude in the examination of witnesses.
The judgment and the order denying a new trial are, and each of them is, affirmed.
Curtis, J., Shenk, J., Waste, C.J., Seawell, J., and Langdon, J., concurred. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '35', 'language_id_whole_page_fasttext': "{'en': 0.9750909805297852}", 'metadata': "{'Content-Length': '47478', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GEBD6TMWCARR5DBH63ANXRI4XTHAC263', 'WARC-Concurrent-To': '<urn:uuid:3b528592-adcf-430f-a51f-8fada92e7414>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 27, 21), 'WARC-IP-Address': '99.84.181.41', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YWRZIBRWD5ULTXA4SWZYSQDBVL5NZLQR', 'WARC-Record-ID': '<urn:uuid:6f9cf648-2518-42a8-b310-b82e7697775b>', 'WARC-Target-URI': 'https://law.justia.com/cases/california/supreme-court/2d/12/41.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae365904-b67a-42d7-a127-1c16d788e03e>', 'WARC-Truncated': None}", 'previous_word_count': '1925', 'url': 'https://law.justia.com/cases/california/supreme-court/2d/12/41.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024179816246032715', 'original_id': 'a79b9960aee01d449dcf526e4ec483ac4e274025e213d5bf693c1125da461de3'} |
Horatio and Hamlet Analysis
Only available on StudyMode
• Download(s) : 344
• Published : April 11, 2013
Open Document
Text Preview
Horatio and Hamlet
Hamlet by Shakespeare is a story whose plot contains an entanglement of emotions like betrayal, love, and the longing for revenge. Through the maze of Hamlet, Horatio and Hamlet are the two characters that must depend on one another. Horatio is Hamlet's most loyal friend and he is the only one he can trust when it comes to the planning of his revenge plan toward the king. However, questions arise when "what ifs" come to play. Horatio accompanies Hamlet to the meeting of the ghost, assists in the confirmation of the King's guilt, and witnesses the death of Hamlet. Many times Horatio gives advice to Hamlet, but Hamlet driven by his revenge, refuses to listen to him. Hamlet listens to no one except his father, the ghost, who only helps in the dramatic irony of his pitfall as the young prince of Denmark.
The milestone of the play is when Horatio tells Hamlet of his father's ghost. Hamlet watches the night sky and encounters his father; as he beckons to go with, Horatio pulls him back and warns him of the dangers of giving into a ghost's trickery. "What if it tempt you toward the flood...Or to the dreadful summit of the cliff [t]hat beetles o'er his base into the sea, [a]nd ther assume some other horrible form [w]hich might deprive your soverignty of reason [a]nd draw you into madness"(Shakespeare 29). Hamlet responds with anger and refuses to listens to Horatio, even threatening to "make the ghost [of the man who] lets [him]"(Shakespeare 30). If Hamlet had listened to Horatio, he would have never found out the truth of his father's death, and Hamlet would not want to get revenge and cause the death of many others. Horatio does give some good advice and if he had tried harder to persuade Hamlet instead of letting him go because he was literally afraid for his life, then maybe he could have convinced him not to go with the ghost.
Nonetheless, Hamlet does go with the ghost where he finds out about the death of his father. His Uncle murdered...
tracking img | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9666556715965272}", 'metadata': "{'Content-Length': '75542', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6U2G3TSIGYHKBFHVJ5G6F5GM3K63TEL5', 'WARC-Concurrent-To': '<urn:uuid:5502b987-0c49-41c4-aa94-5aede6c162b1>', 'WARC-Date': datetime.datetime(2017, 9, 22, 22, 31, 58), 'WARC-IP-Address': '64.30.136.226', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:Q5BME6M46HDJ6AZVQCTPNUCM42TXUIFB', 'WARC-Record-ID': '<urn:uuid:0b03414b-c340-4035-a49b-c94fe69c2751>', 'WARC-Target-URI': 'http://www.studymode.com/essays/Horatio-And-Hamlet-Analysis-1590285.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:68c4ea27-a5d3-4e68-99a4-9a91893b8271>', 'WARC-Truncated': None}", 'previous_word_count': '362', 'url': 'http://www.studymode.com/essays/Horatio-And-Hamlet-Analysis-1590285.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-181-87-197.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.061014413833618164', 'original_id': '68d50c35de5037d4329d05db0daaa9847d0ab2a4d071ee3e6f0c6c51a8a1d7e7'} |
Toll Free
Qualified help with your writing task
To start, you can Order now or Get a quote
How to Write a Capstone Project
A capstone project is more demanding than any work you’ll write, or have written, in college. It’s based on independent research, and is probably one of the most valuable and rewarding academic works available to a student.
The first step always seems to be: “choose a topic.” Getting a little tiresome, right? But as with all big projects, once you register for a research course, they give you the independence to show your knowledge, skill, and creativity. Moreover: you register for a capstone project because you have interest in a topic, not because you were forced to do so.
Each college and university has a registration process mapped out for you, either on the university’s website or in hard copy form at the office. So, we won’t delve into technical details that may differ slightly. Instead we’ll focus on writing (and assume you’ve already registered for the course and completed your proposal).
Writing Tips
First, let’s get the simple things out of the way. Choose the correct citation style and follow it throughout the paper. Be mindful of grammar tenses. Use an active voice whenever possible. Take your time, of course. There are numerous writing tips, and probably know a lot of them by now. Here are a few good ones:
• Scheduling is always important. You should stick to a weekly plan at all times, but to write a successful research project, you need a separate, integrated schedule. You need to dedicate time to three major tasks: researching, writing and resting.
• Edit and proofread the finished paper separately. You can catch some grammar or punctuation errors while you edit, but the structure, format and the overall feel of your paper should be the main focus. You are bound to fix, rewrite or even delete some phrases and sentences, so proofreading afterwards will make the paper look good and polished.
• Use primary sources. You need to analyze and interpret these references, which require more time and effort than secondary sources. Using primary sources shows that you’re familiar with the topic. Also, it’s better to present your own interpretation of data, than to rely too heavily on outside research.
• Consult the grading rubric. It lists everything you have to address and include in your paper and is a reliable checkpoint.
Show the examiners what you’ve learned in the course of your studies, what skills you’ve acquired and how well you can use them.
Paper Requirements
Generally a capstone paper is about 20-25 pages long, but no longer than 45 pages. You should submit a draft to your Capstone advisor first, before editing and submitting the finished project. The paper usually consists of the following sections:
1. Title page. Make sure you don’t miss any important information that usually goes onto the title page, as it identifies your work.
2. Abstract. It goes after the title page and provides an overview of the capstone project. Basically, it’s a summary of the main sections. Here you can state your reasoning for choosing your research problem.
3. Table of Contents. This will also be your outline. Include all major headings and subheadings.
4. 4. Introduction. Here you present your research problem and explain how you got interested in analyzing it.
5. Problem Description. Expand on the problem, its background, why you think the problem exists, and how you’ll address it.
6. Literature review. In general, you should analyze at least 15 sources. The majority of sources should be no older than 10 years, unless it’s a fundamental study or source related to your research.
7. Project description. In this section, include everything you’ve done to research the problem statement: the type of research design you employed, the parameters and methods, as well as your analysis and results. If you have tables or figures, include them in this section, and also, state you IRB status.
8. Findings and conclusion. Summarize your discussion and explain why your findings matter.
9. References page. Include every source you’ve cited.
10. Appendices. A section for information that is supplementary but provides a deeper understanding of the research problem and analysis.
You’ve read the guidelines, but they still don’t help? Our highly qualified academic writers can help you out. Order a custom capstone project on any topic and enjoy writing as never before.
Calculate the price of your order
550 words
Total price: $26
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '26', 'language_id_whole_page_fasttext': "{'en': 0.9369958639144896}", 'metadata': "{'Content-Length': '64676', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MOS4KOZFBQJTCZZAMIQZCWQV6NT743QE', 'WARC-Concurrent-To': '<urn:uuid:ab799b23-df48-4e64-bfbc-4d8f8cbe3fc4>', 'WARC-Date': datetime.datetime(2018, 12, 17, 17, 10, 15), 'WARC-IP-Address': '104.20.61.206', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:5AZQIY7KCKM5A35WOK3ERZTCTWWVKQ2D', 'WARC-Record-ID': '<urn:uuid:1bcae6ef-8bcf-431e-9fe2-298702ff5790>', 'WARC-Target-URI': 'https://www.advancedwriters.com/writing-help/how-to-write-a-capstone-project.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4cbcaeee-ceb3-4e1e-98da-232121265d85>', 'WARC-Truncated': None}", 'previous_word_count': '758', 'url': 'https://www.advancedwriters.com/writing-help/how-to-write-a-capstone-project.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-102-177-182.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1814402937889099', 'original_id': '704bab183f2907aa7762f9615db843ee8156a05fdb2fb85bcd06a331145a3aa7'} |
60 + g**4/12 + g**3/6 - 16*g**2. Let f be -2 + (-24)/(-18) + 2/(-6). Is w(f) a prime number?
False
Is ((2 - 172930) + -1)*99/(-297) prime?
False
Suppose -16 = 4*s, 0 = -r + 5*s - 2*s + 19. Suppose r*v + 31*v = 5890. Is v a composite number?
True
Suppose 3607069 = -54*h + 17117815. Is h prime?
True
Let i = -155280 + 245765. Is i composite?
True
Suppose -4*z + y = -13, 6*z = 5*z - 5*y - 2. Suppose -2*s + 2*j = -18614, z*s = -3*j + 3593 + 24352. Is s composite?
False
Is (3/6*-1)/(5/(-116170)) a composite number?
False
Is 18/(-4)*-11*(-9298372)/(-1254) a composite number?
True
Suppose 4*z - 55*y = -59*y + 639996, -5*z - 3*y = -799999. Is z prime?
True
Suppose -9*x = -4*x + 40. Let u = -158 + 162. Is u/x*-2*7151 prime?
True
Let h(q) = q**3 + 7*q**2 - 6*q + 6. Let d be h(-8). Let z = d - -29. Suppose -z*o + 134 = -18*o. Is o prime?
False
Suppose -4*b = -u + 8, -u + 5*b + 3 = -6. Suppose 0 = -m + 4*y + 3135, -1841 + 5000 = m + u*y. Suppose 9*n - m = 6*n. Is n prime?
True
Suppose 0 = -k - 4*x + 95587, 2*x = -3*k + x + 286805. Is k a prime number?
True
Suppose -7 = 4*j + 7*a - 2*a, 0 = -2*a - 6. Is (j + 1566/(-12))*-22 a prime number?
False
Let w(g) = -14504*g + 757. Is w(-5) prime?
True
Suppose 0*y + y = 751. Let g = 3780 + y. Let a = g + -2838. Is a a composite number?
False
Suppose 0 = -4*n - 4*y + 7044, 4*n + 2*y = -0*n + 7044. Suppose 6309 = 6*l - n. Is l a composite number?
True
Is 690/92*(-37612)/(-6) a prime number?
False
Suppose -24684980 = 55*f - 50*f. Is f/(-506) - 1/(-11) composite?
True
Let j = 1782 + -703. Is j prime?
False
Let h(t) = 5103*t**2 - 10*t + 48. Is h(-7) prime?
False
Let w = 3092 - 577. Suppose 3773 = 3*j - 4*n, 2*j = 3*n - 0*n + w. Is j a prime number?
True
Let o(m) = 985*m - 3904. Is o(135) prime?
False
Let n(a) = 25*a + 2. Let d be n(10). Let x be (270/21)/(3/d). Let u = 2581 - x. Is u a composite number?
True
Let n be (1/(-18)*-4)/((-6)/(-54)). Let k be (n/6)/(12/(-108)) + 23. Suppose 3*r - v - 397 = 0, -3*v - 2*v - k = 0. Is r composite?
False
Let y(v) = -v + 24. Let k be y(21). Is k/9*(3207 - 0) a prime number?
True
Suppose 4*d + 127 = -x, -4*x - 46 = d + x. Let j = -19 - d. Suppose 13*o - 901 = j*o. Is o a composite number?
True
Let b(h) = -h**3 + 9*h**2 + 3*h + 4. Suppose -3*q = -3*v + 3, 4 = 3*v + 2*q - 4. Suppose -4*m = t - 38, -v*m = -4*t - 12 + 2. Is b(m) composite?
False
Suppose -5*x + 498429 = 4*i, 3*x + 53*i - 299055 = 50*i. Is x a composite number?
False
Let r(f) = -34*f**3 - 45*f**2 + 64*f + 181. Is r(-21) a prime number?
False
Let h(u) = 7668*u + 6485. Is h(37) a composite number?
False
Suppose d = 5*d + 16. Let i = -85 + 73. Is (4874/d)/(1 + 18/i) a prime number?
True
Suppose 5*a - 3 - 7 = 0. Let y be (-30)/(-9) - 6/18. Suppose 307 = -a*k + y*k. Is k composite?
False
Let c(l) = 168*l - 29. Suppose -21 = 2*v - 141. Suppose -v = 25*j - 35*j. Is c(j) a composite number?
True
Suppose 18*p = 16*p + 8. Suppose -a = -4*m + 5, p*a - 13 = -1. Is 10 + -10 + (m - 1)*1273 composite?
True
Suppose -4*a + 3*u = -555141, -200580 = -2*a - 3*u + 76977. Is a a composite number?
True
Suppose -4*g + 4*s - 3320 = 0, 3*s + 1650 = -3*g + g. Let n = 53 + g. Let r = 1842 + n. Is r composite?
True
Suppose -971 - 353 = -4*l. Let u(m) = -m**2 - 17*m - 24. Let n be u(-15). Is l/(0/n - -1) composite?
False
Let m(v) = -13*v**2 - 35*v - 14. Let l be m(-19). Let i = l - -7495. Is i composite?
True
Let k be (2 - (-6)/2)*31924/(-10). Let f = -10741 - k. Is f a composite number?
True
Let r(s) = -5*s**2 + 4*s + 207563. Is r(0) a composite number?
False
Let f(y) = -y**3 + 5*y**2 + y - 3. Let o be 2/4*((12 - 3) + 1). Let v be f(o). Suppose -j - v*n + 1213 = 0, 4*n - 1844 = -3*j + 1801. Is j composite?
True
Suppose -3*b + 1690776 = 3*t, 26*b - 24*b + 1690811 = 3*t. Is t a composite number?
False
Let o = 339440 + -191589. Is o a composite number?
True
Suppose 2*n - 6*n + c + 103555 = 0, -5*n + 129434 = 2*c. Suppose 2*k + 2*w - 12930 = 0, -3*k + 7*k = 3*w + n. Is k a composite number?
False
Let k(f) = f**3 + 29*f**2 - 20*f + 51. Let n = 177 - 206. Is k(n) composite?
False
Suppose 2*y - 4*z = -2 - 6, -2*y = 3*z + 15. Let a(j) = -83*j + 23. Is a(y) a prime number?
True
Let o = -1761 + 968. Let g be (-5974)/4 - (-2)/(-4). Let a = o - g. Is a prime?
True
Let a be (23 - 27)*(-3)/((-9)/(-6)). Suppose 4*h = a, -4*g + 11*h = 6*h - 23058. Is g composite?
True
Let x(k) = k**3 - k**2 - 24*k + 23. Let i be x(5). Suppose i*y = 2*y + 307. Is y a prime number?
True
Let f(a) = -47*a - 14 - a**2 - 2*a**2 + 55*a + 2*a**3. Let l = 128 - 123. Is f(l) a composite number?
True
Let y = 360 + -362. Is (3084 + -49)*y/(-2) a composite number?
True
Let x be 7 - 6 - (-2 + 7). Is (-22)/264 - x/(144/293295) composite?
False
Suppose c - 163774 = 3*m, -276*c + 272*c - 2*m + 655138 = 0. Is c prime?
False
Suppose -6*t + 60 = 4*t. Suppose -t*f = 4 - 34. Suppose 10*i = f*i + 1570. Is i composite?
True
Suppose 16*r + 255 = c + 19*r, -c + 275 = -2*r. Suppose -27*j + c = -2352. Is j composite?
False
Let k(l) = 3*l**2 + 19*l + 35. Let m be k(35). Suppose -d + 6606 = -m. Is d a prime number?
False
Suppose 2*m + 4*r = -0*r - 20, -2*m - 5*r = 25. Suppose m = 22*t - 27*t. Is 1277 - t*(2/4)/(-1) composite?
False
Suppose -190125 = -3*t - 2*p, 5*p + 0*p - 15 = 0. Is t a prime number?
False
Let w(g) be the third derivative of g**6/120 - 53*g**5/60 + 29*g**4/24 - 217*g**3/6 - 288*g**2. Is w(54) a composite number?
True
Let m = 25 + -12. Let i = m + -11. Suppose -5*u = 3*o - 301, -3*u + i*o + 93 = -80. Is u a prime number?
True
Let f = 331 + -644. Let j = f + 758. Is j prime?
False
Let p(h) = h**2 + 9*h - 250. Let s be p(-21). Suppose 2*j - 103346 = -5*o, -o + 51687 = j - s*o. Is j a composite number?
False
Suppose -3*c + c = -3*i - 37541, -3*c = 2*i - 56305. Is c prime?
False
Suppose -143018*m + 31349626 = -142996*m. Is m a prime number?
False
Let g be -1*(23/5 - 18/(-45)). Is -1942*((-12)/30)/((-4)/g) composite?
False
Suppose 5*h = -58*d + 55*d + 3807193, 6 = d. Is h a composite number?
True
Suppose y = 4*b + 44099, -4*y + 176333 = -37*b + 42*b. Is y prime?
True
Suppose -2*u + 262 + 192 = 4*o, -5*u - 2*o = -1175. Suppose -75212 = -241*b + u*b. Is b composite?
False
Suppose 26*r + 3360404 = 142*r. Is r a composite number?
True
Suppose 27*v = -4*n + 22*v + 312328, -4*n + 312324 = 4*v. Is n prime?
False
Suppose 2*z - x + 39622 - 178000 = 0, 2*x = -4*z + 276772. Is z composite?
False
Let x = 57990 + 140179. Is x a composite number?
True
Let l(x) = 467*x**3 - x**2 + x + 1. Let q be l(1). Suppose -16*c = -20*c + q. Suppose -9*z = -12*z + c. Is z a composite number?
True
Let a(y) be the second derivative of -375*y**3/2 + 35*y**2 + 87*y. Is a(-9) composite?
True
Let u = -324065 + 1444482. Is u composite?
True
Let u(q) be the third derivative of 7*q**5/120 + 1163*q**4/24 - q**3/6 + 19*q**2. Let m(y) be the first derivative of u(y). Is m(0) a composite number?
False
Let j(s) be the second derivative of 49*s**6/180 - 17*s**5/120 + 5*s**4/6 + 6*s. Let g(t) be the third derivative of j(t). Is g(9) composite?
False
Suppose 44*v - 47*v - 2934 = 0. Suppose -r = -4*d + 33, 17 = 2*d + 7. Is (v/4)/(r/26) a prime number?
False
Let k(m) be the third derivative of m**7/2520 + m**6/60 - m**5/60 + 7*m**4/8 + 21*m**2. Let r(o) be the second derivative of k(o). Is r(9) a prime number?
False
Suppose -j + 456612 = 3*u + 134324, 2*u - 3*j - 214833 = 0. Is u a prime number?
False
Suppose 981*n - 150877419 = 442*n. Is n prime?
False
Let g be (2/2 - (-48)/(-36))*21. Is (-23072)/g - (-4 - -1) composite?
False
Let o(s) = 507*s**3 - 4*s**2 + 7*s - 5. Let r = 113 + -113. Let m be r - -2 - (5 - 5). Is o(m) a prime number?
True
Let n = 55339 - 32816. Is n prime?
False
Suppose 2*s - s = 454. Let h = s + 141. Suppose -5*j = 4*k - 476, 5*k - 3*j - h = -0*k. Is k composite?
True
Let i(y) = -180*y**3 - 4*y**2 + 106*y + 125. Is i(-22) a prime number?
False
Let y(s) = 491*s + 258. Let j be y(14). Let q = -2433 + j. Is q a prime number?
False
Let m(s) = 7*s - 68. Let a be m(17). Suppose -2*h = 2*b + 34, 4*h - 3*b + 3 = -a. Is (-13611)/h + 1/(15/(-6)) a composite number?
False
Let b = -821 - -811. Let z be (-3)/(-2) + 26/(-4). Is (-5566)/b + (-2)/z a prime number?
True
Suppose -9*p - 60770 + 386687 = 0. Is p a composite number?
True
Suppo | mini_pile | {'original_id': '411e37ea5d8c2fb887ee2bd67da5088c65516341244580e0178aad94d58bc838'} |
Retrofit with proguard is not deserializing some models
In my code User model is not being unserialized despite being returned by the server. From my code client.getPerson() returns an instance of the Person object but client.getUser() returns an empty string
What could be the problem?
My Client class as follows,
public class Client implements Serializable {
@SerializedName("address")
private String address;
@SerializedName("nhif_no")
private String nhifNo;
@SerializedName("occupation_name")
private String occupationName;
@SerializedName("person")
private Person person;
@SerializedName("kra_pin")
private String kraPin;
@SerializedName("user")
private User user;
@SerializedName("client_id")
private int clientId;
@SerializedName("sales_agent_id")
private int salesAgentId;
public void setAddress(String address){
this.address = address;
}
public String getAddress(){
return address;
}
public void setNhifNo(String nhifNo){
this.nhifNo = nhifNo;
}
public String getNhifNo(){
return nhifNo;
}
public void setOccupationName(String occupationName){
this.occupationName = occupationName;
}
public String getOccupationName(){
return occupationName;
}
public void setPerson(Person person){
this.person = person;
}
public Person getPerson(){
return person;
}
public void setKraPin(String kraPin){
this.kraPin = kraPin;
}
public String getKraPin(){
return kraPin;
}
public void setUser(User user){
this.user = user;
}
public User getUser(){
return user;
}
public void setClientId(int clientId){
this.clientId = clientId;
}
public int getClientId(){
return clientId;
}
public void setSalesAgentId(int salesAgentId){
this.salesAgentId = salesAgentId;
}
public int getSalesAgentId(){
return salesAgentId;
}
}
My Person class as follows,
public class Person implements Serializable {
@SerializedName("last_name")
private String lastName;
@SerializedName("middle_name")
private String middleName;
@SerializedName("first_name")
private String firstName;
@SerializedName("person_id")
private int personId;
public void setLastName(String lastName){
this.lastName = lastName;
}
public String getLastName(){
return lastName;
}
public void setMiddleName(String middleName){
this.middleName = middleName;
}
public String getMiddleName(){
return middleName;
}
public void setFirstName(String firstName){
this.firstName = firstName;
}
public String getFirstName(){
return firstName;
}
public void setPersonId(int personId){
this.personId = personId;
}
public int getPersonId(){
return personId;
}
}
My User class as follows,
public class User implements Serializable{
@SerializedName("role_id")
private int roleId;
@SerializedName("email")
private String email;
public void setRoleId(int roleId){
this.roleId = roleId;
}
public int getRoleId(){
return roleId;
}
public void setEmail(String email){
this.email = email;
}
public String getEmail(){
return email;
}
}
My JSON file as follows,
{
"client": {
"client_id": 128,
"nhif_no": "KJNH1289",
"kra_pin": "210986",
"sales_agent_id": 43,
"address": "Kikuyu",
"occupation_name": "Prisoner",
"person": {
"person_id": 358,
"first_name": "Kamiti",
"middle_name": "Jela",
"last_name": "Baridi",
"gender": {
"gender_id": 1,
"name": "Male"
}
},
"user": {
"email": "jelabaridi@gmail.com",
"role_id": 2
}
}
}
Fixed it by adding the line below in the proguard rules file
-keep class org.myapp.mypackage.models.** { *; }
| common_corpus | {'identifier': 'https://stackoverflow.com/questions/55865713', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2019.0', 'title': 'Stack Exchange', 'creator': '', 'language': 'Norwegian Nynorsk', 'language_type': 'Spoken', 'word_count': '397', 'token_count': '1149', '__index_level_0__': '8464', 'original_id': '072ec8ee2f08f01094c424f6844c11e153c285ceb04009461733167d250223f8'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.