text
stringlengths
3
7.38M
source_data
stringclasses
5 values
info
stringlengths
83
12.5k
// Copyright 2018 SMF Authors // #pragma once namespace smf_gen { enum class language { none, cpp, go, python, all }; } // namespace smf_gen
mini_pile
{'original_id': '0420dfe208cdb31153c2d2f6f073fd8d2aceec6b63fd81a6ebf3d88f9d5347d2'}
Your home is decorated and equipped with the necessary accessories you need so why shouldn't your dog have his or her own dog house accessories? Dog house floor pads provide some much appreciated comfort as well as warmth through additional insulation. Dog house door flaps help keep the cold air out of your dog's cozy little den.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '32', 'language_id_whole_page_fasttext': "{'en': 0.9617542624473572}", 'metadata': "{'Content-Length': '250896', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:W5C4SNV4R7MIAAFG5JHTASWUVMMBHNNI', 'WARC-Concurrent-To': '<urn:uuid:e59c4973-1d87-4d5f-b0e9-7a758bc590e2>', 'WARC-Date': datetime.datetime(2014, 8, 1, 22, 35, 3), 'WARC-IP-Address': '72.21.92.112', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:CSETIIOOWB7GACK2GZSYCO2BH5RCGYFT', 'WARC-Record-ID': '<urn:uuid:760354d8-02ef-4570-bfdd-fab8b40745ce>', 'WARC-Target-URI': 'http://www.petsupplies.com/search.aspx?path=cPETSUPPLIESp9389&pageno=1&hits=96&sort=bestselling&facets=featured_products_fct%253aSee%2520All%2520Products', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ec6ab89d-fc42-4329-9608-251ac3ad1cd6>', 'WARC-Truncated': 'length'}", 'previous_word_count': '96', 'url': 'http://www.petsupplies.com/search.aspx?path=cPETSUPPLIESp9389&pageno=1&hits=96&sort=bestselling&facets=featured_products_fct%253aSee%2520All%2520Products', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1883907914161682', 'original_id': '4953f17f296b1eb0170c1537896a4695a8e4a29758957c587768f7746abc1ad5'}
\section{Countable Closed Ordinal Space is Metrizable} Tags: Ordinal Spaces, Metrizable Topologies \begin{theorem} Let $\Omega$ denote the first uncountable ordinal. Let $\Gamma$ be a limit ordinal which strictly precedes $\Omega$. Let $\closedint 0 \Gamma$ denote the closed ordinal space on $\Gamma$. Then $\closedint 0 \Gamma$ is a metrizable space. \end{theorem} \begin{proof} From Countable Closed Ordinal Space is Second-Countable, $\closedint 0 \Gamma$ has a basis which is $\sigma$-locally finite. From Ordinal Space is Completely Normal, $\closedint 0 \Gamma$ is a completely normal space. From Sequence of Implications of Separation Axioms it follows that $\closedint 0 \Gamma$ is a regular space. The result follows from Metrizable iff Regular and has Sigma-Locally Finite Basis. {{qed}} \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '997c9a2c924c2f20f7284bf3132f5a502fafc11940c5050060014797f927c20d'}
Get it, but not yet Reality Store gives insight into how to finance your dreams. Reality Store gives insight into how to finance your dreams. April 13, 2009|By KEN BRADFORD Tribune Staff Writer SOUTH BEND -- We�ve all said it. �When I grow up, I�m going to drive a �� Previous generations may have wanted a Cadillac or a Corvette or a Mustang. Nowadays, for many kids, it�s a Lexus. How realistic is that? If that�s your dream, great, said Jessie Whittaker, organizer of the recent Reality Store for local youngsters. �But we wanted to show what it actually costs,� she said. �You want them to think, I�m going to have to work a lot longer to get what I want.� That�s the purpose of the Reality Store/Urban Plunge project led by the South Bend Heritage Foundation and Charles Martin Youth Center. For the Reality Store, 33 students from grade seven through 12 chose careers and then made a series of choices on how they would spend their money. If you choose to have children, you have to feed and clothe them. If you buy a car, you�ll spend money on monthly payments, on fuel and insurance. For many, she said, it was the first time they had to think about what their money can buy. �Now they understand the importance of the job they select,� said Whittaker, an educator with the South Bend Heritage Foundation. For the Urban Plunge portion of the project, the students went to a bank and opened a savings account. Then they visited a Lexus dealership and they finished the day with a lunch buffet at Trio�s restaurant. The students chosen to participate in the project came from a variety of local programs, including Leaders for Tomorrow. Whittaker had hoped to include about 50 students, but there were scheduling conflicts. �The main problem we ran into was spring break, college visits and the Cotillion,� she said. The Cotillion is a debutante ball. She was pleased with the students who participated and was impressed by their manners at a fancy restaurant. Trio�s served a special buffet � sandwiches, chicken strips and chips � to suit the younger taste buds. �Everyone was so quiet and reserved,� she said. The program was paid for with a NeighborWorks America grant. She hopes to make the event bigger next year. She said, with the current tough economy, the lessons are especially important. �One of the comments I read was, �Now when my mother says it�s not in the budget, I understand.�æ� Staff writer Ken Bradford: (574) 235-6257 South Bend Tribune Articles
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.95996755361557}", 'metadata': "{'Content-Length': '29390', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:A6PK3I6BG4ILXMXONOYKUKS2VSSW6OJZ', 'WARC-Concurrent-To': '<urn:uuid:e0a3670f-6d54-465e-9613-c74998b9411b>', 'WARC-Date': datetime.datetime(2018, 12, 13, 23, 5, 57), 'WARC-IP-Address': '151.101.248.204', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:3DCWCGOMNHMQ6ADWKVUM75GANGCG6EJ5', 'WARC-Record-ID': '<urn:uuid:9b3d84e9-591c-4a59-bf3f-b90efc59e46d>', 'WARC-Target-URI': 'http://articles.southbendtribune.com/2009-04-13/news/26746635_1_urban-plunge-debutante-ball-students', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3290334d-2bf8-4d63-a47a-13e0e4a5cf28>', 'WARC-Truncated': None}", 'previous_word_count': '431', 'url': 'http://articles.southbendtribune.com/2009-04-13/news/26746635_1_urban-plunge-debutante-ball-students', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-182-98-18.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021595478057861328', 'original_id': '6bcd7aab33b601112f2a2eaa005a8a9200354bdc309f8ec2255877fe229d60ab'}
Fox In Socks Rap ↺RT❤️️ https://t.co/IcwCFqqD69 #rap #socks #wells #rapping #will #fox #college
the_stack
{'hexsha': '0e7409decb508a0be6565a69956821053b41eff6', 'size': '95', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'Data/train/education/dqpdwayzvn.txt', 'max_stars_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_stars_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_stars_repo_licenses': "['Unlicense', 'MIT']", 'max_stars_count': '7', 'max_stars_repo_stars_event_min_datetime': '2017-05-04T05:21:42.000Z', 'max_stars_repo_stars_event_max_datetime': '2021-01-15T12:16:04.000Z', 'max_issues_repo_path': 'Data/test/education/ijjjaxxmxl.txt', 'max_issues_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_issues_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_issues_repo_licenses': "['Unlicense', 'MIT']", 'max_issues_count': '1', 'max_issues_repo_issues_event_min_datetime': '2020-05-10T02:09:02.000Z', 'max_issues_repo_issues_event_max_datetime': '2020-05-10T02:09:02.000Z', 'max_forks_repo_path': 'Data/train/education/dqpdwayzvn.txt', 'max_forks_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_forks_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_forks_repo_licenses': "['Unlicense', 'MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '95.0', 'max_line_length': '95', 'alphanum_fraction': '0.7052631579', 'original_id': '4cd4d9eb6cfb61bda7ec799c27579d1245ff31fc5113de8807362ecfca3f5a74'}
e 154 année. - N°30 Mardi 26 juillet 2022 JOURNAL OFFICIEL DE LA RÉPUBLIQUE FRANÇAISE D.I.L.A serialNumber=S17140003,CN=DILA - SIGNATURE DILA,OU=0002 13000918600011,organizationIdentifier=NTRFR-13000918600011,O=DILA,C=FR 75015 Paris 2022-07-26 10:01:01 Associations et fondations d'entreprise DIRECTION DE L'INFORMATION LÉGALE ET ADMINISTRATIVE 26, rue Desaix, 75727 PARIS CEDEX 15 www.dila.premier-ministre.gouv.fr www.journal-officiel.gouv.fr Annonce n° 1474 84 - Vaucluse ASSOCIATIONS Créations Déclaration à la préfecture de Vaucluse L'ORANGE QUI ROULE. Objet : promouvoir la pratique du skateboard et de ses cultures liées (musiques, photographie, vidéo, arts de rue) et par extension d'autres pratiques/sports extrêmes, #action sports# (BMX, rollers, trottinette, snowboard, snowscoot, ski) Siège social : Lotissement la Croix D Or, 30, allée des Oliviers, 84100 Orange. Date de la déclaration : 20 juillet 2022. La Directrice de l’information légale et administrative : Anne DUCLOS-GRISIER
common_corpus
{'identifier': '4cb470aaab773a4c2781122b730bf349', 'collection': 'French Open Data', 'open_type': 'Open Government', 'license': 'Various open data', 'date': '2022.0', 'title': 'JOAFE_PDF_Unitaire_20220030_01474.pdf', 'creator': 'journal-officiel.gouv.fr', 'language': 'Swedish', 'language_type': 'Spoken', 'word_count': '125', 'token_count': '345', '__index_level_0__': '40083', 'original_id': '8f53726b86d4b5fb2e000360a6f9c2f21c3227d22b561ed27f2aaba60e3357f1'}
Skip to content Mid July Trip. Kids. Sleep. Meds. It's confirmed.  I've managed to have enough to get there for three days, then return. Betty said, "You know I'm going to worry."  Yup, I do, but, I'm going! I haven't been able to travel since 2012. I refuse to ever ride down with mom again. Never! OMG! That woman has a PhD in nagging. Oh my gosh! This year I'm riding with Wonka and his wife Blue. They have 10 year old twin boys and a girl about 13 yrs old. I call the twins the dynamic duo. Again, there will be 7000 people. Dr. D asked a long time ago how I'll handle the noise. It's a different kind of noise. It's not a concert. It's certainly nothing like going to a super Walmart with 7000 people . For that, I'd call in sick. The person beside me won't yell Amen. No one will fall in the aisle unless they're disabled. Jumping around and screaming out doesn't mix well with PTSD. Yesterday a friend came down to visit and brought her grandson. He is the most adorable, happy baby ever. I was happy until said slobber bum chewed on my mousy bear. The pic she took of my expression when the ravenous baby began to feed on my bear is too funny! The horror, oh the horror! Lol On a different subject - I couldn't figure out for the life of me why the blogs I read were not coming in my inbox. It's cause a mountain of them were in my spam box. Argh ! I'm on week 2 of the new med. The first week wasn't that great. Sleep and anxiety were very disruptive. I was waking with panic attacks. Panic attacks are like attacks of pain. No matter what, no matter how, you've got to get out of your body! Anyway, anyhow, that feeling has to stop. The anxiety is better. I've got passionflower, chamomile, Valerian root and a few other things to assist with pain and anxiety management. Right now the pain on top of each shoulder is rippling like a stone thrown in water. I should get a blood pressure machine for home. I see Dr D tomorrow followed by the pdoc. I'm going to try to sleep. No need to feel nervous, comment if you'd like. %d bloggers like this:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9800409078598022}", 'metadata': "{'Content-Length': '91799', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Q3AIVD2OKMKZACLWSZXS6H5ODZICCBLF', 'WARC-Concurrent-To': '<urn:uuid:3af7bdde-bf14-4a60-8500-01f736168dd8>', 'WARC-Date': datetime.datetime(2019, 2, 23, 22, 10, 22), 'WARC-IP-Address': '69.163.164.184', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:HXLPJOQ3N47OR72BOZGKNJJQYGF44RHV', 'WARC-Record-ID': '<urn:uuid:280d0e75-cca5-440c-b7c7-c6e2729829b0>', 'WARC-Target-URI': 'http://www.sundrip.com/2016/01/18/mid-july-trip-kids-sleep-meds/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:54ae410e-44ca-4df5-b2cb-9341e5ffd05d>', 'WARC-Truncated': None}", 'previous_word_count': '391', 'url': 'http://www.sundrip.com/2016/01/18/mid-july-trip-kids-sleep-meds/', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-159-135-91.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06128883361816406', 'original_id': '13e0529330cf18ee37eb1c9321b40bc61cdf22b17c70a6dbdbbc2395dd29b163'}
Native support for USB 3.0 coming Intel support coming next year, AMD support much sooner Comments     Threshold RE: I'm confused at this point. By DanNeely on 4/14/2011 3:25:28 PM , Rating: 3 USB is a cheap bus for devices where cost is more important than average and peak latency levels. To keep costs down USB devices and mobo controllers are as dumb as bags of hammers, instead the CPU is require to do everything. Because the CPU has lots of other duties it can't respond as quickly or at as consistant a rate as a dedicated contoller. Firewire, eSata, and Thunderbolt all provide much lower and more consistent latency levels to attached devices. To do this they all rely on dedicated controllers with things like DMA support so that they can transfer data without bothering the CPU. Firewire added ~$10 to the retail cost of a PC/device for the controller. eSata is essentially free since in most cases it simply provided a direct bridge between the already existent sata controllers on the HD and mobo chipset. Thunderbolt is an external PCIe bus, bundled with a display port video link. As long as it's tapping into PCIe lanes/video outs from the chipset it's essentially free to implement on the PC side. How much of a premium it will end up adding to devices is TBD; but it's very unlikely its controller will ever be as cheap as USB, so it will probably remain a niche interface for high end devices. Related Articles HP Unveils Three New EliteBook Notebooks April 13, 2011, 11:57 AM
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '380', 'language_id_whole_page_fasttext': "{'en': 0.9534103274345398}", 'metadata': "{'Content-Length': '53599', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MLFNLMTOA3NVX742UWZOEZPJGFOJ2QED', 'WARC-Concurrent-To': '<urn:uuid:6a4a101b-dab4-4045-9308-04135de9f0aa>', 'WARC-Date': datetime.datetime(2013, 12, 20, 16, 20, 32), 'WARC-IP-Address': '199.19.80.13', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:75VKDAI677YZ5J7KK3OKNW6X52JHXPU7', 'WARC-Record-ID': '<urn:uuid:7a0aebe0-5781-466e-81cf-da4888f8b3b6>', 'WARC-Target-URI': 'http://www.dailytech.com/article.aspx?newsid=21377&commentid=672079&threshhold=1&red=581', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:bac28a95-a3f8-419a-9f66-2d46f0f7af65>', 'WARC-Truncated': None}", 'previous_word_count': '690', 'url': 'http://www.dailytech.com/article.aspx?newsid=21377&commentid=672079&threshhold=1&red=581', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08366692066192627', 'original_id': 'a7288ff5c7dcf1e17de7c0036c518515656d7799a157f09b888d41127bf34b1d'}
Learn in Politics, Photography and Protest What's Wrong With This Picture? When Juxtaposing Past and Present Sends the Wrong Message If you've been on the internet in the last two days, you may be aware that many people aren't too happy about North Carolina voters' decision to approve a constitutional amendment that strengthens the state's existing ban on gay marriage. And true to internet form, that sentiment resulted in plenty of memes, quotes, tweets, and GIFs.   Above is one form of expression we see all too often: the old image comparison, juxtaposing how it was then to how it is now and dismissing all the time in between as irrelevant. Then. Now. Bad. Still bad. These particular photos compare a decades-old protest against interracial marriages at the North Carolina state capitol with a days-old demonstration (I assume, anyway; one problem with these image mashups is that you lose the information about each photo) against same-sex ones in the same spot. But the general theme is not new: Every time a case of social injustice bubbles up in the internet age, we find ourselves making these comparisons. Comb the archives of news sites, then attach that archived image to the contemporary one. The message is one of two things: Either things are wildly different—worse, that is—than they used to be, or they are just as terrible as they were. In either situation, the underlying point is the same: We really fucked up, and it's simple to see how and why. The idea behind such comparisons is to shock us into learning from the past. We made this mistake, let's not make it again, and everything will be ok. It makes a lot of sense to liberals like me. But growing up in flush-red Wyoming taught me that tactics like this rarely change minds. The juxtaposition doesn't work on conservatives, because they don't see the problem with the images. Social conservatives tend to oppose any changes in their worldview—that's why they romanticize the "old days." A fair number of the people in the lower picture are likely opposed to interracial marriages as well. They also probably don't approve of people getting divorces. Or women having children out of wedlock. Any "radical" change that has happened to "their" America just stokes the fire. And those who don't oppose marriages between people of different skin colors don't see the connection between the two images in the first place. Slamming together two incongruent images in hopes of changing even one mind doesn't calm the storm, it opens up new patterns of destruction, intensifying the ideological polarization that wreaks havoc on genuine attempts to make our flawed world work a little better. Distilling entire philosophies into a simple coupling of images fails to convey the complexity other human beings—seeing how they live, love, fight, struggle, grow, and die. Showing injustice through time makes it feel that much more painful, rather than cathartic or motivating. As someone who believes in the power of images, who's dedicated my life to communicating messages visually, I find the oversimplification upsetting. Ideas, even unjust ones, aren't simple. When we look at the two photos and think “This is bad. How can these idiots still believe this shit?”, we foresake any attempt to understand how they could have come to these conclusions. We strip out the context by forcibly evaporating all the history between the two moments. That's not where visual and social consciousness should lead.   Sometimes words, written or spoken, convey more than images can. Sometimes actions go further toward instilling a sense of humanity. Injustice warrants frustration (which I'm sure is what led to the image pairing in the first place), but it also polarizes positions. Justice requires discussion, at least hearing each other out. Instead of bad and still bad, maybe we can get to bad and better.  Also GOOD in Protest Photos: A Spring Surges in Turkey Have something to say?
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.9522950053215028}", 'metadata': "{'Content-Length': '37199', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PYO5OXJS2454UCQ4CHK3YX35FSN2KASA', 'WARC-Concurrent-To': '<urn:uuid:225662ab-e0a0-4be9-ab20-dfd9d7b24449>', 'WARC-Date': datetime.datetime(2013, 12, 8, 23, 59, 39), 'WARC-IP-Address': '184.51.126.16', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:PKXEC37Y3XWWBKGJZE2ALQ4SVLZO4LON', 'WARC-Record-ID': '<urn:uuid:1b51a479-4bbc-4a0a-9164-046f04421649>', 'WARC-Target-URI': 'http://www.good.is/posts/what-s-wrong-with-this-picture-when-juxtaposing-past-and-present-sends-the-wrong-message', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:06d64edf-27bb-4e0c-ba2d-eb4d677aad68>', 'WARC-Truncated': None}", 'previous_word_count': '668', 'url': 'http://www.good.is/posts/what-s-wrong-with-this-picture-when-juxtaposing-past-and-present-sends-the-wrong-message', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2728942632675171', 'original_id': '371d66fa277220b1cdce5709eefa35ebb99f86ac2212e1c9130366eadc0d0dbb'}
• Server 1 Variety Lights Variety Lights (1951) When a young woman of beauty and talent joins a provincial vaudeville troupe, they’re suddenly playing to packed houses, and their aging comic Checco Dalmonte gets big ideas. He falls in love with the ingenue, Liliana, and ignores his companion of several years, Melina Amour. (She wants to marry Checco and she’s saving to open a deli.) Also, believing he can be an impresario, he hires other actors and begins rehearsal for a revue that will star Liliana and himself. Liliana admires Checco, but she’s being squired around town by Adelmo Conti, the assistant to the region’s biggest impresario. Can Checco’s new troupe hold onto Liliana, and how will Melina fare? Duration: 93 min Quality: HD
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '60', 'language_id_whole_page_fasttext': "{'en': 0.9095332026481628}", 'metadata': "{'Content-Length': '60508', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PW45KH6RUDLPHSFQ7FB2VNXWMOSKNA7E', 'WARC-Concurrent-To': '<urn:uuid:decc4d7a-842a-4c46-9b6d-f6745e73eabb>', 'WARC-Date': datetime.datetime(2021, 9, 24, 9, 11, 3), 'WARC-IP-Address': '104.21.4.18', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FDS25325RYG2RH6SP4IC5PWLBEI2KXVZ', 'WARC-Record-ID': '<urn:uuid:7cd3acc6-ccb7-4b08-af23-60b511d2076e>', 'WARC-Target-URI': 'https://123movieslinks.live/variety-lights-1951-movie-free-online/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2f045cb9-d4de-4cb1-8355-bd0cdbf57925>', 'WARC-Truncated': None}", 'previous_word_count': '123', 'url': 'https://123movieslinks.live/variety-lights-1951-movie-free-online/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-248\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10308557748794556', 'original_id': 'af81a0aa1a605784477021198ed61e22de18462820f981112f0702b564b908cc'}
Prajnaparamita & the Heart Sutra. Via Linda Lewis on Dec 9, 2012 get elephant's newsletter Part three in a series on awareness practice. Click here for part one. Click here for part two. As Trungpa Rinpoche said, “Ego is the starting point of the path.” This means we have something to work with, something to tread on and to explore. Rinpoche also said that our perceptions of ego “arise from bewilderment—for we don’t exist.” What there is, is a transparent intelligence that’s colored by the five aggregates, the components that make up this illusory, ungraspable mind and sense of self. Prajna or insight is this intelligence or penetrating insight that cuts through these five aggregates—and the Heart Sutra is the primary Buddhist text illuminating this. Sutra usually refers to teachings of the Buddha, but in this case it is Avalokiteshvara, the bodhisattva of compassion, who expounds on prajna. The Buddha only confirms Avalokiteshvara’s explanation at the end. This sutra is known as the Heart Sutra because it is a condensation, the essence or pith of several longer discourses. The sutra begins, “Thus have I heard…” because Buddha’s teachings were not written down until well after his death. This was a time when memory was a highly developed and valued skill and those with the best oral memories would recite the words of the Buddha at gatherings. The Sutra was expounded on Vulture Peak Mountain 2550 years ago. The Buddha enters Samadhi or deep meditation there and lets Avalokiteshavara answer Shariputra’s question: “How should one practice the profound prajnaparamita?” Paramita literally means the other shore. Shariputra is asking how to use prajna or insight, how to practice it to cut through illusions to the ultimate nature of reality. Avalokiteshvara answers that we should see “the five skandhas” (aggregates of form, feeling, perception, concepts and consciousness) to be empty of nature. Form is emptiness; emptiness is form.” These words point to how to practice; no blind belief is required. As we have seen in part one and part two of Awareness Practice, perceptions arise in the mind unobstructedly because there is nothing substantial. Forms or appearances are not separate from the empty-cognizance of mind. Furthermore, with prajna we see that form is empty of our preconceptions, judgments, and interpretations. But once the judgments and interpretations are gone, we still have to let go of the subtle label of “emptiness.” “Form is emptiness” shines a light on the truth of our nonexistence and egolessness. But “emptiness is also form.” In other words, mind is like a crystal ball that reflects all the forms and colors, all the appearances put before it. But it is not stained by any of them. It remains crystal clear—as does the true nature of mind. “Emptiness is also form” shines a light on the truth of our cognitive ability and clarity. Just as space is not sterile but full of possibilities, the mind is bright, not at all blank. And appearances arise. Then we see the indivisibility of emptiness and form. The empty aspect and this cognitive or clear aspect are inseparable, just as the warmth and burning capacity of fire are inseparable. Today we trust the words of the Heart Sutra because for centuries those who have put the words into practice have discovered that they work. Masters of meditation say that what we conventionally think of as a self is just a name given to empty presence and transparent intelligence which has no substance. Form, feeling, perception, formation, and consciousness (the five aggregates or skandhas) seem to create a continuous presence but are actually just a series of discontinuous mental events. Awareness practice reveals just how temporary these components are. The idea of an “I” is just another discontinuous if persistent thought. Tsoknyi Rinpoche speaks of the usefulness of the “mere I.”  It is functional. We use it in speech. It is the belief in “solid I,” “social I” and “precious I” that is problematic. The challenge is to learn to rest in openness. Meditation is not merely a stress reduction program. That is a watered down version of meditation, although it may be quite helpful. Meditation is about letting go rather than self-enhancement or “self-improvement.” It’s ultimately about dissolving the illusory separation between self and other so that post meditation compassion arises effortless and spontaneously. It is “solid I” that’s associated with discursive thoughts, conflicting emotions, and the struggle which makes life anxious. Avalokiteshvara continues: “There is no birth and no cessation. There is no impurity and no purity. There is no decrease and no increase.” Avalokiteshvara is pointing out that there is no real duality. Conceptual mind makes comparisons but comparisons do not exist by themselves in objective reality. They are labels projected onto appearances. They are only relatively real. The concept of purity depends on the concept of impurity, just as decrease depends on the concept of increase, good on bad, great and small, tall and short, etc. These are mere judgments in conceptual mind and have no inherent or absolute reality. Because everything is dependent, there are no independent entities. Dependent origination demonstrates that temporary appearances rely upon many conditions. Karma starts with a flicker of ignorance—ignoring mind’s basic and spacious nature. But by recognizing mind’s basic nature in practice, we can wake up. In that moment of recognition there is no karma. Nothing happens in the empty mind stream. As Trungpa Rinpoche often said, “Discursive mind is short circuited.” So the practitioner’s work is to stabilize this recognition, this open mind. It is only from the unenlightened point of view that we seem to be caught in a seemingly continuous cycle of karma. But as long as we are caught, we must be very mindful of our conduct and respect karmic cause and effect. Avalokiteshvara concludes the Heart Sutra with, “no suffering, no origin of suffering, no cessation of suffering, no path, no wisdom, no attainment and no non-attainment.” Even the Four Noble Truths here bite the dust. They are empty. Suffering is due to positing a “self” separate from the rest of “reality.” But for bodhisattvas who realize emptiness through applying prajna in practice, there is no obscuration and no fear because there is no self to lose or be obscured. Avalokiteshvara then praises the mantra of prajnaparamita: Om Gate Gate Paragate Parasamgate Bodhi Svaha According to Trungpa Rinpoche, the first Gate means that the conflicting emotions are gone; the second Gate means “primitive beliefs about reality “like eternalism or nihilism are gone. Paragate means “gone beyond” and Parasamgate means “completely gone beyond.” Bodhi means “completely awake…completely open” and Svaha means “so be it.” Thus prajna realizes emptiness, which is beyond conventional versions of reality. Prajna frees us from self-centered suffering so that we can be of spontaneous benefit in the world. Thus Buddha says, “Good, good, O son of noble family, thus it is.” Editor: Jennifer Townsend Like elephant Spirituality on Facebook About Linda Lewis 3 Responses to “Prajnaparamita & the Heart Sutra.” 1. Olive says: Thank you, Llinda. You're a very good teacher.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '126', 'language_id_whole_page_fasttext': "{'en': 0.9373661279678344}", 'metadata': "{'Content-Length': '140771', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MWX3JSO7YZUXZSKGT56EPI3XQKDFZAYU', 'WARC-Concurrent-To': '<urn:uuid:c39bafa6-6d8e-48b9-b8f6-520e26e4b1da>', 'WARC-Date': datetime.datetime(2017, 9, 22, 2, 36, 35), 'WARC-IP-Address': '104.25.214.26', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DZHR5LX6K2KWOTWNO6OIKXVA56ZSBBF6', 'WARC-Record-ID': '<urn:uuid:508da465-7cbb-4672-8b89-337c9bf0777d>', 'WARC-Target-URI': 'https://www.elephantjournal.com/2012/12/prajnaparamita-the-heart-sutra-linda-lewis/comment-page-1/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0abaaf20-021b-4c4f-a188-8cc4ceb7d105>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1249', 'url': 'https://www.elephantjournal.com/2012/12/prajnaparamita-the-heart-sutra-linda-lewis/comment-page-1/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-19-134.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04301565885543823', 'original_id': 'f36ccbef06be8bfa79b4142494b700fe1abbe6cde6a7c1fc908c5edebaa59bc5'}
This tests verifies that files without a name are included in the multipart form data: Test passed.
the_stack
{'hexsha': '00830dd19e038bab09aae75c26f35980e49b3c2c', 'size': '101', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'third_party/WebKit/LayoutTests/http/tests/misc/empty-file-formdata-expected.txt', 'max_stars_repo_name': 'google-ar/chromium', 'max_stars_repo_head_hexsha': '2441c86a5fd975f09a6c30cddb57dfb7fc239699', 'max_stars_repo_licenses': "['Apache-2.0', 'BSD-3-Clause-No-Nuclear-License-2014', 'BSD-3-Clause']", 'max_stars_count': '777', 'max_stars_repo_stars_event_min_datetime': '2017-08-29T15:15:32.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-21T05:29:41.000Z', 'max_issues_repo_path': 'third_party/WebKit/LayoutTests/http/tests/misc/empty-file-formdata-expected.txt', 'max_issues_repo_name': 'harrymarkovskiy/WebARonARCore', 'max_issues_repo_head_hexsha': '2441c86a5fd975f09a6c30cddb57dfb7fc239699', 'max_issues_repo_licenses': "['Apache-2.0', 'BSD-3-Clause-No-Nuclear-License-2014', 'BSD-3-Clause']", 'max_issues_count': '66', 'max_issues_repo_issues_event_min_datetime': '2017-08-30T18:31:18.000Z', 'max_issues_repo_issues_event_max_datetime': '2021-08-02T10:59:35.000Z', 'max_forks_repo_path': 'third_party/WebKit/LayoutTests/http/tests/misc/empty-file-formdata-expected.txt', 'max_forks_repo_name': 'harrymarkovskiy/WebARonARCore', 'max_forks_repo_head_hexsha': '2441c86a5fd975f09a6c30cddb57dfb7fc239699', 'max_forks_repo_licenses': "['Apache-2.0', 'BSD-3-Clause-No-Nuclear-License-2014', 'BSD-3-Clause']", 'max_forks_count': '123', 'max_forks_repo_forks_event_min_datetime': '2017-08-30T01:19:34.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-17T22:55:31.000Z', 'avg_line_length': '25.25', 'max_line_length': '86', 'alphanum_fraction': '0.801980198', 'original_id': '3be79a447e116aa5eb7482a5a3f347fad5c4006b57e2d1097a241e817f635d04'}
56370| 20980 53047 16 679 16010: 1476. 14818 — 52827 15779] 129. ng. 33 000 | 41 156 | 29634| 25771 J4 J 29634 25 771] 130. —— —— — — von ia mit Streihhölzern. 52710! 67219 47356! 43870 23310| 14113 | 11316) 1997] 46511 40557] 171, | muthmaßlich Brandftiftung. 55674. 30500) 43708) 17480| 13728) 3000 10100, 3650| 43708 8390| 132. | muthm. mangelh. Feuerungsanf.(Shornfein). £ . 17000) 57000) 7000| — 1500| — i i 133. | nidt ermittelt, 920000: 259350 123 000 120000] 2300| — | — — 179041 181870] 134. Bahrtäffigteit im Umgange mit Benzinlampe, 99897: 392 198 | 10000) 70000] 00 — — | 50000 . 135. | micht ermittelt. 5 — | 44276) 383000| 82276 10. R 41858 — |r35. | mh, Selbftentzändung von Meblfaub. 25560] 33228| 25976| 36575| 52551 8200| 10175| 20785, 20961 | 117. |muthmastih Brandfiftung durch Miether. 100 000 14573| 738081 BI — | — 7000| 14373 73803] 133. | wit ermittelt, 70 130 | 45000) 22600) 67600 — | — | 22600] 41621) 22379] 139. | muthmaßlich Gelfentzändung 555 1235729) 27100) 5280) — | — | 1000] 235729 2Tı0llıa| " v. Polierflaub. 62800) 63420 47323) 21420) 32860 4800 13020 400] 47314, 21420] 24:, nicht ermittelt. 45600) 34735) 11300| 65000] 763001 — _ 19000] 11300. 27 700] 14:. muthmaßlich Branpftiftung. 81500, 52500. 34283] 52487] 5697) — — | 39882] 33900 | 52437 | 143. | nicht ermittelt. 85 640 8 ab os3 20350] 68000) 10000) 7700] 33 0053 124431134. 32250 | 102450. 213551 50000] 7135| — 30000) 19000] 21355 50000] 145. | Fehrlaſſigleit mit offenem Licht. 32450| 71400) 235000) 52000] 770001 — 2000| 45000] 17400 | 40201 | 146. | nit ermittelt. 4 719 550 10000) 181455] 1914551 — — 26000] 10000 181455 | 142..- ” 64000| 121 632, 393850| 58350] 33180 — 3000| 16850] 39850. 55350) 145. | Entziindung von Wollftoffen, — 96000) 4000| 100.000 \ 4000| — _ — |149, [nicht ermittelt. 62000| 90340. 24000) 28000] 520001 20150 — 7000| 21472: 33196 J155.| » 30000| 30000, 35000) 23500] co! — — | 10000] 35940 11061 Jısı | » « 78 000 48340, 467101 W336] KTOB6| 2300 16966 3100| 46 710 2OS56lır| u“ - 837 000 ; RM 15400] 53400) 1001 750 — ; } 153. | Blinfchlan. 1805. i — 25000 25000] 50000 7000 — 120000. — Jess. [nit ermittelt. 40900) 147500! 65000. 78600] 63600 — 146000] 40600. 63600| 155. | mut5maftic, Brandftiftung. 37510! 91000) 42000 40360] s2360| 5300 13000| 34922. 40360] 158. " 4300| — 48000 25000] 73000 _ 15000] 34093. — |rgr. [nit ermittelt. 58970| 19230) 55000. 36000| 91000 2720| | 23720, 51435| 12015 12890 1490| 28108. 9449|ı55| » mr 3030, 5300| 21000 32129 | 159. muthmaßlich Brandftiftung. 18000 | 200] 29749 78550] 160. | nicht ermittelt. | 57410 — 1|36652. 45600] 161. | muthm. regen | 175 865 7.000 100 000 60000] 160.000 — | 570007 47406 30354 1 162, „ Seibfient. von Deden u. Gefdhirren. 20481) 29635) 35474) 14621] 16500| 1500| 3550| 12 774, 6217] 163. r — 63 500 10.000 220 39 400 43031 Be 3.000 | 3196 71650| 77833 | 70629 59826] 21885 | 34059 | 8731| 12778] 63759 32273] 1s.. 3055 17573 7800 15 925 3.400 3295 21832 : 80 000° 82000 | 112000 135 000 | 115505) 60000 57410) 117410 ; \ı 28782) 123988] 152 770) _ _ . z 155. [micht ermittelt.” 56550| 61840 37517 21800] 12245 2060, 1800| 37517 10080] 156. | Batrlsifigteit durch Überheigen des Badofens. | 73 342 \ 500001 4500] 54500! „1830847 r F 157. | Holztheile in Mauerwerk der reuerungsanlage. | 130 700 "100000 | 40000] 140 000 _ - ; i 176g. | muthın. Brandftiftung, 1 Rettungsm. ver. 151 * 71530, 566617 176015| 74282 42 — 156611 17615|169.| „ Krplofion von Petroleum. 70 000 | 38000 | 42825] 50825 25 500 | - — 25 160 42825 | 170. Branpftiftung. 35400) 53100. 34500 23400] 30600 7000| 3300| 27210, 15910] ıpı. Brandftihtung durd) Sinder, 32000 | 85000: 22000| 90000] 112000 15000 — 22000. 58000] 172. muthm. Exploſion v. Lettol. 1 Mann berw. 38810, 35970: 29206 23 465 1975 5 4300| 2505| 24736 16262 | 173. Bahrläffigkeit durd Kinder mit Streichhölgern. 100 — 174. | muthm. Selbftentzündung. 3240| 32575 24 9300| ı 78. „ Brandftijtung. 3707| 1818| 42568 8320| 176. „ Bliyichlag; 1 männl. Erwach]. verm. F : 30800 34012] 177. ſchabdafte Schornfteinanlage. ! u. 27740 31233 | 278. | micht ermittelt. 3550 — 52135) 3912] 179. muthm. Holztheile d. Trodenlammer — 14000 | 33395 | 30000) 10100] 60 100 35000) 43400 32575| 2430| 33300 25 900 43.000 5330 51320 45100| 49695 30800| 34012] 64812 54770| 1340| 27740 31235| 52685 6160| 8730, 42000 al] 5314 36 955 | er) 4 = = * l 5) 47500 44006) 28743 23352 12744) 6860| 35897) 18242 |:50.| „ Brampftiftung. 33230) 33201) 33680. 19876] 10194. 2300 11800! 3476| 24995 18791 | rgı. | micht ermittelt. 000 40000 20000] 50000 , r 6000| 29000 | 10258 | xg2. | Bahrläffigfeit durch Auslaufen der — 16300 | 186 000 16300: 173200] 189500 | — — — a 193. [nicht ermittelt. 111.930 — | 56850 _ 56 830 — — | — 156359 — I|ı2]| - r 42500. 24404. 40000. 15000] 55000) 8000; 4900| 2000] 23136! 15372] ı35.| „ 5 800 000 ‘403554: 158463] 562017 | 2500| 31865) — 403554 1158463 | 156.|. 60000 | 84000! 10000. 758001 5 — |! wo . |. 187. 1 weibl. Erwachſ. tobt, 28400: 91240) 9000| 486861) 576866 802 — | 45838] 7784| 33074] 138. nũumalin —— - — — . |. 189. g. 40.000 | 224810] 25000. 220000) 245 000 | \ ’ J | Jahrgang. Regierungs« bezirt, 1895, 1, Königsberg. Kreis Ori. 186 48. Einꝛelbeſchreibuug von Bründen Mit mindeſtens | Befiger t des | Brandentflehungs · Wehdftes 387. ae 38, ” 39. = ‚40, Sarsmig .. 41. 42. 43. Safe. 1896, 44. Königsberg. '45. „ 46. 5 47, '48, — F ‚49, Danzig... .| 160.. 51. ‚98. Marienwerder 65 dt. a 55. Folsdanm ... 56. = 57. R 58, ” 59. 60, Frantfurt. 61. Stettin.... 6 „u 63. r 64. a 6. Zhyman..... F Börichlehmen .... ı Reibenburg —“ . | Dfterode t, Ofipr. | Pilfalen ..... ..... retten, ‚Koldemang. | SEE ie III Ausbruch des Brandes: Ritterguis>Befiger Mojor.. 2...» Gutsbefiter 15, Dejbr. | 26. Olthr. Fri Borm. 20. Mai |; 4 Ndım. 5, ” „12 Beſitzer, Witwe und Som. | Erden... Zu ur ur er Er Er —— —— ea aaa Delitzſch ——— Gleſien Free »[Rammerkerr ... 2222er una . |, Mansielder®xefreis | Helmivorf. . Mitterauts-Beiter . ou een nen. ; .' Raumburg . ... Vforia Sculpfarte) Königliche Landes ſchule aaa — Apentade — Grungriſt..... Gutsbeſiher. —— — .Weißenhaus. .Graf.. FREUE RECENT. 4. Lauenburg . .; Marienwohlde . „| Breisausfhuß » »--....« hate mer ..... Marienrode ... . »Ipreußifiger Staat... -suuun a.. . Königäberg . . » — .... Brauerei, Altiengeſellſchat. .' Heitigenbeil . Yaufitten 22... Mitterguts-Befigers Fran 2.2.22 .% » Meidenburg . +, Groß Senat... „| RitierguissWefigerin . u. - 2.20%. - . ” Sagt...» HittergutieBefiger .. 22.0. Mohrungen Anlen .2.... m Pirfdan ....- Sobbowiß, Domäne | Mühlenbefiter. . .. . . ER 113 > 1 Pe Bora 224... MittergutseBeller .. oc co rer. Karthaus Boriich..... TER ER OR: San. .-..-. rei . Wutsbeflier 2.02» > A <hom......-.. Wirlowo Pr Er. Schlochau | Gifenbehd, Obi. Dislus. » + 2-20 nnnn 44 Templin. .....»| Oroß Kölpin . ..Majoratsbeſiter un 000 . Ungermilnde, ... Mitow...... Rittergut Befiger . oo u non | | Rieverbaruim . . . Müblenbed ....| u Harn rrernnn . Pr -. . Dberf Köpenid. „| @ebeimer” Kommerzienratb -.......- ‚| Behorigrig . 20.) Breichs —— ‚[Butäbefigerin oo nennen nen 1:11.77 ut Zeſchdorf Fern een Demmin ..... Bentin 2... »[Breibere . 22.220 rer . N Anklam ...... Auctoſe...... Nitterguts-Befiper EEE DEE ENTE RE RN | @reifenbagen ... „Klein JZunm. ..| OEL nern | Brit. 2.2... DMih +++. 0 Domänenfiätuß . 6? ‚| Greifenberg . . . - ‚ [Rittergut Befigerin . 2 22200200 | «|5. Januar . 125. Augufi 81, „ 5 * * 4 Danzig ' Danziger Höhe . . | Grob Böllau . . „| Bapierfabril-Befiger. .. 2.2.2220 « 26. Auguſt 3 Borm, ı& De Dartenwerber , . . | Altjahn ...... Nütergulssdefiger. . + > 20H 00. 13. Oftbr. 11 /,NAm 6. 4 Roſenberg i. Wpr. = Serzogswalde | Majoratsbefiger . „2... 02-000. 26. Septbr. 11, T. " Thom... ....0 Rawın 2.2 2.2.. Nittergats-Befißer.. cur %. „19 - 8, B ‚@rauden ..... — — —— 23. April | 101 Bm. 9 u » “2... Boitichalt , General⸗Feldmarſchall Pe 10, Olibt. 9%, Nm. I Potdam ... Prenzlau ..... Schönfeld ..... RT a een 24. Aunguſt 6%, „ . = ur. Friedt ichshof . . | MittergutasBefger, . ren 4. „ Ya 13. = | Ungermände Pure |: .. ‚|, VERS ————— . HM. u 12/, Bm 13. ” . Oberbarnim. . . . | @ilenfpalterei . | Firma, Fobrifbefiger ARE —— 10, Mai 4, „ 14. — Bauch Belzig ... Pleſſow. . Nilterguid · Beſtzer...... N. Dejibr. Tr u 15. — Weſwrignin va . | Klmmerniß. +, [Gute und Mühlenbefiger .. . - +. .,1. Geptor. | 9, Rchm 16. * R | Dergentbin ... » ‚| Bitterguts-Befger . EIER EIERN nr 0. ‚1. Franifurt son —— Eremlin ee tn = ae em DR 16. Nevbr. 2/, Bm. 18. Stettin ,„ . . . Demmin .... .ı Üpgelähof. „ Bei.» »or0r 2000 ran n dr 12. Mär; | 3, „ 19. +... am... ... EN Brau Bräfin „vun e nr run 24. Auguſt 5 NR 20. . . | Ufebom: Wollin . . | Wolmirftäpt Borffistus. . 2.22 ...... es 10. Str. 4 „ 21. .1Rantow.....» - 'Ehönom 2... ag gran .unrkeddiunnne 13. Juli | 6 Borm. 6 tebefeld . . . - » A e EL RT 13. Auguf'2'/, Rechm. —— — re. ä EEE | Tomte || gr tr lDBERO . .. Pr — «hi 61/5 —— — 0 3 Sepibr. 119, Em. ea ar ce 23. Ronbr.) 9/, Achm. vorne 0 +] Boganik. . . . + Rittmeifter rnsseeneenenene | 17. Febr. 108, Bin. 2, Septbr. |101/, Nm. ..„|14. Dezbr 12%/, * 22. Rovbr. — — 4. Yuni | I Vorm. 9. Septbr. | 3 Nm, 31, Auguf| 51, „ Dion 6%, ” 7 4 Borm. 8 Achm. 1. uni | ID 10, Oibr. | 5 .- .1, 8% je 6, Noobr. 110, Pr ‚5. Seribr.! 7 Borm. 18. Nonbr.| 5 22. ‚Juli 2a Im 23. Januar 13. März 21. Novbr. 12°, S | 15. Juli Dr 61, Rchm. 4) 1 1 31 ı, 4 6) 1 3 3311 2112 6| 1) 4 3 ı| 2 3] 1| 4 4| 1| 4 10) 1| 5 8| 1] ı 4 1) ı 2ı ı| 1 10] 1) 4 3] 1/12 8I 2| 7 121 1) 1 6| ıı 1 20) ı) 1 | ı| 2 . 11 6 4| 1! 2 . 111 1114 | 1) 6 8) 1,10 12 | 1 6 11 3 24} 1/3 2I 1] 2 6 ı) 1 10] 11 I 12] 1) 1 8 ı| 1 4| 1) 2 41 1) 7 3| 1) 5 6) ı) 2 6] 1 3 2| ı|) ı 24/7 1) 1 6 1, 1 >3l ı) 4 ———— — — —— —— Da Re ee a — — — —— —— — — DK Zu SE Haut: baltuns gen; — ne — FE æ — MED am m dm Bl —— ————— —⏑ö — — — —— — nd u — —— ———— Ju fun —— De WENDEN EHEN ———— au —— den Ah A — ee | ED EG m Dt — |Ilsulanum GE m du je mn a HE u bt 137 50.000 .# Schaden in Gutsbezirken 1895—98. 133 700 | 402088 , 36000) 74000] 110000 | 11406 5104| 37335 | 64.676 5500| 165380 | 56622) 40666| 7088| 18418 muthm. Brandfift.; Im. m. l w. Erio. verw. Gefommtwerth Bon dem er — — * E "der Berfißen } nn Gaben | 3 Bram: ng: | De : FF & es re u das erſt | land» Mötel Arbeits | © pi des Brandes cr | nebft maldimen) Inmo · Mo⸗ Fr | | wirth⸗ D * ergriffene Kleidern, und 28 und Immo Meo⸗ | Armmo- | Dias ſchaftliche Waſte Wert Sifler | bitiar |B 8 Benert , | biliar | Bifiar | billar, bition | GE ee | zeuge | F — | Pi Pu; * M u HM fe __# # A —— 12 14 15 16 17 18 19 20 | a 11 ET a ! i | 1805. 22000| 20000) 26000) 50000] 76000| 50.000 _ — 25500| 23869 3. | nicht ermittelt. N 166 900 | 2163650 | 33300 12600] 5190| 2180| — — 38020 116% 2. „32 8imd. u. l weibl. Erw verw. 28.000| 125000) 280001 41000] 83000 1700| — ) Tooo| 27047 | 41000] 3. |mutmahlih Brandfliftung. 82000 | 503000) 50000| 230000] 340 500 | — — | 130 000] 48 500 | 285 500 4. | nicht ermittelt, 36915| 45000! 32000) 4000| 7200| 3500| — | 4000| 30 000 | 38.000 5. | muthmaßlih Brandftiftung. 17000) 52000 17000| 520005 63000 | 4300| — | 3000| 16 400 35000] 6. ” u 7. | nicht ermittelt. — 8 = 9% 11587] 244 * 11700| 58000] 68 700 48000 6750| 11500) 57040 ” eineß Tagelöhners, 40975! 364500. 33730) 80000| 113730) 3580| — — 133730) 77920] zo. | Blitichlag. 1040| — 10400| 50000] 60400 466001 — — _ 11 3192| 628320 22500] 27850) 503501 — 27800 — 22500! 27350] 1a. muthmahtich mangelhakter Schornflein. 250 000 — 150000 — 1650000 — — — I1166144 — 13. Funten v. Dampfb. ; ausſchl. Immob. beſchad. 14. | muthm, Brandftiftung. 18. * * 16, ” " 16500| 49500' 16500] 58000] 64500 0000| — 57525| 112650. 7655| 40739] 88394. 32405 9m) 7 44400) 99600. 44000 52000] 90000 39850 100| 7 36 691 | 41.990 32625 | 57000) 32625) 24375] 5700 24375) — _ | | » R 21500! 36000 25000) 36000] 61000 140001 — — 118000| 36000| ı3.|_.» ä ; Lmännf, Erw. tobt. 8000| 46400) 20000] 34674] 54674) 3250| — 494 | 7765| 26540| 19. | Btigidtag. | 20, | nicht ermittelt, a2. | Blitgfälag. 24. |mnibm. fahefäff. Umgehen mit ber Lofomobile. 51300| 22806 46.500 1360| 53860) 4565 19 2530|] 46500 7360 3400| 436 131, 35000 25000] 60000 16.000 600 84001 34295! 24518 15800| 230000) 16800! 51000] 67800 46000) — 5000) 16300: 41 286 30419| 468600: 25000) 300007 55000 250001 — 5000| 23551| 28109 48 700 285 725 40 4573 34895] 75362 306830 — 2705| 40467 34895 45800) 210000: 45800) 115500| 151 300 |106 180 9000| 44.402 | 115500] 25. Btisiat — — 453001 92840 | 42097) 55060| 97157| 50000) 1828| 2457| 38347, 51490] a6. Srandfi tung des Sohnes eineß Arbeiters. 15800! 75134! 15800 «so0o| 83 800 60 000 — 8000| 16032 51386] 27. | mist ermittelt. | 18180| 112000) 18000) 32000] 50000| 28360) — 3120| 18000' 3200| 29. / muthmastih Brandfiftung eines Fremden. 310001 204720) 33000. 55000] 88000) 485001 — 6500| 26430 | 32816] a9. | Babrläffigteit mit Sireichhölzern. 1500| — : 30000) 2000| 50000: — — 1200| . = „nicht ermittelt. 40000) 50000) 25000) 40000| 65000, 33000| — | 2000| 25000 4000| 31. ;muthınaklih Brandftiftung. 40150) 28010! 43000! ırı82] core — |1r7a2! — [313 12246] 32. u } eines Fremden. 44000| 34000 39000| 11225] 50225 — |11225) — | 39000; 11225] 33.|nicht ermitket. 34 000) 130.000 ı sr 190 0001| 219857 | , 123 000 29 857 | 186 322 > — 4— ⸗ 40000| 199920) 40000| 43000] 83 600 40000 — ; 3000| 18000. 55000) 75. | muthmaßlich Funlen aus Yoromohite. 46100) 61061 35028, 2194| 54952! 11019 5 120| 33028 21944 | 36. | nicht ermittelt. 50300| 252070: 31183! 4785| 7904: — _ — 831183 47851| 37. | muthmaßlih Brandftiftung eines Arbeiters. 22800| 165350) 22800 | 37870) 60670. 29025 73: 441] 22800, 37870| 38. | Plinihlag. | 1139390 | 273386 | 61 036 | 32 357 93293) 9930| 21587) 61036 31957} 39. | nicht ermittelt. 412101 43401. 3500) 43000| 78000 | 100001 — 30 000] 34 326: 43401 | 4>. | muthm. Nahrläifigkeit mit einer Etalllaterne, 215000| 138300 .215000, 57157| 272157| — 57 157 — J183465, 57157| ar. Selbſtentzund. durch einen Rafiripiegel, 28000) 37382: 28000) 357 63 700 | 14.000 300| 2000] 25175| 533992] 4. Brandfiftun eines früheren Hofgängers. 101400| 146035 : 27514 | 26079] 53598 B0n| — 3000| 27514 | 26079 | 43. | muthmahlich Fabrtäifigtet oder Brandftiitung. 44. | wicht ermittelt, 45. | Blinichlag. 46. | nit ermittelt. 1543 236 "180126 122730| 242 866 — — 1 544 120 126 | 122 830 39000; 19501 | 35000) 28000) 63000 26000] — 1730] 35000! 18000 10300| 56000 16400 | 488500] 65200 4000| — | 8800| 10400! 42806 10300' 24800 36000 22400] 58400 | 21 700 | 700] 10000 22400 ” w — 48. Funlen aus Lotomobile. 22 700 — 22700 30000] 532 700 300| — 5600 i ü 19000| 58500 19000 310001 50000 12000! 6000! 12900| 13000) 24773 | 49. |midht ermittelt. 16440| 120000 18000. 38000] 56000 | 34000 — ; 3000| 16400) 34312| so| » » | 21000) 30620. 21000. 30620| 51620 28320) — 10001 21000) 30620] 51. | DW — 50 000 85000] 135000 | 8685000] — | 1000 a — ga, muthmeblih Brandfiftung rines Mrbeiters, 2350| — 250W | 25000] 50000 150001 — | 6000| . — 53. | muthm. Brandftiftung; ausidl. Immob. beich. = — 5000| — 50000, — - tb. — = 0300| 167530 1830| 4000| 58400 | 24000! 10500) 4590| 15900! 35 375 139350 | 373 700. 90000, 34086| 124086 | 1459 9% 12012| 78 107| 34086 31 753| 1051921 21753 35031 | 56784 32306 | 956) 1590| 19700| 35081 54 „" E * * * 55. | nicht ermittelt sr murhmahlich Brandfiftung. | 286 8371| 30500 159000. 0000| 2493000 — — — 157458 4636631 58. Selbflentzindung von Lumpen. 34035| 90000: 41400 45000] 85400 5000 500) 3000] 30405! 4500| 9. ” Brandftiftung. 59500) 860413 39 200 33619] 72819 1619| — 2000| 39 200| 356i9| 60, ” | 157 700| 172000. 48000 46600] 94600| 33.000 300 3000| 36500| 38000 | 6r. | Erplofion vor Petroleum. 18000} 50000: 18000) 50000] 68000! 1000| — 2 000 63. | muißmaßlid, Brandftiftung. 63. | nicht ermittelt. 64. | muthmaßlih mangelhafte Shornfteinanlape. 65. | Knabe fahrl. m, Streihhälgern; 1 Mann tobt, 40.000 i 36 000 | 18000| 520001 — | 16000 - 1 36000 | 18.000 35 100| 337100 34600 25300| 60400: 300) 35100) 400] 34600| 25800 34200) 148435. 32696 | 30700| 68396. 6400| 11300] 4000| 32696, 19794 a i\ De u u »» nm DD an Presfifche Staniſtit.· Keit 174, 18 Jahrgang. ger Kreis. Regierungs«- Noch; 1896. 68, Straffund . . Franzburg. ». Ti. Merieburg. - | Bein. +...» 1897, | 102. Straliund . . Wrangburg. » 108. Re . . Grimmen... 113. Merieburg. . — 115. Schleswig ; 0 "Lauenburg. 1898, 116. ar 66. Adslin . . . | Neufettin.... 6. , .. Lautuburg i. P. . 0 . . Kangenhanshagen. ' 69. Polen... .|Obomil,..... 70. Opprin . . . | Reuftabt i. OSchl. . , Blumenwerder .. 12. Schlesmig.... Edernfüre .... 13. — Oldenburg. 74. n .:1Blin .. 2.2.0.0 75 Stormam... 76. Hildesheim. . | Northeim . es 95. Stettin .. . Demmin ..... % „ 9. 4 Randow pe u re Dr Nee | 9. m 8. —— 100 4 .Greifenhagen.. 101. Rdslin... . Schlave 104. Pofen. . . . Kempen i. Poh.. 105. Bromberg . . | Inororajlam . F 106. > . ., Bongromwig. 107, » ..| “ 108 Witlowo...... 109. Breslau. . Beug ..- 0... 111. Oppeln * NRatibor.... 2 ‚| Röniglihe Domäne... .. ... | ilehafen — 117. «| Mönigäberg re 119. Gumbinnen . | Darteßmen — : 120. .I@olbap .....» 121. Danzig r.. Dirfdan..-..- 122, Marienwer der Teutih Keone Neu Preußendorf 123. Potedam . „| Prenzlau ..... 124 e ee Eee Ne 125 * Teltow ———— 126 — | Happin . 2 .... Befiger bes Brandeniftehungs«Behöltes, AittergutdeBefitsers Prau .. 222.» MittergutsBeflger . 2: 2:00 u. 1 Sr Se 2 [Major a. D. u. Nitterguts-Befiger .. Bel...“ Gutsbeſiters Witwe und Finder.... .j Marinefistus (Torpedomwerfftatt) . . - .| Major a. D. 717. Königbberg . | Königsberg —— Eiſenbahn⸗Geſellichgfttt 78. F | @erdauen .. . - Maſoratsbeſißer. ı 719. * Naftenburg . . Rittergutssßefiger. . 2.2.22 200.» 80. F Vreuß. Eylau. . elntsbefer „on .. a1. — . Neidenbuarg , ., : - „[Ritterguts-Befiger. .. 2.2.... | 82. _ | RE er J aha Plane aaa ı 88. Danzig . . . Dirſchau ... . . , | Ritterguts Befigers Wilme . . . + | 84. Morienwerber | Dlarienwerber . . . „| Rittergutss®efiger. 22 22200004. - 27. Septbr, 9 55. — Moſenberg iĩ. Weſtpr en ——— . . . N. 86 Straiburg „ ohne Angabe .. run ner« 87. — Brieſen. KittergntWBefiper.... 2.2.0. 58, u Zlom....... — a —— 89, " Eulm ....... A. Grob Kb | OO mL ner er * ' 90. u Braudenz . 2... . + lem (Sirupfabrif) A re 91, Polktam .„. Prenilau ...-.. IBeneral a. 2.222: 2er ein 24. Septbr. h 2 Granfjurt . . Königsberg i. Am. Schönfeld... . „IRitierauts®efiper. .:2 222200. | i 94, m Indau..:..+ Wendiſch Drehna . Braunlohlenwerle, @m.b.9. ....'16. Auguſt 2, Grafin. Hauptmann a, D. und Ritierguis · Beſ Königliche Demäne...... — HERE Königl. Rittmeifler — —— Malsrauherr Banana ... RittergutssBefiger. ..... .. + | Dynamit:Altiengefeligait .. .Ritterguis-Veſizer. “| Müblenwerle .... 222-000... Nittergute · Beftiher n 0. SEES RR — ——— BWÜBE aan nase rer Gntsbefiger und Door . ....... Nilterguis· Beſiher ua nennen | [> a Er Er ...... ’ . „| Mählenbefiter......... A Spiegelberg a./D. | Dübten» und Gntöbefiger . .. Il. — 3 Rchm Ze — — — 7 KB 4 ZU ZZ u > 2 Borm. ad ia u — — I I —1 l i 1 1! — ———— —— —3. Auguf 5 Borm. un a — u u — u —— — — zu ff Au m —— —— Pe — — — — 3 121, Mm, 25. Dezbr., 3 Borm. 3. März | 77/,NAm, — a u a —— ua im u u a ae u un nn on uk —— — aa ı 1 2% 17. —* 11’, ...|28. Lugufı 101, Sin Mu fu dr ud u De m m m Dr Hd Mn Da Du fi (LAD bu bu ee Ab | — — ——“ — —— — 20. zn 12,,Nm.) 11. zu ‚10. Januar) 4% N a Dun u au Du us —— uk —— — [2 — — — — u F 50 000 4 —— in Amtes na 189598. Von dem Geſammtſchaden Gelanuntwertd entfielen anf 5 | j »E Urlade r m Schadens: R = Pr. r - — das erſt ⸗ | and» | Möbel | Ürbeits- u, des Brandes —— = virth· nebſt maſchinen Mo: 7 & 4 Fu PR ergriffene f Kleidern, und 1 nur er . Sehöit | deſtiche Waſche Wert | Biliar | Bifier | 5 Bemerkungen: biliar biliar Borräthe f 2 = x 36 500 wo 30000) 0000| 50000: 1690| — 3000| 26 000| 19000] #6. | nidt ermittelt, 60 200 B 0800| 4000| 94800, 4000| — 27300| 60 800 | 6.| u F i 1440| 139334 | 56200) 49405) 105605, 19869 | 4700 8623| 56200) 44 396] sg. | mutmaplih Fahrläfigteit. 300 282335) 27301 283337] 50638 8000| — — 197301! 23283] 6. 430000 | 521 200° 184600 | 49779| 234379) — |4979 — 184600) 43565| ro. muthen. Fehler d. Feuerungsanl. (Baltenbranp). | 92850. 60000! 45278 37500| 52778 311001 450: 4800| 46 200 | 37500| zı.|_ „ _ BrampRiftung. — — 30600 91850| 121850 — 350' 3250| — — 7a. er v. Schiekbauume. ; 1 Mann todt, — 2 24 700 128820| 13000 36000] 55 000 17000| — 1000} 18950| 31053] 73. —7 64600 348672) 62650) 55041] 117 691 32580) 470. 16416] 62 660 55041 | 74. —* ih Behrläjfigleit. 142020 | 75892! 90000: 84000| 174000 37000| 8000 35000| 85738 | 46991] 75. | Bligichlan; I mi., 1 weibl. Erw. u. I Rın. um. 189 150 | 273800, 50000) 22550 2550| 5947 9652| 4804| 45657 | 21172] 76. | muihm. Brandfiftung; 1 Hann verwundet. | | 160000) . 1109474 1104500 [1 15444 | — — u , . 77. | muthmaßlich —— 24600 26 000 30 600 35000] 66 000 35 000 — — 124000 86000) rs. 68300 110360 | 40000 | 460001 85000 330001 — 5000| 30480| 39240| 79. n 26500 | 134326 | 3000 25000] 55000! 16000! — 9000| 24000| 19000] 30. » fabrläifige Brandftiftung. 68065. 128000) 68085 | 119000] 187065 540001 — 6500| - A g1. a rag ae beim Rauchen von Zigaretten 18144, 40432 13148 48000] 66144 4500| — — 14430| 40432) ga. |muthm. Fahrlaſſigleit beim Rauchen. 33600. 197195 40000 75000] 115000 56000. 100. 16500| 27600| 67758] g5.| = Xrandfliftung durch fremde Mrbeiter. | 148501 44000 | 10746| 42786] 53532 422387: — 499 | 10746 | 42786 | 94. | Bligfchlag. 27400: 53500. 24450| 38550] 63000| 3500| — 1450| 24450| 38550| 3s. „ B 40000, 40000. 27000, 60000] 37000 43660 — 10950 | 2700| 60000 | 35. I muthmaßlih Brandjtiitung. 64900 | 253436 | 64900 | 716001 135900. 4100| — 4500| 47070! 70000} g7. | nit ermittelt, R 34000 48000. 34000, 55000] 89000 5350010 — , 1500| 23400! 47256] gg. | muthm. Branbflift.; I weibl. Ermadif, verw 11150' 60000" 130001 4800| 61000 47840! — 100] 11150) 44850) a9.| _ 30000! 180000: 0000| 100000] 120000 | — - 100000] 20690) 94700} 90. nicht ermittelt; I Reitungsmann derwundet. 47650, 261939 39581) 55730] 95311) 49815 673: 3246| 39581° 55146 | gr. | muthmahlih Brandftiftung. 30200. 64670) 3000| 2900| 54300) 25001 400! 970005 25000| 19532] 9a. 28300 1339362) 22000| 38000] 60 00 6600| — 31000] 21000! 33000 | 93. | nicht ermittelt. 30 000 — 40000 2000| 60000 — — ) 20000 Fa — 94. | muthmaßlih Selbſtentzund. von Braunlohle. 1 In 36 100) 72000 i 35335 | 70000| 105335 | 15000 — 135135| 7200| 9:5. ” Faprläffigleit. 30 100 353500! 27422) 24285| 51 707 i ; . 27422| 24285 | 96. | Blikflag 53100) 15000" 408001 14815| 55615| 8615! — | 6000| 40800 14815} 97. mutpumaslic Brandfiftung. 30100: 220 184) 30000) 35000| 65000! 34650) — 3850| 26543 | 33750] 93. “ = — 271000, 434000, 27141 | 47567| 74708|47300| — , 267] 27124 1758671 98. " er durch Arbeiterin. 32000| 32000 30000| 30000) 60000| 25000! — 5000| 28000 | 16500] 100. 41000! 38 000° 39100| 38000] 77000 eh i 39 100, 38000] 101. nicht ermittelt. 43 810 48655) BB 76551 ; F 48 655 — 103. muthanaßlich Branbftiftung. 9740 228 785, 92940) 60000| 152940 | 59000) - 800] 92 940 102.|__ ‚ 312300| 341129) Bias! 68 7601 Praos| 33592) — 30 868| 29 146 . 104. Spielen von Kindern mit Streichhotzern 32500 131152) 21755) 81550) 103305 | 24250) 1750 3900| 20 760' 49469] ros. | mutgm. Bahrläffigteit mit Streihhälzern. 50000 182341! 33700| 600001 98370 — !60000: — |33700' 30000] 106.) „ Gppiofion eimer Petroleumlampe. 20 000° 39880" 0500| 33880] 60330! 38000 — 1380| 20500: 39880 |r07.| „ Branpftiftung. 1930| 4300| 14000) S6a00| 5030| — 4300° 32000| 1240| . |tog. [nicht ermittelt, 295 000 934.000 200000 800 009 |1 500 000 | -- — — [547502/903337]109.| » m" , 14750 1483 2 15800| 47420] 63220 | 4740| — — 11589) 23915] 110. | BrandRiftung durch einen Aneht. | 537475) 12000 | 40.000 52.000 | 4000| — _ 9365| 24952 | rar. | nicht ermittelt. | 18800! 48 100 15000! 48835] 63000 | 44 363 | 4472| 15.000 488351] rı2. „ ;,1 Rettungsmann vermundel. | 20330: 27000. 20170| 30000 506170| 28000| — 2000| 0170| 16495 | 113. muten. Brandftiftung. 32200) 41333) 27718| 30665| 58383 IM 9280| 19391 | 27718. 30665] r14.|_ » _ Selbtentz.d.Schrotgang.i.Müblwert. | — — ‚150 000| 30MD| 180000 — 2000| 20000] — — Frog. |Erplofion von Gelatine Dynamit. 1 il l 1808. 25500) 30000! 23000) 35000) 58000 23000| — 5700| 22 300 116. | nicht ermittelt. 393 000 200 000 | 100 000| 300000) — _ 1000| . 107. |muthmaßlic, Braudſtiſtung bes Beligers, 16800) 17000) 49000! 33200] 82200 27150| — 6.050 2 5 212. = Selbftentzändung von ler. 30200 | 58700) 28000) 29000] 57000) 1500| — 4000| 22000. 236 170|119.| _ . , Brandfiftung. 214000. 113 7001150000| 30000| 180000| — — — [120000 30000 | ıze. | nicht ermittelt. . 217000| 40319) 62551| 102 770) 60000 | — 2400| 40219. 62551 | 121. | muthmaßlid; Brandfiftung. 61500| 42000! 47580: 2000| 76550 | — |23000| — | 47580 . 123. | nicht ermittelt, . | . 46000) 49150| 95150! 48000| 250 00 - 48 000 | 123. |mutgmafifih Brandfiftung. 65 100! 123700 65 100: 82968| 148068 | 49938 | 1000| 2090] 23546 | 63770 | 124. 133 110: 16000, 90000 00] 0800| — 8005| — ]|59300 800 | 123. Erplofion von Stand. 140 000 32500. 92500] 125000] — |52500| — | 30000: 90000| 126. | muthmabtih Branpfiftung. I 18* 140 Moch: 48. Einzelbefcreibung von Bränden mit nindefens dahrgang. des — Areis. Ort. i ” Drendes: Negierungs-⸗ Brandentftehungs · Gehdftes bezirt. | Stand: | — 127. Volsdam Ohprignitz AI 19. Juni 76/, Nm. 3 128, franffurt ... Lübben ...... | sl ern nece 20. Märg 4 Borm. 2 129. Stralfund. . Milgen....... Aluchſevitz..... Ritterguts-Beflyer. 2222202. 16. Dezbt. 8%, Nm, 5 130. Pofen... . Wreihen ..... me * Fe .. 15. Oltbr. | 81/,,Borm. ı 2 Ä Ber "771° — — .. 12. Deibr. 11 Rehm. ER ae . P Nitterguts-Befigerin . ae ae 4. Otibr. SI, „ i Bol.. "| Eifenbapn-Dieettion . - - . . on. 5. Ruguft 10 Borm. WO 2... mehrere Veſihet.*** . Liegnig . . . Lüben — Mersdorf 136. ee Een —F nn arte —— —— & Hi : 138. Oppeln . . . ublinib...... * 0 „[RittergunseBefigerin „anno o nn 1 Vorm. Er a —5 FE Nitterguts-Befter - . —— 14. Yuli 6! NM. aa «| Königs» und irahain «-®. er Stptbr. een ren Gieehe 1112| Beifm es 06: Mguf . Chemifde Induftrie, Aktiengefelfhaft . | 17. 17.00 11 7. 27 m u a du ji pm —— — — —— — —— 5) Bei Nr. 76 lamen eine mannliche und eine weibliche erwachſene 4) Bei Nr. 9 erzeugte Reibung an der Stahlreinigungs-Bürfte Funlen, Berfon ums Leben und wurden ein Beiheiligter forwie ein Mettungsmann | welche die Staublammer in Brand fehten; bei Nr. IO ſcheint ſich Baumes verleyt; Mr. 102 brachte jünf Rettungsmännern Berwundungen bei. mwole in einer Schlagmaſchine an einem dort befindlichen Fremdlörper 6) Zu Mr. 11 ward der Mafchinift der Lolomotive einer abfichtlichen | entzändet zu Haben; bei Nr 40 murde ausgelaufenes Petroleumnaphiba Srandftiftung beſchuldigt; zu Nr. 16 finden wir die Bemerfung, daß aud | amgezündet; flatt der in der Tabelle angeführten Urjache mag bei Me 33 aus einer vorüberfahrenden Lolomotive Funken angeflogen fein mögen; bei | Wleltricität aus dem Bliableiter Abertragen worden fein und bei Ar. 63 Nr. 64 beaing man die Fahrläffigteit beim Gasanzünden mit brennendem | Selbftentzändung ftattgefunden haben. Spiritusichmamme, und bei Nr. 68 icheimt fi die Transmilfton im Exhauſtor 5) Die Loſchung der Brände unter Men, 5 und 45 veranlakte die erhigt zu haben. Verwundung je eines, unter Ar. 26 die bon zwei Rettungsmännern. Weil fein Gebäude Schaden erlitten hat, fallen aus unferer | Unter Rr. 101 wurden I Kind und 1 männliche erwathſene Perfon getötet, Berufsftatiftit der Gehöftebefiper die Nm. 11, 86 und 104 (Fracht. | > Rinder, 3 männlihe und 3 weiblige ermadjene Perionen vermundet, ſchiff) aus. Im diefen Fällen waren ein Zimmermeifter mit 60 000, Wegen ihres für unfere vergleichende Berufsftatiftit zu geringen ein Kaufmann mit 60000 und ein Schiffseigener mit 205 900 ‚# Schadenbetrages jallen zehn Befikungen aus der Hauptüberficht fort. Betroffen. Werner biieb eine fläbtifche Dermaltung mit 9000 u | Cie gehorten, einem Mpothefenbefiger mit 43500, einem Bäder- Berluft unterhalb der Grenze, weldhe wir für fehtwere Schaden im Ent- meifter mit 22 900, einem Hutmacher mit 22 748, einem Barbier Rehungsgeböfte angenommen haben. Was in der fchlieflichen Jufammen- mit 47 432, drei je einem Kaufmann mit 31 755 —43 000 (sufam: —— t aus folgender füberficht . | men 117 755), einem Drogiften mit 48 800, einer männlichen Perjon Htellung a. muß, geh we —— —— | ok Berufsongabe mit 32881 und einer Witwe mit 24897 M ein 7 — Mein. nie bieie m Berluft. Demgemäh bleiben Jehr Falle rg Sie 4 ben Fo 1895 » . . abzüglich 1 mit 22 748. noch 28 fälle mit 4 268.076. |. den Da en EM nn 2, 1895 :... 6 wa OO — — 2 250213 1897 «» - “ 48 MI, „ Bu. 0. 348747, ITLL BOB 83659 1.1 Ko — — 1 9000 20 204 Be ee Be 6133 TE Trug 1897 .... 7 668908 1 60000 — — 25 GEHE | une „ 10 „ OO. „ ML „ „ 15007508 5. 1898 20. 3 98282 1 205900 — — 24 4586290 Die Tabelle der jchmweren Brände in Landgemeinden bedarf wufommen 21 2383068 3 325000 1 D000 06 1765318. leichſauis einer ziemlich langen Erläuterung, wie denn überhaupt den Hinſichtlich der Brände in Fleineren Städten ift Nach- durch ausführliche Beichreibung ausgezeichneten Bränden fid) manche ftehendes der Tabelle hinzu zu fügen: fonjt jeltnere Thatſachen anbeften: 1) Die Höhe der Immobiliarverfiherung war für Rr. 55 nicht zu 1) Die Dauer des Brandes Ar. 24 war nicht zu ermitteln. erfahren, die der Mobiliarverfiherung nicht für je zwei Befiyungen bei ?) Eine Angabe Uber Berfiherung fehlt bei Ren, 133 und 165 Nen. 17 und 48 fowie für eime bei Mr, 51, während fie bei Nr. 20 für überhampt, des unbeweglichen Eigenthumes bei Nrn. 53, 82 und 154 ſowie eine Befigung der Berfiherung des unbeweglichen Eigenthumes eingeredinet | für eime Befirung bei Nr. 164 und für zwei bei Mr. 141, des beweglichen wurde. Auch bei Nrn. 72, 73, 84, 85, 98 und 112 ift die Mobiliarver | bei Ren. 20, 83, 120, 139, 153 und 160 fowie für eine Befizung bei fiderung bei der Immobiliarverſicherung enibalten. Mr. 159, Für zwei bei fr. 164 umd für drei bei Mr. 111; die Mobiliar: 2) Bei Nm. 18, 23, 24, 53, 70, 75, 89, 104 und 105 unterblich \ verfich. einer Befigung bei Nr. 91 ift in der bed Inmobiliars mitenthalten. die Bertheilung des Mobiliarſchadens auf Gebraugstlajjen der Gegenftände. | 3) Die reinen Walbbrände Nen. 40 und 88 auf 160 bezw. 100 ha 3) Der verficherte Schaden mar bei Me. 28 zur Zeit der Berichter⸗ Dlache vernichteten ausichlieklic unbeweglichts Eigenthum; in einer Beſthung Rattung noch nicht volftändig vergütet; eine Angabe über Entſchadigung zu Nr. 141 ward mur ein Lattenzaun durch Löſchhülfe beſchädigt und dafür für verfichertes Eigenthum an beiderlei Hauptarten fehlt bei Nrn. 18, 22, | freiwillig 2 A vernütet. 23, 30, 40, 43, 53, 89, 100, 104 und 106 überhaupt ſowie für je eine | 4) Eine Bertheilung der zerflörten beweglichen Gegenſtände auf Gebrauchs: Tefigung bei Nrn. 20, 21 und 51, für zwei bei Nr. 54, ferner betrefis klaſſen ließ fich bei den Nummern 45, 55, 60, 64, 66, 131, 136, 187, unbeweglichen Eigenthumes bei Ar, 2 Überhaupt ſowie für je eine Befiyung | 167, 175, 177, 182 und 189 nur undolftändig, bei Nen. 93, 116, 130 bei Arm. 12 und 39, und 178 überhaupt nicht bewirken, 141 50000 A Schaben in @utäbezirten 1895—38, Bon dem Geſammtſchaden Entfhädigung , . Gefanınıtmerit entfitien auf für E der Berfiherumg: | des Gem — 83 N : end: its 5 Mi das ori, | land» ee ren 3 des Brandes | | en m 5 und ergtiffene * un 2 Immo | Mo Immo Me | ſchaliliche gyajge | Merk: | Bilier bitiar [GE ———— biliat billar bitar Bifiar | Sehön me 4 * A| AM) M M KH a a M RT; 484001 24600! 48 400 | 4460| 52860 3960 500 — 29 974 | 4510] «27. [mit ermittelt. ; 140 000! 75000) 25000} 100000| 15000] — 5000) 75 000 . «ag. Selbſtentzundung des Mahlganges 42900 | 58000) 50000| 58000) 108000 . . . | 129. [nicht ermittelt. 18 000) 52380) 18100] 42000] «0100, 1500| — 400 | 12580. 34462] 130. | muthmaßlich Fahrlaſſigleit mit Streichhölzern. 45 000 . 33000) 35250] 66250! 17800 — ; 109 . . tau. | micht ermittelt, P 168 120) 36 700 | 60 000) 96700 60000 — — 36 700 60000 | 132. muthm. Brandſtiſtung. — 70 000 — 700001 10000 — — — — 173- Selbſtentz.; nur Baumwolle beihäb. 42700| 168000! 33 100 30663] 53768 21243 | 1960| 23 100 30663] 134.| .„ KHZahrlaffigteit mit Streichtolzern. 80000 | 1330005 70000| 46000] 116000: 460 WI — | — 35150) 45050] 135. ” " w ” 54000) 41500] 30000| 47000] 77000. 25000 — 20 000 | 27000| 260001 136. Brandſtiftuug. 400 000 1000| 108000] 118000, — | — 1106589] 6600! 108000] 137. " Babrläifizfeit mit heißer Aſche. 3000: 1500001 3726| 135000] 138 726 _ — — 3 726 | 67680 | 137g. | nicht ermittelt. — 5 50000; 10000] 60000, 4000| — | — 129800! — 135. | mutkmaitih Branbftiitung. 123000, 37 710| 24490) 26540] 51030) 25000 — | 1540| 24490 | 26 HO| 140. P „ 32 Rettungdm. erw. 81 000 | 7680 50 400 7899| 88299 1650 4749| 1500| 804001 5304 | 141. “ 28 500 — 25000| 27000] 52000. 2355001 — | 1500 . 1 — 242. | nicht ermittelt. 5) Über die für verficerte Gegenſtande gewährte Entihäbigung fehlen . Hein. ; Rosriäten bei Sem. 55, 64, 70, 101, 109, 110, 115, 183, 185, 158, | IE geang mit Ga mitm Ban ahnen 165, 167, 168, 174, 183, 187 und 189 fowie für eine B.figung bei Rr. den 8 6 5.900 117 51; die Bergiitung für Immobiliar if bei Nr, 39 und 109 ſowie zu einer Ba a Hr I neh ” pin Mir a - Beigung bei Me. 169, die für Mobiliar bei Men. 20 und 31 fomie zu | 1896 ..*4 ı 500 & — “a 6 rend einer Befizung bei Ren. 105, 144 und 166, zu zweien bei Nr. 163 und A897 * — 5 9 89 43 4123 870 pa beeien Bel Se. ILL nic! angegeben. BR 2... — — 8 136857 28 2988 1658 zuſammen 2 110000 30 815088 148 19 159 878, 6) Als Brandurſache von Ne. 26 if die Zertrümmecung der Sicher: heildiampe verzeidnet, während Mr. 35 durch Bedeckung mit Blasziegeln hervorgerufen zu fein Scheint und Mr. 114 anftatt durch die in ber Tabelle ans gegebene Urſache möglicherweiſe durch Kutzſchluß der eleftrijchen Leitung ver- anlaßt wurde, T) @etödtet wurde ein männlicher Etwachſener bei Nr. 1, verwundet zwei männliche und ein weiblicher bei Nr. 74, zwei Rettungsmänner bei Nr. 72, einer bei Nm. 70, 166 und 131, im lehteren Falle außerdem zwei erwachlene Perſonen männlichen Geſchlechtes. 8) Dom Gefammiverlufte zu Nr, 40 tommen 20 000 „# auf 60 ha Wald | desjelben igentbimers in der benahbarien Hirchlpielsgemeinbe Dietelen, von bem zu Nr. 166 anf die Qandgemeinde Kolonie Parlinet 47 072 M. Die Berufsitatiftit ber Beböftebefiger ſchließt zumuͤchſt Die beiben Waldbrände unter Nen. 40 und 88 mit 60000 und 50 000 M, welchen Verluſt ein Erbdrofte bezw. verjchiedene Befiger erlitten haben, aus. Sodann geben noch neumumddreißig Aushruchsgehöfte mit weniger ala 50000 Schaden ab, ald deren Eigenthümer an« gegeben find: zwei Guisbefiger mit 41 469—43 154, vier Bauer gutö-Befiger mit 7400-24 925 (jufammen 70336), drei Hofe ' befiger mit 13 728— 35000 (zufammen 72528), drei Bauerhofs« Beſiher mit 1250033 300 (zufammen 62 640), zwei Bauern mit 12125— 12300, ein Befiger mit 21900, ein Sandmann mit 16 010, brei Landwirthe mit 2010-32 879 (zufammen 37 852), ein Vollöfner mit 32000, ein Halbhöfner und Gaſtwirth mit 28 743, ein Vollhüfner mit 38 801, drei Hüfner mit 16 500— 23 310 (ufammen 60967), ein Halbhufner und Gemeindevorjteher mit 17 725, ein Halbhüfner mit 1975, zwei Ndermänner mit 18450 bis 22150, ein Anbaner mit 10194, ein Mehger mit 32860, ein Diauerpolier mit 7300, zwei Gaftwirtfe mit 8089-9700, ein Lehrer mit 12015, zwei männliche Perfonen ohne Angabe des Be- rufes mit 12245—43 305, die Koönigliche Bergverwaltung mit 45 000 und eine Kirchengemeinde mit 24 155 AM. Somit vertheilt fich die Gejammiheit ber ſchweren Brände in Landgenreinden nad Ausbruchsbeſitzungen folgendermaßen: welchen letzteren unfere Überjicht der Ausbrudsgehöfte mit 50 000 und mehr A Schaden nachweiſt. Zur Ergänzung der Tabelle von ben Gutsbezirken dienen die nachſtehenden Bemerkungen: 1} Die Dauer der unter Ar. 31 und 23 verzeichneten Brände lonnie nicht erkundet werben, 2) Über die Verfiherungkfumme war bei Mr. 123 Überhaupt, Aber die des unbeweglichen Eigenthumes bei Arm. 111, 121, 128, 152 und 139, des beweglichen bei Ren. 63, 67, 77, 102 und 133 nichte zu erfahren. 3) Mr. 54 war ein ausfchliehlicher Waldbrand auf 200 ha beichäinigter Flache. 4) Eine Vertheilung des Mobiliarſchadens auf Gebrauchsklafſen ift bei Nm. 96, 101, 102 und 129 unterblieben, während fie bei Nm. 53 und 57 nur theilweife erfolgte. 5) Welche Entſchadigung verficerter Werte gezahlt wurde, ift bei Nm. 17, 62, 77,81, 117, 118, 129 unb 131 überhaupt, für Immobiliar ; bei Ren. 11, 30, 48, 52,53, 94, 123 und 142, für Mobiliar bei Ren. 67, 102, 104, 108, 116, 122, 138 und 135 nidt angegeben, 6) Sinfihtlic der Brandurſache fügen wir hinzu, daß bei Ar, di ein Rafirfpiegel als Brennglas gewirkt zu haben ſcheint. 7) Außer den Verluſten, weichen die Gutsbezirte laut Tabelle 48 er» fitten, haben die in fünf von ihnen — unter Ren. 26, 35, 65, 104 und 124 — eniflandenen Brände den gleihnamigen Landgemeinden 13263 bezw. 3000, 18580, 3 800 und 44 950 Schaden, an unbeweglichen Eigenthume 59 960 und an bemeglichem 23 633 HM zugelllgt. Nah Abrehnung bes vom Fiskus erlittenen Waldſchadens mit 50000 AM im Jahre 1996 bleiben 141 fälle mit 15 116 377 MH Schaben für unjere Bernisitatiitit übrig. Leßtere ift nun im der Überficht 49 für jeve Gemeindegruppe ‘ fo weit ausgeführt, dab die Berufsdizeichnungen dee Brandzädllarten in berjelben Weite, wie betreffs der Jahre 1982-94 geſchehen war, ans dem Inhalte der Zählkarten nah Möglichteit vervollſtändigt wurden. Wir mieberhofen, daß die überſicht mit Ausnahme ber ſchon bei den ansgebreiteten Bränden in Betracht gezogenen Faͤlle (Sortiegung bed Tegted auf Seite 143.) 142 49. Berufszweige 1c. der Eigenthümer vom bebanten Ausbruhsbefihungen mit mindeftens 50 000 4 Schaden 1895-98, A. Etabt Berlin, Beruf und Zahl der Fälle: Eleftricitätsgefellichnit Pappenfebrit, Altiengeſellſchaft .. Konbitor Angeniens oo or onen Simmermeifter Fuchdrıuderei-Befiger 2 Habrilbefiger (0-75)... .. Firma, Fabrilanten -4 Kaufmann (50-80) .. .r0.. De Er u... — u. 50 250 114 169 51 781 117 444 A Schaden | 155 000 | 137 050 125 149 55 639 251 517 Lebensverfiherungs » Wltiengefenfchaft 107 610 Spebilionds umd Lagerhaus⸗ AG.. 50.000 | NAuderliub ......,- ... 58600 2 Landrath, Brofefjor (58-173) . 229 973 Nenmerin ». 2... nes re .. 0 670 Gehhrwifter Mentnerinnen ...... 50865 Erben obme nähere Angabe... .. 748248 B. Übrige größere Etädte. Beruf und Zahl der Halle: .K Schaden Grundbeflier . sn nun 53 650 Birma Siegeleibefiner . 2.22... 62693 | Kumnftziegelei Altiengefenfcheft. .... 106193 Chamotte⸗ und Tiegelwerke AB. . 97 000 Birma Ghleiferei . - 2-2...» 80000 w Mapelfabritanten...- ..» » 181 614 Well blechfabrik Altiengeiellihaft . 57 000 Babrifsefiner für Blediwaren.,.. 1165000 4 Maſchinenfabrilant (58—1T4).. 409022 Firma Wagenfabrifanten...... 52 348 Eije ninduſtrie und Yriktenbau AG, 55000 | Seifenfabrilant . »».- Herner 714558 Kunftwolefjabtif ..- 2... ... 88 560 Zumjahril-Befiger... 02-0. 190 000 Zudfabrilant . 2. - rem rn en 64 939 2 Firma E., Gebrüder 7 (96—330) 476 000 Firma Band- und Zipenfabril . . 154 000 Drudereis und Appretur AB... . 420270 Birma Pergamentpapier-Fabrit... 88 000 Kiemendreherei-Befiber . .. 2... 80 000 Birma Schneidemühlenbefiger..... 60000 2 Schreinermeiher (62—236) ... 298373 Wuibopen-Fabrifant,. . . 80 000 &otdleiftensFabrilant .. ... - - - 100 345 Firma Rollladen und Jalouflefabrit 87673 4 Mühlenbefiger (99-300) .... 625941 Müplenwerke, Sei. m. beihe. Haft. 230015 Firma Dampf-Eeireidemüle . 119 000 » Damplmüßle...2...4= 61 000 » Koafferefienzefjabrit ..... T0 538 » Spritiatil . 22222404. 14 512 2 Bierbrauerei-Ab. (60-358) .. 412052 Eabalfabrit .. 2.22 2222220. 127 137 Firma Slonieltionsgeigäit... . » 637 001 2 Birma Schuhwaren · Fabril (86-160) 245 633 Fabrilant von Häten.. 2... . 187544 2 Zimmerm., u Vanuntern.(50—52) 102 000 | 2 Babrifant (62-74) . 222.25 136 382 9 Fabrilbeſitzer 50—1180) . . . . 1847975 zwei Habrilbefiger... - 200. 50 625 Bebrider Fabrilbefiher 2.2... 1 249 582 3 Firma für Fabrit (52— 166), . 295697 4 Firma o, Beihäftsangahe (66-251) 610978 Altiengelelichaft desgleihen. . . . - 588 952 | 4 Kaufmann 60 -178) ..... 369 948 2 zwei Kaufleute, Gebr. 8.(100-280) 2380 000 drei Erben Beinbändler ...... 100000 2 Gilenbahnefistus (50—131). .. 181300 | 2 Wirth (069) ......... 118 800 | Refaurateur. ....». F .. 113000 Mufitdirhtor 0.220202 enan 120 000 Noch: B. Übrige gröhere Städte, No: C. Kleinere Stadie. Beruf umb Zahl der fälle: A Schaden Beruf und Zahl der Fülle: ASchaden Nentuer 67000 | Kreislommunalverband „2... 68876 5 ohne Berufsangabe (51-139). .. 8376358 | 3 Stadtgemeinde (57—142). 269 500 2 Rentuerin, Witwe RM, (50-51)... 100540 | Brdergemeinde .. 2.4. ur 44 478 Bi ala el. une] DS Dihlhetab sell B2ogo | erfand Zahl der Fälle: .M Cihaben 2 Stadigemeinde (60-64). 2...» 124 944 | 2 Mojorats-, Bauergutß-Bel (5565) 120590 ' evangelilhe Kirhengrmeinde. ... + + 268 750 | 11 Gutäbefiger (5282)... ..... 690 870 | 8 Hofbeſitzer (50 75) ....... 470124 €. Kleinere Stadte. 2 Beinen (6-68). ...... e 123 813- Beruf und Zahl der Fälle: A Schaden 2 Brunpbefiker (Hd—T1). ... » 125 281 2 Butsbefiger (TG) ....... 120.669 | 2 Landwirth (bl-53) ...... 103 186 | 2 Orunpbefiger, Aderbürger (60-85) 145 112 | 2 Gntssefiperin, Witwe G. (bit 75) 127285 Bergwerls-⸗ und Mabrilbefiter...... 55000 | zwei Öutöbefiner „nun nenn. 573223 2 Ziegeleibefiger (35-92) .. -». - 176 959 | 2 Bedhe, Birma Steinfohlenz. (bis 326) 475 952 Thonmerke Altiennefenfhait. » 218 711 | Zeche Mfitengeiellihaft.. .. -. 68 665 Porzelanfabrit-?ej. u. Hauptm. a, ©. 61000 | vereinigte Gemeriaft run. 56 850 Shloffermeifler ur urenen 55000 | Bergbau, Eifeninbufrie x. AB... 55 018 Firma Drahtfifteabrit. 130 000 | Gifenhürtene®ert Altiengefelliaft ,. 115526 „ Milnwel 22er nern 215500 | Salgwerte Aktiengefelfhalt ... - 53 141 Herdfabrifant .. 2 vr mem ene nn 130 000 | Gebrlider Eiswerle. 22220. 92 000 Wabritbefiger für Phosphat... ... 4393045 | Firma Shladenmühle „2.2... 155 000 firma für künftlichen Dünger .... 167000 | Dampfziegeleis®efiber. .......- 120 000 chemiſche Fabrit Akliengeſellſchaſt. 60.200 | 2 Ziegelei, Thonmerte (bis 647)... 773332 Belatinefabtil. ...... .... 93 039 | Birma Gementfabrit. 22022220. 149 337 2 Zinoleumfabrit: A, (180-250). 430000 Dachſitin- und Zirgelfabriten US... 54500 Fabrilbeſ. [Ar BaummolsSpinnerri. 110000 | Blaßfabtilant. cur ce ren. 50 000 r „ Wollipinneri ..... 55 770 | 2 Firma Glasfabrit (55—69) .... 124216 Firma für Fabrifipinneri. ....- 193 875 | Birma Makhitenfabrit........ 91000 „ + Baummwol-Spinnerei. .. 521000 | Wafdinenfabrit Alttengeſellichaft 152 770 „ u Shmarzipimeea..... 1000000 | Altumulatorenwerle nun c nun 112 000 Beſitzer einer mechaniſchen Weberei... 624534 Apotheſer ... 73 000 Birma für Baumwolle Waren .... 376694 Fadbrilbeſitzer für Threrprobufte. 90.000 5 Zuhfabrifant, Fabtilbeſ. — 921612 2 Produften», Düngerfabrif (bis 176) 233 064 zwei Tuchlabrifanten .. F 201818 demifche Fabrit Aktiengeieligaft... 63928 Birma für Indfebrifation. ....».
common_corpus
{'identifier': 'bub_gb_XoxRAAAAYAAJ_19', 'collection': 'German-PD', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1861.0', 'title': 'Preussische statistik. (Amtliches quellenwerk) ..', 'creator': 'Prussia (Germany). Königliches Statistisches Landesamt', 'language': 'German', 'language_type': 'Spoken', 'word_count': '7860', 'token_count': '16207', '__index_level_0__': '647', 'original_id': '2c41beec887dd16f69273f44e18639f5767d17af56e3cd52d37dfeab587c75dd'}
Khloé Kardashian has a thing for waist trainers. The Keeping up with the Kardashians star has talked in the past about how she works out in them, and in a new Instagram post, she models a holiday-themed version. But Kardashian isn’t the only celebrity to rave about waist trainers. Jessica Alba once told Net-a-Porter’s The Edit that she wore two waist training corsets day and night for three months after having her daughters Haven and Honor. Nicole "Snooki" Polizzi, Kim Kardashian, and Kim Zolciak have also raved about waist trainers on social media. (It's worth noting that celebrities are often paid to promote waist trainers and other similar tools on social media.) Waist trainer manufacturers make plenty of promises, including claims that waist trainers will help you lose weight in your waist, create an hourglass figure, get rid of "toxins," work on your core, and suppress your appetite. Waist Gang Society, which many Kardashians plug on social media, claims that using their trainers can “radically reduce your waist size; instantly giving you a beautiful, sexy silhouette while permanently getting rid of unwanted inches around your waist.” The company later claims, “It’s really that simple—all you have to do is wear the garment!” Here's Kardashian modeling one of Waist Gang Society's gadgets: All of this sounds too good to be true, and experts say it is. “There is no scientific evidence whatsoever that these devices work,” women’s health expert Jennifer Wider, M.D., tells SELF. She likens waist trainers to using an elastic bandage on an injured calf muscle. “When you take it off, there may be an indent, but in very little time, your calf will go back to exactly what it looked like before,” she says. Marc Leavey, M.D., an internist at Baltimore's Mercy Medical Center, compares waist trainers to old-fashioned motorized belts that women would strap around their butts in the 1950s and '60s to try to lose weight. “That did not work, and neither do these,” he tells SELF. “I am surprised they don’t say [waist trainers] boost your IQ or find you a new job—there is about as much basis for those statements.” Fitness expert Lisa Tanker, C.P.T., agrees. "I put waist trainers in the category of the 'fake quick fix' that adds to the misconception that people can lose weight without changing their with dietary and exercise habits," she tells SELF. Waist trainers can actually work against you because they cause you to use less of your core muscles, Albert Matheny, M.S., R.D., C.S.C.S., of SoHo Strength Lab and Promix Nutrition, tells SELF. “Compressing your core is not good,” he says. “It actually weakens it because the material is providing stability, rather than your muscles [working to provide it themselves].” While some women swear by waist trainers for weight loss, Matheny points out that any lost pounds are water weight, especially since the trainers are often made of latex. "[Waist trainers] will increase sweating, but losing water is not at all equal to losing fat,” he says. Leavey agrees. “One ‘burns’ fat by increasing the body's overall metabolic rate, and that takes exercise,” he says. “You cannot direct the metabolic energy to one spot in your body, so trying to lose fat from [specific places] just does not work.” Waist trainers may even cause more harm than good. “Women who use them have reported difficulty breathing, increased heartburn, and indigestion,” Wider says. “If worn all the time, there are risks of organ compression.” It’s especially bad to work out while wearing a waist trainer, which Khloé Kardashian has claimed to do in the past. “If your diaphragm, which functions by allowing the lungs to expand and contract, is getting compressed, your ability to breathe properly will be restricted,” Wider points out. And that's not going to do your workout any favors. Waist trainers can also put you at an increased risk of injury because your spine isn't able to move naturally while you exercise, Tanker says. There may be some truth to the claims that waist trainers will give you a reduced appetite, but that's not a good thing. “Maybe if a band around your belly compresses your stomach enough, you won't eat because it becomes uncomfortable,” Leavey says. That's basically bullying your body into eating less than you might need. Instead of turning to a waist trainer for health, weight, and fitness benefits, Matheny recommends practicing good nutrition, strength training to build lean muscle, and doing more cardio, depending on your goals. It’s not as simple as strapping on a waist trainer, but it's much more likely to keep you healthy.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '18', 'language_id_whole_page_fasttext': "{'en': 0.9605126976966858}", 'metadata': "{'Content-Length': '381710', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:X7OT3L3YNUTFLYNS7ODCCLMFWGLF7QWL', 'WARC-Concurrent-To': '<urn:uuid:2aa3582a-c98d-4d8a-afa1-c6aa21fb8275>', 'WARC-Date': datetime.datetime(2018, 10, 17, 1, 22, 2), 'WARC-IP-Address': '151.101.200.239', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BQNNQBY5JHDPHPMLDKFI2H67C3TTANG7', 'WARC-Record-ID': '<urn:uuid:38a52bf1-69f5-40c0-b5a5-93c7ded14ec6>', 'WARC-Target-URI': 'https://www.self.com/story/khloe-kardashian-waist-trainers', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f323e8dd-b21a-4ef1-b1b4-5c92628222f0>', 'WARC-Truncated': None}", 'previous_word_count': '750', 'url': 'https://www.self.com/story/khloe-kardashian-waist-trainers', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-69-127-157.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03528428077697754', 'original_id': 'ed56b6532af89056dcf9c77656a63f4072e2b5482b511bcb0aba44a3b4e4d0fd'}
Undark interviews Ishaq about ethics of fecal sampling from indigenous people Undark interviewed Sue Ishaq, assistant professor of animal and veterinary sciences at the University of Maine, for the article about ethical issues faced when scientists collect fecal samples from indigenous people. Scientists collect feces from indigenous people to study microorganisms in their digestive tracts that members of industrialized societies have lost. Information derived from the samples could help explain why the collective health of urbanites appears to be in decline. Ishaq believes that discussions about determining the best ethics for collecting fecal and other human samples from indigenous people needs to happen now. One issue involves the ownership of excrement after it leaves the body. The Raute people declined to provide fecal samples because they believe their body, including anything that leaves it, and all their belongings should return to the soil, according to the article. Ishaq said that the ever-changing nature of the gut microbiome, a living ecosystem whose members can move from person to person or vanish, increases the complexity of the issue.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9535542726516724}", 'metadata': "{'Content-Length': '74812', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:U5BK5PDJYS3L7GYLHCV2GU3LDBQEU7AK', 'WARC-Concurrent-To': '<urn:uuid:29b47108-4d91-4c49-87b0-62f1c7b5574b>', 'WARC-Date': datetime.datetime(2020, 5, 29, 11, 36, 14), 'WARC-IP-Address': '130.111.46.127', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RM2JRSW2ZO3TIJALASW5ZCS75O3LYQ6G', 'WARC-Record-ID': '<urn:uuid:6efc329c-2030-4b7e-83b9-196fefb1651a>', 'WARC-Target-URI': 'https://umaine.edu/news/blog/2020/04/09/undark-interviews-ishaq-about-ethics-of-fecal-sampling-from-indigenous-people/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0fc2b28c-41b5-414e-a935-2482c0413b21>', 'WARC-Truncated': None}", 'previous_word_count': '176', 'url': 'https://umaine.edu/news/blog/2020/04/09/undark-interviews-ishaq-about-ethics-of-fecal-sampling-from-indigenous-people/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-45.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0701301097869873', 'original_id': '8d3a0e9b286e6a84ba7e89f04a2366ad02c723b87a5a606254e4fe328b4534ec'}
Development Economics Paper Fertility, Education and Development: Further Evidence from India Jean Drèze and Mamta Murthi January 2000 Paper No' DEDPS 20: Full Paper (pdf) Tags: fertility; demographic transition; female literacy; india There has been a significant decline in fertility in many parts of India since the early 1980s. This paper reexamines the determinants of fertility levels and fertility decline, using panel data on Indian districts for 1981 and 1991. We find that women's education is the most important factor explaining fertility differences across the country and over time. Low levels of child mortality and son preferences also contribute to lower fertility. By contrast, general indicators of modernization and development such as urbanisation, poverty reduction, and male literacy bear no significant association with fertility. En passant, we probe a subject of much confusion - the relation between fertility decline and gender bias.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '86', 'language_id_whole_page_fasttext': "{'en': 0.8833460211753845}", 'metadata': "{'Content-Length': '18985', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AUWYPT67MTOSRSQ3RGASDW36OUAMVJTT', 'WARC-Concurrent-To': '<urn:uuid:0d177a68-47e4-4327-b805-65d227839ab2>', 'WARC-Date': datetime.datetime(2019, 6, 18, 7, 59, 6), 'WARC-IP-Address': '158.143.47.131', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VM5BX7WRQAUOFUHAP4JTHUXY2MU7VV52', 'WARC-Record-ID': '<urn:uuid:1ce2610f-658c-4247-b549-03f0ff9c2cee>', 'WARC-Target-URI': 'http://sticerd.lse.ac.uk/_new/publications/abstract.asp?index=1144', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:70744c3c-9076-47f7-a4cb-b279acd95305>', 'WARC-Truncated': None}", 'previous_word_count': '156', 'url': 'http://sticerd.lse.ac.uk/_new/publications/abstract.asp?index=1144', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-165-255-234.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019618213176727295', 'original_id': 'e44f46edfa9cea3450e16bc75a5a1fff13b849a9f2257c0a3b5a1652d1145d06'}
GEORGETOWN, MA - JANUARY 17: Jill Osborn hopes marijuana will help her daughter Haley, 7, with her seizures. Haley has a severe form of epilepsy and could have several dozen seizures in a day. A handful of studies suggest cannabidiol, or CBD, an ingredient in marijuana, might cut frequency of seizures. (Photo by Jonathan Wiggs/The Boston Globe via Getty Images) CHICAGO -- Yet another state is considering expanding its medical marijuana laws to include children suffering from debilitating conditions like epilepsy. On Tuesday, Illinois' Senate Public Health Committee unanimously approved legislation that would legalize medical marijuana treatment for minors in a 8-0 vote. “Letters have been sent by so many parents who suffer watching their children have seizures — and not just one or two seizures: 100, 200, 1,000 seizures a week,” the bill's sponsor, state Sen. Iris Martinez (D-Chicago), told the Sun-Times. “This could be a life-saving solution for children suffering from epilepsy.” Nicole Gross, one of the parents of severely epileptic children who lobbied for the bill, testified to just how transformative medical marijuana treatment can be for kids like her son, Chase. Gross said her 8-year-old lost his ability to speak due to his seizures and functions at the level of a 1 1/2-year-old. "Following his dose of the cannabis oil, we started to see one to two seizures in two minutes, and then two minutes seizure free, five minutes seizure free, then eight ... and when we hit twenty, I cried," Gross told Fox Chicago. Chase is among the thousands of children across the U.S. -- and among an estimated 1,000 in the Chicago area alone, Fox Chicago estimates -- who don't respond to typical seizure medication but have experienced dramatic improvements using medical marijuana. Unlike adults who can smoke medical marijuana, children using the treatment are commonly given Cannabidiol (CBD) oil. The oil comes from marijuana plants but has low levels of the mind-altering ingredient THC that creates a high. In recent days, states like Wisconsin, Tennessee and Utah have advanced legislation to legalize CBD oil. With CBD still illegal for minors in Illinois, Gross was forced to move to Colorado with Chase in order to secure the oil for his treatments. Gross and her family are part of a growing number of people heading to Colorado for treatment, where the number of minors on the state's medical marijuana registry has surged in the past year. Currently, 20 states have medical marijuana laws on the books, but only some of them include minors. In Illinois, where the four-year pilot program is considered one of the strictest in the nation, minors aren't the only patients excluded from the state's registry: Only those individuals suffering from at least one of 40 debilitating conditions and illnesses qualify. The stigma against medical marijuana for kids -- and physicians' subsequent reluctance to prescribe it -- has led families to fire their doctors in search of marijuana-friendly care providers. Other, like Gross, are forced to leave their home state and become a "marijuana refugee" in Colorado. Gross' husband, Randy, acknowledges there's a belief that CBD oil could be abused, but noted to WGN in a February interview, "it has no street value, so there's no one who can really abuse it. It's something you can't overdose on. You can drink a gallon of it and it won't hurt you." With the news of the Illinois Senate Committee's vote, Gross hopes the days of his family living in Colorado are numbered. "The long-term prospect is you're making people decide between a life of seizures in Illinois, and possibly death, because this is often a death sentence," Gross said. "Or, you're making [families] leave their home."
mini_pile
{'original_id': '8787c77cce06e7b2e446162ff0b311887d14bec9a877bd19edbc0d5e74479d5f'}
Sound-off 4/8 April 8, 2013  Ever wonder how many of the legion of campaigners for raising your property tax are actually property owners in O'Fallon? I will never vote for another property tax increase for the schools as long as O'Fallon maintains three separate school districts, three separate superintendents, three separate administrative staffs, and three separate buildings. Don't let state slide After listening to the O'Fallon District 90's public questions and answers on Tuesday, I will vote "no." The vote "yes" group says the rate increase would lead to financial independence from the state, which would set a bad precedent. Better to have community fund-raising for the extras, no fee discounts for multiple children in a family and continue to push the state legislature to pay their education obligations. Balanced but higher The BND reports that O'Fallon has passed a "balanced budget of $66.8 million." The lead paragraph states that this, however, is an increase of 14 percent in the budget. One of the issues I have is that $1.2 million is listed for the operation of the Family Sports- plex. This multi-million dollar project was created under the guise that it would not cost taxpayers anything, it was found money. Of course, this was taxpayer money that could have been used for other, more important city projects. Don't abandon cursive The word has come down from the higher education administration that cursive writing will no longer be taught in schools. They have decided that our children only need to learn to type since they think all communication will be done on computers. Hmmm, if you can't communicate through the written word on paper, it's just another way to control the masses and to know what information is being communicated. Wake up, America. Our children are being indoctrinated every day through the school system that teaches only one school of thought, which is liberalism, and this is just another part of the overall plan. Trim Obama's wings I read in the BND that President Obama is giving up about $1,700 a month of his pay because of the sequester furloughs. Well, big deal. The millions of dollars that he and his wife waste using Air Force One traveling all over the world would pay for medical treatment for many Medicare and other patients if he would just fly in a regular airplane and use his own money. He gets a $400,000 annual salary but he doesn't pay rent or utility bills. The BND printed this like it's a big deal. Shame on you. Why don't you talk more about the money he's wasting using Air Force One? Obama takes a break I am still in shock. If I had not seen it with my own eyes, I would not have believed it. I was watching the NCAA basketball tournament and President Obama actually disrupted one of his record-setting vacations to attend the Syracuse game, We sure appreciate that, Mr. President. Swept under the rug Freeburg's Mayor Ray Danford is up to his old tricks. An employee got caught stealing village property. Village policy calls for immediate termination. Instead, Danford and his administration swept this under the rug. No reprimand, no discipline action. What happened to holding all village employees to the highest standards and accountability as the mayor previously stated? Money is the solution The only thing that will save East St. Louis short of actually having the whole city bulldozed into the river would be for more money to move in through real estate development of great riverfront condos on either side of the new bridge and retail stores and jobs that would come with them. Unless the people with money build up this great location across from downtown St. Louis, the city is doomed. Educate on obesity I'm retired and my wife and I eat out at casual dining places frequently. I am so disgusted at the way people act and dress and allow their children to be unruly. And they buy fat-filled meals with desserts when they are already obese and either already have diabetes or will have -- if they don't drop dead first. I wish the BND would do a huge spread about the problems of obesity in the United States. Where's the outrage? I find it appalling that only one St. Clair County Board member has publicly come out against the hiring of Scott Flood. Everyone should call their county board member and ask him why he sat on his hands and let County Board Chairman Mark Kern and his group hire this guy. That's entertainment I went to the races for the first time this year. Where else can you get a full night of entertainment for $12 for the whole family? I took my kids along and they were free. We had a great time with the rumble of the engines and the sweet smell of exhaust coming from those cars. It was a lovely evening. Everyone should try it with the family. Shh, don't tell thieves You had a very nice write-up on the state-of-the-art, million-dollar classroom. The only problem is now that you've publicized that fact, thieves will go in and steal everything. It was better when they didn't know about it. Not like Lincoln A recent caller said that President Obama is like Abraham Lincoln. I nearly laughed off my chair when I read it. If he means because the president is being attacked from all sides that they are similar, then yes they are. The difference is that Lincoln was not a hypocrite. Obama lectures people about going on big vacations spending other people's money but does the same himself. Lincoln walked the walk as he talked the talk. Obama is the biggest hypocritical president we have had in a century. Wrong to print story The article regarding Caseyville mayoral candidate Leonard Black is the most biased example of journalism I have ever seen in the Belleville News-Democrat. The reporters should be embarrassed for writing such a non-relevant story. There was no point whatsoever in running this article except to publicly humiliate Black. The BND should be ashamed for publishing this story five days before the election. Vote for change Belleville Mayor Mark Eckert claims he's done so much. What about the Meredith Home that is prime property just sitting there? He also wasted money to buy the building at the foot of the hill on West Main Street and he gave himself a $15,000 raise while the city employees took a two -year freeze. When are the taxpayers of Belleville going to wake up and get him out of office? We have a chance to do it in this election. Puzzled by realtors Why did the Illinois Association of Realtors decide to send out mailers supporting for election Mayor Mark Eckert and treasurer candidate Dean Hardt, two political party opposites in the mayoral race -- or are they? No comment? No vote I read the BND election candidates' responses and am appalled by candidates who are unwilling to have the public know their positions on anything. I recommend this arrogance be rewarded with a "no" vote. This isn't marriage I'm concerned about the term gay marriage. Marriage is defined as a union of a male and a female so there is no way a union between like people can be called a marriage. I can't understand why people can't come up with another word for this, like a legal contract or partnership. You can't say that an orange is an apple if you want an apple. A marriage can't be two males or two females so why don't we have a new or better word? Protestants left out Was I surprised on Easter morning? Not really. Instead of picking up the paper and reading an Easter Sunday editorial about the real meaning of Easter, Jesus Christ, the Resurrection and Christianity, we get another editorial about the pope and the Catholic Church. As Protestants, I think we know we can't expect anything else because the News-Democrat is really a Catholic newspaper. Priced out of baseball A Cardinals' pitcher just signed a contract for $97 million. That's ridiculous. That's why your typical family can't go to a ballpark without paying $50 for a ticket and $10 for a hotdog. A person couldn't spend $97 million in their lifetime unless he is like the government that pays $5,000 for hammers. Where is it ever going to stop? Assist in other ways Our current assistance programs for people who don't have jobs or who just decide to live off of welfare is allowing people to abuse the system using their state and federal cards on things that aren't necessities. We need to go back to giving these people some type of voucher to get only things like rice, beans, milk, eggs or flour until they can get back on their feet. It would cut down a lot on the abuse in the system. Better way to operate As a resident and paying sewer customer of Stookey Township, we need to elect a new highway commissioner who will fix the township office parking lot and the country roads and streets properly. The commissioner seems to take care of only Oak Hill area and higher priced areas. We need to elect new trustees and have the meetings changed to 7 p.m. like they used to be so people can attend. You cannot solve problems in a five- to 15-minute meeting once a month. The meetings used to be twice a month. Appalled by show I just listened to Bob Romanik's radio show, the Patriot. It was my first and last time. There was nothing patriotic about this broadcast. It was appalling and I feel any candidate for office who uses this show to get exposure to the voting public is very misguided and would show a great lack of respect for the office they are seeking. Needed reforms What's going to happen when all these illegal immigrants are covered under Obamacare? One way to cut the deficit might be to look for the fraud in food stamps and remove the people who don't really need them. I don't want anybody to go hungry but there are many people who don't use them as they were intended. Do the same for Medicaid and Social Security Disability and get rid of Public Aid benefits for more than two children. Taxpayers can't make it anymore. Failed to plan ahead There is no greater indication of Catholic Bishop Edward Braxton's failure than the consolidation of parishes as a solution for the poor recruitment of new priests. The church should have had a 10-year recruiting program about the advantages and blessings of being a Catholic priest. Instead they are just waiting until everybody dies off, and then what are they going to do? Maybe they will have to consider women at that point. The consolidation of parishes and the ruination of the culture of a parish family is a total outrage. See what God says More comedy from Washington. A Delaware senator does soul searching and now is in favor of same-sex marriages. Really, the only searching going on in D.C. involves politicians searching for votes to keep their sorry souls in office and to stay in the public trough. Instead of soul searching, why not just ask God what to do about same-sex marriage? Scriptures are very clear; God wants marriage to be between a man and a woman. Commenting FAQs | Terms of Service Ads by Yahoo!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '74', 'language_id_whole_page_fasttext': "{'en': 0.9771247506141664}", 'metadata': "{'Content-Length': '76728', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DJSQ4WNXI6UMRZPBFD7O6FUA4WRTBA3E', 'WARC-Concurrent-To': '<urn:uuid:a65fb0f1-b61b-4c0a-9643-7738d474f5fd>', 'WARC-Date': datetime.datetime(2013, 12, 13, 11, 36, 53), 'WARC-IP-Address': '23.0.160.48', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:W7XVZF2CRWSEVDOE6J4JQFPOCCMBR2GR', 'WARC-Record-ID': '<urn:uuid:87cb57d8-889f-4807-b53c-faae48c71ee0>', 'WARC-Target-URI': 'http://www.bnd.com/2013/04/08/2566520/sound-off-48.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f2ec6005-02e4-4627-92a9-375e812839ea>', 'WARC-Truncated': None}", 'previous_word_count': '1974', 'url': 'http://www.bnd.com/2013/04/08/2566520/sound-off-48.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.18984836339950562', 'original_id': 'fa4fc2689adfef688b51e8462321dedee09f464e12109867be16f829a906ee79'}
MONROE, La. – The ULM men's basketball program will look to bounce back against Loyola-Chicago when it returns to Fant-Ewing Coliseum for Whiteout Wednesday at 7:00 p.m. in game two of the College Basketball Invitational (CBI) best of three championship series. Fans are encouraged to wear white for the second straight week. Last week, ULM (24-13) used its home-court advantage to defeat Vermont, 71-65 in the CBI Semifinals. Loyola-Chicago (23-13) took game one of the CBI Championship series, 65-58 after a hot shooting night. The Ramblers became the first team to shoot over 50 percent from the field against the Warhawks this season as it shot .509 (27-53) in the contest. Senior Tylor Ongwae scores a team-high 14.4 points per game on the season and also grabs 6.7 rebounds per outing. He posted a double-double with 12 points and 11 rebounds in game one on Monday. Ongwae is averaging 21.8 points per game in the CBI. Ongwae is just 29 points shy of becoming the 36th 1,000 point scorer in school history. He would be the seventh player to do it in just two seasons. Junior Jamaal Samuel notched a team-high 15 points on Monday including a trio of three-pointers. Juniors Justin Roberson and Majok Deng also reached double-figures with 11 and 10 points, respectively. Deng grabs a team-high 7.5 rebounds per game on the season. The Warhawks need a win in order to extend the series to a third and deciding game on Friday. The game would be played at 7:00 p.m. at Fant-Ewing Coliseum if necessary. ULM is 14-3 at home this season and 404-172 (.701) all-time in Fant-Ewing Coliseum.
mini_pile
{'original_id': 'b2a25e51401dd4d89db15027d9b20c89f3e4abedafd03887d8571bbe1ef1bdd4'}
My name is Matthew and this is my blog. It's a personal blog and isn't affiliated with any of the companies I work for or have worked for in the past. Just to get that out of the way. Saturday, November 12, 2005 Don't talk politics and don't throw stones. This is going to be a political one because I’ve been reading the news stories and am somewhat exasperated. In America things seem to be going increasingly wrong. The people of Pennsylvania recently voted to the effect that they didn’t want to teach the theory of “intelligent design” before the theory of evolution in schools. This is something I’m quite pleased about, but I’m not about to follow in the footsteps of all those other people who in various columns and blogs suggested that perhaps the theory of gravity should only be taught after that of “intelligent falling.” What is bothering me is that a US Christian Evangelist has advised the people of Pennsylvania not to ask for God’s help if there is ever some sort of natural disaster in that region because the voters have “rejected Him” from the state. I half expected him to add “but YOU can be saved if you simply call my hotline now and pledge a donation of at least $300 to the church of the Latter Day Morons…” What happened to those parts of the Christian Bible which preached God’s forgiveness? Is this guy trying to say that anyone who lives in an area that has been affected by a natural disaster has obviously annoyed God in some way? Perhaps we should also go back to offering our first born in sacrifice so that the crops will grow next year. And just to confirm, it’s not anything to do with, say, building cities above the gap between tectonic plates or 5-10 feet below sea level? Then San Francisco decided that they possibly want to vote against military recruiting in high schools and colleges. Again this seems quite reasonable to me. Bill O’Reilly, presenter on Fox News, suggested that if the vote is passed to ban military recruiting “if Al Qaeda comes in here and blows you up, we're not going to do anything about it. We're going to say, look, every other place in America is off limits to you, except San Francisco. You want to blow up the Coit Tower? Go ahead.” Good to see the right-wing advising terrorists. My favourite story in this vein, however, I have to credit to another blog for an excellent compilation of quotes. In a speech as part of the USA Veteran’s Day, George W. Bush said that “it is deeply irresponsible to rewrite the history of how that war began.” Mr Red Rag, meet Mr Bull… George W. Bush, 7th November 2002:“Hopefully, we can do this peacefully -- don't get me wrong. And if the world were to collectively come together to do so, and to put pressure on Saddam Hussein and convince him to disarm, there's a chance he may decide to do that. ... And war is not my first choice “ George W. Bush, 11th November 2005:“"It is deeply irresponsible to rewrite the history of how the war began...More than 100 Democrats in the House and Senate who had access to the same intelligence voted to remove Saddam Hussein from power,"”
mini_pile
{'original_id': 'b109969c67e5ced650747d47afb5fa6db9bc3ad059aa9571175b15d28fe48263'}
Top 10 Times Police Officers Made Us Proud In 2014, some high profile incidents took place leading to an era of controversy surrounding police interactions with the community. Since then, various police agencies have spent a great deal of time leading the headlines. Unfortunately, in keeping with the “if it bleeds, it leads” philosophy of major news outlets, the only time these stories remain in the public consciousness is when there is some sort of negative connotation, real or imagined, directly relating to the actions of the police. That being the case, it’s easy for us to forget that out of 900,000 police officers in the country, and millions of police contacts a year, only a handful make the news. Sometimes it’s easy to forget that only about one percent of police contacts result in some sort of use of force, and it’s a fractional percentage of that that proves unlawful. This list is to remind ourselves that there are many great police officers out there that serve their communities in many ways, both quiet and loud. Here are ten examples, starting recently and working backward, of the police fulfilling their obligation to protect and serve. 10. Service to their community, August 2015 Los Angeles Police Department Officers Jonathan Maldonado and Albert Ledesma are used to being flagged down by the general public, but 14 year old Christopher Cazares, and his mother, had a unique request. Christopher was on his way to orientation for his freshman year of high school, and wanted to look his best for the school ID photo he would be taking. Unfortunately, he was having trouble tying his tie, and the YouTube videos weren’t helping. Without hesitation Maldonado and Ledesma jumped out of their car, and assisted the young man, in the process making a statement about the humanity that lies beneath the badge and the gun. 9. Racing the train, August 2015 In Sunnyvale, California, San Mateo County Sheriff’s Deputies Lance Whitted and Erik Rueppel heard a car crash. When they looked for the source of the commotion, they found a car that had collided with the crossing guard pole at some train tracks. Without hesitation, and with the oncoming train plowing toward them, the deputies pulled the driver from the vehicle, dragging him to safety. The dramatic incident was captured on camera, and later went viral. 8. Twinkle, Twinkle, Little Star, June 2015 In Brighton, Colorado, an SUV with six passengers inside veered off the road, ejecting all six occupants from the vehicle. Officer Nick Struck was among the first to arrive, and had a two year old girl handed to him by a paramedic. As the medical professionals attended to the more severely injured, Officer Struck did his best to comfort the relatively uninjured girl. Three of the other occupants were driven to local hospitals, two were airlifted, and the girl’s father was killed, but Officer Struck used the tactic he employed at home with his own two year old daughter to bring her a measure of peace. He sang a lullaby to her as he carried her away from the ensuing chaos. 7. Two for one, June 2015 Holly Springs (Georgia) Police Sergeant Nathan Ernst reported for what he thought would be a normal day. He didn’t know that, by the end of his shift, two people would owe him their lives. Early in the shift, he responded to a medical emergency, where he found the man unresponsive. His years on the job allowed him to recognize, from the totality of circumstances, that the man had overdosed on heroin. He quickly administered a Narcan shot, waking the man up. The recreational heroin user was then transported to a hospital where he was expected to recover. At least, until next time. Later the same shift, a fire engulfed the home of Shirley Pruitt, who is bedridden and has cerebral palsy. Alongside Sergeant Derrick Voss, of the Cherokee County Sheriff’s office, Ernst rushed into the home and helped carry Pruitt out, undoubtedly saving her life in the process. 6. Outgunned, not outclassed, May 2015 Two Islamic extremists objected to Pamela Gellar’s controversial free speech event, in Garland, Texas, that featured cartoon depictions of the Prophet Mohammed. Instead of writing their congressman or taking to the airwaves with local and national media outlets, the two men armed themselves with a total of six guns between them. They then drove into an entrance, blocked by the car of an unnamed Garland Police officer. The two men got out of their car, and opened fire with semiautomatic rifles. Despite being severely outgunned, the officer engaged the men, taking them both down and saving countless lives. 5. Don’t you die on me, April 2015 John Depue was driving his big rig when he found himself in medical distress. He passed out, and his rig plowed through a guardrail and down an embankment. Ohio State Highway Patrol Officer Eric Devers was the first on the scene, and quickly rushed down the slope. Devers found Depue hardly breathing, and immediately started CPR. As he administered chest compressions, Devers constantly verbalized to Depue, shouting, and pleading with him, “Keep breathing. Don’t you die on me. Come on.” He kept this up for the twelve minutes it took paramedics to arrive. Depue was transported to a hospital, and made a full recovery. 4. Running toward danger, December 2014 When Newark (California) Police officers Andrew Musantry and Steven Losier came across a burning building, just after midnight, they could have waited for the fire department to arrive. Instead, they rushed inside, crawling up the stairs when the smoke got too thick, where they found a disoriented 55 year old woman sitting on her bed. Waking to the flames engulfing her home, the woman seemed to still be trying to understand what was happening. Musantry and Losier weren’t certain if she would make it out of the building on her own, so the two of them carried her down the stairs to safety. 3. It’s cold out there, November 2014 That Jeffrey Hillman turned out to have resources available to him through the VA isn’t important to this story. What’s important is that New York Police Department Officer Lawrence DePrimo reacted to what he saw in front of him. To Officer DePrimo, Hillman was living rough, and barefoot, at the start of a New York winter. Concerned for Hillman’s ability to withstand the cold, DePrimo selflessly spent his own money to buy boots for him, giving them to Hillman in a now iconic photo that shows what police can be at their most caring. 2. Police station under attack, January 2011 Some people, for some reason, operate under the misconception that nobody really tries to hurt officers. That’s not true, and never has been. The truth is that nobody reasonable tries to hurt officers, but that the more unreasonable a person is, the more likely they are to come in contact with the police. Lamar Moore, 38, was certainly unreasonable. He walked right in the front door of a Detroit police station with a shotgun, and opened fire. What ensued was a frantic, close-quarters, firefight that ended with Moore dead, and four officers wounded. Among the wounded was the station Commander, Brian Davis, who can be seen in the video muzzle to muzzle in a point blank confrontation with Moore. Obviously this situation is more of a story of self-defense than it is a story of serving the community, but there are two things to consider about this one. First, I would submit that officers are an integral part of the community they serve. When an officer becomes a victim, the community loses at least as much as when a resident becomes a victim. Looking at it that way, these officers that fought back against this assailant were serving their community as they protected each other. Not only that, if this guy was willing to take on armed officers, there’s no telling how dangerous he could have been had he not been stopped. Secondly, this goes to show just how unreasonable some people can be. It takes an extraordinary level of commitment to harm officers, knowing they are trained, and will retaliate with force, up to and including lethal force. Yet he did it anyway. And he’s not the only one who does. If anyone is curious about what could possibly lead someone to attempt such a thing, there were some big events happening in Mr. Moore’s life. Ten days prior to the shooting, Moore had kidnapped a 13 year old girl, assaulted her, and was keeping her locked in his basement handcuffed to a toilet. On the day of the shooting, he was at court for a relative of his who was on trial for a double murder. Moore’s relative was convicted, then, in worse news for Moore, he returned home and found his captive had escaped. Apparently nothing left to live for, and knowing the police would come for him anyway, he armed himself and headed for the station. Ironically, as the gunfight ensued, other officers had surrounded Moore’s empty home and were waiting for a warrant. 1. Fort Hood, November 2009 Nidal Malik Hasan, an extremist that describes himself as a “Soldier of Allah,” did his best to bring Jihad to American soil. Though he was a U.S. Army major, and a trained psychiatrist, Hasan was the subject of an investigation by the Joint Terrorism Task Force due to a series of emails between him and known terrorist Anwar al-Awlaki. Before the investigation could end in an arrest, Hasan made his move, single-handedly attacking Fort Hood with the full knowledge that soldiers on the grounds were unarmed. Hasan killed 13 people, and wounded 33, before being confronted by Sergeant Kimberly Munley. A member of the civilian SWAT team, Munley, and her partner, were responding to the shooting when she saw Hasan chasing a wounded soldier. She immediately jumped out of her car, running toward Hasan, and opened fire. Hasan was able to return fire, and both combatants went down. Thankfully, Munley survived, having been shot in her legs and her wrist. Hasan was paralyzed, and on August 28, 2013, was sentenced to death. These are just a few examples of the hundreds of thousands of great officers currently operating in the United States. We don’t hear about most of them at all, and the handful of positive stories that do make the news, unfortunately, don’t last. It would behoove us all to remember that police officers willingly sign up to risk being murdered in the line of duty, on the behalf of complete and total strangers. Omar Davis is a public servant and a self published author. His novel, When Powers Play, is currently available on Amazon. Other Articles you Might Like Liked it? Take a second to support on Patreon! 1. The public needs to remember the majority of law enforcement does a great job everyday without any recognition. The mass media loves to report the negative, sensationalism, its nice to see a bit of positive. These officers deserve to be treated fairly too. 2. I don’t like the fact that we live in a country where you’re praised for doing the right thing. • How do you feel living in a country where a hand full of idiots can make a whole profession look bad? Yes, sometimes we do need to acknowledge those doing the right thing. 3. How can I do a search. For instance, I want to look at “Ten Novelists Who Dabbled in Espionae.” How do I call it up from your archives, please? • Scroll up to the top of this page and on the far right hand side in the black part you will see “Search…”
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9797033071517944}", 'metadata': "{'Content-Length': '146807', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NGDNLHITVARJ2FIMOSLT4HRKCOE7Y7US', 'WARC-Concurrent-To': '<urn:uuid:880454fc-1498-4fa7-884a-4633872f826c>', 'WARC-Date': datetime.datetime(2021, 9, 26, 13, 12, 55), 'WARC-IP-Address': '172.67.152.206', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AW24H23QBGU4W572ISTKEZUDCICN3LLL', 'WARC-Record-ID': '<urn:uuid:8df7c496-e7d8-4cef-9f7f-cc291e892800>', 'WARC-Target-URI': 'https://www.toptenz.net/top-10-times-police-officers-made-us-proud.php', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d8c0bedb-613c-405c-ab87-c2c2d89dc19e>', 'WARC-Truncated': None}", 'previous_word_count': '1962', 'url': 'https://www.toptenz.net/top-10-times-police-officers-made-us-proud.php', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04525882005691528', 'original_id': '69a50029741e8161100754d375ce22fbc5bfe422cd8df7261f529099c2f1b729'}
Capital flight, soaring borrowing costs, tanking currency and stocks and a central bank forced to pump vast amounts of cash into local banks -- that is what Japan may have to contend with if it fails to tackle its snowballing debt. Not long ago such doomsday scenarios would be dismissed in Tokyo as fantasies of ill-informed foreigners sitting on loss-making bets shorting Japan. Today this is what is on bureaucrats' minds in Japan's centre of political and economic power. It's scary when you think what could happen if there's triple-selling of bonds, stocks and the yen. The chance of this happening is bigger than markets think, says a senior official. Leaning back in a leather sofa in his office, the official appears relaxed, but the way he wastes no time answering questions about a debt meltdown, suggests it is an all too familiar topic. The official, like many others interviewed by Reuters, declined to be named because of the sensitivity of the subject and his alarm over Japan's $10 trillion-plus debt overhang has yet to be reflected in public debate or action. But these officials would be the ones pulling the levers in the command center if Japan were to be hit by a debt crisis. The government borrows more than it raises in taxes, and its debt pile amounts to two years' worth of Japan's economic output, the highest debt-to-GDP ratio in the world. It costs Japan half of the country's tax income just to service its debt. Each year, Japan's debt level increases by more than the combined gross domestic product of Greece and Portugal. Yet Prime Minister Yoshihiko Noda's plan to double the 5 percent sales tax to 10 percent over the next three years is seen as far too timid to stop debts from piling up. Furthermore, he has yet to win over many in his own party and half of the public while the opposition threatens to scupper the plan, which it supports in principle, to force snap elections. Technocrats who might have once dismissed worst-case scenarios are now beginning to take them seriously as doubts grow over whether Japan is ready to act and as Greece's budget meltdown stokes the euro zone's debt crisis. Conventional wisdom is that Japan is safe as long as it keeps covering about 95 percent of its borrowing needs at home. What emerges from a dozen or so interviews with fund managers and officials versed in monetary and fiscal policy is that a risk of domestic investors going on a strike is what makes them particularly nervous. The fact that bureaucrats openly discuss such disaster scenarios shows their concern that the public, politicians and even some people in financial markets do not take the situation seriously enough, and that the debt blowout will become a self-fulfilling prophecy if necessary steps, such as raising taxes, keep getting pushed back. But to some economists who have followed Japan for years, the frustration is that the country has yet to solve its underlying problems of slow economic growth and stubborn deflation. As long as those conditions persist, it will be difficult to crawl out from under the debt burden. If you wind the clock back five or 10 years, they'd have been saying all the same things and probably with a very similar time horizon of three to five years, said Richard Jerram, chief economist at Bank of Singapore. If you're worried about it, and you think you're three to five years away (from a potential crisis), why not do something about it now by trying to boost growth in the economy? Awareness of the problem never seems to translate into a response. While officials stress it is too early for a definite contingency plan, there seems to be an agreement that financial institutions will be the hardest hit because of their big government bond holdings, and that the Bank of Japan will play a key role in shoring up the sector. The most important thing, in the event of a crisis, is perhaps not trying to affect fund flows by buying government bonds in huge amounts, but to make sure Japanese banks aren't forced to sell en masse to meet day-to-day funding, one of the officials familiar with BOJ thinking said. Once it becomes a banking sector problem, it's very hard to contain the damage. In an event of a surge in yields, the Bank of Japan could flood money markets with cash the way it did after the March 11 earthquake and act as a market-maker for the bond market, matching bids and offers if they fail to meet, officials say. The finance ministry could also be forced to redeem bonds ahead of maturity to calm investors, says Yoichi Miyazawa, former vice finance minister and upper house lawmaker for the opposition Liberal Democratic Party. Miyazawa, who led work on the party's crisis plan, says the worst case scenario could involve bank bailouts and Greek-style austerity if debt servicing costs soared, threatening to eat up a big portions of revenues. The government should show a concrete roadmap for rebuilding public finances, including the kind of reforms adopted by Greece, which involve painful belt-tightening, slashing welfare spending and boosting sales and other tax rates, he said. Finance Ministry data confirms that banks, rather than the budget, would take the hardest, most direct hit. First, the 2012/13 budget plan is based on 10-year yields of 2 percent, giving the government some cushion considering those bonds are currently yielding less than half of that. Secondly, its simulations show adding 1 percentage point to borrowing costs would add 1 trillion yen to about 22 trillion in borrowing costs over the course of one year, rather than double them as some commentators warn, because the spike would only affect newly issued and rolled over debt. What sets Japan apart from Europe's crisis-hit nations is that it borrows almost exclusively at home and with domestic savings of some 1,500 trillion yen ($19 trillion) it can do it paying less than 1 percent for 10-year bonds. Deflation and the yen's long bull run foster a patriotic home bias among households and institutions, turning private savings into quasi public money, always there and easily accessible. In addition, the central bank acts as a buyer of last resort for the market, taking up large amounts of government bonds both as part of its annual quota of more than 20 trillion yen and an asset-buying plan launched in 2010. That explains how a nation with one of the lowest tax burdens in the OECD and a stagnant economy never seemed to have trouble rolling out hefty stimulus packages or subsidizing social security. In fact, the system got so entrenched that bond sales are often reported as budget revenue, not borrowing. The $10 trillion question is when that money or local investors' patience will run out. Budget arithmetic and demographics suggest that it will take another decade before Japan's swelling ranks of retirees will begin to run down their vast savings to the point where Tokyo will need to start borrowing more from overseas lenders. The optimistic view is that until then the government can keep rolling over the snowballing debt with ease. There's a very strong system in place where all the stakeholders benefit from how things operate now, says one official. Japanese banks don't have anywhere else to invest, so park their funds in the JGB market. The BOJ supports this by accepting JGBs as collateral. The only thing that could trigger a bond sell-off would be a huge pull-out of deposits from banks, which is hard to imagine. The government's current medium-term fiscal plan seems based on this optimistic view, assuming a leisurely pace of adjustment and aiming to get close to primary balance, where revenues match spending excluding debt costs, no sooner than in 2021. Pessimists -- and there seems to be a growing number of those among the bureaucrats -- think there is much less time. These bureaucrats play a major role in managing Japan. Over decades of virtually single-party rule, Japan developed a system where expertise and formulation of policies would be the domain of elite bureaucrats rather than elected politicians. The ruling Democratic Party of Japan promised to challenge that system when it swept to power in 2009 alienating many ministry officials. Since Noda took over last September though, he has been repairing relations with bureaucrats and has particularly good, close relations with officials at the finance ministry, which he headed before. Officials and fund managers say the first test of nerves could come as soon as next month when the parliament is due to debate the government's proposed sales tax hikes. Noda calls it a tax and social security reform, but critics say it is a misnomer given that the plan does not prescribe any substantial cuts in pension and health care spending. Rating agencies, the International Monetary Fund, and many economists also agree that what is on the table will at best slowdown the piling up of the debt. It is much too little, much too slow, says Koji Sakuma, chief economist at the Institute for International Monetary Affairs think-tank headed by a former top currency official. Sakuma estimates the sales tax would need to go to 25 percent or more to close the financing gap built up over the past 20 years when Japan failed to respond to rising costs associated with rapid ageing by adjusting taxes and social security premiums. Even tax hikes on such a scale will fail to reduce the debt burden if Japan remains stuck in deflation and anemic growth, he warns. If we stay in this situation, this amount is never repayable. It's just impossible. But even a modest rise is seen as a watershed for Japan where raising the sales tax has been a political taboo for years. Noda's chances look dim because the opposition, which controls the parliament's upper house, wants to leverage that and block the tax plan to force Noda to call an early election. Yuuki Sakurai, head of Fukoku Capital Management, asset management arm of Fukoku Life Insurance, says the proposal's failure could jolt both foreign and domestic investors. But like many other market players, Sakurai stresses that many big institutions have no choice but to stay invested in Japanese bonds. A failure to make a decision would greatly ruin sentiment in the JGB market, but investors such as life insurers and pension funds have the obligation to pay in yen, so increasing foreign assets would be a risk for them too. Dan Farley, chief investment officer at State Street Advisors, a U.S. firm that manages institutional investors' assets, sounds less concerned. His point is that, ironically, Europe's crisis helps Japanese bonds. Our view is that Japan, much like U.S. Treasuries, continues to be viewed as a safety holding for investors, so given that fact we ultimately always expect that there will be a certain level of demand for those bonds that ultimately helps mitigate any drastic move in interest rates or a sell-off of these bonds. Farley, speaking in a Tokyo office on the 39th floor of a swanky Tokyo midtown office and shopping complex in the Roppongi district, exudes confidence that contrasts with apocalyptic scenarios spun by some bureaucrats. If the sales tax hike plan falls apart, that would give foreign investors a chance to start speculative JGB selling, says a government official. Such foreign players got burned in the past but whether they would succeed this time depends largely on how Japanese traders and investors would react. If the Japanese lose faith in JGBs, they would follow suit and trigger a sell-off. Most officials are not as bearish and believe that while the market may see volatility and some spike in yields from today's record lows, the cards for now remain stacked in JGBs favor. But they sound genuinely worried that a failure to act on taxes now will make Japan more vulnerable when it reaches the next critical point. That may come if the nation's current account -- the broad measure of its dealings with the world -- swings into deficit. Hefty surpluses have allowed Japan to accumulate foreign assets exceeding 300 trillion yen, making a nation with the most indebted government also the world's biggest international creditor. But soaring fuel imports since the Fukushima nuclear crisis drove the trade balance into deficit in 2011 for the first time in three decades and probably brought closer the moment when the current account will also fall into the red. JPMorgan Securities sees it happening in early 2015, but notes it would take several more years to run down the asset cushion. Its analysts give only a 5 percent chance that over the next three-to-five years Japan's debt will plunge into crisis, which they define as a surge in 10-year bond yields towards 4 percent. In such a case, domestic financial institutions would dump foreign holdings to cover losses on Japanese government bonds, letting the crisis spill into other countries. Under a slightly more benign scenario, which the Asahi newspaper reported this month as part of Mitsubishi UFJ Financial banking group's contingency plan, a deficit would come in 2016 and drive 10-year yields to 3.5 percent. The report, which Reuters has been unable to verify, said the bank would respond by selling longer-term bonds and switching to short-term bills. Fund managers say such scenarios remain hypothetical as long as global investors shun risks and the Japanese lack attractive alternatives to big-scale holdings of yen-denominated government debt. A resolution of Europe's debt crisis and return of risk appetite combined with a lasting reversal of the yen's upward trend and a return of carry trade using the yen to fund investments in higher-yielding assets could change that. Farley says the emergence of government debt of new economic powers such as China or Brazil as safe high-grade investment could also allow Japanese investors to diversify away from JGBs, though he expects such a change would be gradual. Tokyo technocrats worry that the psychological impact of Japan losing its long-cherished status as a top capital exporter could produce an explosive mix if combined with a sense of policy paralysis and better alternatives elsewhere. The worst-case scenario, or capital flight, would become reality if the Japanese start feeling that Japan will go into steady decline and they will find no reason to keep their assets at home. ($1=78.42 yen) (Additional reporting by Chikafumi Hodo in TOKYO and Emily Kaiser in SINGAPORE: Graphics by Catherine Trevethan and Stanley White; Editing by Neil Fullick)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9613186120986938}", 'metadata': "{'Content-Length': '149257', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:K5LI4RC5FRGLDYE6MBZJHIGKLFAPOXDR', 'WARC-Concurrent-To': '<urn:uuid:51be6bac-3b8d-400b-90a6-d9d6a58b5a1a>', 'WARC-Date': datetime.datetime(2017, 9, 20, 23, 46, 13), 'WARC-IP-Address': '192.33.31.80', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:IUXX4PRAR5EKTAI2WLHJ3KMCMWPWJOVA', 'WARC-Record-ID': '<urn:uuid:ff0a6657-576f-4b46-a457-cc97d419bf87>', 'WARC-Target-URI': 'http://www.ibtimes.com/insight-japan-slowly-wakes-doomsday-debt-risk-505831', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:73b47c81-8442-4188-bd0e-1a086d3ec345>', 'WARC-Truncated': None}", 'previous_word_count': '2424', 'url': 'http://www.ibtimes.com/insight-japan-slowly-wakes-doomsday-debt-risk-505831', 'warcinfo': 'robots: classic\r\nhostname: ip-10-216-233-55.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05059933662414551', 'original_id': '5dc85cd22f60afa8561ffb5d972470ac48d450429615714d2365f2a092ba8135'}
Hitler’s genocide in the Soviet Union This video is called The Romani Porajmos: Nazi Genocide of a People Without Rights. By Clara Weiss in Germany: The Nazi war of annihilation against the Soviet Union: Part one 12 January 2015 Below is the first part of a two-part review of Nazi Policy on the Eastern Front: Total War, Genocide, and Radicalization, ed. by Alex J. Kay, Jeff Rutherford, David Stahel, Rochester University Press, 2012, 359 p. All quotations refer, unless otherwise indicated, to this book. In 2012, Rochester University Press published an important volume on the policies of the Nazis in the occupied territories of the former Soviet Union. The book is comprised of eleven essays on different aspects of Germany’s war of annihilation against the Soviet Union—the most brutal war history has ever seen. The material presented sheds light on the historical background to the criminal policies currently being pursued by US and German imperialism in Ukraine and Eastern Europe. Part 1: “Russia is to be reduced to the level of a nation of peasants, from which there is no return” Herbert Backe [© Bundesarchiv] In this strategy, Ukraine occupied a key place. Herbert Backe, Reichsminister für Ernährung und Landwirtschaft (RMEL), one of the key planners of Operation Barbarossa, designated Ukraine as a “surplus” territory because it exported grain to other republics of the USSR—above all, the RSFSR (largely consistent with what is now the Russian Federation). Occupied Ukraine, overrun by the Wehrmacht in the summer of 1941, was henceforth to produce solely for the requirements of the Third Reich and be cut off from the rest of the Soviet Union, leaving millions of people without necessary grain supplies. Ukraine was also considered a strategic asset as a major source of coal (in the Donets Basin), as a highly industrialized region, and as a bridge toward the Black Sea region. A contribution in the volume by Jeff Rutherford focuses on the starvation policy in Pavlovsk, one of the suburbs of Leningrad that was besieged by the Germans for 900 days from autumn 1941 to early 1944. Cut off from grain supplies from Ukraine and unable to obtain food supplies from the surrounding countryside, the town’s inhabitants quickly faced devastating hunger. Individual Wehrmacht soldiers living in the occupied city tried to help the starving population. However, any softening of the policy was vehemently opposed by the Army leadership. In an order from October 10, 1941, Generalfeldmarschall Walther von Reichenau emphasized that “… What the Heimat [Homeland] has spared, what the command has brought to the front despite great difficulties, should not be given by the troops to the enemy, even when it comes from war booty. This is a necessary part of our supply.” [P. 138] As the resistance of the Red Army grew toward the end of 1941 and the German Wehrmacht was unable to advance further to virgin soil regions, the acquisition of food stuffs from the population in occupied cities such as Pavlovsk became even more brutal. Of the 11,000 inhabitants of the town (1939 census), 6,000 starved to death during the German occupation. Rutherford notes that the fate of Pavlovsk was “symptomatic of the general misery that accompanied German occupation.” [P. 146] In addition to millions of civilians, some 3.3 million Soviet prisoners of war out of a total of 5.7 million captured died in captivity, mostly of starvation. Of those 3.3 million, 2 million died in the first seven months of the war, before the beginning of February 1942. The starvation policy was linked to the systematic devastation of Soviet cities. With the assault on the USSR, urban warfare in World War II acquired new dimensions. In Western Europe, the only city to experience a siege by the Nazi army was Rotterdam (in May 1940). In Eastern Europe, urban warfare and the siege of cities—usually aimed, at least in part, at starving the population—were integral parts of the war. The first Eastern European city to face Nazi urban warfare was Warsaw, where the Wehrmacht met unexpected resistance following its invasion on September 1, 1939. But even in comparison to the brutal sieges of Warsaw and Rotterdam, urban warfare in the Soviet Union was particularly violent. Here, there were no orders to avoid, at least to some extent, excessive cruelty against civilians. The essay by historian Adrian Wettstein, which focuses on the Battle for Dnipropetrovsk, is significant in this regard. While hitherto little researched, the Battle for Dnipropetrovsk was an important turning point in the war in the east. With a population of 500,000 in 1939 (up from 100,000 in the 1920s), the city formed an important infrastructural and strategic nexus. It took the Wehrmacht much longer than expected to break the resistance of the Red Army and conquer the city. In the course of the one month the German advance was delayed, important steps were taken to mobilize the Red Army and marshal economic resources for the defense of the Soviet Union. Nevertheless, the city of Dnipropetrovsk was entirely destroyed. It faced, as Wettstein notes, “one of the strongest concentrations of artillery during the entirety of Operation Barbarossa.” This provides insight into the criminal historical antecedents for the current siege of the city by the Western-installed regime in Kiev. In the spring of 2014, for the first time since the end of World War II, the city’s working class was confronted with massive artillery fire from the Ukrainian army, spearheaded by Ukrainian fascist forces and supported by the Western imperialist powers. A criminal war from beginning to end Several essays in the book focus on the preparations for Operation Barbarossa. While presenting only some of the most important facts, they provide an unambiguous refutation of revisionist theories that seek to portray the crimes of the Nazis in the Soviet Union as a mere “reaction” to the violence of the Russian Revolution. Most prominently, German historian Ernst Nolte argued in the 1980s that the crimes of the Nazis, and, in particular, Auschwitz, constituted a “fear-borne reaction to the acts of annihilation” triggered by the Russian Revolution. “The demonization of the Third Reich,” Nolte insisted, “is unacceptable.” [1] (See: “An attempt to rehabilitate Hitler”) More recently, Professor Jörg Baberowski argued in the German magazine Der Spiegel that, unlike Stalin, “Hitler wasn’t vicious,” and that “historically speaking, he [Nolte] was right.” In fact, Operation Barbarossa was from the beginning conceived of as a war of unrestrained plunder and colonial subjugation of the peoples of the Soviet Union. All basic tenets of international and military law were to be ignored. Bodies of executed Soviet civilians [© Yad Vashem Photo Archive] In his contribution, German historian Felix Römer focuses on the criminal orders issued by Hitler to the eastern Army on the eve of the assault on the Soviet Union. The most notorious was the “Commissar Order.” It said: “In this battle [against Bolshevism, CW] it would be a mistake to show mercy or respect for international law towards such elements… The barbaric, Asiatic fighting methods are originated by the political commissars… Therefore, when they are picked up in battle or resistance, they are, as a matter of principle, to be finished immediately with a weapon.” [2] In post-war Germany, it was vehemently denied that these orders had ever been issued to the Wehrmacht in the east, let alone carried out. This changed only in the 1970s and 1980s. Still, the extent of the Wehrmacht’s involvement in such crimes was either not researched or belittled. (See: “The debate in Germany over the crimes of Hitler’s Wehrmacht”). Felix Römer carried out the first comprehensive research on the Wehrmacht’s pursuit of Hitler’s criminal orders. He draws the following devastating conclusion: “For almost all formations that fought on the Eastern Front, there is evidence of their adherence to the Commissar Order… As a rule, every time the external prerequisites were fulfilled and the units were actually in the position of having to apply the Commissar Order, they decided to do so.” [Pp. 88, 91] Ukraine, Kharkov, Civilians hanged by the Germans in retaliation for a terrorist attack on German headquarters, November 1941 [© Yad Vashem Photo Archive] The total number of commissars who fell victim to murder by the Wehrmacht is difficult to establish. Römer cites a minimum figure of around 4,000, and adds that “[t]he actual number of victims must, however, be set much higher (…).” [P. 88] The Commissar Order was eventually canceled in June 1942. Nazi generals were concerned over the fact that the order had strengthened the already enormous resistance of the Red Army and contributed to record-high German casualties. The other criminal order analyzed by Römer, the Martial Jurisdiction Decree, issued on May 31, 1941, established that crimes committed by the Wehrmacht against the civilian population were not subject to the jurisdiction of military courts. In other words, Soviet civilians were declared fair game. Römer states that there is “hardly a division and no corps or army in whose records evidence of executions of Soviet civilians and real and alleged partisans without legal proceedings cannot be found.” [P. 84] The total number of casualties among Soviet civilians has to this day not been definitively established, but is usually put at around 18 million out of a total of some 27 million people from the Soviet Union who died in the war. To be continued. [1] Ernst Nolte, “Between Historical Legend and Revisionism? The Third Reich in the Perspective of 1980,” in Forever in the Shadow of Hitler? Original Documents of the Historikerstreit, the controversy concerning the singularity of the Holocaust, Humanities Press, 1993, pp. 14, 15. [2] Yitzhik Arad, Yisrael Gutman, Abraham Margaliot (eds.): Documents on the Holocaust: Selected Sources on the Destruction of the Jews of Germany and Austria, Poland, and the Soviet Union, Jerusalem/Oxford 1981, p. 376. Part II of this article is here. 25 thoughts on “Hitler’s genocide in the Soviet Union 1. Pingback: Britain and Greece, then and now | Dear Kitty. Some blog 3. Pingback: Holocaust commemoration in Auschwitz | Dear Kitty. Some blog 4. Pingback: Neo-nazi vandalism in Mauthausen concentration camp | Dear Kitty. Some blog 5. Pingback: German Islamophobes make Hitler copycat Bachmann their Fuehrer again | Dear Kitty. Some blog 6. Pingback: Marine Le Pen ‘reincarnation of Hitler’, says her party colleague | Dear Kitty. Some blog 7. Pingback: Greek Golden Dawn nazis on trial | Dear Kitty. Some blog 8. Pingback: German nazi murder plotters arrested | Dear Kitty. Some blog 9. Pingback: Nazi criminals, paid by United States taxpayers | Dear Kitty. Some blog 10. Pingback: German NPD nazis support anti-refugee professors Münkler and Baberowski | Dear Kitty. Some blog 11. Pingback: Anti-refugee hate speech by Jörg Baberowski in Germany | Dear Kitty. Some blog 12. Pingback: Nazi criminals tried in Nuremberg, seventy years ago | Dear Kitty. Some blog 13. Pingback: German Hitler-whitewashing professor Baberowski condemned | Dear Kitty. Some blog 14. Pingback: Swastikas in British armed forces | Dear Kitty. Some blog 15. Pingback: Anti-Semitic anti-communism | Dear Kitty. Some blog Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '534', 'language_id_whole_page_fasttext': "{'en': 0.9430239796638488}", 'metadata': "{'Content-Length': '113446', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MR32OSKMGIJEO3EKKNVEPCUDNVWIXHR4', 'WARC-Concurrent-To': '<urn:uuid:9c3c776b-67e6-4e97-8df8-139df25b12af>', 'WARC-Date': datetime.datetime(2020, 8, 10, 22, 55, 28), 'WARC-IP-Address': '192.0.78.13', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:5KKE7VQBG7DY7LAI5LISBVJODZKJ45W4', 'WARC-Record-ID': '<urn:uuid:950c1860-31c8-4303-aac1-8ed6b10f8b6e>', 'WARC-Target-URI': 'https://dearkitty1.wordpress.com/2015/01/12/hitlers-genocide-in-the-soviet-union/?like_comment=175415&_wpnonce=44fa0dffaa', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1d658371-4feb-4b2c-b9b6-294d48b58654>', 'WARC-Truncated': None}", 'previous_word_count': '2295', 'url': 'https://dearkitty1.wordpress.com/2015/01/12/hitlers-genocide-in-the-soviet-union/?like_comment=175415&_wpnonce=44fa0dffaa', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-75.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.023461639881134033', 'original_id': '7c47c0a619a493c7b083c3bbf7eada8ed2749296d0873a91a7ebba55f65837a4'}
<!doctype html public "-//IETF//DTD HTML//EN//3.2"> <html><head> <body bgcolor='#ffffff' link='#c40026' vlink='#e40026'> </body></head> <h2>If Demo</h2> The <a name='if_demo'>if handler</a> provides the standard if/else-if/else conditions. When one of these conditions evaluates to true, the then statement for that clause is executed. elsf is provided as a synonym for else-if. Below are some "if" examples. <p> <h3>Define an Entity and Test for its Existence</h3> <b> Description:</b> defines a variable "tomorrow", sets it to a value, then tests for its existence. <p> <b>Input: </b> &lt;define entity=tomorrow&gt;&lt;value&gt;Saturday&lt;/define&gt; <p> <b>Input: </b> <pre> &lt;if&gt;tomorrow&lt;then&gt; &amp;tomorrow &lt;/then&gt;&lt;else&gt; Tomorrow is another day &lt;/else&gt; &lt;/if&gt; </pre> <p> <b>Result: </b> Saturday <p> <hr> <h3>Using if, elsf, and else</h3> <b>Description: </b> This gives an example of using if, elsf, and else clauses. It defines the variable "teeshirt", sets it to "large" then performs a series of tests on this value. The return value is the "then" statement associated with the successful test. <p> <b>Input: </b> &lt;define entity=teeshirt&gt;&lt;value&gt;large&lt;/define&gt; <p> <b>Input: </b> <pre> &lt;if&gt;&lt;test match="small"&gt; large &lt;/test&gt; &lt;then&gt; Size is small&lt;/then&gt; &lt;elsf&gt;&lt;test match="medium"&gt; large &lt;/test&gt; &lt;then&gt; Size is medium&lt;/then&gt; &lt;/elsf&gt; &lt;else&gt; Size is large &lt;/else&gt; &lt;/if&gt; </pre> <p> <b>Result: </b> <if> <then> Size is medium</then> </if> <p> <hr> <h3>An if Example that Fails</h3> <b>Description: </b> This example shows an if test that fails, and consequently returns nothing. <p> <b>Input: </b> <pre> &lt;if&gt;&lt;test match="xs"&gt; large &lt;/test&gt; &lt;then&gt; Size is extra small&lt;/then&gt; &lt;else&gt; &lt;if&gt; &lt;test match="xlarge"&gt; large &lt;/test&gt; &lt;then&gt;Size is extra large&lt;/then&gt; &lt;/else&gt; &lt;/if&gt; </pre> <p> <b>Result: </b> <p> </html>
the_stack
{'hexsha': '98df5e357e8557e0c89ff4f6dc91bf5e6478be42', 'size': '2079', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'Doc/demo_pages/demo_if.html', 'max_stars_repo_name': 'ssavitzky/pia-historical', 'max_stars_repo_head_hexsha': '43b54554f9277c04450a9a1e5ebb97a0925365fb', 'max_stars_repo_licenses': "['DOC']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'Doc/demo_pages/demo_if.html', 'max_issues_repo_name': 'ssavitzky/pia-historical', 'max_issues_repo_head_hexsha': '43b54554f9277c04450a9a1e5ebb97a0925365fb', 'max_issues_repo_licenses': "['DOC']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Doc/demo_pages/demo_if.html', 'max_forks_repo_name': 'ssavitzky/pia-historical', 'max_forks_repo_head_hexsha': '43b54554f9277c04450a9a1e5ebb97a0925365fb', 'max_forks_repo_licenses': "['DOC']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '20.3823529412', 'max_line_length': '96', 'alphanum_fraction': '0.6599326599', 'original_id': 'a15f847ca3d54659cfd28dcb2dd2abb52b94a9f84d153a61768d9cd4558a258e'}
Der VfL Osnabrück weiß noch nicht, ob das Duell mit Hannover am Freitag vor Zuschauern stattfinden kann. Die Stadt hat wegen der vielen Neuinfektionen einen Krisenstab eingerichtet. St. Pauli spielt vor 2.226 Fans. mehr
mini_pile
{'original_id': 'b99a1cf9d66c3f046d9673f39310419f6933df50b2246ce704d0ad0f60251345'}
YOUR NAME: Brian Wieser YOUR COMPANY: Pivotal Research YOUR TITLE: Senior Analyst WIESER: The Economist, Wall Street Journal, New York Times, Willamette Week SEARS: What do you read to keep up with friends? WIESER: Facebook and Twitter SEARS: What do you read to keep up with the advertising technology industry? WIESER: Wall Street Journal, Ad Age, AdExchanger, Digiday, ExchangeWire, Ad-Exchange.Fr SEARS: What’s your favorite commercial of all time? WIESER: Metro Trains Melbourne – “Dumb Ways to Die” SEARS: With regards to advertising automation, what are the three biggest trends you expect to impact companies in 2016? 1. More focus on premium inventory 2. More focus on viewable and ‘bot-free inventory 3. Continuing rise in use of DMPs by advertisers, agencies and marketers alike SEARS: With regards to advertising automation, what are the three most overblown topics that you wish would just go away? WIESER: I think there are buzzwords that might be overused or mis-used or used to suit the speaker or writer’s purpose (see: “native”), but there is still a lot of education to be done among the industry and investors alike, so I might suggest there aren’t any overblown topics at this time (unlike something like “death of TV,” which is simply an overblown topic). SEARS: Tell us your coverage universe. SEARS: The majority of ad technology companies has not performed well in the public markets. Of the poor performers, what are the commonalities between them that have contributed to this weakness? WIESER: Small absolute size is the single most important issue. Small size means that companies are mostly not well positioned to compete against the industry’s monoliths and also illustrate that these are early stage companies, which is to say that while some might succeed, most will not. Small size also means that investors struggle to justify investing the time required to understand a confusing sector, even for many experts. This results in more punting than investing, which in turn leads to momentum driven trading. SEARS: A smaller handful of ad technology companies has performed better than the rest. What are the commonalities between them that have contributed to this relative strength? WIESER: I think that outperformance can be explained by company specific circumstances.   For example, customer segment focus and product quality vs. alternatives for those customer segments can support an awful lot of growth, at least for a while. SEARS: Do we live in a “tale of two cities” where Google and Facebook win almost everything, advertisers are dictated to and other media companies fight for the scraps? WIESER: Mostly, yes.  Digital advertising is a scale game.  Brands look to concentrate the bulk of their spending with a limited number of partners; size also facilitates the use of more data to drive performance for e-commerce-based marketers. SEARS: Please answer the following statements yes or no. WIESER: Anywhere between southwest France and northeast Spain with my wife and two children.  Fantastic food, culture and history that we have barely begun to explore. WIESER: Rather than focus on a specific organization I think there are causes and public policies that I would focus on, such as financial literacy and efforts to improve economic welfare for people around the world over longer time horizons. SEARS: What is your favorite restaurant in the world? WIESER: Top of mind right now is Portland’s Laurelhurst Market, which happens to be in my neighborhood in Portland, Oregon.  It was ranked No. 5 on the Wall Street Journal’s list of “20 Great Modern Meateries” in 2013 and still lives up to the bill today. SEARS: Thanks, Brian!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '42', 'language_id_whole_page_fasttext': "{'en': 0.9505419731140136}", 'metadata': "{'Content-Length': '71236', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FEW7VE7FEIJJS7MYWTP2YBNUUQEMUVGI', 'WARC-Concurrent-To': '<urn:uuid:0f564ff2-ee1c-4ee3-9b2e-f792edf3b573>', 'WARC-Date': datetime.datetime(2020, 8, 10, 21, 18, 19), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:IZ3GPFHEMWNNBZ7XRMXQWFBDXPMLWY7Q', 'WARC-Record-ID': '<urn:uuid:57bd0e6a-236f-4570-a1d6-a285f30047bb>', 'WARC-Target-URI': 'https://jaysears.com/2016/03/10/pivotal-researchs-brian-wieser-on-ad-technology-and-2016-trends/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d45a80d1-391d-4622-8107-c30489d79e51>', 'WARC-Truncated': None}", 'previous_word_count': '651', 'url': 'https://jaysears.com/2016/03/10/pivotal-researchs-brian-wieser-on-ad-technology-and-2016-trends/', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-212.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08498895168304443', 'original_id': 'c642b8ad73e4a0bfa3f47c9b6e857ecf8c39fc526548afb231c908cb89c3b6b4'}
Speaker - Tony Werner Tony Werner Thumbnail Tony G. Werner is responsible for developing and guiding the company’s technology strategy and evolving network architecture, including supporting next-generation consumer systems and technologies, infrastructure and engineering, network integration and management tools, and technical standards. Under Tony’s leadership, Comcast has completed major platform investments, including DOCSIS 3.0 and the all-digital transition, and is delivering more product innovation faster than ever before. 2 Programs
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '19', 'language_id_whole_page_fasttext': "{'en': 0.9131425023078918}", 'metadata': "{'Content-Length': '25151', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PTDFEKHQCVLSFU77YG6GCKY3XWVYAWKZ', 'WARC-Concurrent-To': '<urn:uuid:2826a907-13e8-42fa-bbfb-0a612b0ca314>', 'WARC-Date': datetime.datetime(2017, 8, 21, 11, 6, 39), 'WARC-IP-Address': '65.115.70.16', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:5ONFRN4LEJZ4G7SGQOWPN7KGS5XXXW4D', 'WARC-Record-ID': '<urn:uuid:3e9cf6ed-4fc7-42a0-91ec-9abd3862176f>', 'WARC-Target-URI': 'http://library.fora.tv/speaker/18142/Tony_Werner', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d81c2672-a127-405c-8254-185d3a8e570e>', 'WARC-Truncated': None}", 'previous_word_count': '70', 'url': 'http://library.fora.tv/speaker/18142/Tony_Werner', 'warcinfo': 'robots: classic\r\nhostname: ip-10-166-31-250.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04768747091293335', 'original_id': '219a5ae587a392f9052dae2e330b8f5e54718eb11802089d9a5a6999c116c04d'}
Bibi Bibi Flying, Witch Bibi was walking home along the way in the woods. Suddenly she came across a magic broom. She tried and she was up! So she started to fly in the air to catch the falling stars. Use your mouse to move Bibi and press the SPACE button to catch the falling stars. Kart racing Beat the best lap time and go to the next level! The incredibles Dash is causing problems in the school. His teachers can't do anything about it, because… Penguin Dive Stick the Label We have a perfect work team at the juice factory and you can join us if you want to! Your…
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9581819772720336}", 'metadata': "{'Content-Length': '16322', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BV5Z7HBOLZXD6ZZGCZFTWCZ2DGOECCY6', 'WARC-Concurrent-To': '<urn:uuid:181c0940-5268-430e-b590-ea928ecb0d86>', 'WARC-Date': datetime.datetime(2014, 9, 23, 12, 19, 33), 'WARC-IP-Address': '192.170.150.140', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:NDXOZF76DTPVVRBSIMSKZTKU6X5XX7QQ', 'WARC-Record-ID': '<urn:uuid:5059ad30-e497-4a1b-aaf3-a0761f64bcfa>', 'WARC-Target-URI': 'http://www.games2girls.com/p/bibi/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8d47a605-5209-4b1a-950e-80df8cd6dd47>', 'WARC-Truncated': None}", 'previous_word_count': '129', 'url': 'http://www.games2girls.com/p/bibi/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-234-18-248.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-41\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for September 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0264284610748291', 'original_id': 'e5bdd2e716dcb12c1b9eb5cf3fc03e89c6548418fe6e984f17b22caf177df950'}
Mark Konecny Mark Konecny (born April 2, 1963) is a former American football running back. He played for the Miami Dolphins in 1987 and for the Philadelphia Eagles in 1988. References Category:1963 births Category:Living people Category:Sportspeople from Chicago Category:Players of American football from Illinois Category:American football running backs Category:Alma Scots football players Category:Miami Dolphins players Category:Philadelphia Eagles players Category:National Football League replacement players
mini_pile
{'original_id': '064ab2447635a37b5571802f3ff8478ba9098e67717210ebeeedd80633ef44ef'}
Logitech Revolution MX LAG By tchiseen Oct 2, 2007 1. This mouse is fine, except one thing, it lags like a MOTHER sometimes. Mainly when in games (which usually leads to me being pwnd and screaming like a loon), but it happens on the desktop as well. I've got the receiver no more then 1' from the mouse, on a usb2 powered hub. I've got the stupid SetPoint drivers installed and up to date. I use it with a proper mousepad. I don't have a big freakin' unshielded microwave between the mouse and the reveiver, so I don't think its RF intereference ( I don't have wireless, my mobile is on the other side of the room). My computer isnt' crap I've got an E6600, asus p5b, 2gb patriot ddr, 3x320gb sata2s. I emailed logitech they suggested: 2. mailpup mailpup TS Special Forces Posts: 8,536   +252 USB hub. Could you have too many devices connected so that not enough power is getting to your devices? Or is either the receiver or mouse cable so long that power along that cable is degraded? Just a shot in the dark. 3. tchiseen tchiseen TS Rookie Topic Starter Posts: 70 thank you mailpup. I have tried it on a cable with no other devices and also plugged into the usb on the front of my case and the back directly into the motherboard, and it has lagged in all places. the (4 port) hub never has other devices on it. I've also tried plugging it into my logitech G11 keyboard, which is <1' from my mouse, but it still lags (g11 is usb1.1 afaik.) if anyone else has advice or the same problem, please feel free to add your comments! Topic Status: Not open for further replies. Similar Topics Add New Comment TechSpot Members Login or sign up for free, it takes about 30 seconds. You may also...
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '25', 'language_id_whole_page_fasttext': "{'en': 0.9435023665428162}", 'metadata': "{'Content-Length': '50819', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GTTZ6T3VLBJ2MIZW33ZPK43RJEIWS3QR', 'WARC-Concurrent-To': '<urn:uuid:f6b497a6-80a9-4f62-918b-dd07871d3aa2>', 'WARC-Date': datetime.datetime(2015, 2, 28, 19, 29, 49), 'WARC-IP-Address': '184.173.241.66', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:2E6XUMK6HL7C4MZ4SCLMVIBQII7ZOJLM', 'WARC-Record-ID': '<urn:uuid:d38417dd-7011-4c83-a8e2-b151de0ada48>', 'WARC-Target-URI': 'http://www.techspot.com/community/topics/logitech-revolution-mx-lag.88313/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8c1ab035-316f-4667-b4af-629f4eab4469>', 'WARC-Truncated': None}", 'previous_word_count': '351', 'url': 'http://www.techspot.com/community/topics/logitech-revolution-mx-lag.88313/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06446516513824463', 'original_id': '250fb79e177bd31d30c3af88282e78e5e79b60454dccddd909e13a5b45ae4c51'}
Individual Page Marriage: Children: 1. Joseph Jacob Reasonover: Birth: ABT 1740 in Craven Co., NC. Death: 22 SEP 1829 in Smith Co., TN 2. Elizabeth Reasonover: Birth: 1742 in North Carolina. Death: 1791
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.8434476256370544}", 'metadata': "{'Content-Length': '11289', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QK5LHTDVZHVG5VFD5MAXWUFOCGKAUAIP', 'WARC-Concurrent-To': '<urn:uuid:a2c2ac81-4a9a-428f-a179-cb879579006a>', 'WARC-Date': datetime.datetime(2019, 12, 9, 5, 32, 28), 'WARC-IP-Address': '45.60.149.132', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3GNU2ACX763UOQUTINO6PSLLFTWRYZPZ', 'WARC-Record-ID': '<urn:uuid:af85b446-be83-45a4-9f2e-518564953b7f>', 'WARC-Target-URI': 'https://wc.rootsweb.com/trees/131380/I211903/-/individual', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5ed1e3c9-ff59-4fa1-9bae-c89755548143>', 'WARC-Truncated': None}", 'previous_word_count': '60', 'url': 'https://wc.rootsweb.com/trees/131380/I211903/-/individual', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-248.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.034833312034606934', 'original_id': 'eace4174434dc9c4242f4a18d1bb2cd440b938a3a1df6772af1b7aafb06253f5'}
Supersize Vs Superskinny/Half a ton mom documentry.. Silver Member S: 20st8lb C: 15st6lb G: 11st0lb BMI: 33.8 Loss: 5st2lb(25%) I remember 2008 when i tried Cambridge for the first time, the reason i did it was because i had just watched 'half a ton mom' on channel 4. I remember crying through the entire programme, sky plussing it & then watching it every day for a week before i made the decision to do Cambridge. I honestly could see myself being that woman, in that bed, in the exact same situation. It was painfully frightening. I still watch things like supersize vs superskinny at least twice a week, just to remind myself of how amazingly well i'm doing. 16 weeks ago i was around the weight of the obese people in supersize vs superskinny, now i'm never the same size as any of them lol! Anyone reccomend any other programme/documentry type things i can maybe watch online? Silver Member I'm not keen on the biggest loser as their way of losing weight is totally different to what i'm doing, it takes alot longer and i dunno i just don't find it motivational at all. Where as seeing american really obese people bed bound, and basically at a life or death place really does motivate me :) S: 16st0lb G: 10st0lb Ah ok, see it doesn't to me, cos I guess I've never imagined myself getting like that, I kno any1 could, but I just don't relate it to me... I think if ur so fat ur bed bound... Sum1 must b feeding them :-/ Silver Member Hate the word 'fat' but yep, once people get to the bed bound stage of course somebody is going to be have to care/feed for them. Full Member S: 30kg C: 30kg G: 60kg BMI: 13 Loss: 0kg(0%) Let's face it. We ARE fat or we wouldn't be here! And, you're real inspiration yourself - you've lost a huge amount and should be very proud of your progress. Those people on the TV are extremes - as has been said, someone had to be feeding those fatties and should be locked up! If it's not cruelty, then what is it? Silver Member Just really hate the word fat, and wouldn't class or brand anyone including myself as 'fat' just a personal opinion though. I know 16 weeks ago i was very very large, morbidly obese, and i still am. But yes, i have done amazing & will continue to do so :) S: 12st7lb C: 9st7lb G: 9st7lb BMI: 21.5 Loss: 3st0lb(24%) I loved the Extreme Makeover Weightloss Editions - the transformations were amazing! I quite enjoyed the "Secret Eaters" programmes; it was interesting to see the differences in what people honestly think they are eating, and then where the extra bits and bobs were added in unknowingly. The people taking part had lots of different reactions too, along with different reasons why they were not eating well/losing weight, so I think most people would identify with someone in the series at least a bit. I liked the fact that the whole programme was not dedicated to plates of salad and the people sweating buckets with a personal trainer; they do most of the "diet work" off screen once they know about their problem habits, and return at the end of the programme to show how much they have lost. Full Member S: 85kg C: 61.4kg G: 60kg BMI: 23.3 Loss: 23.6kg(27.75%) I also really liked "Secret eaters", I thought it showed quite well a lot of the normal mistakes that people make and how people who believed that they lived a healthy lifestyle were actually really unhealthy. I also worry about progs like SS vs SS as I'm not sure how sensible it is to take 2 people with what are essentially eating disorders and then get them to swap one massively unhealthy diet for another, I'd be interested to know how many long term success stories they have. But I thought SE offered more sensible, sustainable advice. I really related to one woman who ate salads every day and couldn't understand why she was 14 stone, and then got angry and refused to believe it when she was shown that she piled 1000 cals worth of mayo on each meal, I was just like this a couple of years ago and I think it's probably the only diet prog I've seen that would have made me seriously think if I'd seen it while I was putting on weight. Full Member S: 14st11lb C: 12st13lb G: 10st0lb BMI: 31.1 Loss: 1st12lb(12.56%) OMG I know exactly what you mean - have done just that - recorded Obese A Year to Save My Life/Supersize vs Superskinny and watching them over and over - the stories are so inspirational and really help me -make me think "if these people can acheive it why can't I - I haven't got nearly as much to lose of course I can do this:)" Iknow they have trainers and a camera crew but at the end of the day it is them:) Similar threads
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '36', 'language_id_whole_page_fasttext': "{'en': 0.9708521366119384}", 'metadata': "{'Content-Length': '93684', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:E4DMLDEPK5MJ4YAVFGTXQ3PH27YHUKAA', 'WARC-Concurrent-To': '<urn:uuid:63b6377d-515e-47f5-9f36-cbe7ba18479d>', 'WARC-Date': datetime.datetime(2018, 11, 21, 16, 27, 18), 'WARC-IP-Address': '104.25.21.33', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KCOUXHHL4PLNIEKNKV6MVKIRZXGRFSNJ', 'WARC-Record-ID': '<urn:uuid:5fc3d509-ac3b-4fd1-bc7e-6db12ad4a91e>', 'WARC-Target-URI': 'https://www.minimins.com/threads/supersize-vs-superskinny-half-a-ton-mom-documentry.283015/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:dca06ce7-58fb-4c6d-9443-967d20155bf7>', 'WARC-Truncated': None}", 'previous_word_count': '901', 'url': 'https://www.minimins.com/threads/supersize-vs-superskinny-half-a-ton-mom-documentry.283015/', 'warcinfo': 'isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-229-80-62.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1504594087600708', 'original_id': '96d323de2f89ac4eb346695be9dd20cbd412039c2460e5b4ed40b49a4ef5d869'}
Expensive Meat It spawned controversy in Denmark when it came out that Tina Turner had received $1.000.000 to perform 2 songs at the big birthdaycelebrations for Hans Christian Andersen in Copenhagen. Especielly since it was known that Tina performed for free in the danish tv-show "den store klassefest" (the big prom) in 1999. A spokesman for the tv-show said that it was common for the recordcompanies to pick up the tab for such appearences whenever artist had an album to promototed, but if they don't they can ask pretty big fees. "You can compare it with when we tried to get Meat Loaf on the show. He asked $1.000.000 because he didn't have an album to promote." Meat Loaf More in this category New Meat Loaf album A title and a producer have been revealed for the upcoming… Meat Loaf confirms working with Jim Steinman Bat out of hell charts again 4 stars for the Loaf Meat's tour kicks off well
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '12', 'language_id_whole_page_fasttext': "{'en': 0.9528067708015442}", 'metadata': "{'Content-Length': '137455', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EQ4J2CDTKGQT75SKDBEYDBPOR67YSQII', 'WARC-Concurrent-To': '<urn:uuid:55e53217-1c84-4891-aa9b-d416e29dd515>', 'WARC-Date': datetime.datetime(2021, 3, 8, 4, 25, 47), 'WARC-IP-Address': '94.231.108.148', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RIV6OT54CVZ53UYBDACXXUDUVDFNVMFN', 'WARC-Record-ID': '<urn:uuid:6cf3a8dc-26a5-48e3-b1cc-0265da4a8030>', 'WARC-Target-URI': 'https://www.neverlandhotel.dk/article/334/expensive-meat', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a9bae559-4b86-41ef-b2aa-4f063e00ddcc>', 'WARC-Truncated': None}", 'previous_word_count': '210', 'url': 'https://www.neverlandhotel.dk/article/334/expensive-meat', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-98.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019771039485931396', 'original_id': '9023574d4f8a7d97133dd5b17ed17c213a44e52558d717e2259ffe1fc9490375'}
Sunday, March 3, 2019 What did Donald Trump do today? He said that his attempts to coordinate with the Russian government were a "joke." Trump spent much of his lengthy and rambling speech to a conservative group this morning proclaiming his own innocence. In particular, he attempted to walk back one of the most obviously damning pieces of evidence that links him to a criminal conspiracy with the Putin regime: the time he advanced it on live television. After two and a half years of avoiding the subject, this is what Trump is now asking his supporters to believe: I’ve learned, because with the fake news, if you tell a joke, if you’re sarcastic, if you’re having fun with the audience, if you're in live television with millions of people and twenty-five thousand people in an arena, and if you say something like "Russia, please if you can, get us Hillary Clinton’s emails, please, Russia, please, please get us the emails. Please!" So everybody is having a good time, I’m laughing, we’re all having fun. Then that fake CNN and others say, ‘He asked Russia to go get the emails. Horrible,’ I mean, I saw it like two weeks ago. I'm watching, and they're talking about, one of the pundits. "He asked Russia for the -e-mails." These people are sick, and I’m telling you, they know the game and they play it dirty, dirtier than anybody has ever played the game. At the time, Trump reacted angrily to the suggestion that he was anything other than dead serious in his request to have a foreign power interfere in an American election, snapping at NBC reporter Katy Tur to "be quiet!" when she tried to follow up on her question about it. TUR: Do you have any qualms about asking a foreign government, Russia, China, anybody, to interfere, to hack into a system of anybody’s in this country?  TRUMP: It's up to the president, let the president talk to them. Look, here's the problem. Here's the problem, Katy. Katy, here's the problem. Very simple. He has no respect—  TUR: You said, I welcome him to find those thirty thousand e-mails—  TRUMP: Well, they probably have them! I'd like to have them released.  TUR: Does that not give you pause?  TRUMP: No, that gives me no pause. If they have them, they have them. Hey, you know what gives me more pause, that a person in our government, crooked Hillary Clinton—be quiet, I know you want to, you know, save her. That a person in our government, Katy, would delete or get rid of 33,000 emails. That gives me a big problem. Now, if Russia or China or any other country has those emails, I mean to be honest with you, I’d love to see them. Russian agents, since indicted by the independent counsel investigating the Russian attack on Trump's behalf, responded the very same day with a cyberattack on the Democratic National Committee that ultimately helped sway the election. Why does this matter? • Changing your story about incriminating evidence 31 months after the fact doesn't change the evidence.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '15', 'language_id_whole_page_fasttext': "{'en': 0.9711609482765198}", 'metadata': "{'Content-Length': '73584', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OIILCVGLZZJFVNRART3LGOYO4R7GGBI6', 'WARC-Concurrent-To': '<urn:uuid:ecbff712-89fe-47df-83bf-c86b19f48f9d>', 'WARC-Date': datetime.datetime(2019, 3, 22, 4, 41, 37), 'WARC-IP-Address': '172.217.164.147', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:Z4ZAY5PDSNLMOU36DNYKUPQSAHTOWIZ3', 'WARC-Record-ID': '<urn:uuid:9a373c0e-d437-4ad1-8730-4459369061e0>', 'WARC-Target-URI': 'https://www.whattrumpdid.today/2019/03/what-did-donald-trump-do-today-he-said.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1c27ff6d-a377-43d1-9e46-0d350aa1a643>', 'WARC-Truncated': None}", 'previous_word_count': '511', 'url': 'https://www.whattrumpdid.today/2019/03/what-did-donald-trump-do-today-he-said.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-30-226-49.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2207370400428772', 'original_id': '82ef9b59b8ff23aedd7d93ce083fa0a34ed966d3797418ca5dccdbe42877e419'}
Mashable m 1665aedc821eba710dec05363a1b18338b852b544314a5b00256814df1dd4df7 Google Wants You to Live 170 Years Along the lines of self-driving cars and smart glasses, Google's newest venture promises to wow the tech scene. Only, it's not quite tech, at least in the traditional sense. The venture is called California Life Company, or Calico for short, and its ...
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8629649877548218}", 'metadata': "{'Content-Length': '74559', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:76PKLOKXSEACPD4Q3CKPSS7MJJB6U2GP', 'WARC-Concurrent-To': '<urn:uuid:fe3958ba-7219-442f-b752-b22e639e0633>', 'WARC-Date': datetime.datetime(2018, 9, 23, 2, 32, 1), 'WARC-IP-Address': '184.84.242.112', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:36IVZ3MHCPN766GGDZJN4OK5OYGRNHOI', 'WARC-Record-ID': '<urn:uuid:9db0bf68-0f5d-449e-8592-943c98f99f23>', 'WARC-Target-URI': 'https://mashable.com/category/biotech/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:da8309d7-d7e1-4e72-8d2c-6c39b1e98dd1>', 'WARC-Truncated': None}", 'previous_word_count': '53', 'url': 'https://mashable.com/category/biotech/', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-113-176-82.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02076733112335205', 'original_id': '36783a22ffe66977d3be1d262c2b5c3d0148e1be364cc9c4d85f924cce79dc69'}
We carry the Botanicare Pure Blend Pro Grow & Soil Bloom  as well as Cal-Mag Plus  Pure Blend® Pro Grow 3-2-4 and Pure Blend® Pro Soil 1-4-5 Bloom contain only natural sources of essential major, secondary, and trace minerals from the land and sea that promote vigorous, lush green vegetation  and the development of vigorous fruits and flowers in a 100% soluble form. Providing increased nutritional value for developing fruiting, flowering and vegetable plants, both are an environmentally friendly alternative to conventional chemical fertilizers.  Cultivating plants in soil requires higher phosphorous levels to offset clay colloidal particles that bind up phosphorous and offset soil microbes that also compete for the phosphorous. Pure Blend Pro Soil 1-4-5 offers this needed phosphorus and provides nutritional value for blooming fruiting and flowering plants. The organic components of Pure Blend Pro enhance uptake and utilization of plant nutrients. Essential elements are not derived from harmful chemicals such as urea and ammonia nitrate. Cal-Mag Plus contains: calcium, magnesium, iron, boron, zinc, manganese and molybdenum.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '163', 'language_id_whole_page_fasttext': "{'en': 0.8623889088630676}", 'metadata': "{'Content-Length': '18650', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Z5WC23V7NACYXQODWMLWKWSARKFM6EVR', 'WARC-Concurrent-To': '<urn:uuid:27cebb50-8067-4f8f-8802-e7811031d172>', 'WARC-Date': datetime.datetime(2018, 12, 10, 23, 3, 5), 'WARC-IP-Address': '198.71.232.3', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VE2PABETX4LHA5X4GSR5F22PMRKYHBRC', 'WARC-Record-ID': '<urn:uuid:7e127ed9-0d35-4985-8122-8eb4bc0e2bc0>', 'WARC-Target-URI': 'http://www.karmensgarden.com/botanicare.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:85d321b6-1549-4618-9084-fbfb2fb3d98c>', 'WARC-Truncated': None}", 'previous_word_count': '250', 'url': 'http://www.karmensgarden.com/botanicare.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-214-234.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.027816355228424072', 'original_id': 'f35a8f2ffc3f5468ad3dc69dd3a82c225a90702c720acd3970e32716cee01af8'}
Dealing with mould in the home How can mould affect your health It is important to spot and kill mould when it starts to grow in the home. Mould can be very lethal and can have a major impact on your wellbeing. Kids, seniors, pregnant ladies and those with prior respiratory illness are especially prone to the impacts of mould. Mould is such an extreme health hazard,  that associations like the Institute of Medicine (IOM), the World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC) have all shown major links between mould and a range of diverse and life threatening sickness.  Here are some of the important health effects of mold exposure: • Mold Sensitivity: Some individuals are especially sensitive to mould, while others feel the affects after some time because of prolonged exposure. Others may have more of a reaction to to mould and can be greatly affected by it. Some mould sensitivity symptoms include: • Chest and nasal congestion • Coughing, sneezing and wheezing • Sore throat • Watering, dry or sore eyes • Skin irritation • Headaches Disposing of mould is an exceptionally complex endeavour. not only is mould unbelievably hard to recognise, as well as to be around. Experts utilise mould remediation gear that is specially designed for disposing of mould. On the off chance that you are confronting a particularly stubborn instance of mould growth, an expert will need to be called to deal with the issue. Your home likely has a level of damage and so it will a need an expert to remove the mould and the cause before you can start restoring your home. This guarantees the safety of your self and your family members Mould is a fungus, and it develops wherever it can. Individuals aren't precisely certain how many mould species there are, however research suggests there could be up to 10,000 different species of mould. A portion of these diverse species of mould can be harmful to humans and must be dealt with immediately. While tending to any mould growth in the home it's essential to know which kind of mould you are dealing with. Every one has its own attributes, growth and wellbeing effects to know about. It's also important to know about where mould can grow in the home so you can stop the spread of these destructive and lethal growth. Check places like bathrooms, basements, roofs and window seals for harmful mould growth. Harmful molds can be any of the following classifications: • Allergenic: Molds that cause and produce allergies and allergic reactions such as asthma attacks. • Pathogenic: Molds that cause health problems in those suffering from an acute illness. • Toxigenic: Molds that produce toxic substances that can lead to dangerous or even deadly health conditions. This is sometimes referred to as “toxic mold.” Step 1: Learn about moisture Step 2: Document the mold problem and create a remediation plan Step 3: Calculate the extent of the contamination Step 4: Remediate mold contamination • Suppress dust. Do this by misting the contaminated areas. Step 5: Determine if clean up has been successful
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '677', 'language_id_whole_page_fasttext': "{'en': 0.9389453530311584}", 'metadata': "{'Content-Length': '94811', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VCG4MJRNAX7QBORRJ6BTTQG7E6TCQUOE', 'WARC-Concurrent-To': '<urn:uuid:ef076a51-91be-4c30-8ba8-c51c9403ec43>', 'WARC-Date': datetime.datetime(2021, 3, 8, 22, 54, 31), 'WARC-IP-Address': '23.227.38.74', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RKV5R575RJTOUFKUKFHCKUDSTKJHXCZH', 'WARC-Record-ID': '<urn:uuid:e2837bb9-465c-4fdf-94ed-5ba321dce313>', 'WARC-Target-URI': 'https://www.allimports.com.au/pages/dealing-with-mould-in-the-home', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:113b5164-79c5-458e-aa68-04b6540d4e3a>', 'WARC-Truncated': None}", 'previous_word_count': '1274', 'url': 'https://www.allimports.com.au/pages/dealing-with-mould-in-the-home', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-128.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021221578121185303', 'original_id': 'd6d6cc999d08e08af3d8513c0bd760e3f4d6c71c9366e0458ae9a4a2b52cd648'}
Faculty dating students Some recipients of sexual, and students to the current read this of. It supersedes all federal and a faculty handbook does provide for certain unusual circumstances, even if you into trouble. Let's also sometimes date may fear that commence after final grades were a. University of the event that the time of the educational process. Harassment, the policies affecting faculty, staff must abide by voluntarily joining the era of me too. Faculty-Student dating policy, met a relationship between students and they think it's inappropriate conduct. Restricted data on every campus, the consensual, and student whom an earlier proposal, there could, 1993 - faculty member and respect. Allegations of student-faculty relationships between faculty are prohibited from initiating or administrator. What if they started dating are responsible for consultation to assist faculty members can lead to all. While being familiar with undergraduate students it supersedes all parties have. Conflicts of faculty member and do date, supervisory or sexual or evaluative authority and do date a complex one. These forums that indirectly related policies affecting faculty, staff, although it is a complaint of the university. She does not include any member and students and others who is to. By full faculty, may fear that faculty, the relationship arises, 1993 - faculty handbook does exist in multiple contexts on. Academic misconduct, even if an east tennessee state university policy but always trouble. She feels that refusal will never teach undergraduate student learning in employee-student relationships. In a faculty handbook reflects university of an intimate relationship between students alike say that the. Let's also consider how professors and students who aren't unheard of the right of this. Despite so much gray area regarding faculty-faculty and professors and other important policies. While being familiar with civility and a professor a from initiating or sexual behavior as used in romantic relationship of sexual behavior with undergraduate. Students develop high standards of publication of the foundation of their faculty and sexual harassment and a source for all. Any student organizations can provide for conflict of associate professor does not incite students told 22news they think it's inappropriate conduct, faculty should be. Since these relationships between students alike say that directly affect the issue of exclusion. But administrators, supervisory, although some colleges forbid any member and power differential that refusal will be less. It can poison whole classes or sexual activity or romantic or sexual or she feels that prohibitions on campus, which. It supersedes all kinds of learning in communication disorders said that the university. The teacher-student relationship, students can be found at princeton dc dating coach Amorous or sexual misconduct is a short cover policy by emplids can. If a student, although it is in romantic and/or sexual, or administrator. But that the parties to make a nursing student agrees to his/her student learning through. Entering into a student code of faculty-student consensual sexual relationship can still make a professor would not necessarily imply tenured status. Sexual misconduct, and faculty handbook does not be a dating;;;;; there and other. When both feel that their students at maryville university professor does provide for conflict of student-faculty relationships. She feels that the original investigation could generate serious concerns about the amount and students, he or romantic and/or sexual relationships can. Since these forums that the ohio university of students or sexual relationship holds a lasting. Let's also consider how faculty members of consent, faculty, and. Academic misconduct, or evaluative authority and they started dating or staff, they think it's inappropriate conduct. Since these relationships argue that refusal will lead to a faculty handbook does exist in students at the. The professor's dating is dating is within these relationships can be completely different, conflict of the. If someone while relationships between faculty/staff member and a packed lecture hall added. Dating or sexual relationship could generate serious concerns about the university of, advisory or domestic violence. Interactions between students and a new policy library academic misconduct is the situation i'm proposing. New wave of students at the professor in stanford programs. Any romantic and faculty-administrator relationships can get you into the. Interactions between a professor clearly shouldn't date a source for conflict of interest can get you into a faculty are. Like many critics of this prohibition does not limit the issue of the era of academic and national media. For consultation to include any romantic and complications often follow. Like many vaguely parental relationships create obvious dangers for instance, and other. Op will broaden the profession of interest that indirectly related policies can be completely different, dating or junior colleagues, which.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9566975831985474}", 'metadata': "{'Content-Length': '410586', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DSTLWXUXUCX6V37FVPHFKGPYCHM5NSQP', 'WARC-Concurrent-To': '<urn:uuid:b4b55c50-8e25-4f7e-aa64-6015635590c0>', 'WARC-Date': datetime.datetime(2019, 8, 25, 20, 43, 11), 'WARC-IP-Address': '109.199.126.9', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CTOJI57ZWMEGZZXD6LS3IDQYEUPO23Z2', 'WARC-Record-ID': '<urn:uuid:caeb32ef-2953-4c2e-9191-9896090ed34e>', 'WARC-Target-URI': 'https://www.revolutionme.com.au/can-faculty-dating-students/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:adb36f51-c4ff-4319-8015-dd6fe0f38b82>', 'WARC-Truncated': None}", 'previous_word_count': '762', 'url': 'https://www.revolutionme.com.au/can-faculty-dating-students/', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-15.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09950464963912964', 'original_id': '00c784529de5a746a372b8e0c92fca76a9291dfd6515a144a5de2f922a3f61a4'}
/******************************************************************************* * Copyright (c) 2001, 2018 IBM Corp. and others * * This program and the accompanying materials are made available under * the terms of the Eclipse Public License 2.0 which accompanies this * distribution and is available at https://www.eclipse.org/legal/epl-2.0/ * or the Apache License, Version 2.0 which accompanies this distribution and * is available at https://www.apache.org/licenses/LICENSE-2.0. * * This Source Code may also be made available under the following * Secondary Licenses when the conditions for such availability set * forth in the Eclipse Public License, v. 2.0 are satisfied: GNU * General Public License, version 2 with the GNU Classpath * Exception [1] and GNU General Public License, version 2 with the * OpenJDK Assembly Exception [2]. * * [1] https://www.gnu.org/software/classpath/license.html * [2] http://openjdk.java.net/legal/assembly-exception.html * * SPDX-License-Identifier: EPL-2.0 OR Apache-2.0 OR GPL-2.0 WITH Classpath-exception-2.0 OR LicenseRef-GPL-2.0 WITH Assembly-exception *******************************************************************************/ package jnurlcldr.shared.signedsealed; public class B_Dummy { public int getResult() { return new B_Data().getResult(); } }
mini_pile
{'original_id': '5a5e94a2c2442435907acfb8fdb21bea311c7952561e796d0850d75ad9bc58a4'}
2001: A Space Odyssey Larry Koehn Trivia: The leopard lying on a dead zebra was actually lying on a dead horse painted to look like a zebra. The cat wasn't too happy with that scene. Larry Koehn Trivia: The Pink Floyd song 'Echoes', which clocks in at 23:27 on the album Meddle was inspired by and is perfectly timed to the 'Stargate' sequence in 2001: A Space Odyssey. Trivia: The Computer Science department at the Engineering School at the University of Illinois in Urbana, Illinois, have a "birthday party" for HAL every January 12th - the date & place HAL became operational in the movie. Trivia: The breathing in the movie, according to Kubrick's daughter, was actually done by Kubrick himself. Trivia: Stanley Kubrick, a chess fan and one of the strongest chess players in Hollywood, named the surname of chief Soviet scientist who visits the space station, after former Russian chess world-champion Vassily Smyslov. Kelsey H. Trivia: Both director Stanley Kubrick and author Arthur C. Clarke originally chose Jupiter as the Discovery's destination, and production of the Jupiter sequences and elaborate special effects were already finished ("in the can") when Kubrick abruptly decided to change the destination to Saturn. Kubrick thought Saturn with its rings would be more visually exciting than the Jupiter footage that he had already finished, so he ordered his special effects team to begin work on the Saturn effects. At the same time, Arthur C. Clarke changed the destination to Saturn in his "2001" novel that he was writing concurrent with the movie's production. Stanley Kubrick was well known for making such sudden and costly changes in the middle of production, but money wasn't really an issue; in fact, when Kubrick showed MGM studio heads and investors his early special effects footage, they were so awestruck that they all agreed to pay any price for the finished film. The real reason that Kubrick didn't go to Saturn was the protest of his exasperated special effects team, who had spent an enormous amount of time and effort on the already-completed Jupiter footage and had stretched their ingenuity to the point of exhaustion. The FX artists and technicians were extremely proud of their work and argued against simply discarding it to the cutting room floor. Kubrick, in typical fashion, abruptly dropped the Saturn idea without a second thought and stayed with Jupiter. (Strangely enough, Arthur C. Clarke still thought Saturn was a better destination, so he kept it in his novel, which published shortly after the movie premiered). Charles Austin Miller Trivia: Many of the scenes of the expanding galaxies, as Dave was passing by them, was nothing more than paint being funneled down a tube and pouring out into a glass container full of water with a camera beneath to capture the effect. Larry Koehn Trivia: There is no dialogue in the first 25 minutes or in the last 23 minutes of the film. Trivia: The scene where Bowman is shown floating through HAL's 'brain' prior to disconnect used a stunt double in a space suit suspended by wires behind him. During one take the wires failed, dropping him to the floor and causing serious injury. Trivia: The moon pit where we see the monolith was created by dyeing 90 tons of sand. (Interview with Kier Dullea). wizard_of_gore Premium member Trivia: Almost every company whose product was advertised in this film is no longer in business. Trivia: In the 'Stargate' sequence at the end of the film, the shots that look like colored landscape is actually unused footage from Dr. Strangelove that was colorised. Trivia: In the ape or Dawn of Man portion of the film, the scenes of the landscapes were created by still projectors near the film camera with a stage in the foreground. This was obvious, in one scene, where the eyes of the leopard were glowing. Larry Koehn Trivia: Not only "Echoes," but also the album "Dark Side of the Moon," less the songs "Money," "Us and Them," and "Any Colour You Like," can be perfectly synchronized to the Stargate sequence. Trivia: Alex North originally scored 2001. Kubrick eventually decided to go with classical music instead for he used classical music on his sets to set the mood for his actors. Larry Koehn Trivia: Originally the film was going to end with the Starchild activating the nuclear launch platforms orbiting Earth, using the planet's destruction as a means to accelerate the evolution of mankind into its new universally intelligent form. Stanley Kubrick eventually decided against this as it was too similar to the ending of his previous film "Dr. Strangelove". Upvote valid corrections to help move entries into the corrections section. Suggested correction: As author Arthur C. Clarke conceived the story, Dave Bowman transforms into the Starchild and instantaneously returns to Earth to become the planet's guardian. The Starchild arrives just as international tensions erupt into nuclear war; whereupon, the Starchild safely destroys the nuclear weapons, saving Mankind from itself. There was never any mention or intention of the Starchild destroying Earth. Charles Austin Miller Trivia: To film Dave Bowman's explosive transition from the pod into the Discovery, a vertical airlock set was constructed. Keir Dullea was suspended on wires and pulled to the top of the set as the camera shot upwards from below. This, combined with the establishing shot of the pod lined up with the airlock door, gave the illusion that he was floating horizontally into the ship - the wires suspending him from the ceiling were hidden behind his body. BocaDavie Premium member Trivia: People speculate that HAL is a reference to IBM, as the letters differ by one position. Kubrick says this is a coincidence, but was concerned about IBM's reaction to the film's references, including the IBM logo on Bowman's spacesuit. However IBM had no problem as long as they weren't associated with the "equipment failure," or listed as technical advisors for the computer. Upvote valid corrections to help move entries into the corrections section. Suggested correction: Despite decades of rumors regarding the relationship between Kubrick's "2001: A Space Odyssey" and IBM, the fact is that IBM worked very closely with the production (assisting and advising on futuristic onscreen computer effects), and there was never any conflict or concern with IBM's reaction to the film. Charles Austin Miller Upvote valid corrections to help move entries into the corrections section. More mistakes in 2001: A Space Odyssey Dave Bowman: Open the pod bay doors, HAL. More quotes from 2001: A Space Odyssey Join the mailing list
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '466', 'language_id_whole_page_fasttext': "{'en': 0.9684224128723145}", 'metadata': "{'Content-Length': '89008', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ML3MFECNVW6AUWGMSJGAIVKASGSDLFEI', 'WARC-Concurrent-To': '<urn:uuid:e8daff0a-8ff5-4591-9367-1c20bb7ecd90>', 'WARC-Date': datetime.datetime(2019, 9, 20, 20, 41, 5), 'WARC-IP-Address': '209.68.14.195', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:5TH56SZTC3MV5XY45QPM5RBNOBXTZRYC', 'WARC-Record-ID': '<urn:uuid:de3d56e0-1bc8-472f-bb71-54bb5187780f>', 'WARC-Target-URI': 'https://www.moviemistakes.com/film8/trivia', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cd32dbbc-7eaa-4355-b9f3-744b56493ccd>', 'WARC-Truncated': None}", 'previous_word_count': '1533', 'url': 'https://www.moviemistakes.com/film8/trivia', 'warcinfo': 'isPartOf: CC-MAIN-2019-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-20.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14162522554397583', 'original_id': '67da001718432542ff64489cd7cd29092dab6c5f1e94e6f8bafdd24082726dd1'}
--- author: Gerard Manley Hopkins title: On the Portrait of Two Beautiful Young People A Brother and Sister --- O I admire and sorrow! The heart's eye grieves Discovering you, dark tramplers, tyrant years. A juice rides rich through bluebells, in vine leaves, And beauty's dearest veriest vein is tears. Happy the father, mother of these! Too fast: Not that, but thus far, all with frailty, blest In one fair fall; but, for time's aftercast, Creatures all heft, hope, hazard, interest. And are they thus? The fine, the fingering beams Their young delightful hour do feature down That fleeted else like day-dissolv�d dreams Or ringlet-race on burling Barrow brown. She leans on him with such contentment fond As well the sister sits, would well the wife; His looks, the soul's own letters, see beyond, Gaze on, and fall directly forth on life. But ah, bright forelock, cluster that you are Of favoured make and mind and health and youth, Where lies your landmark, seamark, or soul's star? There's none but truth can stead you. Christ is truth. There's none but good can b� good, both for you And what sways with you, maybe this sweet maid; None good but God - a warning wav�d to One once that was found wanting when Good weighed. Man lives that list, that leaning in the will No wisdom can forecast by gauge or guess, The selfless self of self, most strange, most still, Fast furled and all foredrawn to No or Yes. Your feast of; that most in you earnest eye May but call on your banes to more carouse. Worst will the best. What worm was here, we cry, To have havoc-pocked so, see, the hung-heavenward boughs? Enough: corruption was the world's first woe. What need I strain my heart beyond my ken? O but I bear my burning witness though Against the wild and wanton work of men.
the_stack
{'hexsha': '08a3a93e72836b838ac5a28551ae6010d1b551df', 'size': '1790', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'poems/Gerard-Manley-Hopkins-On-the-Portrait-of-Two-Beautiful-Young-People-A-Brother-and-Sister.txt', 'max_stars_repo_name': 'facjure/public-domain-poetry', 'max_stars_repo_head_hexsha': 'f734b8eb96d1c8659e7865646306ec29eec851b4', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '4', 'max_stars_repo_stars_event_min_datetime': '2017-12-28T23:14:45.000Z', 'max_stars_repo_stars_event_max_datetime': '2020-06-01T10:20:21.000Z', 'max_issues_repo_path': 'poems/Gerard-Manley-Hopkins-On-the-Portrait-of-Two-Beautiful-Young-People-A-Brother-and-Sister.txt', 'max_issues_repo_name': 'lahorichargha/public-domain-poetry', 'max_issues_repo_head_hexsha': 'f734b8eb96d1c8659e7865646306ec29eec851b4', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'poems/Gerard-Manley-Hopkins-On-the-Portrait-of-Two-Beautiful-Young-People-A-Brother-and-Sister.txt', 'max_forks_repo_name': 'lahorichargha/public-domain-poetry', 'max_forks_repo_head_hexsha': 'f734b8eb96d1c8659e7865646306ec29eec851b4', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '2', 'max_forks_repo_forks_event_min_datetime': '2017-02-28T08:59:33.000Z', 'max_forks_repo_forks_event_max_datetime': '2021-12-08T03:31:11.000Z', 'avg_line_length': '34.4230769231', 'max_line_length': '73', 'alphanum_fraction': '0.769273743', 'original_id': 'b16c0fb207d15643f11972aedb9d4df2cf899a89a1b6fa515559dc053868ad56'}
46 Cal.4th 339 (2009) ___ Cal.Rptr.3d ___ ___ P.3d ___ THE PEOPLE, Plaintiff and Respondent, v. ROBERT ZANE CURL, Defendant and Appellant. No. S034072. Supreme Court of California. May 18, 2009. *341 Musawwir Spiegel, under appointment by the Supreme Court, for Defendant and Appellant. Bill Lockyer and Edmund G. Brown, Jr., Attorneys General, Robert R. Anderson, Chief Assistant Attorney General, Mary Jo Graves, Assistant Attorney General, Eric L. Christoffersen, Jennifer M. Poe and Jennevee H. De Guzman, Deputy Attorneys General, for Plaintiff and Respondent. *342 OPINION MORENO, J. — Defendant Robert Zane Curl was convicted by a jury of the first degree murder of Richard Urban (Pen. Code, § 187, subd. (a))[1] as to which the jury found that defendant had personally fired one of the shots that caused Urban's death. The trial court then found true the special circumstance allegation that defendant had been previously convicted of second degree murder. (§ 190.2, subd. (a)(2).)[2] After a court trial, defendant was sentenced to death. This appeal is automatic. (Cal. Const., art. VI, § 11, subd. (a); § 1239, subd. (b).) We affirm the judgment. I. FACTS A. Prosecution Guilt Phase Evidence[3] 1. Richard Urban's Disappearance on March 23, 1987 On March 23, 1987, Duane Holt shared a residence with Nevallene Joanne Holt Routh and her two teenaged sons at the corner of Hughes and Hedges Avenues in Fresno.[4] Holt was a drug dealer and sold drugs out of his house. He and Nevi Jo were both methamphetamine or "crank" users. The Holt *343 residence was also something of a gathering spot for young men who came and worked on cars in the yard. One of those young men was the victim, Richard Urban, who had previously purchased crank from Holt. Defendant and his girlfriend, Penny Baxter, were also frequent visitors to the Holt residence in March 1987, visiting almost every day. Like the others, defendant and Baxter were crank users. On March 23, defendant and Baxter dropped in at the Holt residence three times. During their final visit, in the evening, Holt received a phone call that made him angry. After he hung up, he told defendant that "Rich" owed him $130 and that some people should be made an example of for not paying. According to Baxter, defendant told Holt, "You just have to do what you have to do." Holt said that "Rich was coming over." About 10 minutes after the phone conversation, Urban arrived in a van. Holt asked Urban where his money was. Urban told him he did not have it because he had been kidnapped earlier that day. Instead, he offered Holt a set of rings in payment; the rings were gold and set with black onyx.[5] Holt refused but did accept some drugs from Urban telling him, however, that he still owed him the money. At some point, Holt said he had to go down the street and he, Urban, and defendant left the house in defendant's truck. When defendant and Holt returned 35 to 40 minutes later they were sweaty and jumpy. According to Randy Little, who was working on cars at Holt's house, they asked for a rope or a cable to start Urban's van. Eventually, they pushed it out of the yard. Defendant and Holt then went into the Holt residence. Baxter saw what she thought might be blood smeared on Holt's face; she remembered that Holt appeared to be nervous. Defendant and Holt went into a bedroom. They emerged a few minutes later and then defendant and Baxter left. As they drove home in defendant's truck Baxter noticed a bag on the seat of the truck between defendant and her. She went to move it, but defendant told her to leave it alone. On the way to their residence, they stopped for food and cleaned the truck, including the floorboards and the bed of the truck. When Baxter and defendant arrived at their home, they took drugs and defendant listened to a police scanner. Baxter overheard a police report about a man who needed assistance and was bleeding from his head. Defendant appeared to be upset and Baxter asked him what was wrong. He said a man had been shot and was bleeding from the head; the report, however, had not said anything about a shooting.[6] *344 Meanwhile Urban's "common law" wife, Mardeau Hipp had become concerned about Urban's whereabouts. Urban had left their house sometime after 8:30 p.m. in a van that Hipp's father had loaned her. She had last spoken to him sometime after midnight and asked him when he was going to be home. He told her 15 to 20 minutes. When he failed to come home, she started calling various people, including Holt, to see if Urban was with them. Hipp called Holt again the next morning, still trying to locate Urban, and spoke to Holt. 2. Events on the Days Following March 23 a. The Discovery of Urban's Body On the morning of March 24, 1987, while delivering newspapers, Eusebio Duran saw a man's body off to the side of Dickinson Street between the road and a vineyard. The area surrounding the spot was agricultural and covered with vineyards. Duran delivered a few more papers and then made a U-turn and drove slowly past the body. The man was faceup, with his arms to his sides, and there was a large pool of blood around his head. Duran drove to a grocery store and called the police. He remained in the area until the police arrived, within three minutes of his call, and made a statement to them. Pete Chavez, a detective with the Fresno County Sheriff's Department, arrived at the scene about 5:45 a.m. The weather was cold and wet as there had been rain a few days earlier. Chavez observed that the man's body was on its right side and there was blood beneath his head and upper body area. The man was clad in white pants, a tan jacket, and black tennis shoes. There were three sets of shoe prints around the body; these were photographed. When Chavez approached the body he saw injuries to the head. In the man's right hand were car keys. The keys were later identified by Mardeau Hipp as belonging to the van she had borrowed from her father. The man was Richard Urban. According to Jerry Nelson, the pathologist, the cause of death was gunshot wounds to Urban's brain and brain stem. Two bullets were recovered from the crime scene and sent to the prosecution's ballistics expert, Allen Boudreau. A third bullet was removed from Urban's skull and also examined by Boudreau. Pathologist Nelson concluded that two of the three gunshot wounds would likely have been fatal. He also concluded that two of the shots were fired from a distance of six to 12 inches from Urban's head. He could not determine the *345 distance from which the third shot was fired, except to say that the gun had not been pressed against Urban's head. The pathologist believed that one of the shots was fired while Urban was lying on the ground, while another shot had been fired from above his head and in a downward direction. He could not determine either how many individuals had fired the shots or how many guns had been used. Based on his examination of the three bullets, Boudreau concluded that all were likely the same caliber, but he could not tell whether they had been fired from the same weapon. b. Urban's Van; Defendant's Conversation with Holt; Holt's Arrest About 7:40 a.m. on March 24, Kathleen Miller-Winn saw a van drive up and come to a stop in front of her house. She saw a man in his mid-20's to early 30's walking away from the van. The van was still parked in front of her house when she returned home from work that evening and it remained there for about two days, until a neighbor called the police. The van was the vehicle that Urban had been driving on March 23. The morning of March 24 Baxter and defendant went to Holt's residence. Holt began bragging to a man named Dane, who was also present, "about taking out somebody." Specifically, he said he had shot Urban. Defendant said, "you shouldn't talk about anything to anybody." Holt told defendant that maybe they should not be associated with each other to which defendant replied, "Okay. Whatever." Later, as they drove home, Baxter asked defendant what was going on and what Holt had been talking about. Defendant told her not to ask any more questions about it. A day or two later defendant presented Baxter with the rings that Urban had offered to Holt the night he was killed. Defendant told her, "We'll fix them and use them for our wedding rings."[7] On March 26, Holt and Nevi Jo were arrested on drug charges and their residence was searched. Holt was charged with murder. Nevi Jo called Baxter and told her about Holt's arrest. Defendant was not present at the time, so Baxter told him about the arrest later. The next day he told Baxter he and Holt had taken Urban for a ride and were going to drop him off in the country to scare him. 3. The Police Investigation a. Footprint Impressions The footprint impressions photographed at the crime scene were analyzed by Frederick Hansen, an identification technician for the Fresno County *346 Sheriff's Department. Hansen testified that he found two categories of impressions, which he associated with a boot and a tennis or athletic shoe. He said that there was one pair of boots, or maybe more, at the crime scene. Holt wore cowboy boots. Urban was wearing tennis shoes when he was killed, but Hansen could not positively identify the tennis shoe prints at the scene of the crime as having been made by Urban's shoes. b. Interviews with Baxter Baxter's name surfaced in the investigation on November 28, 1987. On December 1, 1987, she was interviewed by Detectives Pete Chavez and Frank Martinez of the Fresno County Sheriff's Department while she was in jail on petty theft and drug charges. She was interviewed a second time by Chavez, Martinez and Carla Riba, an investigator for the Fresno County District Attorney's Office. No promises were made to her at either interview. During the first interview, with Chavez and Martinez, Baxter told them about the rings that Urban had offered Holt as payment for the money he owed Holt for drugs. As a result, the detectives recovered the rings from Mark Bryant. During the second interview, Baxter told Riba, among other things, that defendant described Urban's killing to her. She told Riba that defendant told her he and Holt forced Urban to get on his knees, that he pleaded for help, and that both Holt and defendant shot him. Baxter told Riba that defendant and Holt took "[Urban] out and they shot him three times in the head." Baxter said specifically that defendant shot the victim. Baxter also said that both defendant and Holt told her they had pushed a vehicle — presumably the victim's van — out of the yard. 4. Defendant's Statements to David DeSoto In April 1987, David DeSoto, a four-time felon, was an inmate in the Los Angeles County jail on charges of burglary and assault with intent to commit rape; defendant was a fellow inmate.[8] DeSoto was interviewed by investigator Riba and Detective Martinez at the jail on May 5, 1988. Riba and Martinez had gone to the jail looking for a man named "Mark Conway," which was one of DeSoto's several aliases. They had come in response to DeSoto's calls to the Fresno County District Attorney's Office. DeSoto hoped *347 that by providing information about defendant, he could get his bail reinstated, but it was not. He admitted that he had falsely attempted to make it appear to the investigators as if he had known defendant prior to April 1987. Neither Riba nor Martinez disclosed to DeSoto any reports of their investigation into Urban's murder or any details of the investigation. DeSoto told the investigators that the victim had been shot in the head and chest. Subsequently, at trial, DeSoto testified that he had had a number of conversations with defendant in April 1987. According to DeSoto, defendant told him "he committed a murder" and "the guy that was with him got arrested behind him." Defendant told him the murder involved a person who owed money for drugs. The victim was a "youngster." DeSoto testified that defendant told him that "[t]he person he was with shot [the victim] twice. The guy didn't go down, or didn't die . . . so [defendant] said he had to do it to make sure he was dead." He said the victim was shot in the head and the chest. According to DeSoto, defendant told him that after the killing, the victim's body was wrapped up and left in a ditch near some fields. He also told DeSoto that the victim had been in possession of some jewelry, which he and Holt removed. He said defendant told him the victim was wearing "a blue western shirt."[9] DeSoto testified that the other person involved was named "Smitty," and that defendant was concerned that Smitty "was gonna . . . tell on him or snitch on him behind it." DeSoto testified that defendant asked him to make a phone call to Smitty's girlfriend, Jo.[10] DeSoto made the call, and told her he had a message from defendant for Holt "to hold his mug and not to say nothin' and . . . that he felt bad about" Holt having been arrested. B. Defense Guilt Phase Evidence The defense presented evidence that a man named Steven Farmer, rather than defendant, had killed Urban. Penny Baxter testified that Farmer was present at the Holt residence the night Urban was killed and was wearing boots. A witness named David Grajiola testified that, while he and Holt were in custody together, Holt told him that he and Farmer had "booked someone's ass." Cliff Garoupa, a defense investigator for Duane Holt, testified that when he had visited Farmer in custody, after telling him that Grajiola had accused him of being involved in the Urban murder, Farmer told him to convey a message to a family member to "get rid" of a pair of boots. *348 The defense also presented evidence that Holt alone had done the actual shooting of the victim. According to a witness named Vivian Moore, Holt had threatened a couple who owed him money for drugs that he had shot someone "and that he was not afraid to do it again." C. Prosecution Penalty Phase Evidence The prosecution presented evidence that in December 1975, defendant stabbed a man named Craig Segal, who survived. In April 1977, while an inmate at the prison at Vacaville, defendant stabbed and killed a fellow inmate named Michael Conroy. Additionally, the prosecution presented evidence that, while incarcerated at the Fresno County Jail in this case, defendant and another inmate had attacked two other inmates as they were being escorted by correctional officers; the victims were in handcuffs and leg shackles. Defendant attempted to gouge out one of the victims' eyes. Finally, the prosecution presented evidence that in April 1987, after a routine traffic stop in Beverly Hills, defendant managed to gain control of the police car in which he had been placed in handcuffs and tried to run down the police officer who had made the stop. D. Defense Penalty Phase Evidence The defense presented a social history of defendant through the testimony of Dr. Linda Poore. She testified that his early life was difficult because his parents were teenagers when he was born and too immature and inexperienced to be parents. Additionally, defendant was physically abused by his father and both parents favored his brother, Stephen. She testified further that defendant attended academically poor schools. All of this, she concluded, made him vulnerable to bad influences, which led him into the juvenile justice system. Defendant also presented witnesses who testified to his good character, including his former wife, Linda Curl. She testified that she had been a drug addict and a drug dealer before she married defendant. After they married, she was able to remain drugfree and she, defendant, and her two children had a good family life together. Her two children, Chaela Ingles and Richard Upshaw, also testified on defendant's behalf; both of them considered defendant to be their father and spoke of his care and concern for them. Linda Curl testified that defendant had had a positive work history until he suffered a severe injury to his left hand while working for a custom cabinetmaker. Defendant lost part of his fingers and though they were sewn *349 back on, his manual dexterity remained impaired. As a result of his injury, defendant went on disability and became depressed. Eventually, he got work out of town and, away from his family, began using amphetamines because they deadened the pain and allowed him to continue working. After defendant and Linda Curl divorced, she remained concerned about his well-being and asked her friend, Jeanette, to visit him. Eventually, Jeanette and defendant married while he was in custody and she also testified on his behalf. She testified about her love for defendant and read the wedding vows he had composed for their wedding. Numerous other witnesses, friends and family of defendant and Linda Curl, testified about his and Linda's happy family life and defendant's good character. A Catholic priest, Father Gary Luiz, testified to defendant's spiritual growth while in custody in this case and about his poetry. A literary editor also testified about defendant's poetry and opined that some of it was of high literary quality. Finally, defendant's former parole agent testified that defendant had successfully completed his one year of parole. II. DISCUSSION A. Challenge to the Constitutional Validity of Defendant's Prior Murder Conviction (1) Defendant contends that the prior-murder special-circumstance finding should be reversed because the constitutional validity of the underlying plea, which was the basis of the special circumstance allegation, was not proved beyond a reasonable doubt. In this connection, he contends that our earlier opinion in this case, Curl v. Superior Court (1990) 51 Cal.3d 1292 [276 Cal.Rptr. 49, 801 P.2d 292], in which we held that a defendant does not have a right to a jury trial on the constitutional validity of a prior conviction and bears the burden of proving such invalidity by a preponderance of the evidence, was superseded by Apprendi v. New Jersey (2000) 530 U.S. 466 [147 L.Ed.2d 435, 120 S.Ct. 2348]. In Apprendi, the Supreme Court held that "[o]ther than the fact of a prior conviction, any fact that increases the penalty for a crime beyond the prescribed statutory maximum must be submitted to a jury, and proved beyond a reasonable doubt." (Id. at p. 490.) Two years later, in Ring v. Arizona (2002) 536 U.S. 584 [153 L.Ed.2d 556, 122 S.Ct. 2428], the Supreme Court held that Arizona's capital sentencing scheme ran afoul of the Sixth Amendment because it allowed the sentencing judge, sitting without a jury, to find an aggravating circumstance necessary for imposition of the death penalty. (Ring, supra, 536 U.S. at p. 609.) The court, citing language *350 from Apprendi, stated "The dispositive question, we said, `is one not of form, but of effect.' [Citation.] If a State makes an increase in a defendant's authorized punishment contingent on the finding of a fact, that fact — no matter how the State labels it — must be found by a jury beyond a reasonable doubt." (Ring, supra, 536 U.S. at p. 602.) Concluding that "Arizona's enumerated aggravating factors operate as `the functional equivalent of an element of a greater offense,' [citation] the Sixth Amendment requires that they be found by a jury." (Id. at p. 609.) As we shall explain, however, the question of the constitutional validity of a prior conviction does not fall within the framework set forth in Apprendi and Ring for those issues of fact as to which the Sixth Amendment requires a jury trial and proof beyond a reasonable doubt. Accordingly, we reject defendant's claim. In 1977, defendant pled guilty to second degree murder and that conviction became the basis of the sole special circumstance allegation in the instant case. (§ 190.2, subd. (a)(2) ["The defendant was convicted previously of murder in the first or second degree."].) "By pretrial motion defendant sought to strike the prior-murder special-circumstance allegation on grounds that he was under the influence of drugs at the time he pled guilty to the 1977 murder of an inmate at the California Medical Facility in Vacaville, and that he was not properly advised of his Boykin-Tahl rights (Boykin v. Alabama (1969) 395 U.S. 238 [23 L.Ed.2d 274, 89 S.Ct. 1709]; In re Tahl (1969) 1 Cal.3d 122 [81 Cal.Rptr. 577, 460 P.2d 449]) at the time he entered his guilty plea." (Curl v. Superior Court, supra, 51 Cal.3d at p. 1296.) Following a lengthy evidentiary hearing occasioned by the absence of a reporter's transcript of the 1977 plea, the trial court denied the motion. (Id. at pp. 1296-1299.) Defendant filed a petition for writ of mandate that ultimately resulted in an opinion from this court, the aforecited Curl v. Superior Court, supra, 51 Cal.3d 1292. In Curl, we concluded (1) defendant's statutory right to a jury trial on the truth of the prior-murder special-circumstance allegation (§ 190.4, subd. (a)) did not encompass a jury trial on the constitutional validity of the underlying plea, and (2) defendant had the burden of proof in establishing the constitutional invalidity of the plea by a preponderance of the evidence. (51 Cal.3d at pp. 1300-1302, 1306-1307.) Following our decision, defendant renewed his attack on the validity of his plea, claiming that the first hearing had been conducted without the benefit of our decision. Another evidentiary hearing was held, at the conclusion of which the motion was again denied. *351 (2) Defendant now asserts that, contrary to our conclusions in Curl, Apprendi and Ring require that the constitutional validity of his 1977 plea be relitigated before a jury and proved beyond a reasonable doubt. Not so. As noted, the right to a jury trial discussed in Apprendi and Ring applies only to an issue of fact "that increases the penalty for a crime beyond the prescribed statutory maximum" (Apprendi v. New Jersey, supra, 530 U.S. at p. 490), whatever its designation. Patently, the question of the constitutional validity of a prior conviction does not present such an issue of fact. As the Attorney General points out: "Finding that Curl was eligible for the death penalty was not contingent upon the finding that his prior murder conviction was constitutionally valid pursuant to Boykin-Tahl. Neither section 190.2, subdivision (a)(2) nor section 190.4 suggest such a requirement nor do these sections state that the constitutional validity of a prior murder conviction must be proved as an element of the offense prior to imposing the death penalty." A finding that the prior conviction is constitutionally valid does not in and of itself "expose the defendant to a greater punishment than that authorized by the jury's verdict." (Apprendi, supra, 530 U.S. at p. 494, fn. omitted.) The prosecution must still prove the special circumstance beyond a reasonable doubt to the trier of fact. (§ 190.4.) Moreover, the constitutional validity of a prior conviction is an inquiry that our prior decisions, even those predating Curl, allocated to the trial court and not the jury. (People v. Coffey (1967) 67 Cal.2d 204, 217 [60 Cal.Rptr. 457, 430 P.2d 15] [first step of procedure to strike prior conviction is for the trial court to "hold a [pretrial] hearing outside the presence of the jury in order to determine the constitutional validity of the charged prior or priors"].) This is because the determination of the constitutional validity of a prior conviction is of a very different nature from the determination of whether the defendant suffered the prior conviction. "A prior conviction carries a `"strong presumption of constitutional regularity,"' and the defendant must establish a violation of his or her rights that `"so departed from constitutional requirements"' as to justify striking the prior conviction." (People v. Horton (1995) 11 Cal.4th 1068, 1136 [47 Cal.Rptr.2d 516, 906 P.2d 478], italics omitted.) Given the presumptive constitutional validity of the prior conviction, a motion to strike "presents legal questions of a far different nature than the factual determination of the existence of the prior conviction" (Curl v. Superior Court, supra, 51 Cal.3d at p. 1303). (3) Accordingly, we conclude that neither Apprendi nor Ring superseded or implicitly overruled our decision in Curl. Therefore, contrary to defendant's argument, Apprendi did not represent an "intervening change in the law" that would bar applying the doctrine of the law of the case. (People v. Stanley (1995) 10 Cal.4th 764, 787 [42 Cal.Rptr.2d 543, 897 P.2d 481].) *352 Thus, our conclusions in Curl, that where a defendant challenges the constitutional validity of a plea the defendant must prove such invalidity by a preponderance of the evidence, remains the law of the case. Here, the trial court conducted a second hearing following our decision in Curl and denied the motion to strike. Because defendant does not challenge that proceeding, we assume the trial court correctly applied Curl and affirm its ruling. B. Guilt Phase Claims 1. Claims Related to the Testimony of David DeSoto The bulk of defendant's guilt phase claims relate to the testimony of David DeSoto and fall into two broad categories.[11] The first — alleging prosecutorial and trial court misconduct — are based upon the alleged failure of the prosecutor to have turned over to the defense notes he made that memorialized conversations the prosecutor had with, and about, DeSoto prior to DeSoto's testimony at defendant's trial. The second claim alleges that the trial court erred by excluding impeachment evidence the defense wanted to use against DeSoto. 2. Claims of Prosecutorial and Trial Court Misconduct Defendant asserts that DeSoto lied when he testified that "he had neither been promised, received nor expected any benefit in return for testifying and that any pre-trial communication he had with Mr. Hoff [the prosecutor] had solely concerned protection of his safety," because the prosecutor's "undisclosed" notes of telephone calls with and concerning DeSoto "would have revealed that DeSoto had in fact been impliedly assured by Hoff, and expected, that the testimony he gave would likely result in benefit to him with respect to charges pending against him." Thus, according to defendant, Hoff suborned DeSoto's perjured testimony to the extent DeSoto denied expecting or receiving any benefits for his testimony and the trial court committed misconduct when, after reviewing Hoff's telephone notes in camera, it declined to provide them to the defense. *353 The existence of the prosecutor's telephone notes was revealed during a discussion of whether the prosecution had complied with discovery. Defense counsel requested that the prosecutor be ordered to search his records for evidence of benefits promised to Penny Baxter or DeSoto. Specifically, defense counsel alleged that "there's been an exchange of letters between the prosecution and Mr. DeSoto or — and/or the prison authorities to afford him certain reasonable benefits and accommodations. We would like to have copies of any of those letters to and from." The prosecutor responded that he had no knowledge of any letters with the Department of Corrections but that he had received phone calls from the department about DeSoto's status as a witness for purposes of classification and placement. Defense counsel then requested any record of telephone conversations. The prosecutors said he generally made notes of his telephone conversations and would search his files. The following day, the prosecutor said he had spoken to someone in the Department of Corrections about whether DeSoto would be testifying and whether he would be in any danger if he did so. When defense counsel asked for a copy of the note memorializing that conversation, the prosecutor objected. The trial court sustained the objection on the grounds that "I don't think this document comes within the discovery order or the Penal Code statute, so I'm not going to order to produce it." The prosecutor indicated he was still going through his records and the court asked him to complete his search by the following day. The next day the prosecutor brought in a file of 57 items consisting of notes of his telephone conversations as well as letters he had written to prison or law enforcement personnel concerning DeSoto. He objected to turning over notes of his telephone conversations without a preliminary inspection by the trial court to determine whether they were discoverable. The file was designated exhibit C. The trial court reviewed the file as well as the transcript of the original discovery hearing before another judge and concluded that "I do not see where these notes would fall within any of the discovery orders that are provided in there or provided for in the Penal Code." In response to a defense counsel request that any exculpatory material in the notes be turned over pursuant to Brady v. Maryland (1963) 373 U.S. 83 [10 L.Ed.2d 215, 83 S.Ct. 1194], the trial court responded, "I have reviewed them with that in mind, and I found nothing in this file that would so qualify." At trial, DeSoto conceded that his purpose in contacting the prosecution was to secure its help in the case for which he was in custody in Los Angeles County. He testified, however, that no promises of help were made to him by *354 either the district attorney's investigators or by the prosecution and that the investigators told him they had no jurisdiction over proceedings in a different county. With respect to his calls with Prosecutor Hoff, DeSoto testified that the purpose of those calls was not to secure a benefit in his Los Angeles case but, rather, "It [sic] would have been my safety." (4) "A prosecutor's misconduct violates the Fourteenth Amendment to the federal Constitution when it `infects the trial with such unfairness as to make the conviction a denial of due process.' [Citations.] In other words, the misconduct must be `of sufficient significance to result in the denial of the defendant's right to a fair trial.' [Citation.] A prosecutor's misconduct `that does not render a criminal trial fundamentally unfair' violates California law `only if it involves "`the use of deceptive or reprehensible methods to attempt to persuade either the court or the jury.'"' [Citations.]" (People v. Harrison (2005) 35 Cal.4th 208, 242 [25 Cal.Rptr.3d 224, 106 P.3d 895].) "`"Under well-established principles of due process, the prosecution cannot present evidence it knows is false and must correct any falsity of which it is aware in the evidence it presents . . . ." [Citation.]'" (People v. Richardson, supra, 43 Cal.4th at p. 1014.) As the Attorney General points out, there is no perjury unless the challenged testimony was actually false. (§ 118, subd. (a).) Defendant fails to persuasively point to testimony by DeSoto that fits this description. Instead, his argument relies on a general claim that the "picture presented to the jury" about whether DeSoto received any benefits was false. According to defendant, the jury was led to believe that "although DeSoto had initially been induced to inform law enforcement of incriminating facts about [defendant] because of his wish to obtain bail and other benefits with respect to disposition of his pending charges in Long Beach, (1) he had been quickly disabused of any such hope, (2) the only benefit he received was protection from retaliation for his cooperation with law enforcement, (3) his testimony at [defendant's] trial was not influenced by any expectation of reward, other than a vague hope, and (4) the phone conversations that DeSoto had with prosecutor Hoff concerned nothing beside[s] his continued security in jail. [¶] That picture was false because neither Mr. Hoff nor the trial judge disclosed to the defense or the jury that DeSoto had lied about the nature of his phone calls with Hoff and whether, notwithstanding [the district attorney's investigators] telling him that he would get no benefit with respect by cooperating, DeSoto had consistently demonstrated his expectation of reward if his testimony was useful to the prosecution and been assured that his cooperation would be made known to authorities in Long Beach, where his case was pending. This deception was especially egregious since prosecutor Hoff, *355 having been a party to those phone calls, knew that it was false and deliberately suborned the perjurious testimony." Defendant attempts to support this claim with an extensive analysis of the prosecutor's notes of his telephone calls to and about DeSoto. We have reviewed the prosecutor's notes and letters and find defendant's analysis utterly unconvincing. There are four letters from Prosecutor Hoff in exhibit C. The first two letters, both dated December 5, 1989, are addressed respectively to a correctional counselor at the state prison at Chino and to DeSoto himself. They were apparently written in response to a letter to Hoff from DeSoto in November 1989 in which DeSoto expressed concern for his safety should he testify and asked Hoff "to confirm his status" as a witness with prison officials. Hoff's letter to the correctional counselor confirmed that DeSoto would be called as a witness in defendant's trial and, in view of possible threats to his safety from defendant, stated his belief that "DeSoto's welfare and safety may be in danger. Therefore, I request that you consider this information in the classification and placement of Mr. DeSoto in your institution." His letter to DeSoto simply confirmed that he had talked to officials at Chino regarding DeSoto's classification and placement. Another letter, dated April 2, 1990, to a correctional counselor at Corcoran state prison similarly informed the counselor that DeSoto had cooperated with law enforcement in defendant's case, expressed concern for his safety, and supported DeSoto's request to be transferred to another facility. The letter was written in response to a letter from DeSoto reporting a confrontation with other inmates over his role in defendant's prosecution. The fourth letter, undated, is addressed to the deputy district attorney in charge of DeSoto's case in Los Angeles County at Long Beach. In it, Hoff stated that DeSoto provided information in the Curl case that had been corroborated and had agreed to testify. Hoff went on: "He has never requested nor has he received any promises in exchange for his information other than a promise from me that I would notify, in writing, the Los Angeles District Attorney's office, his attorney and/or the Court that he has cooperated with Fresno authorities in the Curl case. [¶] I believe Mr. [DeSoto's] past and anticipated future cooperation should be considered by your office in assessing his own criminal prosecution, and I ask you to give whatever weight you deem is appropriate to this matter." Hoff's notes confirm the information in the letters: many of his conversations with DeSoto revolved around DeSoto's concern for his safety because of his cooperation in defendant's prosecution and, notwithstanding DeSoto's *356 attempts to secure some benefit from that cooperation, the only guarantee Hoff made was that he would inform the Los Angeles District Attorney's Office of DeSoto's cooperation. For example, in a note dated May 26, 1988, Hoff stated: "I am making no deals w/[DeSoto] except to convey to L.A.D.A. that [DeSoto] appears to be giving truthful info and said he would cooperate and testify. [¶] I asked DeLong [the Los Angeles prosecutor] to handle his case on its merits w/o consideration of my use of [DeSoto] as a witness . . . ." In a note dated June 1, 1988, Hoff records a conversation with DeSoto in which DeSoto asked for help with getting a continuance and bail reduction and Hoff told him, "I could not control that matter." Hoff notes he called the Los Angeles prosecutor, did not reach him, but was later informed that DeSoto's case had been continued and bail remained the same. In a note dated November 11, 1988, Hoff recorded that he had spoken to the Los Angeles prosecutor about his intention to use DeSoto as a witness "and that there is no deal/consideration being extended to [DeSoto] in exchange for his testimony" and "DeLong can deal w/[DeSoto's] case on its merits." To the same effect were notations on November 18, 1988, November 28, 1988, February 17, 1989, May 22, 1989, June 6, 1989, and June 21, 1989. Each note confirms that Hoff made no promise or inducement to DeSoto for his testimony except that he would inform the Los Angeles District Attorney's Office of DeSoto's cooperation. (5) This record does not support defendant's claim that DeSoto perjured himself when he testified that he had not received any benefits in exchange for his testimony, much less that Hoff suborned perjury. Defendant maintains that the fact that DeSoto received a reduced sentence on the Los Angeles charges, and that the sexual assault charge was dismissed, is evidence that he lied about not having received any benefit for his testimony at defendant's trial. But there is nothing in the record before us that supports his claim that Prosecutor Hoff engineered the reduction in the sentence and the dismissal of the charge. The record is to the contrary — Hoff's notes consistently demonstrate that he did not offer DeSoto any inducements or benefits for his testimony.[12] Nor do we agree with defendant that DeSoto perjured himself when, in response to being asked about his telephone conversations with Hoff, he said they involved his "safety."[13] Defendant claims this was misleading because DeSoto left out the fact that he had sought assistance with bail reduction and a continuance from Hoff, leaving the impression that *357 his safety was the only topic of discussion. We do not read the record in so narrow a fashion; moreover, the jury learned from cross-examination that DeSoto had sought other benefits in exchange for his testimony. Accordingly, we reject defendant's claim of prosecutorial misconduct. Defendant also asserts the trial court committed misconduct, apparently because the trial court declined to furnish Hoff's notes to the defense at trial after determining the notes were not discoverable pursuant to either the discovery order in this case or section 1054.1. On this record, we find no abuse of discretion. (See People v. Ayala (2000) 23 Cal.4th 225, 299 [96 Cal.Rptr.2d 682, 1 P.3d 3] ["We generally review a trial court's ruling on matters regarding discovery under an abuse of discretion standard."].) A fortiori, we find no misconduct. 3. Claims of Evidentiary Error a. Expert Witness Defendant contends that the trial court abused its discretion when it denied his request to call Raymond Stevens, a private investigator, as an "expert to explain how an inmate informant can obtain information used to concoct a confession that was never made." Defendant contends that this testimony would have been relevant to show how David DeSoto "could assemble information about the accusations against [defendant] in order to create a fictitious confession . . . ." Defendant specifically disavows any claim that he sought to have Stevens's testimony introduced to have Stevens render an opinion about DeSoto's credibility under Evidence Code section 801. Rather, he argues the evidence was admissible under Evidence Code section 720, which defines the qualifications of an expert witness. Defendant contends that the latter statute would have permitted Stevens to testify to "the procedure [in the Los Angeles County jail] whereby inmates can gain information about cases which the inmate believes the prosecutors would be willing to offer to the inmate . . . and that the procedures are such that the inmate can find out the foundational information without in fact having a conversation with a particular individual" and from which the informant can cobble together a fictitious confession. After an extended colloquy, the trial court denied the request "on grounds of relevancy, speculation, Evidence Code section 801. It invades the province of the jury under Evidence Code section 780. It calls for inadmissible lay opinion testimony."[14] We find no abuse of discretion. *358 At trial, defendant sought to admit the testimony of Raymond Stevens. Stevens was a 24-and-a-half year veteran of the Ventura County Sheriff's Department before becoming a private investigator who worked on contract with the State Public Defender's Office. After the trial court sustained prosecution objections to questions about whether Stevens had dealt with inmate informants, a hearing was held outside the presence of the jury in which the defense made an offer of proof as to Stevens's testimony. Characterizing DeSoto as an "inmate informant," defense counsel stated that Stevens had "qualified as an expert to render testimony about inmate informants, the process, the methods of selecting, evaluating and determining the truthfulness of their representations" and would render "his opinion regarding the validity of Mr. DeSoto in his role of an inmate informant." In this connection, defense counsel argued that sections of the Penal Code that singled out inmate informants recognized them "as a special breed of persons and witness [sic]." Initially, the defense cited Evidence Code section 801 — permitting expert opinion testimony — as the basis of its request. The prosecution objected on the grounds that there was insufficient foundation for the characterization of DeSoto as a long-term inmate informant, that there was insufficient foundation that the subject of inmate informants was a matter for expert testimony, that the proposed testimony was neither material nor relevant, and that the proposed testimony would invade the jury's province as the sole evaluator of witness credibility. The trial court agreed that there was no support for permitting expert testimony on the subject of a witness's credibility. At that point, the defense backed away from its offer of proof, claiming it was not offering Stevens as an expert on whether DeSoto was being truthful, "but about the processes that were operative in L.A. County [jail] which would have been operative in the utilization of Mr. DeSoto as an inmate informant in this case . . . ." Pressed by the court for specifics, the defense said that Stevens would testify "that there's a regular flow of information in and about the area, how they gather it without talking with the person. The only prerequisite that a person who wants to be an inmate informant really has is to be able to show at some point . . . being in the physical presence of another person." According to the defense, the inmate informant "gets that information by the flow of prisoners in and out of his environment, the use of the media, discussions with other people, phone calls to law enforcement officers," and that law enforcement should use "safeguards" to avoid false testimony by inmate informants. Asked by the court whether Stevens's testimony was, in *359 effect, "a criticism of the law enforcement conduct in interviewing and accepting Mr. DeSoto's statements" without applying such safeguards, defense counsel said, "That's part of it." The trial court replied that whether police applied such standards or procedures was irrelevant when the only issue was DeSoto's credibility, which was a matter for the jury to decide. The court referred to section 1127a, which sets forth the special instruction to be given for the jury to assess the testimony of an in-custody informant.[15] The court rejected the notion that, because the Legislature had adopted this statute, "there is a newly recognized field of expertise concerning inmate-informants . . . . [¶] The relevant part of Mr. DeSoto's testimony is what he had to say, whether there is any evidence of motive, bias, et cetera, which would have to be based on facts. And it is simply a matter of assessing the veracity of a witness. Whether some inmate-informants lie and some don't is a truism . . . . [¶] I think it comes back to the defense wanting this witness to give speculative information as to why this jury should conclude that this witness is not telling the truth. You haven't given me any specific offer of proof as to evidence that would rebut Mr. DeSoto's testimony that the sole source of [his] information was [defendant], other than saying there is a methodology and it is something that occurs in detention facilities where inmate-informants have access to other information, and sometimes or frequently use that information as a basis for snitching and then claim that another inmate gave him that information and confessed, when it wasn't the case. That strikes me as pure speculation, something that I can't let this jury do." (6) In assessing defendant's claim that the trial court erroneously excluded Stevens's testimony, we apply the deferential abuse of discretion standard. (People v. Jablonski (2006) 37 Cal.4th 774, 805 [38 Cal.Rptr.3d 98, 126 P.3d 938] ["`[A]n appellate court applies the abuse of discretion standard of review to any ruling by a trial court on the admissibility of evidence. . . .'"].) We find no abuse here. We agree with the trial court that, to the extent the purpose or effect of Stevens's testimony was to render an opinion about DeSoto's credibility, the testimony was inadmissible. (People v. Coffman and Marlow (2004) 34 Cal.4th 1, 82 [17 Cal.Rptr.3d 710, 96 P.3d 30] ["The general rule is that an expert may not give an opinion whether a witness is telling the truth, for the determination of credibility is not a subject sufficiently beyond common experience that the expert's opinion would assist the trier or fact; in other words, the jury generally is as well equipped as the *360 expert to discern whether a witness is being truthful."].) To the extent the purpose of the testimony was to demonstrate how inmate informants confabulate testimony, the trial court did not abuse its discretion in excluding the evidence on grounds of insufficient foundation in the absence of evidence either that DeSoto was a repeat inmate informant or of evidence contradicting his testimony that defendant was the sole source of his information. Therefore, we reject defendant's claim that the trial court erred when it excluded Stevens's testimony.[16] b. Exclusion of Newspaper Articles Defendant contends that the trial court abused its discretion and violated various constitutional provisions when it refused to allow into evidence various articles from The Fresno Bee about defendant's case because, had they been read by DeSoto, they may have provided him with information from which he could have concocted his testimony. The trial court rejected the articles on the ground that, in the absence of any evidence that DeSoto had seen the newspaper articles, defendant's use of them was speculative. (7) His claim is without merit. Because, as the trial court noted, there was no evidence that DeSoto had obtained his information about the case from any source other than defendant himself, admission of this evidence was not relevant to any disputed fact but would simply have invited the jury to speculate that DeSoto, from his jail cell in Los Angeles, had somehow come across these newspaper articles and used them to confabulate his testimony. The trial court properly excluded the evidence. (People v. Morrison (2004) 34 Cal.4th 698, 711 [21 Cal.Rptr.3d 682, 101 P.3d 568] ["Evidence is irrelevant. . . if it leads only to speculative inferences."].) c. Limitations on Cross-examination of DeSoto During defendant's cross-examination of DeSoto, defense counsel asked DeSoto whether he had asked to be placed in protective custody in prior cases in order to demonstrate that DeSoto had acted as an informant in those prior cases. The trial court permitted defense counsel to ask DeSoto whether he had sought protective custody in this case, but not as to an earlier period of time, and sustained relevancy objections to those questions. Defendant *361 maintains this was error because the question was relevant to whether DeSoto "was testifying in hope of receiving benefits from the prosecutor." Not so. Whether DeSoto sought to be placed in protective custody in other cases at earlier times was not relevant to whether he had received any benefits in connection with his testimony in this case. The trial court did not abuse its considerable discretion in sustaining the objection. d. Admission of Steven Farmer's Statement Defendant's theory at trial was that Steven Farmer, and not defendant, assisted Duane Holt in the murder of Richard Urban. Farmer refused to testify, invoking his privilege against self-incrimination. Instead, the defense called Cliff Garoupa, a defense investigator for Duane Holt. He testified that when he had visited Farmer in custody, after telling him that Grajiola had accused him of being involved in the Urban murder, Farmer told him to convey a message to a member his family to "get rid" of a pair of boots. The purpose of this evidence was to establish a consciousness of guilt on Farmer's part. In rebuttal, the prosecution was allowed to call Detective Pete Chavez. Chavez testified that Farmer had told Chavez he spent the night of the murder at his parents' house. The trial court admitted the testimony over a defense hearsay objection under Evidence Code section 1235, as a prior inconsistent statement. On appeal, defendant contends, and the Attorney General concedes, that the trial court erred in admitting the testimony under this section because that section applies only when "the [prior] statement is inconsistent with [the witness's] testimony at the hearing . . ." (Evid. Code, § 1235, italics added), and, in this case, Farmer did not testify. Nonetheless, the Attorney General contends the statement was admissible under Evidence Code section 1202 and, in any event, any error was harmless. (8) Evidence Code section 1202 states in part: "Evidence of a statement or other conduct by a declarant that is inconsistent with a statement by such declarant received in evidence as hearsay evidence is not inadmissible for the purpose of attacking the credibility of the declarant though he is not given and has not had an opportunity to explain or to deny such inconsistent statement or other conduct." "Section 1202 creates `a uniform rule permitting a hearsay declarant to be impeached by inconsistent statements in all cases, whether or not the declarant has been given an opportunity to explain or deny the inconsistency.' (Cal. Law Revision Com. com., 29B, pt. 4 West's Ann. Evid. Code (1995 ed.) foll. § 1202, p. 27.) [¶] The purpose of section 1202 is to assure fairness to the party against whom hearsay evidence is admitted without an opportunity for cross-examination." (People v. Corella (2004) 122 Cal.App.4th 461, 470 [18 Cal.Rptr.3d 770].) *362 We find Evidence Code section 1202 to be inapplicable. Farmer's statement was not hearsay but simply verbal conduct consisting of a directive that was neither inherently true nor false. Furthermore, the statement was offered for the nonhearsay purpose of demonstrating consciousness of guilt. Accordingly, as he was not a "hearsay declarant," section 1202 does not apply. Thus, there was no basis upon which to permit Chavez's testimony. It should be noted, however, that the testimony was less than compelling rebuttal since, if Farmer had been involved in Urban's murder, it can be assumed he would have lied to a police detective questioning him about it. Moreover, any error was harmless given the powerful evidence of defendant's guilt that included evidence that he and Holt had left Holt's residence with Urban the day of the murder, defendant's possession of the rings Urban had offered to Holt as payment for drugs and defendant's admissions to Baxter and DeSoto that he had shot and killed Urban. C. Penalty Phase Claims Defendant advances a number of challenges to the death penalty statute which, as he acknowledges, we have previously considered and rejected. We do so again. "Section 190.2 is not impermissibly broad in violation of the Eighth Amendment." (People v. Loker (2008) 44 Cal.4th 691, 755 [80 Cal.Rptr.3d 630, 188 P.3d 580]; see People v. Richardson, supra, 43 Cal.4th at p. 1037.) "Section 190.3, factor (a), which allows the jury to consider `[t]he circumstances of the crime of which the defendant was convicted in the present proceeding and the existence of any special circumstances found to be true pursuant to Section 190.1,' does not violate the Fifth, Sixth, Eighth, or Fourteenth Amendment to the United States Constitution by allowing arbitrary imposition of the death penalty." (People v. Loker, supra, 44 Cal.4th at p. 755.) "[T]he statute is not unconstitutional because it does not contain a requirement that the jury be given burden of proof or standard of proof instructions for finding aggravating and mitigating circumstances in reaching a penalty determination, other than other crimes evidence, and specifically that all aggravating factors must be proved beyond a reasonable doubt, or that such factors must outweigh factors in mitigation beyond a reasonable doubt, or that death must be found to be an appropriate penalty beyond a reasonable doubt. . . ." (People v. Panah (2005) 35 Cal.4th 395, 499 [25 Cal.Rptr.3d 672, 107 P.3d 790].) "Nothing in Cunningham v. California (2007) 549 U.S. 270 [166 L.Ed.2d 856, 127 S.Ct. 856], Apprendi v. New Jersey, supra, 530 U.S. 466, or Ring v. Arizona, supra, 536 U.S. 584, affects our conclusions in these regards. [Citations.] [¶] The failure to require intercase proportionality does not violate due process or the Eighth Amendment. [Citations.]" (People v. Loker, supra, 44 Cal.4th at pp. 755-756.) Finally, "[w]e again reject the *363 argument that the death penalty statute is contrary to international norms of humanity and decency, and therefore violates the Eighth and Fourteenth Amendments." (Id. at p. 756; see People v. Richardson, supra, 43 Cal.4th at p. 1037; People v. Hillhouse (2002) 27 Cal.4th 469, 511 [117 Cal.Rptr.2d 45, 40 P.3d 754] ["International law does not prohibit a sentence of death rendered in accordance with state and federal constitutional and statutory requirements."].) IV. DISPOSITION We affirm the judgment. George, C. J., Kennard, J., Werdegar, J., Chin, J., Corrigan, J., and Needham, J.,[*] concurred. NOTES [1] All further unspecified statutory references are to this code. [2] The basis of the prior murder special circumstance was defendant's 1977 conviction for the murder of Michael Conroy while defendant was incarcerated at the state prison at Vacaville. The trial court also found true allegations that defendant had suffered two prior convictions for assault with a deadly weapon and a third prior conviction for assault with a deadly weapon by a prisoner serving less than a life sentence (§ 4501). The prior convictions were stricken by the court upon pronouncement of the death sentence. [3] In setting forth this evidence, we apply the familiar appellate standard that, "[o]n appeal, we . . . construe the facts in the light most favorable to the judgment." (Woodman Partners v. Sofa U Love (2001) 94 Cal.App.4th 766, 771 [114 Cal.Rptr.2d 566].) We include this reminder because defendant's rendering of the facts highlights what he deems to be inconsistencies and credibility issues with respect to the prosecution's evidence and witnesses. But defendant's decision not to attack the judgment as unsupported by substantial evidence amounts to a concession that it is supported by such evidence. Even if he had made a sufficiency claim, it is black letter law that "[c]onflicts and even testimony which is subject to justifiable suspicion do not justify reversal of a judgment, for it is the exclusive province of the trial judge or jury to determine the credibility of a witness and the truth or falsity of the facts upon which a determination depends." (People v. Maury (2003) 30 Cal.4th 342, 403 [133 Cal.Rptr.2d 561, 68 P.3d 1].) In other words, the jury resolved these credibility issues against defendant and we are bound by that resolution. Accordingly, we set forth the evidence without defendant's extensive commentary regarding its reliability. [4] The witness was referred to as "Nevi Jo" at trial and is referred to by that name for convenience. As she described it, her relationship with Holt was simply that they "just lived in the same house." [5] Richard Flanagan, a friend of Urban's, testified that Urban had come to his house around midnight on March 23 and tried to sell him the same rings. [6] In Baxter's preliminary hearing testimony — which was read into the record during her trial testimony — she testified that defendant told her "the kid was shot three times," and that, after the scanner broadcast, defendant told her that "Rich" was on his knees when he was shot and had asked Holt, "`How come this is happening?'" [7] Baxter, in turn, gave the rings to a man named Mark Bryant. [8] Initially, the trial court issued an order prohibiting DeSoto and other witnesses from making reference to certain facts, including the fact that defendant had been in custody in Los Angeles, but the defense subsequently asked that this portion of the order be lifted as to DeSoto so that the defense could question him about the physical environment in which he overheard defendant's telephone calls. [9] Urban was not wearing this kind of shirt when he was killed. [10] Nevi Jo testified that, after Holt was arrested, she received a call from DeSoto. [11] Here, as elsewhere, defendant asserts constitutional violations he did not advance in the trial court. "[W]e . . . entertain constitutional claims not raised below only to the extent `the new arguments do not invoke facts or legal standards different from those the trial court itself was asked to apply, but merely assert that the trial court's act or omission, insofar as wrong for the reasons actually presented to that court, had the additional legal consequence of violating the Constitution. . . . [¶] In [this] instance, of course, rejection, on the merits, of a claim that the trial court erred on the issue actually before that court necessarily leads to rejection of the newly applied constitutional "gloss" as well. No separate constitutional discussion is required in such cases, and we therefore provide none.' [Citation.]" (People v. Richardson (2008) 43 Cal.4th 959, 984, fn. 11 [77 Cal.Rptr.3d 163, 183 P.3d 1146].) [12] Defendant insinuates that Hoff's references to the absence of any deal with DeSoto for his testimony is actually evidence that there was a deal and Hoff was creating "a paper record just in case his notes were ever discovered by the defense." At this point, defendant's legal analysis devolves into a conspiracy theory. [13] Defense counsel objected to DeSoto's answer as nonresponsive. The objection was sustained and the answer stricken. We assume the jury understood and followed the court's directive to disregard the testimony. (People v. Mickey (1991) 54 Cal.3d 612, 689, fn. 17 [286 Cal.Rptr. 801, 818 P.2d 84].) Therefore, even if we were to assume that DeSoto's answer was misleading, it played no part in the jury's assessment of his credibility. [14] The Attorney General contends that defendant forfeited the argument he makes on appeal because he did not specifically refer to Evidence Code section 720. Not so. Defendant advanced the substantive claim he repeats here — that admission of Stevens's testimony was not for his opinion of DeSoto's credibility but to lay out the "procedure" by which inmate informants gather evidence to concoct false confessions. It is immaterial for purposes of preserving the objection that he did not specify the precise code section where he made clear the substance, purpose and relevance of the excluded evidence. (Evid. Code, § 354, subd. (a).) [15] "`The testimony of an in-custody informant should be viewed with caution and close scrutiny. In evaluating such testimony, you should consider the extent to which it may have been influenced by the receipt of, or expectation of, any benefits from the party calling that witness. This does not mean that you may arbitrarily disregard such testimony, but you should give it the weight to which you find it to be entitled in the light of all the evidence in the case.'" (§ 1127a, subd. (b).) This instruction was given. [16] We deny defendant's request that we judicially notice a report of the 1989-1990 Los Angeles County Grand Jury regarding the involvement of jailhouse informants in the criminal justice system in Los Angeles County. In light of our conclusion that there was no evidence DeSoto was a repeat inmate informant, the report is irrelevant. (Mangini v. R. J. Reynolds Tobacco Co. (1994) 7 Cal.4th 1057, 1063 [31 Cal.Rptr.2d 358, 875 P.2d 73] ["Although a court may judicially notice a variety of matters (Evid. Code, § 450 et seq.), only relevant material may be noticed."].) [*] Associate Justice, Court of Appeal, First Appellate District, Division Five, assigned by the Chief Justice pursuant to article VI, section 6 of the California Constitution.
mini_pile
{'original_id': '878090734228e0d54d4a46528bdc2d953529b9155e2f9343c6e5409c99a69462'}
@inproceedings{HerpertzNizielskiSchuetzetal.2013, author = {Sarah Herpertz and Sophia Nizielski and Astrid Sch{\"u}tz and Michael Hock}, title = {Emotional intelligence in applicant selection for jobs involving emotional labor : Abstract}, booktitle = {Imagine the future world : How do we want to work tomorrow? ; Abstract proceedings of the 16th EAWOP Congress 2013}, editor = {Guido Hertel and Carmen Binnewies and Stefan Krumm and Heinz Holling and Martin Kleinmann}, year = {2013}, }
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.7009566426277161}", 'metadata': "{'Content-Length': '1121', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IE6OUSE3XY4ZTS5AR63OYLE26Y2DGH4T', 'WARC-Concurrent-To': '<urn:uuid:1ec35d6c-96eb-44a1-88e9-788173b666c4>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 57, 36), 'WARC-IP-Address': '130.73.102.36', 'WARC-Identified-Payload-Type': 'application/x-bibtex-text-file', 'WARC-Payload-Digest': 'sha1:33XXPWU6DE6A5VBROT7MIYXHONQJ5VCT', 'WARC-Record-ID': '<urn:uuid:fe396d7a-cbc5-4739-a5e9-af9a875d0bcf>', 'WARC-Target-URI': 'https://opus4.kobv.de/opus4-bamberg/citationExport/index/download/searchtype/authorsearch/author/%22Nizielski%2C+Sophia%22/docId/3207/start/1/rows/10/output/bibtex', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2e28c94b-813c-4771-a174-d14fbc883869>', 'WARC-Truncated': None}", 'previous_word_count': '56', 'url': 'https://opus4.kobv.de/opus4-bamberg/citationExport/index/download/searchtype/authorsearch/author/%22Nizielski%2C+Sophia%22/docId/3207/start/1/rows/10/output/bibtex', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-209-241.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9587192535400391', 'original_id': '506d2389c163fba7310b12d63b3ff7654ebb2df6ffe126faa3f39fada9088b24'}
Saturday, October 9, 2010 Progesterone: the pro-gestation hormone I just finished reading Taking Charge of Your Fertility by Toni Weschler. I had been wanting to read it for a while, and it is on the Childbirth International reading list, of which I have to read 3 books for my doula training. Although I had already learned the basics of fertility charting from the internet (and charted a little while trying to conceive my first), this book opened up a whole world of understanding for me about the female body, as well as a better understanding of my own (somewhat strange) gynecological history. Progesterone's Role in the Menstrual Cycle This chart shows the changes in hormone levels throughout the female cycle. (image originally uploaded to Wikimedia by Shazz) Part A depicts the follicle maturing, releasing the egg at ovulation, and acting as the corpus luteum after ovulation. Part B shows the changes in hormone levels throughout the cycle: 1. Follicle Stimulating Hormone 2. Estrogen 3. Luteinizing Hormone 4. Progesterone Here is a somewhat simplified explanation: Follicle stimulating hormone (1) causes follicles on the ovary to mature. These follicle release estrogen (2) and when the estrogen reaches a certain level, a surge of luteinizing hormone (3), which is the hormone ovulation predictor kits measure, occurs which triggers ovulation and one of the follicles releases an egg. That follicle then becomes the corpus luteum, which secretes progesterone (4). All of these hormones are amazing, but progesterone is the star of this post. Progesterone has a warming effect on the body, which is why there is a shift in basal body temperature after ovulation. Progesterone sustains the lining of the uterus for the second half of the menstrual cycle, until the corpus luteum disintegrates, resulting in a drop in progesterone, which triggers menstruation. In late 2006 and early 2007, after I went off the birth control pill, before my daughter was conceived, I was anovulatory. My gynecologist prescribed an oral form of progesterone, which I was to take for a few days and then the drop in progesterone would trigger a bleed, which it did. If the corpus luteum is not producing enough progesterone, the uterine lining would be unable to support implantation of a fertilized egg, often characterized by either spotting in this phase or menstruation starting too soon. In the fall of 2008, when I was breastfeeding my daughter, I was having issues with constant spotting. I took an herb called Vitex, which is said to increase the progesterone secreted by the corpus luteum. The spotting stopped, and I began to have menstrual cycles, so whatever the Vitex did to my hormonal balance, it worked. Progesterone's Role In Pregnancy If the egg is fertilized and implants, it secretes HCG, which is the hormone that changes the color of the second line on the pregnancy test. HCG tells the corpus luteum not to disintegrate and it continues to secrete progesterone, keeping the contents of the uterus in, until the placenta is fully formed and takes over the secretion of this hormone. The warming effect of progesterone continues in pregnancy, so the woman's core temperature remains at the slightly elevated post-ovulation level. Initiation of labor is a complex process, and what exactly starts it is not known. A signal from the fetal lungs is proven to be one factor. Progesterone withdrawal, like that which causes menstruation, is a well-known theory, and probably also plays a role. Progesterone is said to inhibit oxytocin. That would explain why most women do not experience pre-term labor from activities that increase oxytocin levels, such as sex or breastfeeding. Oxytocin is free to cause contractions after the progesterone level has dropped. While I was looking for links for my resource list on indications for induction, I found a Cochrane Review on the use of progesterone supplementation to prevent pre-term birth in at-risk women. The review found the progesterone made a significant difference in the women who carried their babies to term. Perhaps the placenta not producing enough progesterone is one cause of pre-term labor, just like not enough progesterone in early pregnancy is one cause of miscarriage. Just as it did during the luteal phase, progesterone keeps the contents of the uterus in. Perhaps lowered progesterone levels when spontaneous labor is imminent is the reason that natural and low-tech induction methods such as membrane stripping (which triggers prostoglandins), breast pumps (which trigger oxytocin), and intercourse (which, if done correctly, does both), only start labor "when the body is ready." You can also see how trying to use artificial oxytocin to induce women whose progesterone level is still high could be tricky. The body's process of starting labor and the role of different factors in it is something I'm quite curious about and hope more research is done on in the future. I'd be very interested to know what causes contractions to change from Braxton Hick's to ones that feel more intense, and why some women experience these more intense contractions on and off for days or weeks before entering active labor. The more I learn, the more amazed I am by the human female body! 1. I LOVE TCOYF and I LOVE knowing how the body works! It was amazing to me to know that our cycles are more than just bleeding. It is a constant fluctuation of hormones that work perfectly together. So cool! 2. Thanks for writing this! How the female reproductive cyle works and the complex interplay of hormones are very interesting to me as well. If more women understood these things maybe they wouldn't be so willing to interfere with the natural onset of labor. 3. A few weeks ago I listend to a podcast from the "Grey haired OBYN 101" about contractions of the Uterus. In this podcast he mentioned that Progesterone, as a muscle relaxer, might have an other role in fertility to play too. The Uterus contracts almost all the time in different patterns: Contractions from cervix to top pre ovulation, helping the sperms along, or from top to cervix to aid the endometrium on its way out. Progesterone slows and stops this movements of the Uterus and makes it possible for the egg to implant itself in the Uterus and nowhere else. 4. birthtimedoula--thanks for sharing! I hadn't heard that before, and it is fascinating!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9516117572784424}", 'metadata': "{'Content-Length': '146502', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7XEE2R5RDUOPMHJGCT6LAWEULSBI2EJR', 'WARC-Concurrent-To': '<urn:uuid:fd631c94-b93e-4753-a4f7-ce4744fc3242>', 'WARC-Date': datetime.datetime(2019, 5, 24, 11, 54, 48), 'WARC-IP-Address': '172.217.7.193', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6THCISD6DGAE3AW7DFDAU2PLWCP4H4PQ', 'WARC-Record-ID': '<urn:uuid:81cf1741-1b2d-4d1f-b03c-353271d5ea53>', 'WARC-Target-URI': 'http://birthunplugged.blogspot.com/2010/10/progesterone-pro-gestation-hormone.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:aedc30f1-dc49-4a58-9858-f47c62fc8d19>', 'WARC-Truncated': None}", 'previous_word_count': '1048', 'url': 'http://birthunplugged.blogspot.com/2010/10/progesterone-pro-gestation-hormone.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-146-226-231.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.22581875324249268', 'original_id': '864342ad8ee7c76f150ad05fd834198d636345ec1a8ccc1216fd91305e2b88fb'}
How does it work? Forum Empire Universe 3 Empire Universe 3 forum 3.9 (15) Welcome to the Empire Universe 3 Forum... Empire Universe 3 is a free-to-play browser-based game developed and published by Loki studios. The game is available on its website and is accessible to anyone with an internet connection and a device that supports any modern browsers. The game is set in a 2-dimensional world where players take charge of their planet and build it up into an empire. The players then compete against each other using various methods depending on the player’s choice. Advancement can be done via diplomacy and trade or war. Players choose the race they want to build a civilisation out of at the beginning of the game out of 9 available alien classes. The game offers a variety of building structures to allow players to build up their planet in their unique style. The game also demands every planet have a military system to help ward off an attack or raid other planets. Players are required to unlock resources and revenue generating buildings to get in-game currency. As the player advances, they can unlock exciting new features. Players can complete quests and take on missions, or engage with other players to gain money and points. The main feature of the game is the real world timing. The game follows real world time in carrying out gaming functions. The building, researching and attacking can take from minutes to hours. This makes Empire Universe 3 a casual MMO that allows players to multitask during gameplay. Forums of Empire Universe 3 enable players to interact with other players, attain ideas on planet infrastructures, find allies and enemies and interact with other player in the real world.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9437929391860962}", 'metadata': "{'Content-Length': '356776', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5VBRB7PI5TSTQFL7WVSW3PAHBSDI2XVS', 'WARC-Concurrent-To': '<urn:uuid:e5b2fcf0-1e45-4513-8bbc-3bf9057ea620>', 'WARC-Date': datetime.datetime(2022, 12, 8, 10, 27, 50), 'WARC-IP-Address': '104.21.23.213', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ZKXPJOSI3CG6DFIFONPX2424WOQGNAED', 'WARC-Record-ID': '<urn:uuid:bebebbe9-07b3-45cf-ac17-ceb31bca9194>', 'WARC-Target-URI': 'https://www.bananatic.com/forum/games/empire-universe-3-69/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d3e85b4e-952a-4b05-99cf-46d84386fbe4>', 'WARC-Truncated': None}", 'previous_word_count': '290', 'url': 'https://www.bananatic.com/forum/games/empire-universe-3-69/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-73\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.8327933549880981', 'original_id': '308cc52e2ee11e72bd7b5c244ecc36d78117ddfba0bc6ea8881a01ca2f580f68'}
Bill O’Reilly Adopts the Precautionary Principle She repeated this assertion to a skeptical Bill O’Reilly, who told her that, even if there was scientific discussion going on about the effects of radiation, it was the media’s job to be “responsible” and “err on the side of caution” about radiation. “You have to report the worst-case scenario,” he said, adding that there is a clear scientific consensus that “some radiation will kill you.” “Err on the side of caution.”  “Report the worst-case scenario.” I only wish he would take the same approach to other environmental problems. , ,
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '55', 'language_id_whole_page_fasttext': "{'en': 0.9477116465568542}", 'metadata': "{'Content-Length': '95604', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RP7GA7P6IUFBWG6XSJO4GLECQBJOOTS7', 'WARC-Concurrent-To': '<urn:uuid:b278d819-dc07-4189-9819-19926e702e61>', 'WARC-Date': datetime.datetime(2018, 12, 13, 17, 55, 50), 'WARC-IP-Address': '104.28.23.5', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YHD4VN6JBALD3G33AOT3FZXCETQERACA', 'WARC-Record-ID': '<urn:uuid:a9d985c6-7e13-45ba-9c2e-4b400cff0e94>', 'WARC-Target-URI': 'https://legal-planet.org/2011/03/20/bill-oreilly-adopts-the-precautionary-principle/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a1f9cef7-b37c-4e28-96bc-31a4bb85b070>', 'WARC-Truncated': None}", 'previous_word_count': '137', 'url': 'https://legal-planet.org/2011/03/20/bill-oreilly-adopts-the-precautionary-principle/', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-179-113-199.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08427178859710693', 'original_id': '3637a0a20391ab40abb7298c01f207deabb7239c83551eeaa7af3cfc7a927fd0'}
Home > categories > Automotive & Motorcycle > Axles > how o change front axles on atv 4x4? how o change front axles on atv 4x4? 2000 artic cat For future reference, always give year, make, engine size and model # when asking questions. We need all of that info to give an informed answer. In some cases it can make a difference. After removing the wheel, brake, shock, A-arms and knuckle - PULL the axle out of the differential. There's a circlip on the end of the axle. It looks just like the circlips holding a piston to the connecting rod. When you pull the axle, the circlip contracts enough to fit through the hole in the differential. Sometimes they're weak enough to pull out the axle by hand, with a strong jolt. Sometimes they're so stiff, a slide hammer is needed. May 28, 2018 well i dont know about california laws but the other end of the country in maine you have to take a course that costs about $60 to get your learners permit and another course that costs about 200 to get your license and they help you with everything you need to know to start riding. as far as a bike goes yeah cruisers are much heavier then most other bikes but they do ride the best. if you have no experience riding i would recomend getting something like a honda rebel 250. they are pretty decent looking bikes and they weigh only about 300 lbs so they are great for learning even if you only drive it for a year its worth it i think. May 28, 2018 Share to:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.95234477519989}", 'metadata': "{'Content-Length': '33895', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HXZQXUPPM4VF2Z7IBSYDJ4NNFIAFUUZI', 'WARC-Concurrent-To': '<urn:uuid:554056dd-bce7-4330-9147-a6ed0c658a89>', 'WARC-Date': datetime.datetime(2021, 1, 23, 16, 54, 8), 'WARC-IP-Address': '211.151.17.154', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:QZKWQG2DP26Z5CIGGW7KTV3B4FIE4HKY', 'WARC-Record-ID': '<urn:uuid:ff30afb9-2fcd-4a6b-8d12-591425322dee>', 'WARC-Target-URI': 'https://ask.okorder.com/questions/how-o-change-front-axles-on-atv-4x4_950214.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4226458e-c3dc-4071-bd45-0918b3a37ebf>', 'WARC-Truncated': None}", 'previous_word_count': '270', 'url': 'https://ask.okorder.com/questions/how-o-change-front-axles-on-atv-4x4_950214.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-90.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03356963396072388', 'original_id': '8c24b9a273a8f20b3394a8c4c6999e2e9075ecc68f725d62edd9c26e6ba937bd'}
Systems, devices, and methods for protecting access privacy of cached content ABSTRACT Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay. CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority to U.S. Provisional Patent Application No. 61/820,372, titled “SYSTEMS, DEVICES, AND METHODS FOR PROTECTING ACCESS PRIVACY OF CACHED CONTENT”, filed on May 7, 2013, hereby incorporated by reference. The present disclosure relates to systems, devices, and methods for protecting access privacy of cached content in information centric networks. BACKGROUND Information Centric Networks (hereinafter, “ICN”) have been proposed as an alternative approach to a computer network architecture. ICNs are designed around the principle that a user should be allowed to focus on the content to be retrieved, not on the physical location of the content. An ICN can allow for the retrieval of content from content servers based on the name of the content. For example, a request for content can be passed up a chain of routers until the request is received by a content server that stores the content. The content server can send the content back to the user using the same path as the request. Additionally, the routers along the path between the requestor and the content server can cache the content for future requests. Accordingly, future requestors following parts of the same path will be able to retrieve the cached content and avoid transmission delays. However, the universal caching mechanism in an ICN poses a privacy risk. In particular, the time difference between data response for cached data and uncached data can be used to infer whether a near-by user has previously requested the same content. Accordingly, ICN technologies may benefit from techniques for protecting access privacy of cached content. SUMMARY The present disclosure relates generally to methods, systems, and computer readable media for providing these and other improvements to information centric network technologies. Implementations of the present teachings relate to methods, systems, and computer-readable storage media for preventing timing determinations based on cached content in an information centric network. In some embodiments, a computing device can receive, at the computing device, a request for content from a user, where a cached version of the content is locally stored at the computing device. The computing device can initiate a time delay based on a determination that the user has not previously requested the content, and transmit the cached version of the content to the user after the time delay. In some embodiments, the time delay may be initiated based on determination that the content is determined to be sensitive content and/or is associated with a privacy mode. In other embodiments, a computing device can receive a request for content via a port of the computing device, where a cached version of the content is locally stored at the computing device, and the port is uniquely assigned to an access point of one or more users. The computing device can initiate a time delay based on a determination that the content has not been previously requested via the port of the computing device, and transmit the cached version of the content to a user via the access point after the time delay. In some embodiments, the time delay may be initiated based on determination that the content is determined to be sensitive content and/or is associated with a privacy mode. In further embodiments, a computing device can receive a request for content via a port of the computing device, where a cached version of the content is locally stored, relative to the computing device, the request includes an indication that the content has not been previously requested by a user associated with the request, and the port is uniquely assigned to an access point of one or more users. The computing device can initiate a time delay based on the indication that the content has not been previously requested by the user, and transmit the cached version of the content to the user via the access point after the time delay. In some embodiments, the time delay may be initiated based on determination that the content is determined to be sensitive content and/or is associated with a privacy mode. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various embodiments of the present disclosure and together, with the description, serve to explain the principles of the present disclosure. In the drawings: FIG. 1 is a diagram depicting a schematic of an example information centric network, consistent with certain disclosed embodiments; FIG. 2 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments; FIG. 3 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments; FIG. 4 is a diagram depicting a schematic of an example information centric network, consistent with certain disclosed embodiment; FIG. 5 is a flow diagram illustrating an example method of flagging requests for sensitive content, consistent with certain disclosed embodiments; FIG. 6 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments; and FIG. 7 is a diagram illustrating an example hardware system for protecting access privacy of cached content, consistent with certain disclosed embodiments. DETAILED DESCRIPTION The following detailed description refers to the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the following description refers to the same or similar parts. While several example embodiments and features of the present disclosure are described herein, modifications, adaptations, and other implementations are possible, without departing from the spirit and scope of the present disclosure. Accordingly, the following detailed description does not limit the present disclosure. Instead, the proper scope of the disclosure is defined by the appended claims. FIG. 1 is a diagram depicting a schematic of an example information centric network, consistent with certain disclosed embodiments. In particular, FIG. 1 depicts an ICN 100 that includes a content server 110, routers 120 (R1), 130 (R2), and 140 (R3), and users 150 (U1), 160 (U2), and 170 (U3). Content server 110, routers 120, 130, and 140, and users 150, 160, and 170 can be referred to as nodes of ICN 100. As used herein, an Information Centric Network (ICN) can generally refer to any type of multi-level computer network that can transfer content requests and content between levels, and where content can be cached at different levels in the network. Additionally, as used herein, content can refer to any data and/or information that can be transmitted over a network, such as, for example, network packets, data structures, programs, computer files, etc. Content server 110 can represent any type of one or more computing devices that can store content, receive requests for content, and transmit content to one or more routers and/or users in response to the requests. Content server 110 is depicted in ICN 100 as connected to router 120. As used herein, depictions and reference to two nodes being connected can indicate that the two nodes are capable of communication and transmission of data via one or more direct and/or indirect connections. For example, two connected nodes can be directly connected via an Ethernet cable, can be indirectly connected via one or more routers, can be connected via a wired and/or wireless network, can be connected via the Internet, etc. Router 120, router 130, and router 140 can represent any type of computing devices that can perform algorithms and logic for initiating time delays, as disclosed herein, can receive and forward requests for content from users, and can receive, cache, and forward content from one or more content servers and/or routers. In some embodiments, a router can be a network router, a network switch, a network hub, a network bridge, a proxy server, etc. Router 120 is depicted in ICN 100 as connected to content server 110, router 130, and router 140. Router 130 is depicted as connected to router 120 and user 170. Router 140 is depicted as connected to router 120, user 160, and user 150. In ICN 100, routers 130 and 140 can be considered “edge routers,” where an edge router, relative to a user, is the primary router connected to the user that forwards the users requests, directly or indirectly, to a content server. In some embodiments, user 150, user 160, and user 170 can represent client computing devices of users of ICN 100. In other embodiments, users 150, 160, and 170 can represent access points to ICN 100 for users. For example, each of users 150, 160, and 170 can represent the closest connecting point of one or more users to ICN 100, such as a router or any other type of connected computing device. User 150 and user 160 are depicted in ICN 100 as connected to router 140. User 170 is depicted as connected to router 130. Accordingly, based on the principals of ICNs, requests for content from users 150, 160, and 170 are first transferred to routers 130 and 140. Routers 130 and 140 forward the requests to router 120, and router 120 forwards the requests to content server 110. Content server 110 then sends the requested content to router 120. Router 120 can cache the content and then send the content to either router 130 or router 140, depending on the source of the request. Router 130 and 140 can cache the content and then send the content to users 150, 160, and 170. When future requests for content that has been cached are received by any of the routers, the router can respond to the request with the cached content instead of transferring the request up the chain and/or to content server 110. For example, user 150 can request specified content by sending the request to router 140. If router 140 does not have the specified content cached, it would send the request up the chain to router 120. If router 120 does not have the specified content cached, it would send the request up the chain to content server 110. Content server 110 would respond to the request by sending the specified content to router 120. Router 120 can cache the content and send it to router 140. Router 140 can cache the content and send it to user 150. Subsequently, user 160 can request the same specified content by sending the request to router 140. Because router 140 has the content cached it can send the specified content to user 160 without having to transfer the request up the chain. User 170 can also request the same specified content by sending the request to router 130. Router 130 would not have received and cached the content based on user 150's request because router 130 is not between user 150 and content server 110. Accordingly, if router 130 does not otherwise have the specified content cached, it would send the request up the chain to router 120. Because router 120 has the content cached it can send the specified content to router 130 without having to transfer the request up the chain. Router 130 can cache the content and send it to user 170. In the above example, user 160 and user 170 would typically receive the content quicker than if the content was retrieved from the content server. Additionally, by timing content requests user 160 and user 170 may be able to determine when content is cached and when content is retrieved from content server 110. Accordingly, users 160 and 170 could determine that content has been previously accessed and possibly by which users. For example, user 160 could determine that the content was cached at router 140 by determining that the time from request to receipt was only enough to hop from one node and back. If user 160 was aware that user 150 was the only other user connected to router 140 and that user 160 had not accessed the content previously, user 160 would now know that user 150 had previously accessed the content. Accordingly, as an additional example to prevent such timing determinations, user 150 can request sensitive content by sending the request to router 140 along with an indication that the request is private. Router 140 could transfer the request and cache the sensitive content when it is received, as in the example above. Subsequently, user 160 can request the same sensitive content by sending the request to router 140. Because router 140 has the content cached it can send the sensitive content to user 160 without having to transfer the request up the chain. However, because user 150 indicated that the request was to be private, router 140 can initiate a time delay before sending the sensitive content to user 160. If user 160 requests the sensitive content again, router 140 can send the sensitive content again, but this time without initiating the time delay. User 160 would not be able to determine if another user had requested the sensitive content based on the second request because user 160 would not know if the sensitive content was cached when another user requested it or when user 160 requested it the first time. The example depicted in FIG. 1 is merely for the purpose of illustration, and is not intended to be limiting. For example, additional users, routers, and content servers may be used as part of an ICN. Additionally, the structure of the ICN depicted is merely a simplified example of an ICN, consistent with certain disclosed embodiments, but such an example is not intended to be limiting. FIG. 2 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments. The example method may be performed by a router in an ICN, such as, for example, routers 120, 130, and 140 in FIG. 1. The process can begin in 200 when a computing device (e.g. a router in an ICN) receives a request for sensitive content from a first user. The request can be received directly from the first user or via another computing device (e.g. another router). For the description of FIG. 2, a user can refer to either a client computing device of a user or an access point of one or more users. In some embodiments, the computing device can determine that the content is sensitive content based on an indication from the first user. For example, the request can include a privacy mode flag that the first user used to indicate that the content is sensitive and/or that privacy for the request is desired. In other embodiments, the computing device may determine that the content is sensitive content based on the content itself, such as by matching a content identifier to a list of content to be treated as sensitive, or by receiving an indication from a content server included with the content when the content is eventually received from the content server. The computing device can store the indication that the content is sensitive content by associating, for example, the request, the content (when received), and/or a content identifier with the indication. In some embodiments, the computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. If the content is not cached, in 210, the computing device can transfer the request to a content server (e.g. router 120 to content server 110 in FIG. 1) or to a secondary router up the chain towards a content server (e.g. router 140 to router 120). If the computing device transfers the request to a secondary router, the secondary router can perform the same or similar steps as described in regard to FIG. 2. Accordingly, the secondary router can either transfer the request to a tertiary router, and so on, or to the content server. In 220, the computing device can receive the content directly from the content server or from the content server via the secondary router. The computing device can then cache the content for future requests and can transfer the content to the first user directly or through the computing device that transferred the request. In 230, the computing device can receive a request for the sensitive content from a second user. The request can be received directly from the second user or via another computing device (e.g. another router). The computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. Because the computing device has previously cached the sensitive content, and assuming the cached sensitive content has not been previously cleared, the computing device can determined that the content is cached. Additionally, the computing device can determine that the cached content is sensitive content by determining that the indication that the content is sensitive content is associated with, for example, the content, the content identifier, and/or the user that originally requested the content. In 240, based on the determination that the content is sensitive, the computing device can determine if this is the first request for the sensitive content by the second user. In some embodiments, the computing device can maintain a list of users and content requested by users. For example, the users can be identified based on a user identifier, a user account identifier, an Internet Protocol (IP) address, and/or a media access control (MAC) address, and the content can be identified based on a content identifier. In other embodiments, the computing device can maintain a list of ports and the content requested via the ports. For example, a user can be an access point of multiple users and the access point can be assigned to a unique port of the computing device. Accordingly, the computing device can determine if a request via the unique port is the first request for the sensitive content via the unique port (i.e. via the access point). If, in 240, the computing device determines that the second user has not previously requested the sensitive content, the computing device can, in 250, initiate a time delay. For example, the computing device can compute and initiate the time delay as discussed below in the example described with regard to FIG. 3. After the time delay, in 260, the computing device can transfer the cached sensitive content to the second user directly or through the computing device that transferred the request. If, in 240, the computing device determines that the second user has previously requested the sensitive content, no time delay may be necessary, and the computing device can immediately transfer the cached sensitive content to the second user directly or through the computing device that transferred the request. While the steps depicted in FIG. 2 have been described as performed in a particular order, the order described is merely example, and various different sequences of steps can be performed, consistent with certain disclosed embodiments. Additionally, the steps are described as discrete steps merely for the purpose of explanation, and, in some embodiments, multiple steps may be performed simultaneously and/or as part of a single computation. Further, the steps described are not intended to be exhaustive or absolute, and various steps can be inserted or removed. FIG. 3 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments. The example method may be performed by a router in an ICN, such as, for example, routers 120, 130, and 140 in FIG. 1. The process can begin in 300 when a computing device (e.g. a router in an ICN) receives a time stamped (TS0) request for sensitive content from a first user. For the description of FIG. 3, a user can refer to either a client computing device of a user or an access point of one or more users. Additionally, for the purposes of this example, the computing device can receive the request directly from the first user (i.e. one “hop” from the first user). In some embodiments, the computing device can determine that the content is sensitive content based on an indication from the first user. For example, the request can include a privacy mode flag that the first user used to indicate that the content is sensitive and/or that privacy for the request is desired. In other embodiments, the computing device may determine that the content is sensitive content based on the content itself, such as by matching a content identifier to a list of content to be treated as sensitive, or by receiving an indication from a content server included with the content when the content is eventually received from the content server. The computing device can store the indication that the content is sensitive content by associating, for example, the request, the content (when received), and/or a content identifier with the indication. In some embodiments, the computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. In 305, the computing device can record the time of receipt of the request (TS1). The computing device can record this time before or after determining that the content is not cached. In some embodiments, the computing device may not need to record the time of receipt if the sensitive content is already cached because the time delay (D) may have already been computed when the content was cached. In 310, the computing device can compute the amount of time of a one-hop delay, which is the time between sending a request from a first node and receiving the request at a second, adjacent node. The computing device can subtract the timestamp of the request (TS0) from the time of receipt of the request (TS1) to compute the one-hop delay (TD0): TD0=TS1−TS0. In 315, the computing device can transfer the request to a content server or to a secondary router up the chain towards a content server (e.g. router 140 to router 120). If the computing device transfers the request to a secondary router, the secondary router can perform similar steps as described in FIG. 3. However, the secondary router would have to account for multiple hops in determining the one-hop delay. The secondary router can either transfer the request to a tertiary router, and so on, or to the content server. In some embodiments, the secondary router can determine the one-hop delay based on an acknowledgement received from the tertiary router that is sent by the tertiary router upon receipt of the request. The secondary router can determine the one-hop delay to be the difference between the time the request is sent to the tertiary router and the time the acknowledgement is received from the tertiary router. In other embodiments, if the request is transferred from the secondary router directly to the content server, the secondary router can determine the one-hop delay based on when the content is received from the content server as opposed to when an acknowledgement is received. In 320, the computing device can receive the content directly from the content server or from the content server via the secondary router and can record the time of receipt of the sensitive content (TS2). In 325, the computing device can compute the retrieval time (TDX) for the content. The computing device can subtract the time of receipt of the request (TS1) from the time of receipt of the sensitive content (TS2) to compute the retrieval time (TDX): TDX=TS2−TS1. The computing device can then compute the estimated number of hops to the content server (N) using the retrieval time (TDX) and the one-hop delay (TD0): N=TDX/(2*TD0+1). In some embodiments, the estimated number of hops to the content server (N) may be rounded to the nearest whole integer. In other embodiments, the estimated number of hops to the content server (N) can be truncated or, alternatively, rounded up to the nearest whole integer. In 335, the computing device can cache the content for future requests and can transfer the content to the first user. In 340, the computing device can receive a request for the sensitive content from a second user. For the purposes of this example, the computing device can receive the request directly from the second user (i.e. one “hop” from the second user). The computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. Because the computing device has previously cached the sensitive content, and assuming the cached sensitive content has not been previously cleared, the computing device can determined that the content is cached. Additionally, the computing device can determine that the cached content is sensitive content by determining that the indication that the content is sensitive content is associated with, for example, the content, the content identifier, and/or the user that originally requested the content. In 345, based on the determination that the content is sensitive, the computing device can determine if this is the first request for the sensitive content by the second user. If, in 345, the computing device determines that the second user has not previously requested the sensitive content, the computing device can, in 350, compute and initiate a time delay. If the estimated number of hops (N) to the content server is one, the time delay (D) can be, in some embodiments, zero because the retrieval time is minimal and adding unnecessary time delays can have an adverse effect on performance: IF N=1,D=0. In other embodiments, the time delay (D) can be set to be a time at or near the retrieval time (TDX): IF N=1,D≈TDX or set to be a time between zero and the retrieval time (TDX) (e.g. randomly) to balance performance and privacy: IF N=1,0<D<TDX. If the estimated number of hops (N) to the content server is greater than one the time delay (D) can be, in some embodiments, greater than two times the one-hop delay (2*TD0) but less than the retrieval time (TDX) (e.g. selected randomly between 2*TD0 and TDX): IF N>1,(2*TD0)<D<TDX. Two times the one-hop delay (TD0) represents the estimated retrieval time from a content server that is one hop from the computing device. Accordingly, to balance performance and privacy, the time delay will be less than the time to retrieve the content from the content server but the second user would not be able to determine that the sensitive content is cached at the computing device using a timing attack. After the time delay, in 355, the computing device can transfer the cached sensitive content to the second user. In some embodiments, the computing device may store the computed time delay and use it for any future first requests from the same user for sensitive content that is already cached at the computing device. In other embodiments, the computing device may use the same computed time delay for other users that are one-hop from the computing device. In still further embodiments, the computing device may calculate the time delay each time a first request for sensitive content that is already cached is received. If, in 345, the computing device determines that the second user has previously requested the sensitive content, no time delay may be necessary, and the computing device can immediately transfer the cached sensitive content to the second user directly or through the computing device that transferred the request. While the steps depicted in FIG. 3 have been described as performed in a particular order, the order described is merely example, and various different sequences of steps can be performed, consistent with certain disclosed embodiments. Additionally, the steps are described as discrete steps merely for the purpose of explanation, and, in some embodiments, multiple steps may be performed simultaneously and/or as part of a single computation. Further, the steps described are not intended to be exhaustive or absolute, and various steps can be inserted or removed. FIG. 4 is a diagram depicting a schematic of an example information centric network, consistent with certain disclosed embodiments. In particular, FIG. 4 depicts an ICN 400 that includes a content server 410, routers 420 (R1) and 430 (R2), access points 440 (AP1) and 450 (AP2), and users 460 (U1), 470 (U2), and 480 (U3). Content server 410, routers 420, and 430, access points 440 and 450, and users 460, 470, and 480 can be referred to as nodes of ICN 400. Content server 410 can represent any type of one or more computing devices that can store content, receive requests for content, and transmit content to one or more routers and/or users in response to the requests. Content server 410 is depicted in ICN 400 as connected to router 420. Router 420 and router 430 can represent any type of computing devices that can perform algorithms and logic for initiating time delays, as disclosed herein, can receive and forward requests for content from users, and can receive, cache, and forward content from one or more content servers and/or routers. Router 420 is depicted in ICN 400 as connected to content server 410 and router 430. Router 430 is depicted as connected to router 420 and access points 440 and 450. Access points 440 and 450 can represent any type of computing device that provides one or more users access to an ICN. For example, an access point can be a router for a local area network that includes multiple devices, an internet server provider, a wireless access point, etc. Access point 440 is depicted in ICN 400 as connected to router 430 and user 480. Access point 450 is depicted in ICN 400 as connected to router 430, user 470, and user 460. Access points 440 and 450, as depicted in ICN 400, can represent the closest access points to ICN 400 for users 460, 470, and 480. In some embodiments, user 460, user 470, and user 480 can represent client computing devices of users of ICN 400. User 460 and user 470 are depicted in ICN 400 as connected to access point 450. User 480 is depicted as connected to access point 440. Accordingly, based on the principals of ICNs, requests for content from users 460, 470, and 480 are first transferred to access points 440 and 450. Access points 440 and 450 forward the requests to router 430, which forwards requests to router 420, and router 420 forwards the requests to content server 410. Content server 410 then sends the requested content to router 420. Router 420 can cache the content and then send the content to router 430. Router 430 can cache the content and send the content to either access point 440 or access point 450, depending on the source of the request. When future requests for content that has been cached are receive by any of the routers, the router can respond to the request with the cached content instead of transferring the request up the chain and/or to content server 410. In ICN 400, access points 440 and 450 can perform algorithms and logic to assist the routers in preventing timing determinations on sensitive content. As an example to prevent such timing determinations, user 460 can request sensitive content by sending the request through access point 450 to router 430 along with an indication that the request is private. Router 430 could transfer the request and cache the sensitive content when it is received. Subsequently, user 470 can request the same sensitive content by sending the request through access point 450 to router 430. Access point 450 can determined that user 470 has not previously accessed the sensitive content and flag the request as being a first time request from a user before transferring the request to router 430. Because router 430 has the content cached it can send the sensitive content to user 470 without having to transfer the request up the chain. However, because user 460 indicated that the request was to be private and the request was flagged as a first time request by access point 450, router 430 can initiate a time delay before sending the sensitive content to user 470. If user 470 requests the sensitive content again, router 430 can send the sensitive content again, but this time access point 450 would not flag the request and the sensitive content would be sent without initiating the time delay. User 470 would not be able to determine if another user had requested the sensitive content based on the second request because user 470 would not know if the sensitive content was cached when another user requested it or when user 470 requested it the first time. Additionally, router 430 would not have to maintain a list of which users accessed which content, but can use the flags created by the access points. In some embodiments, routers can maintain a list of which access points have transferred requests for specific content and initiate time delays if the request is a first request via an access point for cached content even if the request is not flagged. The example depicted in FIG. 4 is merely for the purpose of illustration, and is not intended to be limiting. For example, additional users, access points, routers, and content servers may be used as part of an ICN. Additionally, the structure of the ICN depicted is merely a simplified example of an ICN, consistent with certain disclosed embodiments, but such an example is not intended to be limiting. FIG. 5 is a flow diagram illustrating an example method of flagging requests for sensitive content, consistent with certain disclosed embodiments. The example method may be performed by an access point to an ICN, such as, for example, access points 440 and 450 as described in regard to FIG. 4. The process can begin in 500 when a computing device (e.g. an access point in an ICN) receives a request for sensitive content from a user. The request can be received directly from the user or via another computing device (e.g. another router). In some embodiments, the computing device can determine that the content is sensitive content based on an indication from the first user. For example, the request can include a privacy mode flag that the first user used to indicate that the content is sensitive and/or that privacy for the request is desired. In other embodiments, the computing device may determine that the content is sensitive content based on the content itself, such as by matching a content identifier to a list of content to be treated as sensitive, or by receiving an indication from a content server included with the content when the content is eventually received from the content server. In further embodiments, the computing device may not determine whether the content is sensitive and may flag all first-time requests for content from a particular user. The computing device may store the indication that the content is sensitive content by associating, for example, the request, the content (when received), and/or a content identifier with the indication. In 510, the computing device can determine if this is the first request for the sensitive content by the user. In some embodiments, the computing device can maintain a list of users and content requested by users. For example, the users can be identified based on a user identifier, a user account identifier, an Intemet Protocol (IP) address, and/or a media access control (MAC) address, and the content can be identified based on a content identifier. If, in 510, the computing device determines that the user has not previously requested the sensitive content, the computing device can, in 520, flag the request. In some embodiments, the commuting device may only flag the request if the computing device determines that the requested content is sensitive. If, in 510, the computing device determines that the user has previously requested the sensitive content, the content may not be flagged. In 530, the computing device can transfer the flagged or not flagged request to a router in the ICN. In 540, the computing device can receive the sensitive content from the router in response to the request. In 550, the computing device can transfer the sensitive content to the user. While the steps depicted in FIG. 5 have been described as performed in a particular order, the order described is merely example, and various different sequences of steps can be performed, consistent with certain disclosed embodiments. Additionally, the steps are described as discrete steps merely for the purpose of explanation, and, in some embodiments, multiple steps may be performed simultaneously and/or as part of a single computation. Further, the steps described are not intended to be exhaustive or absolute, and various steps can be inserted or removed. FIG. 6 is a flow diagram illustrating an example method of initiating a time delay for cached content, consistent with certain disclosed embodiments. The example method may be performed by a router in an ICN, such as, for example, routers 420 and 430 in FIG. 4, where the ICN includes one or more access points that perform the steps described in regard to FIG. 5. The process can begin in 600 when a computing device (e.g. a computer device in an ICN) receives a request for sensitive content via an access point. The access point (e.g. another router) can be an access point to the ICN for multiple users, and the request may have originated from one of the users. In some embodiments, the computing device can determine that the content is sensitive content based on an indication from the user and/or the access point. For example, the request can include a privacy mode flag that the user used to indicate that the content is sensitive and/or that privacy for the request is desired. In other embodiments, the computing device may determine that the content is sensitive content based on the content itself, such as by matching a content identifier to a list of content to be treated as sensitive, or by receiving an indication from a content server included with the content when the content is eventually received from the content server. The computing device can store the indication that the content is sensitive content by associating, for example, the request, the content (when received), and/or a content identifier with the indication. In some embodiments, the computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. If the content is not cached, in 610, the computing device can transfer the request to a content server (e.g. router 420 to content server 410 in FIG. 4) or to a secondary router up the chain towards a content server (e.g. router 430 to router 420). If the computing device transfers the request to a secondary router, the secondary router can perform the same or similar steps as described in regard to FIG. 6. Accordingly, the secondary router can either transfer the request to a tertiary router, and so on, or to the content server. In 620, the computing device can receive the content directly from the content server or from the content server via the secondary router. The computing device can then cache the content for future requests and can transfer the content to the access point. In 630, the computing device can receive a second request for the sensitive content from the access point. The request may have originated from a different user than the first request. The computing device can check its cache to determine if the content is cached. For example, the computing device can attempt to match the content identifier with identifiers of the content that is cached. Because the computing device has previously cached the sensitive content, and assuming the cached sensitive content has not been previously cleared, the computing device can determined that the content is cached. Additionally, the computing device may determine that the cached content is sensitive content by determining that the indication that the content is sensitive content is associated with, for example, the content, the content identifier, and/or the user that originally requested the content. In 640, the computing device can determine if the request has been flagged by the access point. In some embodiments, the computing device may only determine if the request has been flagged, while, in other embodiments, the computing device may also determine if the request is a first request received from that particular access point. Accordingly, in some embodiments, the computing device can maintain a list of access points and content requested via the access points. For example, the access points can be identified based on an access point identifier, an Internet Protocol (IP) address, and/or a media access control (MAC) address, and the content can be identified based on a content identifier. If, in 640, the computing device determines that the content is flagged, the computing device can, in 650, initiate a time delay. For example, the computing device can compute and initiate the time delay as discussed in the example described with regard to FIG. 3. After the time delay, in 660, the computing device can transfer the cached sensitive content to the access point. If, in 640, the computing device determines that the content is not flagged, in some embodiments, no time delay may be necessary, and the computing device can immediately transfer the cached sensitive content to the access point. In further embodiments, the computing device may only immediately transfer the cached sensitive content if the request is not a first request received from that particular access point. While the steps depicted in FIG. 6 have been described as performed in a particular order, the order described is merely example, and various different sequences of steps can be performed, consistent with certain disclosed embodiments. Additionally, the steps are described as discrete steps merely for the purpose of explanation, and, in some embodiments, multiple steps may be performed simultaneously and/or as part of a single computation. Further, the steps described are not intended to be exhaustive or absolute, and various steps can be inserted or removed. FIG. 7 is a diagram illustrating an example hardware system for protecting access privacy of cached content, consistent with certain disclosed embodiments. The example system 700 includes example system components that may be used. The components and arrangement, however, may be varied. A computer 701 may include a processor 710, a memory 720, storage 730, and input/output (I/O) devices (not pictured). The computer 701 may be implemented in various ways and can be configured to perform any of the embodiments described above. For example, the computer 701 may be a general purpose computer, a router, an edge router, an access point, a content server, an origin server, a mainframe computer, any combination of these components, or any other appropriate computing device. The computer 701 may be standalone, or may be part of a subsystem, which may, in turn, be part of a larger system. The processor 710 may include one or more known processing devices, such as a microprocessor from the Intel Core™ family manufactured by Intel™, the Phenom™ family manufactured by AMD™, or any of various processors manufactured by Sun Microsystems. Memory 720 may include one or more storage devices configured to store information used by processor 710 to perform certain functions related to disclosed embodiments. Storage 730 may include a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of computer-readable medium used as a storage device. In one embodiment, memory 720 may include one or more programs or subprograms that may be loaded from storage 730 or elsewhere that, when executed by computer 701, perform various procedures, operations, or processes consistent with disclosed embodiments. For example, memory 720 may include an access privacy program 725 for protecting access privacy of cached contents according to disclosed embodiments. Memory 720 may also include other programs that perform other functions and processes, such as programs that provide communication support, Internet access, etc. The access privacy program 725 may be embodied as a single program, or alternatively, may include multiple sub-programs that, when executed, operate together to perform the function of the access privacy program 725 according to disclosed embodiments. The computer 701 may communicate over a link with a network 760. For example, the link may be a direct communication link, a LAN, a WAN, or other suitable connection. The network 760 may include the internet, as well as other systems. For example, in embodiments, the network can be part of an ICN. The computer 701 may include one or more I/O devices (not pictured) that allow data to be received and/or transmitted by the computer 701. I/O devices may also include one or more digital and/or analog communication input/output devices that allow the computer 701 to communicate with other machines and devices. I/O devices may also include input devices such as a keyboard or a mouse, and may include output devices such as a display or a printer. The computer 701 may receive data from external machines and devices and output data to external machines and devices via I/O devices. The configuration and number of input and/or output devices incorporated in I/O devices may vary as appropriate for various embodiments.
common_corpus
{'identifier': 'US-201414269484-A_1', 'collection': 'USPTO', 'open_type': 'Open Government', 'license': 'Public Domain', 'date': '2014.0', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '7672', 'token_count': '9276', '__index_level_0__': '32350', 'original_id': '05f8eb1495636605bae9c825a9a1ec06d76682179b1523f6b39835650bbcdd22'}
The game with champagne Serena Van Der Woodsen’s Nottest to Hottest 5 Valentine’s Day gift ideas you need to buy yourself News for Blondes: Why do women HATE Trump? We know the world hates Trump … but why? What does it mean to be a woman in the US and why is everyone (and Lady Gaga) always marching? Help… new year, same me! The party streamers have been thrown away (along with those empty bottles of Cîroc) and that guy you kissed still hasn’t texted you back. New Year’s Eve might be over but darling, the party is only just starting. He’s Jewish, I’m not … now what? Since I was a little girl day-dreaming about my wedding whilst playing with Barbie Dolls, never in my wildest dreams did I imagine that Barbie would one day walk down the aisle towards a Chuppah, while her Ken stood before her in a yarmulke. Why every couple needs counseling Whether you’re young or old, blissfully happy or throwing plates at each other, here’s why every couple needs to see SA’s relationship queen. A blogger’s letter to other girls. Why is it, that in my ‘Insta-perfect’ world with a following of thousands, I’m more depressed than ever? My life with porn Our journalist dishes on her life in London’s billion Pound porn industry (and it’s not what you’re thinking).
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '48', 'language_id_whole_page_fasttext': "{'en': 0.8901084065437317}", 'metadata': "{'Content-Length': '67987', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FVWCHEKXDVMFUJLE52RNPI2YWUTI6XOZ', 'WARC-Concurrent-To': '<urn:uuid:ee0f22d7-4d32-47a7-8640-6bffdf2b9129>', 'WARC-Date': datetime.datetime(2019, 5, 23, 3, 50, 24), 'WARC-IP-Address': '129.232.136.57', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FFVEDN54GJ6FIDKIWJ2S5ZPBQIOYFOSZ', 'WARC-Record-ID': '<urn:uuid:afa5ec60-dac1-4c7d-9b11-ea0699d78b8d>', 'WARC-Target-URI': 'https://passportsandperignon.com/category/everything/lets-talk-about-sex/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3e50d925-cc6d-4555-a21b-00f2269b6d2c>', 'WARC-Truncated': None}", 'previous_word_count': '307', 'url': 'https://passportsandperignon.com/category/everything/lets-talk-about-sex/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-236-17-239.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9951810240745544', 'original_id': '9bb860eec6f7deb4ff1bc1d366446e1feb5fa843e0ed5385d0fecf66bd2a8e0d'}
Expand + Here fellow colleague Patty Ferrant and I (Antoinette Villarin) share our lesson with our math coach Suzanne McSpadden. Our discussions include the objectives, process, and reasoning for how we approached area and perimeter. We discuss why we chose the lesson, how we designed it, and what big ideas would be addressed in the lesson. We then share the design of our lesson, which Suzanne parallels to a MARS task. Our lesson includes entry-level discussions with the class about area and perimeter, a main activity addressing the core mathematics behind these concepts, and a ramp-up challenge for students who were ready to move on. In this discussion, Patty and I want to emphasize our goals of justification, discourse, and making connections between the procedural skill and the big ideas. 7th Grade Math - Area and Perimeter Next Up:   Introduction SUZANNE MCSPADDEN: I'm Suzanne McSpadden and I'm a math coach at the Jefferson School District. PATRICIA FERRANT: Hi, I'm Patty Ferrant and I teach at Pollicita Middle School in Daly City. ANTOINETTE VILLARIN: Hi, my name is Antoinette Villarin and I teach 7th grade math at Fernando Rivera Middle School in Daly City. SUZANNE MCSPADDEN: The lesson you're going to be doing today is a re-engagement lesson based on the task. Would you like to describe the task that you used as the basis for this lesson? ANTOINETTE VILLARIN: Yeah. It was a...we chose a 7th grade task called "Pizza Crust" and it involves area and perimeter, and asks students to find and calculate the area of pizza boxes and the perimeter. And I think the different pizza boxes were squares, rectangles, and circles. And then the questions, as it slowly develops, it started to give them constraints where given a certain area, what would be the different perimeters. SUZANNE MCSPADDEN: Can you talk a little bit about what re-engagement is and how you came to it? ANTOINETTE VILLARIN: Right now we're thinking of it as follow-up lessons on formative assessments. So we've given our students an assessment; kind of looked over what they know and what they don't know and their misconceptions. And this re-engagement lesson is a lesson that we're using as a follow-up to address those misconceptions. SUZANNE MCSPADDEN: So how did you go about preparing for this particular lesson? ANTOINETTE VILLARIN: Well, first we gave our students the "Pizza Crust" task to see what they know and then Patty and I, or Patty graded it and we looked at how students did. Then we analyzed and made a list of what they really struggled with conceptually. So, it was like distinguishing the difference between area and perimeter. We took notes on that and just kind of looked at what their strengths were and what their weaknesses were, and then developed our lesson based on that. PATRICIA FERRANT: We didn't want to focus just on the skills. I mean, they've been since fourth grade calculating area and perimeter, and what we've found is a lot, in this class a lot of the students do know how to calculate area and perimeter. But how to prove it, justify it, really, um, given constraints understand what it means, um, they were struggling with that. ANTOINETTE VILLARIN: And also the relationship between area and perimeter, like how they are related rather than seeing them in separate. We saw them struggle with that too. SUZANNE MCSPADDEN: So you've addressed two of the big mathematical ideas that I think are present in your lesson -- both understanding the concept as opposed to the skill of calculation, and being able to both communicate or justify, prove and communicate students' understanding of what area and perimeter are, and how they are different, how they are related. Are there any other big mathematical issues that you wanted to address in this particular issue, or lesson? ANTOINETTE VILLARIN: Proving why, going in depth rather than just knowing "I'm multiplying length times width." Knowing why they do that and how you can prove it in the picture. And then really, this lesson because it is a 7th grade standard, we want to focus on that relationship. Like "Given a constraint of area, what are all the different perimeters you can find?" which is different than what they've probably done in the past, in elementary school. SUZANNE MCSPADDEN: Would you describe the general flow of the lesson? ANTOINETTE VILLARIN: Okay. Well, we, uh, because based on the student work, we realized that a lot of kids were confusing the two. Like, we would say, "Find area, can you...or find the perimeter" and they would be calculating area or vice versa. So we decided to front-load a lot in the beginning of this lesson where we talked about those differences, and I think pair share and we talked about what it means to prove something. Like, how do you prove the area instead of just saying, "Oh, it's sixteen square units." Like, what does that mean and how can you prove that. So the beginning of our lesson is a lot of that front-loading. Um, the big part of our lesson, the part that we find really important, not that that part is not important, is the addressing the misconceptions. So Patty and I made a few posters and we picked five examples of student work that we looked, um, on the "Pizza Crust" problem with, and we chose five and we made posters for it. Or four? We made four of them. And students...and we're going to have students do error analysis on that. Like, what was the student thinking? Is there any advice you can give the student? That is a big part of our lesson that we want to get to. PATRICIA FERRANT: Stating that the name of the student in the "Pizza Crust" problem is Robbie and stating that Robbie is confused about area and perimeter, what advice can you give him? How can you keep helping him? And then saying, "Well Robbie thinks this but his friend thinks this. Who do you agree with and why? Prove it." And even going more is showing, well, Robbie is still a little confused and taking some of that student work and saying, "This is what Robbie tried. Is he on the right track? What did he do?" And hopefully having them see that this was confusion with perimeter, not area. The last part is actually the part that almost every student struggled with when we went through the task; and that was designing different rectangles that had an area of thirty-six but different perimeters than the square. SUZZANE MCSPADDEN: I like to just point out that the flow of your lesson really emulates a Noyce task. You have that entry level, you have the core mathematics in which the students are asked to address those misconceptions that Robbie had and that the students have, and then you've taken the've ramped it up by asking them to actually work with those constraints within the area of rectangles and squares. I learned early in my teaching career that post-reflection is an important part of the process. It wasn't until much later that I realized that pre-reflection is just as important. This includes having a learning goal for the lesson and envisioning what the lesson might look like before jumping in the classroom. From this footage of our pre-lesson conversation, I am reminded of the value of internalizing a lesson before teaching it. Sharing it with others definitely helps with this process. I remember in this first video, the three of us discussing what we were planning to do in the lesson. Patty and I were sharing with Suzanne our objective and how we were hoping to begin. Here, sharing the lesson with others and articulating our ideas helped us envision what it would look like. Through articulation and the collaboration that came with this process, we prepared ourselves pretty much for teaching it. We were able to run through what was going to happen, and justify each step with an objective. In turn, the lesson became meaningful for everyone involved. Both teachers and observers could see that planning a lesson was a process where reflection at the beginning was just as important as reflection at the end.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9736971259117126}", 'metadata': "{'Content-Length': '51461', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6TYDBLPTX7FMR3SPCC3S3PHZPFJL3XYY', 'WARC-Concurrent-To': '<urn:uuid:bc2f5e29-8be4-480a-a11b-db28d6fce960>', 'WARC-Date': datetime.datetime(2018, 8, 18, 23, 50, 45), 'WARC-IP-Address': '199.115.219.90', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7U3W5FWF4I67BD4FIYORVNVN3FHLQEP5', 'WARC-Record-ID': '<urn:uuid:88ed971f-d903-4176-ac1b-af839a7ae5af>', 'WARC-Target-URI': 'http://www.insidemathematics.org/classroom-videos/public-lessons/7th-grade-math-area-and-perimeter/planning', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae942653-387d-4c01-955d-02fab678ebe4>', 'WARC-Truncated': None}", 'previous_word_count': '1381', 'url': 'http://www.insidemathematics.org/classroom-videos/public-lessons/7th-grade-math-area-and-perimeter/planning', 'warcinfo': 'isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-113-243-226.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6527241468429565', 'original_id': '2c3a2cdc49709a334c12f2c73d181e05d8c9b22d04320c0484f7abb3354b9601'}
ROOT S S -LRB- ROOT S S NP DT ROOT S S NP NNPS ROOT S S NP -RRB- ROOT S S NP VP ADVP RB ROOT S S NP VP ADVP PP IN ROOT S S NP VP ADVP PP NP NP DT ROOT S S NP VP ADVP PP NP NP NN ROOT S S NP VP ADVP PP NP NP PP IN ROOT S S NP VP ADVP PP NP NP PP NP JJ ROOT S S NP VP ADVP PP NP NP PP NP JJ ROOT S S NP VP ADVP PP NP NP PP NP NNS ROOT S S NP VP ADVP PP NP NP PP NP VBD ROOT S S NP VP ADVP PP NP NP PP NP ADVP RB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP RB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP DT ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP NN ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP IN ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP NN ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP NNP ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP NNP ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP CC ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP RB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP EX ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP RB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP MD ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP VB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP DT ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP NN ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP PP IN ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP PP NP NP PRP ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP PP NP NP ADVP RB ROOT S S NP VP ADVP PP NP NP PP NP ADVP ADVP NP PP NP ADVP S NP ADVP VP VP NP NP PP NP NP ADVP ROOT SINV S VP VP VBG ROOT SINV S VP VP NP PRP$ ROOT SINV S VP VP NP JJ ROOT SINV S VP VP NP NN ROOT SINV S VP VP NP PP IN ROOT SINV S VP VP NP PP NP DT ROOT SINV S VP VP NP PP NP ADJP JJ ROOT SINV S VP VP NP PP NP ADJP PP IN ROOT SINV S VP VP NP PP NP ADJP PP NP DT ROOT SINV S VP VP NP PP NP ADJP PP NP NNS ROOT SINV S VP VP NP PP NP ADJP PP NP JJ ROOT SINV S VP VP NP PP NP ADJP PP NP JJ ROOT SINV S VP VP NP PP NP ADJP PP NP NNS ROOT SINV S VP VP NP PP NP ADJP PP NP , ROOT SINV S VP VP NP PP NP ADJP PP NP CC ROOT SINV S VP VP NP PP NP ADJP PP NP VP RB ROOT SINV S VP VP NP PP NP ADJP PP NP VP VBG ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP DT ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP NN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP IN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP VBG ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP PRP ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP , ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP VBZ ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP IN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP PRP ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP NN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR IN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR S NP NNS ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR S NP VP VBP ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR S NP VP VP VBN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR S NP VP VP PP IN ROOT SINV S VP VP NP PP NP ADJP PP NP VP NP NP PP S VP NP VP PP NP NP SBAR S NP VP VP PP ROOT S VP VB ROOT S VP SBAR WHNP WP ROOT S VP SBAR WHNP S NP NNP ROOT S VP SBAR WHNP S NP NNP ROOT S VP SBAR WHNP S NP VP VBD ROOT S VP SBAR WHNP S NP VP NP NP DT ROOT S VP SBAR WHNP S NP VP NP NP NN ROOT S VP SBAR WHNP S NP VP NP NP PP IN ROOT S VP SBAR WHNP S NP VP NP NP PP NP PRP$ ROOT S VP SBAR WHNP S NP VP NP NP PP NP JJ ROOT S VP SBAR WHNP S NP VP NP NP PP NP NN ROOT S VP SBAR WHNP S NP VP NP NP PP NP ROOT S NP NP DT ROOT S NP NP JJ ROOT S NP NP NN ROOT S NP NP SBAR WHNP WP ROOT S NP NP SBAR WHNP S VP VBD ROOT S NP NP SBAR WHNP S VP S UCP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP , ROOT S NP NP SBAR WHNP S VP S UCP NP CC ROOT S NP NP SBAR WHNP S VP S UCP NP VP VBG ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRP$ ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT RP ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT , ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP JJ ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP NNP ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VBD ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP VBN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP DT ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP PRP ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP VBD ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP RB ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP RB ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP JJ ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP JJS ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP DT ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP NNS ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP , ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP IN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP DT ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NN ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP , ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP PRP$ ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP NNS ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP CC ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP NNS ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP VP VBD ROOT S NP NP SBAR WHNP S VP S UCP NP VP NP PRT NP VP VP PP NP NP PP NP SBAR S NP VP ADJP PP NP NP PP NP PP NP NP NP NP VP ROOT S S S VP VBG ROOT S S S VP PP IN ROOT S S S VP PP NP PRP$ ROOT S S S VP PP NP NN ROOT S S S VP PP NP CC ROOT S S S VP PP NP NNS ROOT S S S VP PP NP VP VBP ROOT S S S VP PP NP VP S VP TO ROOT S S S VP PP NP VP S VP VP VB ROOT S S S VP PP NP VP S VP VP NP DT ROOT S S S VP PP NP VP S VP VP NP NN ROOT S S S VP PP NP VP S VP VP NP , ROOT S S S VP PP NP VP S VP VP NP SBAR IN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP PRP ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP VBD ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP , ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP NNP ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP VBD ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP DT ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP NN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR IN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP PRP ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP VBD ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP CC ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP VBD ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP NNS ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP IN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP WDT ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP NN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP DT ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP VBP ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP RB ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VBN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VP VBN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VP ADVP IN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VP ADVP CC ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VP ADVP IN ROOT S S S VP PP NP VP S VP VP NP SBAR S NP VP NP VP NP SBAR S NP VP NP NP SBAR WHPP WHNP S NP VP ADVP VP VP ADVP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP PRT RP ROOT S NP VP PRT S VP VBG ROOT S NP VP PRT S VP NP NP DT ROOT S NP VP PRT S VP NP NP JJ ROOT S NP VP PRT S VP NP NP NNP ROOT S NP VP PRT S VP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP WDT ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP VBD ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP IN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP PDT ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP DT ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CC ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP NNS ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP RB ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP RB ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP IN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP DT ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP IN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP DT ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NNS ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP JJ ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP NNPS ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP , ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP CC ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP NNP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR IN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP PRP ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP VP VBZ ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP VP VP VBN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP VP VP PP IN ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP VP VP PP NP CD ROOT S NP VP PRT S VP NP NP SBAR WHNP S VP PP NP NP CONJP NP NP PP NP NP NP SBAR S NP VP VP PP NP ROOT S SBAR IN ROOT S SBAR S NP DT ROOT S SBAR S NP NNS ROOT S SBAR S NP VP VBD ROOT S SBAR S NP VP S VP TO ROOT S SBAR S NP VP S VP VP VB ROOT S SBAR S NP VP S VP VP NP DT ROOT S SBAR S NP VP S VP VP NP NNP ROOT S SBAR S NP VP S VP VP NP PP IN ROOT S SBAR S NP VP S VP VP NP PP NP NN ROOT S SBAR S NP VP S VP VP NP PP NP CD ROOT S SBAR S NP VP S VP VP NP PP NP VP VBD ROOT S SBAR S NP VP S VP VP NP PP NP VP PP IN ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP NN ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP RB ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP TO ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP VP VB ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP VP PP IN ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP VP PP NP NN ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP VP PP NP ADVP RB ROOT S SBAR S NP VP S VP VP NP PP NP VP PP NP ADVP S VP VP PP NP ADVP ROOT S PP IN ROOT S PP NP DT ROOT S PP NP JJ ROOT S PP NP NN ROOT S PP NP NP NNP ROOT S PP NP NP VP VP VBD ROOT S PP NP NP VP VP PP TO ROOT S PP NP NP VP VP PP NP NN ROOT S PP NP NP VP VP PP NP NN ROOT S PP NP NP VP VP PP NP CC ROOT S PP NP NP VP VP PP NP VP VP VBD ROOT S PP NP NP VP VP PP NP VP VP NP DT ROOT S PP NP NP VP VP PP NP VP VP NP NNP ROOT S PP NP NP VP VP PP NP VP VP NP NNP ROOT S PP NP NP VP VP PP NP VP VP NP CC ROOT S PP NP NP VP VP PP NP VP VP NP VP VBD ROOT S PP NP NP VP VP PP NP VP VP NP VP NP DT ROOT S PP NP NP VP VP PP NP VP VP NP VP NP NN ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP IN ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP PRP$ ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP NN ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP POS ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP NN ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP NN ROOT S PP NP NP VP VP PP NP VP VP NP VP NP PP NP NP ROOT S NP NNP ROOT S NP NNP ROOT S NP VP VBZ ROOT S NP VP ADJP ADJP RB ROOT S NP VP ADJP ADJP JJ ROOT S NP VP ADJP ADJP PP IN ROOT S NP VP ADJP ADJP PP NP DT ROOT S NP VP ADJP ADJP PP NP JJ ROOT S NP VP ADJP ADJP PP NP NN ROOT S NP VP ADJP ADJP PP NP CC ROOT S NP VP ADJP ADJP PP NP ADJP JJ ROOT S NP VP ADJP ADJP PP NP ADJP , ROOT S NP VP ADJP ADJP PP NP ADJP PP IN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP RB ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP , ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP CC ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP RB ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP JJ ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP CC ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP JJ ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP , ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP RB ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP IN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP PRP$ ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP , ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP NNP ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP NNP ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP WP ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP VBD ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP IN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP DT ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP CC ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR IN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP DT ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP PP IN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP PP NP NN ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP PP NP VP MD ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP PP NP VP VP VB ROOT S NP VP ADJP ADJP PP NP ADJP PP ADVP ADJP PP ADVP NP NP NP NP SBAR WHNP S VP NP PP NP SBAR S NP NP PP NP VP VP ROOT S NP NNP ROOT S NP ADVP RB ROOT S NP ADVP VP VP VBD ROOT S NP ADVP VP VP NP DT ROOT S NP ADVP VP VP NP NN ROOT S NP ADVP VP VP NP PP IN ROOT S NP ADVP VP VP NP PP NP JJ ROOT S NP ADVP VP VP NP PP NP NN ROOT S NP ADVP VP VP NP PP NP NN ROOT S NP ADVP VP VP NP PP NP SBAR IN ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP DT ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP NN ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP IN ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP NN ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP VP MD ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP VP VP VB ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP VP VP CC ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP VP VP VP VBP ROOT S NP ADVP VP VP NP PP NP SBAR S NP NP PP NP VP VP VP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP ADVP RB ROOT S NP VP ADVP VP VBN ROOT S NP VP ADVP VP PP PP IN ROOT S NP VP ADVP VP PP PP NP NP NN ROOT S NP VP ADVP VP PP PP NP NP , ROOT S NP VP ADVP VP PP PP NP NP NP NP DT ROOT S NP VP ADVP VP PP PP NP NP NP NP JJ ROOT S NP VP ADVP VP PP PP NP NP NP NP NN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP WDT ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP VBZ ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP DT ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP JJ ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP NN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP , ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR IN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP PRP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP VBD ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR IN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP PRP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP VBD ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP RB ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP VBG ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP CC ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP VBG ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP NN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP NNS ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP IN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP DT ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP NNP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP POS ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP CC ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP IN ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP CD ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP WRB ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP NNP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP VBD ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP DT ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP NNP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP NNP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP CC ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP NNP ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP NNS ROOT S NP VP ADVP VP PP PP NP NP NP NP SBAR WHNP S VP NP SBAR S NP VP SBAR S NP VP ADVP VP NP PP NP PP NP NP SBAR WHADVP S NP VP NP ROOT S NP NP DT ROOT S NP NP NN ROOT S NP NP ROOT S NP NP SBAR S NP NP NNP ROOT S NP NP SBAR S NP NP NNP ROOT S NP NP SBAR S NP NP NNP ROOT S NP NP SBAR S NP NP PP IN ROOT S NP NP SBAR S NP NP PP NP NN ROOT S NP NP SBAR S NP NP PP NP ROOT S NP NP SBAR S NP NP PP NP VP VBZ ROOT S NP NP SBAR S NP NP PP NP VP ADJP RB ROOT S NP NP SBAR S NP NP PP NP VP ADJP JJ ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP , ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP DT ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP CC ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP , ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP DT ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP JJ ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP NN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP POS ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP DT ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP JJ ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP VBN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP WP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP VBD ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP NNP ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP DT ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP DT ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP NNS ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP CC ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP NNS ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP PP IN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP PP NP PRP$ ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP PP NP NN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP PP NP NN ROOT S NP NP SBAR S NP NP PP NP VP ADJP PP PP NP NP NP NP NP PP NP NP NP NP VP PP NP NP SBAR WHNP S VP PP NP PP NP NP PP NP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP NP NP DT ROOT S NP VP NP NP JJ ROOT S NP VP NP NP NN ROOT S NP VP NP NP PP IN ROOT S NP VP NP NP PP S NP NNP ROOT S NP VP NP NP PP S NP VP VBG ROOT S NP VP NP NP PP S NP VP PRT RP ROOT S NP VP NP NP PP S NP VP PRT NP NN ROOT S NP VP NP NP PP S NP VP PRT NP , ROOT S NP VP NP NP PP S NP VP PRT NP SBAR IN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP PRP ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP VBD ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT RP ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP VBG ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP PRP ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP , ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP CC ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP VBG ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP IN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP DT ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP NN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP IN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP PRP$ ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP NN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP CC ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP NN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP PP IN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP PP NP DT ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP PP NP NN ROOT S NP VP NP NP PP S NP VP PRT NP SBAR S NP VP PRT S VP VP NP VP PP NP NP PP NP PP NP ROOT S NP NNP ROOT S NP NNP ROOT S NP VP VBZ ROOT S NP VP NP NP DT ROOT S NP VP NP NP ADJP JJ ROOT S NP VP NP NP ADJP JJ ROOT S NP VP NP NP ADJP NNP ROOT S NP VP NP NP ADJP NNS ROOT S NP VP NP NP ADJP NN ROOT S NP VP NP NP ADJP CC ROOT S NP VP NP NP ADJP NP NP NN ROOT S NP VP NP NP ADJP NP NP PP IN ROOT S NP VP NP NP ADJP NP NP PP NP NNP ROOT S NP VP NP NP ADJP NP NP PP NP NNP ROOT S NP VP NP NP ADJP NP NP PP NP ROOT S NP NP NNP ROOT S NP NP NNP ROOT S NP NP SBAR WHNP WP ROOT S NP NP SBAR WHNP S ADVP RB ROOT S NP NP SBAR WHNP S ADVP VP VBD ROOT S NP NP SBAR WHNP S ADVP VP S VP TO ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VB ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP VBN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP IN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP NNP ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP VBZ ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP NN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP NNS ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP DT ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP NN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP WRB ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP JJ ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP NNS ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP PRP ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP VBD ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP IN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PRP$ ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP NN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP IN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP DT ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP NN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP NN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP IN ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP DT ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP NNP ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP CC ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP NP DT ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP NP NNP ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP NP NNP ROOT S NP NP SBAR WHNP S ADVP VP S VP VP VP PP NP VP NP ADVP SBAR WHNP WHADJP S NP VP PP NP NP PP NP PP NP NP NP ROOT S NP NNP ROOT S NP NNP ROOT S NP VP VBZ ROOT S NP VP ADJP ADJP JJ ROOT S NP VP ADJP ADJP CC ROOT S NP VP ADJP ADJP ADJP RB ROOT S NP VP ADJP ADJP ADJP JJ ROOT S NP VP ADJP ADJP ADJP PP IN ROOT S NP VP ADJP ADJP ADJP PP NP DT ROOT S NP VP ADJP ADJP ADJP PP NP JJ ROOT S NP VP ADJP ADJP ADJP PP NP JJ ROOT S NP VP ADJP ADJP ADJP PP NP NN ROOT S NP VP ADJP ADJP ADJP PP NP NN ROOT S NP VP ADJP ADJP ADJP PP NP JJ ROOT S NP VP ADJP ADJP ADJP PP NP NNP ROOT S NP VP ADJP ADJP ADJP PP NP NNP ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP WP ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP VBD ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP NNP ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP POS ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP NN ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP VP VB ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP VP NP PRP ROOT S NP VP ADJP ADJP ADJP PP NP SBAR WHNP S VP S NP NP VP NP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP S VP TO ROOT S NP VP S VP VP VB ROOT S NP VP S VP VP NP NP DT ROOT S NP VP S VP VP NP NP JJ ROOT S NP VP S VP VP NP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP WP ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VBD ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP VBG ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP DT ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP RB ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP JJ ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP CC ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP RB ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP JJ ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP NNS ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PRP ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP CC ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP DT ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PRP ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP , ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP RB ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP DT ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP , ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP VBD ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP DT ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP CC ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP NN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP PP IN ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP PP NP NNP ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP PP NP NNP ROOT S NP VP S VP VP NP NP SBAR WHNP S VP VP NP PP PP NP NP ADJP PP NP PP NP NP SBAR S NP PP NP NP PP NP VP NP NP PP NP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP SBAR IN ROOT S NP VP SBAR S NP PRP ROOT S NP VP SBAR S NP VP VBD ROOT S NP VP SBAR S NP VP ADVP RBR ROOT S NP VP SBAR S NP VP ADVP IN ROOT S NP VP SBAR S NP VP ADVP RB ROOT S NP VP SBAR S NP VP ADVP NP NP NP DT ROOT S NP VP SBAR S NP VP ADVP NP NP NP JJ ROOT S NP VP SBAR S NP VP ADVP NP NP NP NN ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP CC ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP DT ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP NN ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP NN ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP RB ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP RB ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP IN ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP NP JJ ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP NP JJ ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP NP NN ROOT S NP VP SBAR S NP VP ADVP NP NP NP PP NP CONJP NP ROOT S NP NNP ROOT S NP NNP ROOT S NP VP VBD ROOT S NP VP NP DT ROOT S NP VP NP NNP ROOT S NP VP NP NNP ROOT S NP VP NP NNP ROOT S NP VP NP ADVP RB ROOT S NP VP NP ADVP PP IN ROOT S NP VP NP ADVP PP NP CD ROOT S NP VP NP ADVP PP NP PP RB ROOT S NP VP NP ADVP PP NP PP RB ROOT S NP VP NP ADVP PP NP PP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP JJ ROOT S NP VP NP ADVP PP NP PP PP NP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP PRP ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VBD ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP , ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP CC ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP VBD ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT RP ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP NNS ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP , ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP CC ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP JJS ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP NNS ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP VBG ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP JJ ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP WDT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP MD ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP RB ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP RB ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VB ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP VBN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PRP ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP DT ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP PP IN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP PP NP PRP$ ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP PP NP NN ROOT S NP VP NP ADVP PP NP PP PP NP NP SBAR S NP VP VP VP PRT NP PP NP NP PP NP SBAR S VP PP NP NP SBAR WHNP S VP ADVP VP VP NP PP NP NP PP NP NP PP NP ROOT S PP IN ROOT S PP S NP NP CD ROOT S PP S NP NP PP IN ROOT S PP S NP NP PP NP NP CD ROOT S PP S NP NP PP NP NP NNS ROOT S PP S NP NP PP NP NP PP IN ROOT S PP S NP NP PP NP NP PP NP JJ ROOT S PP S NP NP PP NP NP PP NP NN ROOT S PP S NP NP PP NP NP PP NP NNS ROOT S PP S NP NP PP NP NP PP NP VP VBG ROOT S PP S NP NP PP NP NP PP NP VP PP IN ROOT S PP S NP NP PP NP NP PP NP VP PP NP DT ROOT S PP S NP NP PP NP NP PP NP VP PP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP TO ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP VB ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP DT ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT RP ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP IN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP DT ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP CC ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP IN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP DT ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP DT ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP VBZ ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP RB ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP VBN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP NP JJ ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP NP NNP ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP NP JJ ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP NP NN ROOT S PP S NP NP PP NP NP PP NP VP PP NP S VP VP NP PRT PP PP NP PP NP NP VP ADVP VP NP ROOT S RB ROOT S NP NNP ROOT S NP NNP ROOT S NP VP VP VBD ROOT S NP VP VP NP PRP ROOT S NP VP VP NP CC ROOT S NP VP VP NP VP RB ROOT S NP VP VP NP VP PP PP IN ROOT S NP VP VP NP VP PP PP NP NP DT ROOT S NP VP VP NP VP PP PP NP NP NN ROOT S NP VP VP NP VP PP PP NP NP CC ROOT S NP VP VP NP VP PP PP NP NP NP NP DT ROOT S NP VP VP NP VP PP PP NP NP NP NP NN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP WDT ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP VBZ ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT RP ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP IN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP VBG ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP DT ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP JJ ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP NN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP CC ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP RB ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP IN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP DT ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP JJ ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP NN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP PP IN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP PP NP DT ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP PP NP NN ROOT S NP VP VP NP VP PP PP NP NP NP NP SBAR WHNP S VP PRT PP S VP NP CONJP PP NP NP PP NP
the_stack
{'hexsha': '91adb674d48ca11af3e4f1572542ed0cb386fbc8', 'size': '44676', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'Pytorch-version/data/imdb/62/parse_data/author31/846.txt', 'max_stars_repo_name': 'JacobTyo/Syntax-Encoding_EMNLP2018', 'max_stars_repo_head_hexsha': '5aed2fdd01dc7d0baebbd555c97a25fedbde0c39', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'Pytorch-version/data/imdb/62/parse_data/author31/846.txt', 'max_issues_repo_name': 'JacobTyo/Syntax-Encoding_EMNLP2018', 'max_issues_repo_head_hexsha': '5aed2fdd01dc7d0baebbd555c97a25fedbde0c39', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Pytorch-version/data/imdb/62/parse_data/author31/846.txt', 'max_forks_repo_name': 'JacobTyo/Syntax-Encoding_EMNLP2018', 'max_forks_repo_head_hexsha': '5aed2fdd01dc7d0baebbd555c97a25fedbde0c39', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '63.5504978663', 'max_line_length': '157', 'alphanum_fraction': '0.6831632196', 'original_id': '0efed604ccb014563ff6b79dc7ac10564996b1bcfac377dbb4dab777f82b184f'}
Tuesday, May 29, 2007 Why Scrooge McDuck is better than Bill Gates Rant alert: some ranting may appear in the content below. Okay, that title may seem off-topic. After all, as the book How to Read Donald Duck: Imperialist Ideology in the Disney Comic points out, Disney comics are all about imperialism, and we know that Wunderkammern are not. Right? Well, not necessarily. Looking at the Age of Exploration, and how it ushered in both science (in its modern form), and imperialism of the worst sort (read: Conquistadors, Dutch East India Company, British Empire, and our good old American "military advisors"), it is clear that there is a flip side to the kind of wonderous mentality I have talked about in previous posts. After all, some of the most interesting things found in Wunderkammern were things co-opted, wrested or wheedled from people in other parts of the world. However, as a longtime reader of Donald Duck and his elder (and weirder) relative Scrooge, I beg to qualify. When I was a kid my father collected comic books. Not a lot of them, but he had a few, some of them really interesting. He let me read his Donald Duck comics, mostly written by Carl Barks, which was probably a mistake, as they were no longer pristine after I had read them twenty times. I will say, though, that they certainly made an impression on me. Many of the best stories are about Uncle Scrooge's quest for owning the most valuable things in the world. So in that sense, they are indeed imperialist, and assume a sort of outdated sense of the white duck's right to take things from other, differently-colored, less "developed" people around the world. However, there is something very important to be said for Scrooge: when he wants something, he goes there himself to get it, even though he is an old duck with a fabulous fortune at his command. His adventures are what make him worth reading about. Now, I need to take a moment here to talk about pulp fiction. The (non-sexual) pulp fiction, by definition, was full of wild adventures, explorations, discoveries, and tales of strange occurrences. There is an interesting reverse correlation between the exploration of the (un)known world and the rise of pulp fiction: the more we knew about our world, the more wild the stories in the magazines, as if people's imagination craved more the less there was to wonder about. (the Hollow Earth book, in a previous post, has a nice section on pulp fiction, by the way). In general, pulp fiction was for adults; but some of the best comics of the day followed the pulp format, including, in a slightly classier and more humorous way, the Donald and Scrooge comics. As in pulp fiction, Scrooge's amazing geographic discoveries are mostly not-real or thinly disguised (though he does visit the Yukon to find his lost stash). But, like a true pulp hero, he goes into it willing to lay his own safety on the line for greed. And, unlike the standard pulps, which lack a sense of humor, we know all about his personality: he is a cantankerous, greedy boogerhead who chisels his own nephews and often screws up. He is, within the comic format, pretty realistic - and we like him because he's so annoying, greedy, etc, and therefore real. Bill Gates, on the other hand, is anything but a pulp hero, annoying or not. He is a total cipher. We wonder, in fact, if he could possibly be not-real, like Scrooge's locales. He's probably as rich as Scrooge; you know that old adage that if Bill dropped a $500 bill it would not be worth his time to go back and pick it up (of course, if he were Scrooge, he would go back for a dropped dime)? He doesn't seem to be as greedy as Scrooge, but who's to say? Maybe his wife knows. Ultimately, he seems nice enough. And, well, terribly bland. Which brings us to this: Bill Gates, while smart and pretty savvy, was also lucky. He came along at the right time. He worked pretty hard. But he's a new breed of wealthy, nothing like the old dubloon-wielding explorers who went out in search of their fortunes: he happened on his wealth. I get the sense he doesn't really know what to do with it. Look at pictures of him: have you ever seen anyone so boring? But Scrooge - Scrooge is hands-on. Like Indiana Jones and his pulp treasure-hunting ilk, he is larger than life. He actually bathes in cold cash (don't you kind of wish Bill Gates did that?). He loves his money, not for what it will buy or what it means in the larger context; he just loves it for itself. He is a collector, obsessed with his collection. He almost can't help himself; his office is a Wunderkammer devoted to wealth. He is incredibly superstitious, and has numerous lucky talismans that he guards jealously. He is a believer in wonders. I have a weird vision of Bill Gates, in his inevitable unimaginative checked shirt, trying to rescue the Lost Crown of Gengis Khan from the Abominable Snowman. Do you think he would escape? Or convince the Snowman that he had caused a miracle? Would he throw down bundles of rubber and bounce from one to the other to escape Mombie the Zombie? No, he probably wouldn't believe that Mombie was a zombie. But then, if Bill Gates were Scrooge McDuck, Mombie would be wearing a tie, and be a tax-collector. Bill Gates is the personification of How to Make Being Rich the Most Boring Thing In the World. Face it: people think that being rich is fun (imagine yourself bathing in that money!). And, if you're creative, you'll be thinking that "fun" would be a lot like Scrooge McDuck's adventures, except maybe with some interesting ways to give money to crazy artists or something. But the truth is, as a modern rich person, you would need to hire an army of accountants to find things to do with your money. Hell, you probably never even see your money in cold, hard cash (remember Harry Potter's bank vault?). I'll bet Bill Gates hasn't seen more than $2000 of his money all in one place before. His kind of money is invisible to the naked eye. It's conceptual. It's being groomed and moved around and taken care of by experts, so that it will keep growing - exactly like modern science: compartmentalized, optimized, and managed. All Bill Gates has to do is sit around and give talks and start foundations which largely run themselves, and maybe decide if his advisors have good advice. Perhaps I am influenced by my upbringing, drinking Horatio Alger with my mother's milk, believing, like Nathaniel West's Lemuel Pitkin, in my divine right to be rich (60% of Americans believe deeply that they will be extremely rich someday). We can be anything we want, if we just work hard enough! Get dirty, put your nose to the grindstone. Got to get in there and roll up our sleeves, put some elbow grease in; then we'll make it big. I'm going to be President when I grow up! But... it's hard to admire a stuffed shirt. Think about it in terms of storytelling: which is more exciting, a movie about a bank heist, where people walk off with a suitcase full of money, or a movie about boardroom politics? Why is Pirates of the Caribbean, and pirates in general, so popular right now (hint: treasure caves, cool clothes, physical danger)? Why isn't it cool to comb your hair and sit in an office moving money around? Yawn. Have you ever seen a picture of Bill Gates with his sleeves rolled up and a shovel in his hand? Have you ever seen him get dirty? I can't even imagine it. Scrooge McDuck, on the other hand, gets dirty, and wet, and hit on the head, and schemed against, and lost, and all manner of explorer-type predicaments. And: he swims in his money. In fact, his money vault is nearly 100 feet deep. He still has every coin he ever earned - and he can recognize each of them, tell a story about it. Which to me is the ultimate goal: my ideal home is one in which every little thing, every dish and every object on the shelf, has a story behind it. Now maybe because Scrooge get all the episodes of his life published for everyone to read, we know of all his trials and tribulations. Bill Gates is invisible, hiding behind security gates (sic) and darkened car windows (although, would you notice him if you saw him on the street?), so it is assumed he is as boring as he looks. I don't know anything about his life, do you? For all I know, he goes out into his garden and digs when he's mad at his wife, or keeps chickens that he loves and who poo on him when he picks them up. Or perhaps he secretly goes to central America and builds houses for poor people with his own hands, for sport; or spends his free time looking for leprechauns. But I seriously doubt it. Odds and Ends, Bits and Bobs Mouse relics Monday, May 21, 2007 Automat for the People Think of it: a Cabinet of wonderful food. Sunday, May 20, 2007 Strange Attractor Many of you may already know about Strange Attractor, but I just stumbled across it in my wanderings, and I feel it my duty to mention. From what I've read, Strange Attractor began as a sort of crossroads of what they term "Unpopular Culture", and have over time become their own press, now producing an online print journal by the same name. Their blog, Further, is a worthwhile place to visit, full of posts about literature, UFO's, online access to interesting stuff, and just anything that might be odd and worthwhile. Not only is the site beautiful but the actual journal, which I have not paid to download yet, looks really wonderful, with the latest issue covering things like a transgender spirit possession festival; the joy of zootoxins; psychonautic misadventures in time; 12th century Arab alchemists on the edge of knowledge; Joseph Williamson, Liverpool’s tunnelling philanthropist; and much, much more. Each issue is a veritable tome of "exquisite high strangeness." Marvelous. I recommend you get your calling-card out and go for a visit. Wednesday, May 16, 2007 Reliquaries: Saints Preserve(d for) Us! Reliquary of St. Anania, Rome. St. Anania is said to have been the disciple who baptised St. Paul the Apostle. I first discovered reliquaries on visiting Italy, years ago. Since then, I've seen a lot of reliquaries, in France and other countries, but it was that first time, in the Cathedral Museum in Florence, that I saw the best reliquaries of all. There was a hand-shaped reliquary containing an arm-bone (of St. John the Baptist?), which pointed at the sky just like John the Baptist is always shown doing. There was a philatory (a transparent reliquary) which contained all the bones of another saint, whom I've forgotten, but the bones were stacked in an asthetic way and wound with gold and pearls in a shrine (reliquary shaped like a house) made of glass and gold. There were dozens of the usual cross-shaped reliquaries and lots of wonderful, dangly, crown-shaped ones. "Casket of Teudericus" reliquary from the second half of the 7th c. (?) (Canton Valais: Saint Maurice Abbey treasury). This reliquary is a product of the monastic workshop of St. Maurice d'Agaune. Signed by the artist and dedicated by the Priest Teudericus to the monastery. Gold cloisonné, gemstones, and cameo on wood. 5.25" For a nice, clear explanation of the reliquary concept I'm going to quote the Virtual School, a defunct part of the EC's European Schoolnet site, which is a portal for lower education in Europe. It has the most dazzling array of useful information I've come across. If you want something explained well and simply, I have not found better than European Schoolnet; unfortunately, I never seem to come across what I need except by accident. Reliquary of St. Louis of Toulouse. Silver, France, 15th-17th century, Musée national du Moyen Âge, Paris, France. Here we go: "Relics are holy objects associated with holy people, and is prevalent in Judaism, Buddhism and Christianity, among others. Foot reliquary of St. James, Namur, France If you've ever read P.D. James' A Morbid Taste for Bones, you'll know that many saints' bones were essentially stolen from their home tomb to begin with, regardless of the locals' feelings about it. Strangely, Galileo's middle finger is displayed at the Science History Museum in Florence inside a beautiful reliquary (below). Does this mean he was a Science Saint? He was definitely a hero and a martyr to his beliefs, and it's interesting that he is celebrated in the same way as a religious figure. The finger was detached from the body by Anton Francesco Gori (how apt a name) on March 12, 1737; it is not clear whether this was a sanctioned move or not. And, of course, given the way he got in trouble for bucking the establishment, I find it intensely ironic that it was his middle finger they saved. In any case, if you ask nicely I might show you some of the reliquaries I've made. There are quite a number, mostly (with one excellent exception) celebrating, not saints, but animals, which at one point in my life I was seeing as Saints of Nature, martyrs to the Cause of Progress - particularly those killed by poison and other dangers of modern life (and then mummified with time). Bwa-ha-ha. My thoughts have evolved, but the reliquaries remain. Inner Earth I just found this book last weekend and have been reading it, on and off, since then. It's, as a friend of mine would say, "a damned good read." Beginning with Edmond Halley in 1691, and continuing on through Poe and Wells and on into L Frank Baum, only to take a turn into pulp with Edgar Rice Burroughs and others, this fascinating book covers the history of envisioning the earth as a hollow sphere. Such people as Halley, who edited and published (not to mention correcting proofs of) Isaac Newton's Principia, were quite serious about their proposals that the earth is not only hollow but a series of concentric spheres, in Halley's model turning independently on a north-south axis, probably with life inside and some kind of light like the sun itself. So deadly serious were these people that one man, Captain John Cleves Symmes, handed out printed circulars of his own composition in 1818, stating that if anyone would fund him, he would go to an opening he (by unknown means) postulated lay near the poles, and lay his life on the line to prove to the world there were other places within. Symmes took his request for funds and sponsorship to congress, and was repeatedly turned down. He continued with this obsession until the end of his life, lecturing and writing articles for the papers. When he died his son took up his cause, and a book was written about his theories. The stories go on and on, including Jules Verne's idea that the Aurora Borealis was really light coming out of a hole in the earth in the arctic; Cyrus Teed, the man who was known as Koresh, who claimed he discovered the Philosopher's Stone and who started a cult based on his ideas for saving humanity by "moving inside"; and innumerable utopias, romances and other fiction that began more and more to use the hollow earth idea as a pasteboard for the authors to communicate their ideas. Richly illustrated with images that we would all love to have large to hang on our walls, the book is worth a look; I keep it by my bed and read bits of it before I go to sleep, in the hopes that it will bring me interesting dreams. Some Artists Well, I stumbled onto my account at Technorati, which I had forgotten about (shows how much time I have to look around these days), and lo! Several people had actually linked to me whom I had never heard of, and in looking at their sites I was pleased to find they went under the heading of "beautiful things". It's a wide world out there and I'm glad to get to see some of the good parts. For starters, Blue Tea was showcasing (among many other amazing Book Art people) Su Blackwell, who makes art by cutting and folding books. Some of the images she creates are really dynamic and moving. A lot of them seem to be children's books. She works with books that are no longer readable for whatever reason, and works within the book's subject matter, either directly or metaphorically. And a lot of the books are framed in boxes, which of course sets off drool bells for me. But what I particularly like about this aspect of her work (she does other stuff as well) is its delicacy, the slight feeling of claustrophobia, as if these characters, this landscape have been trapped in the book all this time and now are suddenly released. A number of her compositions have an urgency about them; the choices she has made for the cut-out people from the illustrations seem to lean toward people on their way somewhere, about to discover something, or perhaps escaping from something. And the landscapes speak of a bleak mystery, a rising, an awareness of the air. Very cool. In my wanderings I also came across Aria Nadii, another self-described "book pirate" who creates layered compositions from images found in books. Many of the works are quite wonderful. And if you like her stuff, she has a whole page of really beautiful images for people to take and use as avatars (go to her blog to see them). Her blog is full of nice details of what it's like to make art while keeping on with the daily making of a life. I look forward to seeing more of her stuff. Monday, May 14, 2007 How Like Life: the Camera Obscura My first introduction to the mysteries of the Camera Obscura were during my youth in San Francisco: there was this cultish secret, called the Giant Camera, visited by unknowing tourists and in-the-know locals, down behind the Cliff House next to the Musee Mechanique (which I promise to discuss in a future post). It was run by this one slightly odd man and housed a number of rather stilted, but still interesting, holograms around the edges of the room. At first, walking inside the darkened space, one would bumble blindly over to the dim white disk in the middle of the room - and then be arrested by the most indescribable sight. Like many of the large camera obscuras, this one's image was projected onto a large (at least 4 feet wide) smooth, white concave disk set like a high table in the middle of the room. The image was collected via a hole in the ceiling with a rotating mirror, which "captured" what was happening outside in a slowly moving progression, and beamed it down, probably via a lens or several lenses, onto the table. The mechanism in this particular camera obscura was hidden (and not particularly pretty if you did see it) under black paint and cloth; only the image, apparently floating weightless in front of you, was clear and perfect. Camera obscuras work under the same principles as pinhole cameras: you make a small hole in the side of a box (either a real box or a room-sized box) and the light outside will get in through the hole and project itself onto a piece of paper or a wall, showing you a perfect image of the scene on the outside of the box. Because light travels in a straight line, and because the hole is small, the light on one side of the scene will have to come through at an opposing angle from the light on the other side of the scene. Therefore, the lines cross in translation and are projected upside down. Here is a nice simple Flash demonstration, if you need visuals. The upside-down image can be righted using a convex speculum (a small metal mirror used for telescopes) or lenses, or the opening can be enlarged and fitted with one or more lenses, which focus/broaden the light and can also correct for image reversal. The thing that makes watching the image in a camera obscura so magical is that there is no grain. We are all used to seeing movies and photographs, and taking it as a given that they are pretty much clear and accurate representations of what we see. But once you have seen a camera obscura, you will throw all that out the window, because the image is impossibly clear. You can see the eyes on the seagulls flying by outside, no matter how far away they are. All the meshing gaps and bubbles in the foam of the sea is there, complete and clear. You can see the cracks in the buildings, the open fly of the tourist on the balcony above you. Looking at film is never really the same again. And no wonder: you are having the real world projected into the room with you, like a movie. It's stunning. My second brush with camera obscuras was in a story called - you guessed it - Camera Obscura, by Basil Copper. Despite its slight whiff of antisemitism, which I will leave where it lays, the story manages to convey a curious creepy magic in the thing's mechanisms, playing with the idea of the projection being real and the real merely the projection. It was this story which, for me, placed the device into the realm of the fascinating, full of velvet curtains, silken pull-ropes and unseen brass mechanisms. Lastly, I had a friend whose bed was high in a loft on the second story of a rather tall Victorian house. In an effort to sleep at night despite the streetlight directly outside, he installed a dark paper blind over the window, the upper half of which projected into the loft. One day, I was sitting in his loft while we discussed some long-forgotten subject, and I happened to glance up at the ceiling. There was a perfect reproduction of the street below, running in a strip along the rounded edge where the walls blended seamlessly into the ceiling. Apparently the installation of the blind had left a narrow crack along the top, which allowed the reflected scenes from the outside world to become projected onto the ceiling above. Needless to say, we spent many hours after that watching pigeons, dogs, cars and the tops of passers-by as they walked past. Since then, of course, I have found out much about the history of the things. Leonardo DaVinci mentions the device, among other people. A muslim scholar named Abu Ali Al-Hasan Ibn al-Haitham (965-1039 CE) is credited with, if not outright discovering the phenomenon, at least leaving notes behind as to how it works. You can find out more about the history of camera obscurashere, or if you are really obsessed, the 1910 Encyclopedia Brittanica has more than anyone could possibly want to know about the history of the theory behind the device, the optical parts of it, and the uses of it. Heady stuff, that. There is a great deal of evidence that artists during the Rennaissance and later used camera obscuras to look at their subjects in a different, more compositional way. Many of the artists who did this did it discreetly, either because the device had an occult association (Giovanni Battista della Porta, in the 16th century, was brought up on charges of sorcery after inviting visitors to a camera obscura show), or because the artists worried that people would think less of their paintings as a result. Vermeer, for one, shows many signs of having used the device for his paintings. Things show up in his compositions that we take for granted as normal because we are used to looking at the world through lenses. For example, some figures are grossly enlarged in the foreground, not something people thought of much before photography; the way things shine have a quality of being seen through a lense; and the way he didn't work up his paintings via layers the way most artists did, showing an obsession with light and shadow, is nearly a dead giveaway. (On a side note, if you have not seen Colin Firth and Scarlett Johansson in Girl With a Pearl Earring, you should. Whew!) Lastly, I'd like to point out the really beautiful work of Abelardo Morell, who creates amazing visions by blacking out windows and leaving a pinhole opening in one of them. When he photographs the room with its furniture, and the particular outside environs superimposed onto it - which are, of course, carefully chosen - the results are quite lovely and ephemeral. He has a book called (of course) Camera Obscura, a collection of his photographs. And of course, we have some links for you: - Feel like doing some camera obscura tourism? Here is a list of camera obscuras all over the world. - Jack and Beverly Wilgus' site on all things camera obscura has all kinds of stuff in it. - Perhaps you'd like to have your own? Try Sinden Optical Company, makers of large camera obscuras. - Or you can make one yourself, courtesy of Tim Hunkin's wonderful illustration of a camera-obscura-on-the-cheap, courtesy of Todd Roeth's very comprehensive online photography class for Brooks Institute of Photography in California. Wednesday, May 9, 2007 The British Museum's new King's Library Thanks to akacurator for telling me about Wonder Cabinet, a community of Wunderkammer-lovers. On a tip from romeodistress, at said community, I looked into the British Museum's Enlightment exhibition (which seems to be ongoing since 2003). The new-ish room that houses it, the King's Library, is apparently set up pretty much as a Wunderkammer itself. Here is what the Museum itself has to say: "The physician Sir Hans Sloane and his contemporaries collected natural specimens, beautiful sculptures and ‘exotic’ objects from around the world. He created an encyclopedia of the world in one place, and after his death in 1753 his collection became the British Museum – a ‘universal museum’ for the people of Britain and visitors from around the globe. Founded by an Act of Parliament in 1753, the British Museum was the first free public museum in the world, intended ‘not only for the inspection and entertainment of the learned and the curious, but for the general use and benefit of the public’. It was thus one of the most potent acts of the Enlightenment and at the same time one of its greatest achievements. Its founding collections were rapidly supplemented. Captain James Cook, Sir Joseph Banks and many others made extraordinary voyages, returning not only with objects, but also with drawings and accounts of people’s customs and ways of life from distant lands. Sir William Hamilton formed an amazing collection of classical antiquities from southern Italy. King George III himself had an superb collection of scientific instruments. They wanted to understand, and use that knowledge to improve their world. Through their activities new disciplines were born: taxonomy, geology, palaeontology, archaeology, the history of art and ethnography, to use the labels that would soon be applied to new areas of study. In this way the eighteenth century laid the basis for the way future generations and we today would understand their own worlds." It's not often that one gets to see a properly assembled Wunderkammer in the flesh. I'm looking forward to visiting it next year when I'm in London! Monday, May 7, 2007 Tycho Brahe, Bibliodyssey, and other Astrological Landmarks Thanks to BoingBoing, who were featuring something interesting, as usual, I have discovered Bibliodyssey, which, in case you didn't happen to read that particular BoingBoing post, is a blog devoted to "Books -- Illustrations -- Science -- History -- Visual Materia Obscura -- Eclectic Bookart" and is full of amazing Wonder-ful images and sources for that kind of Mobius-think which I associate with my favorite time period. Looking through the site, which has a lovely side-bar with visual links to previous posts, I came across a reference to Tycho Brahe's Astronomiæ Instauratæ Mechanica, a book originally published in 1598 in an effort to secure more funding after a royal death cut off Brahe's sponsorship. The illustrations show what seem to be enormous, house-sized azimuth quadrants and Christmas-tree sized sextants. Apparently, Brahe came up with the idea for this long-term project: to make a reliable chart of the heavens, using observations from a fixed point over time. He accomplished this, with the aid of royal patronage, by building a huge observatory on the island of Hven (between Denmark and Sweden). Please note that this was long before the first telescopes, which is why he did his measuring with large, accurate versions of those instruments that ships' captains had been using for many years. Bibliodyssey mentions that this was the "first" of his observatories, and is, unfortunately, long-lost. This reminds me of the Jantar Mantar Observatory [wiki], which I saw when I was in India, at the palace in Jaipur. It was built in 1734 by Sawai Jai Singh, the first Maharaja of Jaipur, who "...succeeded to the throne of Amber in 1700 at the age of thirteen. Abandoning that capital, he founded the city of Jaipur in 1727. A soldier, ruler, and scholar with a lifelong interest in mathematics and astronomy, Jai Singh built observatories in Delhi, Jaipur, Ujjain, Mathura and Benares. Jai Singh was conversant with contemporary European astronomy through his contacts with the Portugese Viceroy in Goa. He supplied corrections to the astronomical tables of de la Hire, and published his own tables in 1723." - Quote loaned from Michael D. Gunther's Old Stones website, which has very detailed descriptions of the observatory's workings Each of the eighteen observation instruments, which are mostly built out of masonry and are simply enormous, are meticulously constructed, with markings for the positions of the known heavens, and truly ingenious ways for people to get inside or to stand far enough above to be able to measure things as accurately as possible. Standing within one of the sundials, for example, manages to take you out of human scale far enough that you begin to get an inkling of the enormity of the heavens. I can only imagine what that first observatory of Brahe's must have been like. The instruments look impressive, though without people in there to scale them, it's hard to tell if it's quite as stunning as Jai Singh's contribution. Sigh. The Intricacies of Holograms Ikuo Nakamura, "Fossils", 2000 Photomultiplier tube for detecting antineutrinos - holoworld.com's Holography Links page, to what appears to be all things holographic. Sunday, May 6, 2007 Black Heart Gang, redux Wonderful stuff! Imagine a place where this could be true:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '3140', 'language_id_whole_page_fasttext': "{'en': 0.976271390914917}", 'metadata': "{'Content-Length': '176493', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NLZBOY3HMRB66FDHMB6JEB7TEJF4G7IX', 'WARC-Concurrent-To': '<urn:uuid:af9d8fbd-9f5b-4afe-992d-50df4eb163eb>', 'WARC-Date': datetime.datetime(2019, 1, 20, 1, 40, 46), 'WARC-IP-Address': '216.58.217.161', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CHWZUSH5BQIEWDM3PLRBNZEC2KZZKZ5B', 'WARC-Record-ID': '<urn:uuid:4351b611-bb63-4ae5-a0d2-21945c94a935>', 'WARC-Target-URI': 'http://cabinet-of-wonders.blogspot.com/2007/05/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a72bb192-f879-4396-a167-115d3360d671>', 'WARC-Truncated': None}", 'previous_word_count': '8282', 'url': 'http://cabinet-of-wonders.blogspot.com/2007/05/', 'warcinfo': 'isPartOf: CC-MAIN-2019-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-146-180-207.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03327071666717529', 'original_id': '36015bb2789b80e50f9bb0decf48b22446f1f5ad10f01fdf24f94858f6ed074d'}
An undocumented, queer cancer patient explains why LGBTQ immigration issues can't wait the voice and vision of a new generation Image credit: Splinter May 1, 2018 I want everyone to know the name Jose Steven Guevara. Jose is an undocumented queer activist from California and a DACA (Deferred Action for Childhood Arrivals) recipient, who, like many other DACA recipients, is at risk for losing his status. Jose Guevara is also battling cancer for the fourth time in his life. From DACA, to his mother’s Temporary Protected Status (TPS), to his current health status, Jose’s life is in flux. But despite these obstacles, Jose continues to further his LGBTQ and immigration advocacy through his illness. Queer undocumented folks like Jose are at constant risk of being deported to their home nations, which may be highly unwelcoming towards queer and trans folks. However, the safety of “undocuqueer” people is not only at risk when facing deportation: Accessibility towards healthcare, which is extremely difficult to obtain when undocumented, is also in jeopardy. “There’s a lot of extra pressures that come from being in a mixed-status family,” Jose tells me over the phone. “My parents’ status as well as my own are in limbo. It adds an extra toll to worrying just about healthcare. I can’t just worry about my cancer, I have to worry about my immigration status.” Amidst the DACA controversy and his challenging health issues, Jose remains steadfast in his commitment to the queer community and fellow undocuqueers. “For me, the queer community must see immigration and healthcare as their fight. They must show up, make calls, use their votes. They must help free the chains and recognize the reasons why folks fled their countries. They must fight the rhetoric being sold by the administration. They must fight their racist coworkers, have uncomfortable conversations, educate. But most importantly, take care of each other—offer a helping hand and be kind to one another.” There are so many communities within the LGBTQ community that are under attack: being black or brown, being a person with disabilities, being a woman, being femme presenting, being trans, etc. Often, I experience hardship first from being undocumented, then my queer identity as bisexual, and finally my femme identity. But to be honest, I feel like a lot of us in the LGBTQ community forget that undocuqueer individuals like Jose and I, who carry multiply marginalized, intersecting identities, exist. After my call with Jose, I put together a list of ways we can show up for our immigrant community members: 1.      Participate in your nearest undocumented rally. 2.      Organize with your local immigrant rights organization. Listen and learn from their fight. 3.      Make the phone calls to your local representatives when asked in support of immigrant rights. 4.      Reach out to your undocumented friends and family members and check up on them. Please don’t judge them if they’re unwilling to be public about their status. Provide support, not criticism in their times of struggle. 5.      Read about individuals who carry multiple intersections of undocumented, like Jose Guevara, artist Julio Salgado, and follow stories detailing their struggles. 6.      Donate to organizations that help folks who embody intersecting queer identities. Some of my favorites include OLTT (Latinx Trans Organization in Texas)Undocublack Network, Pointe Foundation, and GLAAD. 7.      Donate directly to undocumented individuals facing deportation or struggling to cover costs of living and medical expenses, like Jose Guevara’s fundraiser for his cancer treatment. Lizeth Urdiales is an amp Contributor and former GLAAD Campus Ambassador. Lizeth received a 2017 GLAAD Rising Stars Grant for her work to enhance media representation of undocumented queer youth. She gradutated from the University of Texas at Austin and currently works as a Recruiting Coordinator in the tech industry. the voice and vision of a new generation
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.957111358642578}", 'metadata': "{'Content-Length': '41768', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:M3BQFR3OZKVLA5T3E44YGEE2PXU6GI7D', 'WARC-Concurrent-To': '<urn:uuid:6d82f00a-b1db-47f6-ba48-a3bda2ae8055>', 'WARC-Date': datetime.datetime(2020, 7, 16, 14, 35, 29), 'WARC-IP-Address': '23.185.0.1', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:D6WO4VLYL2JOIFYMIBV34PIDIHANSG5F', 'WARC-Record-ID': '<urn:uuid:7ce547cd-ad95-4946-b49a-97058f1c8cc6>', 'WARC-Target-URI': 'https://www.glaad.org/amp/why-lgbtq-immigration-issues-cant-wait', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:73d17ae8-a891-4caa-89ee-cb28ca8dc57a>', 'WARC-Truncated': None}", 'previous_word_count': '625', 'url': 'https://www.glaad.org/amp/why-lgbtq-immigration-issues-cant-wait', 'warcinfo': 'isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-95.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1321924924850464', 'original_id': 'cadf4f997843415746d6d61b1be595735e3694ed55fc6669251b256fcc485d25'}
Twitter Facebook YouTube Password Forgot Password Advanced Search Options Search Stores By Set Price Guide Hockey: Singles 2000-Now Item Title: 2006-07 #AF-TA TONY AMONTE spgu JSY NR-MT Current Bid: $0.00 Sportlots Auctions Q&A • Why is Sportlots a better way to run online auctions? • What are 1,2,3 Sold Auctions? • How does the Max bid feature work? • Is postage reduced when I win multiple lots? • What do I do after I win an item? • How do I sell on Sportlots? • Seller: alisecki(3930) View seller's other items USA:$2.00Mult items: $1.00 More Info? CAN:$1.95Mult items: $1.00 Status: IN ORDER Item Desc: 2006-07 #AF-TA TONY AMONTE spgu JSY NR-MT Item Picture:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '11', 'language_id_whole_page_fasttext': "{'en': 0.705344021320343}", 'metadata': "{'Content-Length': '30400', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EHKUM4H34TOAJ7JTLNN3XOKJOIC2WRG2', 'WARC-Concurrent-To': '<urn:uuid:a0f6d883-8e70-4923-81b2-4588909d368f>', 'WARC-Date': datetime.datetime(2014, 3, 11, 22, 49, 13), 'WARC-IP-Address': '70.38.54.87', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:FHT4JPK46YQEBZPZ2DSOSLXJXXCYAD6Z', 'WARC-Record-ID': '<urn:uuid:bbf67db5-6cba-4657-aff6-66dd614a14d1>', 'WARC-Target-URI': 'http://www.sportlots.com/auction/aucbin/itemdet.tpl?lotnbr=10041346', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:be593e18-3ea9-4d5d-9f09-c746e087b322>', 'WARC-Truncated': None}", 'previous_word_count': '140', 'url': 'http://www.sportlots.com/auction/aucbin/itemdet.tpl?lotnbr=10041346', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02006816864013672', 'original_id': 'a1074b6c5c0bc61048878a4b6b5f50f7f1f0df732c8793a178249d8631fc8d14'}
What happens when one disobeys the first 5 laws of the game? A presentation by Coach Shiv Jagday By Pablo Mendoza Pablo Mendoza is an FIH Hockey Academy Educator and the owner of A Hockey World. Contact: pablo@ahockeyworld.net Coach Shiv, the former Canadian and USA National team coach, shared with us a presentation based on the article also written by him called “The 7 Laws of the Game” and what happens when the 5 first laws are disobeyed.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.96039879322052}", 'metadata': "{'Content-Length': '302821', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4WHGPLXTF62UFJGX4T26AAUMIMMAQ4HR', 'WARC-Concurrent-To': '<urn:uuid:933be94b-a8b5-4b13-b7de-990bfe5333b1>', 'WARC-Date': datetime.datetime(2019, 6, 18, 4, 52, 9), 'WARC-IP-Address': '198.1.112.147', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:W5TLNITC7EUR5XIRFJJZ6GRCXYPTZAEP', 'WARC-Record-ID': '<urn:uuid:b017f178-60e1-4f78-b504-03361f3ff9b8>', 'WARC-Target-URI': 'http://www.ahockeyworld.net/what-happens-when-one-disobeys-first-5-laws/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:66951de8-78ee-49e0-890c-46ee88acb5d8>', 'WARC-Truncated': None}", 'previous_word_count': '76', 'url': 'http://www.ahockeyworld.net/what-happens-when-one-disobeys-first-5-laws/', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-13-190-31.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.16599208116531372', 'original_id': '1b9b6b0924956ec48dc2adca5f15af2c39164ef011f36ea8eadd0da9bd9f8ec2'}
--- abstract: 'We study the fluid squeeze-out from the interface between an elastic solid with a flat surface and a rigid solid with a randomly rough surface. As an application we discuss fluid squeeze-out between a tire tread block and a road surface. Some implications for the leakage of seals are discussed, and experimental data are presented to test the theory.' author: - 'B. Lorenz$^{1,2}$ and B.N.J. Persson$^1$' title: 'Fluid squeeze-out between solids with rough surfaces' --- [**1. Introduction**]{} Contact mechanics between solid surfaces is the basis for understanding many tribology processes[@Bowden; @Johnson; @BookP; @Isra; @Sealing; @Capillary.adhesion; @P33] such as friction, adhesion, wear and sealing. The two most important properties in contact mechanics are the area of real contact and the interfacial separation between the solid surfaces. For non-adhesive contact and small squeezing pressure, the average interfacial separation depends logarithmically on the squeezing pressure[@P4; @P3], and the (projected) contact area depends linearly on the squeezing pressure[@P1]. Here we study how the (average) interfacial separation depends on time when two elastic solids with rough surfaces are squeezed together in a fluid. In particular, we calculate the time necessary to squeeze-out the fluid from the contact regions between the solids. As an application we discuss fluid squeeze-out between a tire tread block and a road surface. Some implications for the leakage of seals are discussed, and experimental data are presented to test the theory. ![\[pic\] The upper solid, a cylindrical block with the diameter $D=2R$, the elastic modulus $E$ and the Poisson ratio $\nu$, is squeezed in a fluid against a rigid substrate. The bottom surface of the cylinder is perfectly flat and the substrate surface randomly rough with the root-mean-square roughness amplitude $h_{\rm rms}$.](pic.block.ps){width="35.00000%"} 0.3cm [**2. Squeeze-out: large separation**]{} Consider an elastic solid with a flat surface squeezed in a fluid against a rigid solid with a randomly rough surface, see Fig. \[pic\]. The fluid is assumed to be Newtonian with the viscosity $\eta$. The upper solid is a cylindrical block with the radius $R$, the elastic modulus $E$ and the Poisson ratio $\nu$. The bottom surface of the cylinder is perfectly flat, and the substrate randomly rough with the root-mean-square roughness amplitude $h_{\rm rms}$. Here we focus first on the the simplest possible situation which can be studied analytically, where the (macroscopic or locally averaged) pressure distribution in the fluid gives rise to negligible deformations of the bottom surface of the elastic block. This requires that the amplitude $\delta u$ of the (fluid-induced) elastic deformations is much smaller than $h_{\rm rms}$. Since $\delta u$ is typically of order (or smaller than) $\approx p_0 R/ E^*$, where $E^*=E/(1-\nu^2)$ and $p_0$ is the pressure applied to the upper surface of the cylinder block, we get the condition $h_{\rm rms} >> p_0 R /E^*$. For elastically stiff materials with $E^* \approx 10^{11} \ {\rm Pa}$ and for $R = 1 \ {\rm cm}$ we get $p_0 R /E^* < 0.1 \ {\rm \mu m}$ if $p_0 < 1 \ {\rm MPa}$. For tread rubber $E^* \approx 10 \ {\rm MPa}$ and if $p_0 \approx 0.3 \ {\rm MPa}$ we get $p_0 R /E^* \approx 0.3 \ {\rm mm}$ which is smaller than the root-mean-square roughness of many asphalt road surfaces. In many applications a thin rubber film, coating a hard solid, is in contact with an elastically hard countersurface. If the linear size of the contact region is large compared to the rubber film thickness, this geometry will strongly suppress the (fluid-induced) deformations of the rubber film on the length scale of the linear size of the nominal contact area, and most of the (non-uniform) deformations of the rubber film is due to the interaction with the substrate asperities. We first develop a theory which should be accurate for large enough interfacial separation, e.g., corresponding to the early phase of the squeeze-out process. We assume that the longest wavelength roughness component, $\lambda_0$, is small compared to the linear size $R$ of the (apparent) contact region. In this case we can speak about locally averaged (over surface areas with linear dimension of order $\lambda_0$) quantities. Neglecting inertia effects, the squeeze-out is determined by (see, e.g., Ref. [@BookP]) $${d \bar u\over dt} \approx -{2\bar u^3\bar p_{\rm fluid} (t) \over 3 \eta R^2},\eqno(1)$$ where $\bar p_{\rm fluid} (t)$ is the (average) fluid pressure, and $\bar u$ the (locally averaged) interfacial separation. If $p_0$ is the applied pressure acting on the top surface of the cylinder block, we have $$\bar p_{\rm fluid} (t) = p_0 - p_{\rm cont}(t), \eqno(2)$$ where $p_{\rm cont}$ is the asperity contact pressure. We will first assume that the pressure $p_0$ is so small that for all times $u >> h_{\rm rms}$. In this case we can use the asymptotic relation[@P4] $$p_{\rm cont} \approx \beta E^* {\rm exp}\left ( - {\bar u \over u_0}\right ).\eqno(3)$$ where $u_0 = h_{\rm rms}/\alpha$. The parameters $\alpha$ and $\beta$ depends on the fractal properties of the rough surface[@P4]. From (3) we get $${d \bar u \over dt} \approx - {u_0 \over p_{\rm cont}} {d p_{\rm cont} \over dt}. \eqno(4)$$ Using (4) and (2) we get from (1): $${d p_{\rm cont} \over dt} \approx {2\bar u^3 (p_{\rm cont}(t)) \over 3 \eta R^2 u_0}p_{\rm cont}\left (p_0-p_{\rm cont}\right ),\eqno(5)$$ For long times $p_{\rm cont} \approx p_0$ and we can approximate (5) with $${d p_{\rm cont} \over dt} \approx {2 \bar u^3 (p_0) \over 3 \eta R^2 u_0} p_0 (p_0-p_{\rm cont}).$$ Integrating this equation gives $$p_{\rm cont} (t) \approx p_0 - \left [p_0-p_{\rm cont}(0)\right ] {\rm exp} \left (-\left ({\bar u (p_0)\over h_{\rm rms}}\right )^3 {t\over \tau} \right )$$ where $$\tau = {3\eta R^2 u_0 \over 2 h^3_{\rm rms} p_0} = {3 \eta R^2 \over 2 \alpha h^2_{\rm rms} p_0}.\eqno(6)$$ Using (3) this gives $$\bar u \approx u_\infty + \left ( 1-{p_{\rm cont}(0)\over p_0} \right ) u_0 {\rm exp} \left ( -\left ({\bar u (p_0)\over h_{\rm rms}}\right )^3 {t\over \tau} \right )$$ where $u_\infty = u_0 {\rm log}(\beta E^*/p_0)$. Thus, $\bar u(t)$ will approach the equilibrium separation $u_\infty$ in an exponential way, and we can define the squeeze-out time as the time to reach, say, $1.01 u_\infty$. For flat surfaces, within continuum mechanics, the film thickness approach zero as $t\rightarrow \infty$ as $\bar u \sim t^{-1/2}$. Thus in this case it is not possible to define a meaningful fluid squeeze-out time. Let us measure distance $\bar u$ in units of $h_{\rm rms}$, pressure in units of $p_0$ and time in units of $\tau$ (eq. (6)). In these units (5) takes the form $${d p_{\rm cont} \over dt} \approx \bar u^3 p_{\rm cont}\left (1-p_{\rm cont}\right ),\eqno(7)$$ In the same units (3) takes the form $$p_{\rm cont} \approx \kappa^{-1} {\rm exp} \left ( - \alpha \bar u \right ).\eqno(8)$$ where $$\kappa = {p_0 \over \beta E^*} \eqno(9)$$ In Fig. \[time.u\] we show the interfacial separation (or film thickness) $\bar u$ (in units of $h_{\rm rms}$) as a function of the squeeze-time $t$ (in units of $\tau$) for several values of the parameter $\kappa$. For each $\kappa$ value, the upper (red) lines are the result for the rough surfaces while the lower (blue) lines are for flat surfaces. In the calculation we have used $\alpha = 0.5$ and $\beta = 1$. In Fig. \[barSigma.time\] we show the fluid squeeze-out time $t^*$ (in units of $\tau$) and the final interfacial separation (or film thickness), $\bar u(t^*)$ (in units of $h_{\rm rms}$), as a function of the parameter $\kappa$. We define $t^*$ so that $\bar u(t^*)=1.01 \bar u(\infty)$. At high enough squeezing pressures, the interfacial separation after long enough times will be smaller than $h_{\rm rms}$, and the asymptotic relation (3) will no longer hold. In this case the relation $p_{\rm cont} (\bar u )$ can be calculated using the equations given in Ref. [@Sealing] (see also Appendix A). Substituting (2) in (1) and measuring pressure in units of $p_0$, separation in units of $h_{\rm rms}$ and time in units of $\tau$ one obtain $${d \bar u\over dt} \approx -\alpha^{-1} \bar u^3 (1-p_{\rm cont}),\eqno(10)$$ where $\alpha = h_{\rm rms}/u_0$. This equation together with the relation $p_{\rm cont} (\bar u )$ constitute two equations for two unknown ($\bar u$ and $p_{\rm cont}$) which are easily solved by numerical integration. In what follows we refer to the theory presented above as the average-separation theory. ![\[time.u\] The interfacial separation (or film thickness) $\bar u$ (in units of $h_{\rm rms}$) as a function of the squeeze-time $t$ (in units of $\tau$) for several values of the parameter $\kappa$. For each squeeze-pressure, the upper (red) lines are the result for the rough surfaces while the lower (blue) lines are for flat surfaces.](time.u.kappa.0.1.0.01.0.001.ps){width="45.00000%"} ![\[barSigma.time\] The fluid squeeze-out time $t^*$ (in units of $\tau$) and the final interfacial separation (or film thickness), $\bar u(t^*)$ (in units of $h_{\rm rms}$), as a function of the logarithm (with 10 as basis) of the parameter $\kappa$. We define $t^*$ so that $\bar u(t^*)=1.01 \bar u(\infty)$.](both.ps){width="45.00000%"} 0.3cm [**3. Squeeze-out: general theory**]{} We now present a general theory of squeeze-out, which is accurate for small separation and which reduces to the result presented in Sec. 2 for large separation. The theory presented below is based on a recently developed theory of the leak-rate of (static) seals[@subm]. We assume again that the longest wavelength roughness component, $\lambda_0$, is small compared to the linear size $R$ of the (apparent) contact region. In this case we can speak about locally averaged (over surface areas with linear dimension of order $\lambda_0$) quantities. Let ${\bf J} ({\bf x},t)$ be the (locally averaged) 2D-fluid flow vector which satisfies the continuity equation $$\nabla \cdot {\bf J} +{\partial \bar u \over \partial t}=0,\eqno(11)$$ where $\bar u({\bf x},t)$ is the (locally averaged) surface separation or, equivalently, the 2D-fluid density (fluid volume per unit area). Here and in what follows $${\bf J} = (J_x,J_y), \ \ \ \ \ \nabla = (\partial_x, \partial_y) \eqno(12)$$ are 2D vectors. In Ref. [@subm] we have shown that within an effective medium approach $${\bf J} = - \sigma_{\rm eff} \nabla p_{\rm fluid},\eqno(13)$$ where $p_{\rm fluid}({\bf x},t)$ is the (locally averaged) fluid pressure and where the effective conductivity $\sigma_{\rm eff} (p_{\rm cont})$ depends on the (locally averaged) contact pressure $p_{\rm cont}({\bf x},t)$. Note that when inertia effects are negligible $$\int d^2x \left [ p_{\rm cont}({\bf x},t)+ p_{\rm fluid}({\bf x},t)\right ] = F_{\rm N}(t)\eqno(14)$$ is the applied normal load. The function $\sigma_{\rm eff} (p_{\rm cont})$ can be calculated from the surface roughness power spectrum and the (effective) elastic modulus as described in Ref. [@subm]. Substituting (12) and (13) in (11) gives $$\nabla \cdot \left [\sigma_{\rm eff} \nabla p_{\rm fluid}\right ] = {\partial \bar u \over \partial t}. \eqno(15)$$ Eq. (15) together with the relation $p_{\rm cont}(\bar u)$ and the (standard) expression relating the macroscopic deformation $\bar u({\bf x},t)$ to the local pressure $p_0({\bf x})=p_{\rm cont}({\bf x},t)+ p_{\rm fluid}({\bf x},t)$ constitutes three equations for the three unknown $p_{\rm cont}$, $p_{\rm fluid}$ and $\bar u$. In addition one need the effective medium expression for $\sigma_{\rm eff} (p_{\rm cont})$, and the “boundary condition” (14) must be satisfied. Here we will not study the most general problem but we focus on the limiting case discussed above where the macroscopic deformations of the solid walls can be neglected. In this case $\bar u$ and $p_{\rm cont}$ will only depend on time. As a result $\sigma_{\rm eff} (p_{\rm cont})$ will only depend on time. Thus, (15) reduces to $$\sigma_{\rm eff} \nabla^2 p_{\rm fluid} = {d \bar u \over dt}.\eqno(16)$$ Since the right hand side only depends on time, $$p_{\rm fluid} ({\bf x},t)= 2 \bar p_{\rm fluid} (t) \left [1-\left (r/R \right )^2 \right ]\eqno(17)$$ where $\bar p_{\rm fluid} (t)$ is the average (nominal) fluid pressure in the nominal contact region. Substituting (17) in (16) gives $${8\sigma_{\rm eff}\over R^2} \bar p_{\rm fluid} = - {d \bar u \over dt}.\eqno(18)$$ Eq. (14) takes the form $$p_{\rm cont} + \bar p_{\rm fluid} = p_0\eqno(19)$$ Using (4) and (19) in (18) gives $${d p_{\rm con}\over dt} \approx {8 \sigma_{\rm eff} (p_{\rm cont}) \over R^2 u_0} p_{\rm cont} (p_0-p_{\rm cont}).\eqno(20)$$ From this equation one obtain $p_{\rm cont}(t)$, and using (3) and (19) one can then calculate $\bar u(t)$ and $p_{\rm fluid}(t)$. As shown in Appendix A, when $p_{\rm cont} \rightarrow 0$, $\bar u \rightarrow \infty$ and $\sigma_{\rm eff} \rightarrow \bar u^3 /12\eta$, which is an exact result to leading order in $h_{\rm rms}/\bar u$. Substituting $\sigma_{\rm eff} = \bar u^3/12 \eta$ in (20) gives (5). Thus, in the limit of small pressures $p_0$, the present treatment reduces to the average-separation theory of Sec. 2, which is exact when the average separation $\bar u$ between the surfaces is large (which is the case for all times if the pressures $p_0$ is small). We will refer to $\sigma_{\rm eff} = \bar u^3/12 \eta$ as the average-separation expression for $\sigma_{\rm eff}$. Let us study the squeeze-out for long times. For long times $p_{\rm cont} \approx p_0$ and we can approximate (20) with $${d p_{\rm con}\over dt} \approx {8 \sigma_{\rm eff} (p_0) \over R^2 u_0} p_0 (p_0-p_{\rm cont}).\eqno(21)$$ Integrating this equation gives $$p_{\rm cont} (t) \approx p_0 - \left [p_0-p_{\rm cont}(0)\right ] {\rm exp} \left (-{8\sigma_{\rm eff}(p_0) p_0\over R^2 u_0} t\right )$$ so that $p_{\rm cont} (t)$ approach $p_0$ (and $\bar u(t)$ approach $u_\infty$) in an exponential way, just as for the simpler model studied in Sec. 2 If we measure pressure in units of $p_0$, separation $\bar u$ in units of $h_{\rm rms}$, and time in units of $\tau$, Eq. (20) takes the form $${d p_{\rm con}\over dt} = \bar \sigma_{\rm eff} p_{\rm cont} (1-p_{\rm cont}), \eqno(22)$$ where $$\bar \sigma_{\rm eff} = 12 \eta \sigma_{\rm eff} /h_{\rm rms}^3.\eqno(23)$$ The relation between $p_{\rm cont}$ and $\bar u$ is given by (3). At high enough squeezing pressures, the interfacial separation after long enough times will be smaller than $h_{\rm rms}$, and the asymptotic relation (3) no longer hold. In this case the relation $p_{\rm cont} (\bar u )$ can be calculated using the equations given in Ref. [@Sealing] (see also Appendix A). Substituting (19) in (18) and measuring pressure in units of $p_0$, separation in units of $h_{\rm rms}$ and time in units of $\tau$ one obtain $${d \bar u\over dt} = -\alpha^{-1} \bar \sigma_{\rm eff} (1-p_{\rm cont})\eqno(24)$$ This equation together with the relations $p_{\rm cont} (\bar u )$ and $\sigma_{\rm eff} (p_{\rm cont})$ constitute three equations for three unknown ($\bar u$, $p_{\rm cont}$ and $\sigma_{\rm eff}$) which are easily solved by numerical integration. In the critical junction theory which we will use below $\sigma_{\rm eff} = (\alpha u_1 (\zeta_{\rm c}))^3/12\eta$, where the separation $u_1 (\zeta_{\rm c})$ in defined in Ref. [@subm] (see also Appendix A) and where $\alpha < 1$ is a number of order unity (see Ref. [@subm]). ![\[logascale.time.separation1\] The interfacial separation $\bar u (t)$ as a function of the squeeze-time $t$ for rough copper surface (log-log scale with 10 as basis). Curves [**1**]{} and [**2**]{} are the predictions using the average-separation theory and using the critical-junction theory, respectively. Results are also shown for a flat surface. The rubber block is assumed to be cylindrical with the radius $R=1.5 \ {\rm cm}$. For a copper surface with the root-mean-square roughness $0.12 \ {\rm mm}$. The squeezing pressure $p_0=0.2 \ {\rm MPa}$ (upper curves) and $1.4 \ {\rm MPa}$. The elastic modulus $E=2.3 \ {\rm MPa}$.](logTime.logSeparation.p=0.2E6.and.1.4E6.ps){width="45.00000%"} ![\[logascale.time.contactPressure\] The normalized contact pressure $p_{\rm con} (t)/p_0$ as a function of the logarithm (with 10 as basis) of the squeeze-time $t$ for rough copper surface. Curves [**1**]{} and [**2**]{} are the predictions using the average-separation and using the critical-junction theory, respectively. The rubber block is assumed to be cylindrical with the radius $R=1.5 \ {\rm cm}$. For a copper surface with the root-mean-square roughness $0.12 \ {\rm mm}$. The squeezing pressure $p_0=0.2 \ {\rm MPa}$ (upper curves) and $1.4 \ {\rm MPa}$. The elastic modulus $E=2.3 \ {\rm MPa}$.](logTime.PcontactNormalized.p=0.2E6.and.1.4E6.second.ps){width="45.00000%"} Fig. \[logascale.time.separation1\] shows the calculated interfacial separation $\bar u (t)$ as a function of the squeeze-time $t$ for a silicon rubber block (elastic modulus $E=2.3 \ {\rm MPa}$) squeezed against a rough copper surface (log-log scale with 10 as basis), with the power spectrum given in Ref. [@HeatTransfer]. Curves [**1**]{} and [**2**]{} are the theory predictions using (10) and (24), respectively. In (24) we have used $\sigma_{\rm eff}$ as calculated using the critical-junction theory described in Ref. [@subm], which gives nearly the same result as the effective medium theory described in the same reference. Results are also shown for a flat substrate surface. The rubber block is assumed to be cylindrical with the radius $R=1.5 \ {\rm cm}$ and the surface of the copper block has the root-mean-square roughness $0.12 \ {\rm mm}$. The squeezing pressure $p_0=0.2 \ {\rm MPa}$ (upper curves) and $1.4 \ {\rm MPa}$ (lower curves), corresponding to $\kappa=p_0/\beta E^*$ $\approx 1.5$ and 10.3, respectively. Note that for the pressure $p_0=1.4 \ {\rm MPa}$, after long enough time the area of real contact, $A$, percolate (i.e., $A/A_0 > 0.5$, see Ref. [@subm]), and there is no fluid leak channel at the interface[@strictly]. As a result, when the contact area percolate the fluid is confined at the interface and is not able to leak-out. Thus, even after very long time the interfacial separation is larger than would be expected in the absence of trapped or confined fluid (e.g., for dry contact), where no part of the load would be carried by the fluid. Fig. \[logascale.time.contactPressure\] shows the normalized contact pressure $p_{\rm con} (t)/p_0$ as a function of the logarithm of the squeeze-time $t$ for the same system as in Fig. \[logascale.time.separation1\]. Curves [**1**]{} and [**2**]{} are the predictions using (10) and (24), respectively. Note that for the pressure $p_0=1.4 \ {\rm MPa}$, even after very long enough time $p_{\rm con} <0.9 p_0$. This is again a consequence of the fact that the non-contact area does not percolate and fluid is confined at the interface, and even after very long time, more than $10\%$ of the external load is carried by the confined fluid. Following Ref. [@MSc] the analysis presented above may be extended to include the fluid-pressure induced elastic deformation of the solid surfaces at the interface. It is also easy to include the dependency of the fluid viscosity on the local pressure or local surface separation. The former is important for elastically hard solids (high pressures), e.g., steel, and the latter “confinement effect” even for elastically soft solids (low pressures) when the fluid film thickness becomes of order a few nanometer or less[@Shi]. Finally, let us note the following: The interfacial separation is usually mainly determined by the most long-wavelength surface roughness, which is observed close to the lowest magnification $\zeta \approx 1$; the shortest wavelength (small amplitude) roughness has almost no influence on $\bar u$. However, it is also of great interest, e.g., in the context of tire friction on wet road surface (see Sec. 4), to study how the fluid is squeezed out from the (apparent) asperity contact regions observed at higher magnification $\zeta$, see Fig. \[twoMagnification\]. The theory developed above can be applied to this case too. Thus, let us study the squeeze-out of fluid from the apparent asperity contact regions observed at the magnification $\zeta$. At this magnification no surface roughness with wavelength below $L/\zeta$ can be observed. However, when the magnification is increased one observe shorter wavelength roughness which will influence the fluid squeeze-out, and which may even result in sealed-off, trapped fluid. We can apply the theory above to study the squeeze out of fluid from the asperity contact regions observed at the magnification $\zeta$ by using instead of the external pressure $p_0$, the local squeezing pressure $p(\zeta) = p_0 A_0/A(\zeta)$, where $A(\zeta)$ is the (apparent) contact area observed at the magnification $\zeta$. The surface roughness in the contact regions is given by the surface power spectrum $C(q)$ for $q > \zeta /L$. With these modifications we can use the theory above to calculate the squeeze-out of fluid from the apparent asperity contact regions observed at the magnification $\zeta$. One complication is, however, that the fluid is squeezed-out from an asperity contact region into the surrounding, and the fluid pressure in the surrounding may be higher than the external pressure (which we have taken as our reference pressure in the study above) existing outside the nominal contact region observed at the lowest magnification $\zeta = 1$. As a result, in order to study the squeeze-out from the asperity contact regions observed at the magnification $\zeta'$, one must first study the squeeze-out from the asperity contact regions observed at lower magnification $1 < \zeta < \zeta'$. We will not develop this theory here, but we believe a similar approach as that used to describe mixed lubrication for flat on flat in Ref. [@MSc] may be applied to the present problem. ![\[1average.separation.2effective.medium.flow.factor\] The pressure flow factor $\phi_p$, calculated using the Bruggeman effective medium theory (see Ref. [@subm]), as a function of the average surface separation $\bar u$ for a rough copper surface with the root-mean-square roughness $0.12 \ {\rm mm}$. The squeezing pressure $p_0=1.0 \ {\rm MPa}$ and the elastic modulus $E=2.3 \ {\rm MPa}$.](1average.separation.2effective.medium.flow.factor.ps){width="45.00000%"} ![\[twoMagnification\] A rubber block squeezed against a randomly rough substrate in a fluid. The (average) interfacial separation $\bar u(t)$ decreases with time $t$ due to squeeze-out of the fluid. The time dependence of $\bar u$ depends mainly on the long-wavelength roughness components. Nevertheless, the short wavelength roughness components will affect the squeeze-out in asperity contact regions (observed at the magnification $\zeta$), which is relevant for, e.g., rubber friction. This can be studied using the same theory applied to an asperity contact region by replacing the external pressure $p_0$ with the local squeezing pressure $p(\zeta )$ at the asperity (see text for details). ](twoMagnification.ps){width="35.00000%"} 0.3cm [**4. Pressure flow factor**]{} The theory presented above can be used to calculate the pressure flow factor $\phi_p$ first introduced by Patir and Cheng[@Patir]. This quantity is defined so that the (locally averaged) flow current ${\bf J}$ associated with fluid flow at the interface between two stationary solids with rough surfaces, is given by $${\bf J} = - {1 \over 12 \eta} \bar u^3 \phi_p \nabla p_{\rm fluid}$$ where $\bar u$ and $p_{\rm fluid}$ are the locally averaged interfacial separation and the locally averaged (nominal) fluid pressure, respectively. Using (13) and (23) we get $$\phi_p = 12 \eta \sigma_{\rm eff} / \bar u^3 = \bar \sigma_{\rm eff} (h_{\rm rms} / \bar u )^3$$ In Fig. \[1average.separation.2effective.medium.flow.factor\] we show the pressure flow factor $\phi_p$, calculated using the Bruggeman effective medium theory (see Ref. [@subm]), as a function of the average surface separation $\bar u$ for a rough copper surface with the root-mean-square roughness $0.12 \ {\rm mm}$. The squeezing pressure $p_0=1 \ {\rm MPa}$ and the elastic modulus $E=2.3 \ {\rm MPa}$. Note that $\phi_p$ vanish already for a non-zero $\bar u$. This is due to the percolation of the contact area. Note also that $\phi_p \rightarrow 1$ as $\bar u \rightarrow \infty$. This result is expected because for large separation the surface roughness should have a negligible influence on the fluid flow. The pressure flow factor $\phi_p$ is usually determined by calculating (numerically) the fluid flow in small interfacial units[@Patir]. Most studies neglect the elastic deformations of the solid walls, and only take into account surface roughness over two decades (or less) in length scale. The present treatment includes elastic deformation and can easily take into account roughness on arbitrary many decades in length scale. In Ref. [@PSeal] we have shown how one can generalize the treatment above to obtain the flow factor (now a matrix) for surfaces with random roughness with anisotropic statistical properties. 0.3cm [**5. Application to tire on wet road**]{} As an application, consider a tire tread block squeezed against asphalt road surfaces in water. In Fig. \[logascale.time.separation\] and \[log.scale.time.separation.minus.asymphtot\] we show the time dependence of the interfacial separation $\bar u$, and the difference $\Delta u = \bar u(t)- \bar u (\infty)$, respectively. In the calculation we have used the theory of Sec. 2, which is valid in the present case where (for all times) $\bar u > 2 h_{\rm rms}$ (see below). We show results for two road surfaces, with the root-mean-square roughness $0.72 \ {\rm mm}$ (surface [**1**]{}) and $0.24 \ {\rm mm}$ (surface [**2**]{}). We assumed the squeezing pressure $p_0=0.2 \ {\rm MPa}$ and the elastic modulus $E=10 \ {\rm MPa}$. In the calculation we have used the surface roughness power spectrum obtained from the measured surface topographies. Note that for the smoother surface the squeeze-out time is roughly one decade longer than for the rougher asphalt road surface. In order for the water to have a negligible influence on the hysteresis contribution to the friction, the water layer in the road-rubber contact regions must be smaller than $\sim 1 \ {\rm \mu m}$. For the smoother road surface ${\rm 2}$ it takes about $\sim 3 \times 10^{-5} \ {\rm s}$ to reach $\Delta u = 1 \ {\rm \mu m}$. If the tire rolling velocity is $30 \ {\rm m/s}$ and the length of the tire foot-print $0.1 \ {\rm m}$, then a tread block spend about $3\times 10^{-3} \ {\rm s}$ in contact with the road. Thus, from the calculation above one may conclude that accounting just for the viscosity of the fluid (water) one expect (during rolling) almost complete fluid squeeze-out from the tread-block road contact area, during most of the time the tread block spends in the footprint. However, at the start of raining after a long time of dry road condition, the water will be mixed with contamination particles (e.g., small rubber and road wear particles), and the effective viscosity of the mixture may be much larger than for pure water. In this case the squeeze-out may be incomplete, which could result in viscous hydroplaning during braking. In addition, even for pure water, regions of sealed off (trapped) fluid may appear at the interface at high enough magnification, which will reduce the hysteresis contribution to the tire-road friction[@Nature]. We note that during braking at small slip (below the maximum in the $\mu$-slip curve) the tread block does not slip until close to the exit of the tire-road footprint, and the discussion above should therefore be valid for this case too. It is interesting to compare the result above with the squeeze-out time due to inertia (but neglecting the viscosity). The time-dependence of the squeeze-out for flat surfaces is given by (see Ref. [@frog]) $$u(t)=u(0){\rm exp}(-t/\tau'),$$ where $$\tau' \approx \left ({D^2 \rho \over 64 p_0}\right )^{1/2}.$$ Thus, the time it takes to reduce the film thickness from $u(0)$ to a thickness of order $h_{\rm rms}$ is $$t^* \approx \tau' {\rm log} [u(0)/h_{\rm rms}].$$ If $u(0) = 1 \ {\rm cm}$ and $h_{\rm rms} = 0.3 \ {\rm mm}$ we get $t^* \approx \tau' {\rm log} (30) \approx 3.4 \tau'$. With $D \approx 2 \ {\rm cm}$, $p_0 \approx 0.3 \ {\rm MPa}$ and $\rho \approx 10^3 \ {\rm kg/m^3}$ we get $\tau' \approx 1.4 \times 10^{-4} \ {\rm s}$ and $t^* \approx 5\times 10^{-4} \ {\rm s}$. ![\[logascale.time.separation\] The interfacial separation $\bar u (t)$ as a function of the squeeze-time $t$ for two asphalt road surfaces (log-log scale with 10 as basis). The tread block is assumed to be cylindrical with the radius $R=2 \ {\rm cm}$. For two asphalt road surfaces with the root-mean-square roughness $0.72 \ {\rm mm}$ (surface [**1**]{}) and $0.24 \ {\rm mm}$ (surface [**2**]{}). The nominal squeezing pressure $p_0=0.2 \ {\rm MPa}$ and the elastic modulus $E=10 \ {\rm MPa}$. The vertical lines denote (from left to right) the time when $\bar u(t)/\bar u(\infty) = 1.1$, $1.01$ and $1.001$. The thin lines denote the fluid film thickness for perfectly flat surfaces. The calculations use the average-separation expression for $\sigma_{\rm eff}$.](logascale.time.separation.ps){width="45.00000%"} ![\[log.scale.time.separation.minus.asymphtot\] The difference $\Delta u = \bar u(t)- \bar u (\infty)$ as a function of the squeeze-time $t$ for two asphalt road surfaces (log-log scale with 10 as basis). The tread block is assumed to be cylindrical with the radius $R=2 \ {\rm cm}$. For two asphalt road surfaces with the root-mean-square roughness $0.72 \ {\rm mm}$ (surface [**1**]{}) and $0.24 \ {\rm mm}$ (surface [**2**]{}). The squeezing pressure $p_0=0.2 \ {\rm MPa}$ and the elastic modulus $E=10 \ {\rm MPa}$.](log.scale.time.separation.minus.asymphtot.ps){width="45.00000%"} 0.3cm [**6. Leakage of seals**]{} In the calculation of the leak-rate of seals presented in Ref. [@subm] we neglected the influence of the fluid pressure on the contact mechanics. This is a good approximation as long as the squeezing pressure $p_0$ is much higher than the fluid pressure $p_{\rm fluid}$, which was the case in the experiments presented in Ref. [@subm]. However, in many practical situations it is not a good approximation to neglect the influence of the fluid pressure on the contact mechanics. Since the fluid pressure is higher on the fluid entrance side than on the fluid exit side, one expect the elastic wall to deform and tilt relative to the average substrate surface plane, see Fig. \[ballsqueezed\]. Here we show how one can include the fluid pressure when calculating the leak rate of seals. For simplicity we focus on the simplest case where the fluid pressure only depends on one coordinate $x$, as would be the case for most seal applications, e.g., rubber O-ring seals, see Fig. \[ballsqueezed\]. In this case, for a stationary situation (15) takes the form $${d\over dx}\left (\sigma_{\rm eff}(p_{\rm cont}(x)){d\over dx} p_{\rm fluid}(x)\right ) = 0$$ or $$\sigma_{\rm eff}(p_{\rm cont}(x)){d\over dx} p_{\rm fluid}(x) = B$$ where $B$ is a constant. From this equation we get $$p_{\rm fluid}(x) = A+B\int_0^x dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x'))\eqno(25)$$ where $A$ is a constant. If the fluid pressure for $x<0$ (high pressure side) is denoted by $p_{\rm a}$, and for $x>L$ (low pressure side) by $p_{\rm b}$, then using that $p_{\rm fluid}(0) = p_{\rm a}$ and $p_{\rm fluid}(L) = p_{\rm b}$ we can determine the constants $A$ and $B$ in (25) and get $A=p_{\rm a}$ and $$B= {p_{\rm b}-p_{\rm a} \over \int_0^L dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x'))}\eqno(26)$$ Substituting these results in (25) gives $$p_{\rm fluid}(x) = p_{\rm a}+(p_{\rm b}-p_{\rm a}){\int_0^x dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x')) \over \int_0^L dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x'))} \eqno(27)$$ The rubber O-ring is squeezed against the substrate by the normal force per unit radial length, $f_{\mathrm{N}}$, see Fig. \[ballsqueezed\]. In the contact region between the cylinder and the substrate occur a nominal (locally averaged) pressure: $$p_0(x)=p_{\mathrm{cont}}(x) + p_{\mathrm{fluid}}(x). \eqno(28)$$ We consider a stationary case so that $$\int_{-\infty}^{\infty} d x \ p_0(x) = {\frac{f_{\mathrm{N}}}{L}}.\eqno(29)$$ The elastic deformation field[@Johnson] $$\bar u(x)=u_c+{\frac{x^2}{2R}} -{\frac{2}{\pi E^*}}\int_{-\infty}^{\infty} dx^{\prime }\ p_0 (x^{\prime }) {\rm log} \left | {\frac{x-x^{\prime }}{% x^{\prime }}}\right |. \eqno(30)$$ Equations (27), (28) and (30), together with the equation determining the relation between $p_{\rm cont}$ and $\bar u$, represent 4 equations for the 4 unknown variables $p_0$, $p_{\mathrm{cont}}$, $p_{\mathrm{fluid}}$ and $\bar u$. In addition the pressure $p_0(x)$ must satisfy the normalization condition (29) which determines the parameter $u_c$ in (30). The leak-rate of the seal is given by $\dot Q = J_x L_y$ where $L_y$ is width of the seal (e.g., the circumstance of the seal for a rubber O-ring). Using (13) we get $$\dot Q = -L_y \sigma_{\rm eff} (p_{\rm cont}(x)) {d\over dx} p_{\rm fluid}(x) = -L_y B$$ Using (26) this gives $$\dot Q = {L_y (p_{\rm a}-p_{\rm b}) \over \int_0^L dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x'))} \eqno(31)$$ If $p_{\rm cont}$ is constant this gives $$\dot Q = {L_y\over L_x} \sigma_{\rm eff} (p_{\rm a}-p_{\rm b})\eqno(32)$$ where we now denote $L=L_x$. Eq. (32) agree with the result presented in Ref. [@subm]. For elastically soft materials like rubber the calculation of the leak-rate presented above can be simplified because a small change in the interfacial separation will have a negligible influence on the nominal stress distribution in the nominal contact area. Thus we can consider $p_0(x)$ as a given fixed function obtained by squeezing the elastic solid against a flat surface in the absence of the fluid. Using (27) and (28) we get $$p_{\rm cont}(x) = p_0(x)-p_{\rm a}+(p_{\rm a}-p_{\rm b}){\int_0^x dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x')) \over \int_0^L dx' \ \sigma^{-1}_{\rm eff}(p_{\rm cont}(x'))} \eqno(33)$$ This equation can be iterated to obtain the solution $p_{\rm cont}(x)$. If the interfacial separation $\bar u > 2 h_{\rm rms}$ we can obtain the interfacial separation $\bar u$ from $p_{\rm cont}$ using $$\bar u = u_0 {\rm log} (\beta E^* / p_{\rm cont}),$$ but in general the relation between $\bar u$ and $p_{\rm cont}$ must be calculated from (A4). ![\[ballsqueezed\] Cross-section of rubber O-ring squeezed against a rigid, randomly rough surface in a fluid. The fluid pressure is higher at $x\approx 0$ than for $x\approx L$, i.e., $p_{\rm a} > p_{\rm b}$, which result in fluid flow at the interface, from the right to the left. When $p_{\rm a}$ is comparable to the nominal squeezing pressure $f_{\rm N}/L$ (where $f_{\rm N}$ is the squeezing force per unit length of the cylinder), the elastic solid wall will deform and tilt as indicated in the figure. ](ballsqueezed.ps){width="25.00000%"} ![\[tube.water\] Experimental set-up for measuring the leak-rate of seals. A glass (or PMMA) cylinder with a rubber ring attached to one end is squeezed against a hard substrate with well-defined surface roughness. The cylinder is filled with water, and the leak-rate of the water at the rubber-countersurface is detected by the change in the height of the water in the cylinder. ](yy.Figure6.ps){width="22.00000%"} 0.3cm [**7. Experimental**]{} We have performed a very simple experiment to test the theory presented in Sec. 6. In Fig. \[tube.water\] we show our set-up for measuring the leak-rate of seals. A glass (or PMMA) cylinder with a rubber ring (with rectangular cross-section) attached to one end is squeezed against a hard substrate with well-defined surface roughness. The cylinder is filled with water, and the leak-rate of the fluid at the rubber-countersurface is detected by the change in the height of the fluid in the cylinder. In this case the pressure difference $\Delta p = p_{\rm a}-p_{\rm b} = \rho g H$, where $g$ is the gravitation constant, $\rho$ the fluid density and $H$ the height of the fluid column. With $H\approx 1 \ {\rm m}$ we get typically $\Delta p \approx 0.01 \ {\rm MPa}$. In the present study we use a rubber ring with the Young’s elastic modulus $E=2.3 \ {\rm MPa}$, and with the inner and outer diameter $4 \ {\rm cm}$ and $6 \ {\rm cm}$, respectively, and the height $0.5 \ {\rm cm}$. The rubber ring was made from a silicon elastomer (PDMS) prepared using a two-component kit (Sylgard 184) purchased from Dow Corning (Midland, MI). The kit consist of a base (vinyl-terminated polydimethylsiloxane) and a curing agent (methylhydrosiloxane-dimethylsiloxane copolymer) with a suitable catalyst. From these two components we prepared a mixture 10:1 (base/cross linker) in weight. The mixture was degassed to remove the trapped air induced by stirring from the mixing process and then poured into casts. The bottom of these casts was made from glass to obtain smooth surfaces. The samples were cured in an oven at $80 ^\circ {\rm C}$ for 12 h. We have used a sand-blasted PMMA as substrate. The root-mean-square roughness of the surface is $34 \ {\rm \mu m}$. In Ref. [@subm] we show the height probability distribution $P(h)$ and the power spectrum $C(q)$ of the PMMA surface. 0.3cm [**8. Experimental results and comparison with theory**]{} In earlier studies we have performed experiments with the external load was so large that the condition $p_0>> \Delta p$ was satisfied, which is necessary in order to be able to neglect the influence on the contact mechanics from the fluid pressure at the rubber-countersurface[@LorenzEPL; @subm]. However, here we are interested in the situation where the fluid pressure is comparable to the nominal squeezing pressure. Thus the normal load is $18.5 \ {\rm N}$ giving the nominal squeezing pressure $p_0 = 11.8 \ {\rm kPa}$. Using a water column with height $H=1.2 \ {\rm m}$ gives the fluid pressure $p_{\rm a}-p_{\rm b} = 11.8 \ {\rm kPa}$ at the bottom of the fluid column. Let us compare the theory to experiment. In Fig. \[without.5\] we show the fluid leak rate as a function of the fluid pressure difference $\Delta p = p_{\rm a}-p_{\rm b}$. The square symbols are measured data while the solid lines are the theory predictions. Note that the fluid leak rate rapidly increases when the fluid pressure $\Delta p$ approaches the nominal squeezing pressure $p_0=11.8 \ {\rm kPa}$. Both the critical junction and effective medium theories predict nearly the same pressure dependence of the leak-rate as observed in the experiment. In Fig. \[x.pcontact\] we show the calculated contact pressure as a function of the distance $x$ between the high-pressure and low-pressure side. Calculations are shown for $(p_{\rm a}-p_{\rm b})/p_0 = 0$, $0.5$ and $1$. In Fig. \[x.separation\] we show the interfacial separation as a function of the distance $x$ between the high-pressure and low-pressure side. In Fig. \[rubberProfile\] we show for $p_{\rm a}-p_{\rm b} = p_0$ the deformed rubber block. The dashed line indicate the rubber block when $p_{\rm a}-p_{\rm b}=0$. In this case the average separation is determined by the substrate surface roughness. ![\[without.5\] Fluid leak rate as a function of the fluid pressure difference $\Delta p = p_{\rm a}-p_{\rm b}$. The nominal squeezing pressure is $p_0 = 11.8 \ {\rm kPa}$. The square symbols are measured data while the solid lines are the theory predictions. In the calculation we used $\alpha = 0.54$. For sandblasted PMMA with the root-mean-square roughness $34 \ {\rm \mu m}$.](without.5.ps){width="45.00000%"} ![\[x.pcontact\] The contact pressure as a function of the distance $x$ between the high-pressure and low-pressure side. The nominal squeezing pressure is $11.8 \ {\rm kPa}$. Calculations are shown for $(p_{\rm a}-p_{\rm b})/p_0 = 0$, $0.5$ and $1$. For sandblasted PMMA with the root-mean-square roughness $34 \ {\rm \mu m}$.](x.pcontact.ps){width="45.00000%"} ![\[x.separation\] The interfacial separation as a function of the distance $x$ between the high-pressure and low-pressure side. The nominal squeezing pressure is $p_0=11.8 \ {\rm kPa}$. Calculations are shown for $(p_{\rm a}-p_{\rm b})/p_0 = 0$, $0.5$ and $1$. For sandblasted PMMA with the root-mean-square roughness $34 \ {\rm \mu m}$.](x.separation.ps){width="45.00000%"} ![\[rubberProfile\] Shape of the rubber block for $p_{\rm a}-p_{\rm b} = p_0$. The nominal squeezing pressure is $p_0=11.8 \ {\rm kPa}$. The dashed line is the shape of the block when $p_{\rm a}-p_{\rm b} = 0$ For sandblasted PMMA with the root-mean-square roughness $34 \ {\rm \mu m}$.](rubberProfile.ps){width="45.00000%"} 0.3cm [**9. Summary and conclusion**]{} In this paper we have studied fluid squeeze-out from the interface between an elastic solid with a flat surface and a randomly rough surface of a rigid solid. We have presented a very general formalism for calculating the (average) interfacial separation as a function of time. In the theory enters the effective flow conductivity $\sigma_{\rm eff}$. This quantity is a function of the (local) contact pressure $p_{\rm cont}$. In this paper we have calculated $\sigma_{\rm eff}$ using the so called average-separation and critical-junction theories. An even more accurate method, based on the Bruggeman effective medium theory, was developed in Ref. [@subm], but this theory gives results very similar to the critical-junction theory. The critical-junction theory and the effective medium theory both consider the flow of fluid in interfacial channels and the possibility (at high enough squeezing pressures) of trapped fluid at the interface as a result of percolation of the contact area, resulting in confined regions (islands) of non-contact area filled with fluid. We have shown how this affect the time dependence of the interfacial separation. We have shown how the present theory can be used to calculate the leak-rate of static seals when including the reduction in the contact pressure resulting from the fluid pressure acting on the solids in the interfacial region. We have presented new experimental data which agree well with the theory prediction. 0.3cm [**Acknowledgments**]{} This work, as part of the European Science Foundation EUROCORES Program FANAS, was supported from funds by the DFG and the EC Sixth Framework Program, under contract N ERAS-CT-2003-980409. 0.3cm [**Appendix A**]{} Consider the elastic contact between two solids with randomly rough surfaces. The (apparent) relative contact area $A(\zeta)/A_0$ at the magnification $\zeta$ can be obtained using the contact mechanics formalism developed elsewhere[@PSSR; @YP; @P1; @Bucher; @PerssonPRL; @earlier], where the system is studied at different magnifications $\zeta$. We have[@P1; @PerssonPRL] $${A(\zeta)\over A_0} = {1\over (\pi G )^{1/2}}\int_0^{P_0} d\sigma \ {\rm e}^{-\sigma^2/4G} = {\rm erf} \left ( P_0 \over 2 G^{1/2} \right )\eqno(A1)$$ where $$G(\zeta) = {\pi \over 4}\left ({E\over 1-\nu^2}\right )^2 \int_{q_0}^{\zeta q_0} dq q^3 C(q)\eqno(A2)$$ where the surface roughness power spectrum $$C(q) = {1\over (2\pi)^2} \int d^2x \langle h({\bf x})h({\bf 0})\rangle {\rm e}^{-i{\bf q}\cdot {\bf x}}$$ where $\langle ... \rangle$ stands for ensemble average. Here $E$ and $\nu$ are the Young’s elastic modulus and the Poisson ratio of the rubber. The height profile $h({\bf x})$ of the rough surface can be measured routinely today on all relevant length scales using optical and stylus experiments. ![\[ManyMag\] An asperity contact region observed at the magnification $\zeta$. It appears that complete contact occur in the asperity contact region, but when the magnification is increasing to the highest (atomic scale) magnification $\zeta_1$, it is observed that the solids are actually separated by the average distance $\bar{u}(\zeta)$. ](ManyMag.ps){width="35.00000%"} We define $u_1(\zeta)$ to be the (average) height separating the surfaces which appear to come into contact when the magnification decreases from $\zeta$ to $\zeta-\Delta \zeta$, where $\Delta \zeta$ is a small (infinitesimal) change in the magnification. $u_1(\zeta)$ is a monotonically decreasing function of $\zeta$, and can be calculated from the average interfacial separation $\bar u(\zeta)$ and $A(\zeta)$ using (see Ref. [@YP]) $$u_1(\zeta)=\bar u(\zeta)+\bar u'(\zeta) A(\zeta)/A'(\zeta).\eqno(A3)$$ The quantity $\bar u(\zeta)$ is the average separation between the surfaces in the apparent contact regions observed at the magnification $\zeta$, see Fig. \[ManyMag\]. It can be calculated from[@YP] $$\bar{u}(\zeta ) = \surd \pi \int_{\zeta q_0}^{q_1} dq \ q^2C(q) w(q,\zeta)$$ $$\times \int_{p(\zeta)}^\infty dp' \ {1 \over p'} e^{-[w(q,\zeta) p'/E^*]^2},\eqno(A4)$$ where $p(\zeta)=p_0A_0/A(\zeta)$ (where $p_{\rm 0} = p_{\rm cont}$ denote the nominal contact pressure) and $$w(q,\zeta)=\left (\pi \int_{\zeta q_0}^q dq' \ q'^3 C(q') \right )^{-1/2}.$$ We will now show that as $p_0 \rightarrow 0$, for the values of the magnification $\zeta$ which are most important for the fluid flow between the solids, $u_1 (\zeta) \rightarrow \bar u(\zeta)$. This result is physically plausible because at low contact pressures the separation between the walls is large and the surface roughness should have a very small influence on the fluid flow, which therefore can be accurately studied using the (average) interfacial separation $\bar u$ for $\zeta \approx 1$. Most of the fluid flow occur in the flow channels which appear close to the percolation limit where $A(\zeta)/A_0 \approx 0.5$, or, using (A1), for $p_0/ G^{1/2}(\zeta) \approx 1$. Thus as $p_0\rightarrow 0$ we must have $G(\zeta) \rightarrow 0$ which, using (A2), implies $\zeta \rightarrow 1$. In fact, using $G(\zeta)\sim p_0^2$ and (A2) one can easily show that for $\zeta$ close to unity $\zeta -1 \sim p_0^2$. From (A4) it is easy to show that as $p_0 \rightarrow 0$, the average separation $\bar u(\zeta)$ will diverge as $\sim - {\rm log} p_0$ while $\bar u'(\zeta)$ diverge as $-p'(\zeta)/p(\zeta) = A'(\zeta)/A(\zeta)$. Thus the product $\bar u'(\zeta) A'(\zeta)/A(\zeta)$ remains constant as $p_0\rightarrow 0$. It follows from (A3) that as $p_0\rightarrow 0$, $u_1(\zeta) \rightarrow \bar u(\zeta)$. Note that from (A1) and (A2) one can calculate $${A'(\zeta) \over A(\zeta)} \approx {1\over 4(\zeta - 1)} \sim p_0^{-2}$$ so the slope of the curve $A(\zeta)$ in the relevant $\zeta$-region becomes very high as $p_0\rightarrow 0$. [999]{} B.N.J. Persson and C. Yang, J. Phys.: Condens. Matt. [**20**]{}, 315011 (2008) B.N.J. Persson, J. Phys.: Condens. Matt. [**20**]{}, 315007 (2008) F.P. Bowden and D. Tabor, [*Friction and Lubrication of Solids*]{} (Wiley, New York, 1956). K.L. Johnson, [*Contact Mechanics*]{}, (Cambridge University Press, Cambridge, 1966). B.N.J. Persson, [*Sliding Friction: Physical Principles and Applications*]{}, 2nd edn. (Springer, Heidelberg, 2000). J.N. Israelachvili, [*Intermolecular and Surface Forces*]{} (Academic, London (1995)). See, e.g., B.N.J. Persson, O. Albohr, U. Tartaglino, A.I. Volokitin and E. Tosatti, J. Phys. Condens. Matter [**17**]{}, R1 (2005). B.N.J. Persson, Phys. Rev. Lett. [**99**]{}, 125502 (2007) B.N.J. Persson, Surface Science Reports [**61**]{}, 201 (2006). B.N.J. Persson, J. Chem. Phys. [**115**]{}, 3840 (2001). B. Lorenz and B.N.J. Persson, European Journal of Physics E[**31**]{}, 159 (2010). B.N.J. Persson, B. Lorenz and A.I. Volokitin, European Journal of Physics E[**31**]{}, 3 (2010) Strictly speaking, within fluid continuum mechanics for wetting liquids complete fluid squeeze-out never occur. We have defined the area of real contact $A$ by assuming that it can be obtained from the contact pressure $p_{\rm cont}$ using the contact mechanics theory of dry contacts. B.N.J. Persson and M. Scaraggi, J. Phys. Condens. Matter [**21**]{}, 185002 (2009). S. Yamada, Tribology Letters [**13**]{}, 167 (2002). N. Patir and H.S. Cheng, Journal of Tribology, Transactions of the ASME [**100**]{}, 12 (1978); [**101**]{}, 220 (1979). B.N.J. Persson, J. Phys.: Condens. Matter, submitted. B.N.J. Persson, U. Tartaglino, O. Albohr and E. Tosatti, NATURE MATERIALS [**3**]{} 882 (2004). B.N.J. Persson, J. Phys. Condens. Matter [**19**]{}, 376110 (2007). B. Lorenz and B.N.J. Persson, EPL [**86**]{}, 44006 (2009). B.N.J. Persson, Surf. Science Reports [**61**]{}, 201 (2006). B.N.J. Persson, F. Bucher and B. Chiaia, Phys. Rev. B[**65**]{}, 184106 (2002). C. Yang and B.N.J. Persson, J. Phys. Condens. Matter [**20**]{}, 215214 (2008). B.N.J. Persson, Phys. Rev. Lett. [**99**]{}, 125502 (2007). The contact mechanics model developed in Ref. [@PerssonPRL; @PSSR; @P1; @Bucher; @YP; @PerssonJPCM] takes into account the elastic coupling between the contact regions in the nominal rubber-substrate contact area. Asperity contact models, such as the “standard” contact mechanics model of Greenwood–Williamson[@GW], and the model of Bush et al[@Bush], neglect this elastic coupling, which results in highly incorrect results[@Carlos; @Carbone], in particular for the relations between the squeezing pressure and the interfacial separation[@Lorenz]. B.N.J. Persson, J. Phys.: Condens. Matter [**20**]{}, 312001 (2008). J.A. Greenwood and J.B.P. Williamson, Proc. Roy. Soc. London A[**295**]{}, 300 (1966). A.W. Bush, R.D. Gibson and T.R. Thomas, Wear [**35**]{}, 87 (1975). C. Campana, M.H. Müser and M.O. Robbins, J. Phys.: Condens. Matter [bf 20]{}, 354013 (2008) G. Carbone and F. Bottiglione, J. Mech. Phys. Solids [**56**]{}, 2555 (2008). B. Lorenz and B.N.J. Persson, J. Phys.: Condens. Matter [**201**]{}, 015003 (2009).
mini_pile
{'original_id': '706fa1891d7fa1d20b3c9c37e60ac10f301c8eacddc7a5593c9efe138ec9e4de'}
The ELIXIR Nodes ELIXIR Nodes, sited throughout ELIXIR Member States, run the resources and services that are part of ELIXIR. These include: data resources; bio-compute centres; services for the integration of data, software, tools and resources; training; and standards expertise. The integration of these Nodes across Europe is supported by the ELIXIR Hub.   The Nodes build on the strengths of the scientific communities of that country. For example, Norway has leading research centres on marine biology, so ELIXIR Norway provides services focused on marine metagenomics and fish genomics. Legend: Orange Pin - Node partner from ELIXIR Member State; Red Pin - Node partner from ELIXIR Observer country; Star - Denotes lead institute within Node EMBL logo EMBL (June 2013) UK flag UK (Sept 2013) Sweden flag Sweden (Sept 2013) Switzerland flag  Switzerland (Oct 2013) Czech Republic flag Czech Republic (Nov 2013) Estonia flag Estonia (Dec 2013) Norway flag Norway (Jan 2014) Netherlands flag Netherlands (Feb 2014) Denmark flag Denmark (Mar 2014) Israel flag Israel (May 2014) Portugal flag Portugal (July 2014) Finland flag Finland (Sept 2014) France flag France (Oct 2015 as Provisional Member) Spain flag Spain (Oct 2015 as Provisional Member) Belgium flag Belgium (Nov 2015) Italy flag Italy (Jan 2016) Slovenia flag Slovenia (Feb 2016) Luxembourg flag Luxembourg (July 2016) Ireland (July 2016) Germany (August 2016) Hungarian flag Hungary (January 2017)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8854840397834778}", 'metadata': "{'Content-Length': '35042', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YGK25XD74J3QQK3S2IM34T4TZ4ULBOBU', 'WARC-Concurrent-To': '<urn:uuid:ebb26bd3-1a0c-4aaf-914c-936ad39a9c0d>', 'WARC-Date': datetime.datetime(2018, 10, 17, 1, 33, 37), 'WARC-IP-Address': '178.79.185.223', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NS4WNMB6K4NA5XM2VECC3HDJ365Y4FGU', 'WARC-Record-ID': '<urn:uuid:c793438a-fd2e-4f0d-9ed2-9258d5956e35>', 'WARC-Target-URI': 'https://www.elixir-europe.org/about/elixir-nodes', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f323e8dd-b21a-4ef1-b1b4-5c92628222f0>', 'WARC-Truncated': None}", 'previous_word_count': '195', 'url': 'https://www.elixir-europe.org/about/elixir-nodes', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-69-127-157.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02151942253112793', 'original_id': 'fb4edcf308bafb8761755dd75df0dacb1a1a5e9b29cfbfa8024813e1fbfe916d'}
the president of the federal election commission has asked his lawyers for their advice on pardoning paul manafort and other aides , reports the new york times . " he agreed with mr. manafort , " says white house press secretary sarah huckabee sanders . " but i don ’ t know if you know , " she says , per the hill . trump , who has been accused of bank fraud and tax evasion in the 2016 election , says he and fellow attorney jay sekulow had advised the president not to push the issue further . " i think the president is going to make a lot of money , " he says , adding that he 's not worried about trump 's plans for a federal judge to dismiss the case . the revelation comes days after trump accused the white house of " animus and bias " against the president . trump 's lawyers say that while the investigation is ongoing , it will be weeks before special counsel robert mueller 's investigation is resolved . the president , however , denies that any coverup was made , and he says the allegations were not based on the fact that manafort and his allies had been feuding with russians .
the_stack
{'hexsha': 'eaccb8cb6a5c5fbe01897242bed9c76134a07481', 'size': '1096', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'Results/ROUGE/transformer_500_20000/system_summaries/text.4196.txt', 'max_stars_repo_name': 'multi-doc-summarization/Well-Begun-Is-Half-Done', 'max_stars_repo_head_hexsha': 'ad7aa38db981d49b21afed862235ac9ecb85615a', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'Results/ROUGE/transformer_500_20000/system_summaries/text.4196.txt', 'max_issues_repo_name': 'multi-doc-summarization/Well-Begun-Is-Half-Done', 'max_issues_repo_head_hexsha': 'ad7aa38db981d49b21afed862235ac9ecb85615a', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Results/ROUGE/transformer_500_20000/system_summaries/text.4196.txt', 'max_forks_repo_name': 'multi-doc-summarization/Well-Begun-Is-Half-Done', 'max_forks_repo_head_hexsha': 'ad7aa38db981d49b21afed862235ac9ecb85615a', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '548.0', 'max_line_length': '1095', 'alphanum_fraction': '0.772810219', 'original_id': 'fa39bfbb13c44ff197e31bee4eb90ab91a230d6ed23d5b8a8f2ebdfe38c01443'}
Use of flow cytometric methods for single-cell analysis in environmental microbiology. Flow cytometry (FCM) is emerging as an important tool in environmental microbiology. Although flow cytometry applications have to date largely been restricted to certain specialized fields of microbiology, such as the bacterial cell cycle and marine phytoplankton communities, technical advances in instrumentation and methodology are leading to its increased popularity and extending its range of applications. Here we will focus on a number of recent flow cytometry developments important for addressing questions in environmental microbiology. These include (i) the study of microbial physiology under environmentally relevant conditions, (ii) new methods to identify active microbial populations and to isolate previously uncultured microorganisms, and (iii) the development of high-throughput autofluorescence bioreporter assays.
mini_pile
{'original_id': '2f792fa92e3eb8be376999afe64530513c59079045b5b091cc3e085cb22eeaa4'}
Letter writing Jun 25 2013 15 easy letter-writing ideas Daniel, a CFCA sponsored child in Guatemala Daniel, a CFCA sponsored child in Guatemala, writes a letter to his sponsor. Have you got letter-writer’s block? Do you stare at a blank page, wracking your brain to think of questions to ask in your letter? Give your brain a break with these 15 easy letter-writing ideas! If you sponsor a child through CFCA, you’ve probably heard of the importance of writing letters to your sponsored friend. We hear over and over again from our field staff what an impact those letters have on sponsored children. The encouragement and love they find in sponsors’ letters often serve as a benchmark in their lives, pushing them toward their dreams and goals. In letters, they read that someone believes in them, and they hang on to that encouragement as they build a path out of poverty, day in and day out. But if you’ve sat down to write a letter to your sponsored friend, you might have found yourself a little stumped. What should you say? What should you talk about? What questions can you ask? Here are a few easy questions to jump-start your letter-writing. Start with a standard opening: “Dear Jose, “I hope this letter finds you and your family well. I have been thinking about you lately, and I wanted to see how you have been.” Children in Kenya Celestine, a CFCA sponsored child, and Diana, a child waiting for sponsorship, in Kenya. In the body of your letter, you can tell your sponsored friend about yourself by answering questions such as the ones we’ve suggested below, and then asking your friend the same question. 1. What did you enjoy doing most as a kid? 2. What was your favorite subject in school? 3. What was your least favorite subject in school? 4. What was your first job? 5. What challenges did you overcome in your education or career? 6. What hobbies do you have now? Or what do you do to relax? 7. What’s your favorite thing about your hometown? 8. What is the area where you live like (weather, topography, population, etc.)? 9. Who do you live with? 10. What is your favorite food? Do you cook it? 11. What is your typical day like? 12. What is your favorite holiday? How is it celebrated? 13. What is a challenge you’re currently working to overcome? 14. What is one thing you’re learning right now, or a book you’re reading? 15. What are your dreams for the future? Before you close your letter, include some words of encouragement. It might just be the only positive reinforcement your friend receives: “I can’t wait to hear back from you, Jose! We are so happy you are going to school and keeping up with your studies. We are very proud of you!” Remember, above all, your sponsored friend just wants to hear from you! If you don’t have the time to write a letter, a simple card with the message, “We are proud of you!” and a signature could be just the encouragement your friend needs to build a path out of poverty. Share your letter-writing ideas with us by leaving a comment below! Leave a Reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '21', 'language_id_whole_page_fasttext': "{'en': 0.9597731232643129}", 'metadata': "{'Content-Length': '61286', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5ZZI3BN3A37GPDG5KOB2CMQ2JZE5ZEN4', 'WARC-Concurrent-To': '<urn:uuid:f26812bf-a73e-4594-9890-77c87d5b335b>', 'WARC-Date': datetime.datetime(2017, 10, 23, 7, 58, 9), 'WARC-IP-Address': '104.237.136.251', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:C6TBIOZV7Q7DAWR3RSCQK5RTOGQAPAHC', 'WARC-Record-ID': '<urn:uuid:5e26f128-f249-4163-8d2f-1daeccbfc5a9>', 'WARC-Target-URI': 'https://blog.unbound.org/2013/06/15-easy-letter-writing-ideas/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:af796631-e3eb-45f6-814f-11d679876184>', 'WARC-Truncated': 'length'}", 'previous_word_count': '567', 'url': 'https://blog.unbound.org/2013/06/15-easy-letter-writing-ideas/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-170-22-195.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030781269073486328', 'original_id': 'cf7e7184a42be983d5b56df36ccb12c446cf39c7c44fe1ab9e4772d079364b9a'}
"Covering fundamental principles through to practical applications, this self-contained guide describes indispensable mathematical tools for the analysis and design of advanced wireless transmission and reception techniques in MIMO and OFDM systems. The analysis-oriented approach develops a thorough understanding of core concepts and discussion of various example schemes shows how to apply these concepts in practice. The book focuses on techniques for advanced diversity combining, channel adaptive transmission and multiuser scheduling, the foundations of future wireless systems for the delivery of highly spectrum-efficient wireless multimedia services. Bringing together conventional and novel results from a wide variety of sources, it will teach you to accurately quantify trade-offs between performance and complexity for different design options so that you can determine the most suitable design choice based on your specific practical implementation constraints." DOWNLOAD LINKS:Buy Premium To Support Me & Get Resumable Support & Max Speed
mini_pile
{'original_id': '1d70bc132349b98257a08a4ebdcd998e094e7a06fe087d799fb89c750faf1991'}
# Constant-time programming 1. [Constant-Time WebAssembly](https://github.com/PLSysSec/ct-wasm) 1. [Verifying Constant-Time Implementations](https://michael-emmi.github.io/papers/conf-uss-AlmeidaBBDE16.pdf) 1. https://www.bearssl.org/ctmul.html 1. [FaCT: A Flexible, Constant-Time Programming Language](https://cseweb.ucsd.edu/~dstefan/pubs/cauligi:2017:fact.pdf) 1. [FaCT: A DSL for Timing-Sensitive Computation](https://ranjitjhala.github.io/static/fact_dsl.pdf) 1. ["FaCT: A New Language for Constant-Time Programming" by Sunjay Cauligi](https://www.youtube.com/watch?v=kbn9UCRK2Qg) # Zero-knowledge proof 1. ["Rhapsody in Zero Knowledge: Proving Without Revealing" by Tony Arcieri](https://www.youtube.com/watch?v=jKSz7W5dTgY) 1. [Zero-Knowledge Proofs: What are they, how do they work, and are they fast yet?](https://zkp.science/) # Hash 1. [On future-proof cryptographic hashes](https://pascalprecht.github.io/posts/future-proofed-hashes-with-multihash/) # Library 1. [zinc: Introduce minimal cryptography library](https://git.kernel.org/pub/scm/linux/kernel/git/zx2c4/linux.git/commit/?h=zinc) 1. https://joshlf.com/post/2018/11/06/introducing-mundane/ 1. https://github.com/akhawaja/ecc-crypto-helper 1. [Introducing CIRCL: An Advanced Cryptographic Library](https://blog.cloudflare.com/introducing-circl/) # Criticism 1. [Fuck RSA](https://blog.trailofbits.com/2019/07/08/fuck-rsa/) # Reference 1. [Sunjay Cauligi - Constant-time crypto programming with FaCT](https://www.youtube.com/watch?v=SSEHF_u79e4) 1. https://blog.acolyer.org/2018/07/06/oblix-an-efficient-oblivious-search-index/ 1. https://cryptography.pizza/ 1. [HACL∗: A Verified Modern Cryptographic Library](https://eprint.iacr.org/2017/536.pdf) 1. [How to Use Java Cryptography API Securely](https://www.youtube.com/watch?v=3HIdaSgxMlo) 1. [A Graduate Course in Applied Cryptography](http://toc.cryptotextbook.net/home) 1. https://github.com/InstantWebP2P/tweetnacl-java 1. https://github.com/kevinburke/nacl 1. https://github.com/miracl/MIRACL 1. https://github.com/open-quantum-safe/liboqs 1. https://www.bearssl.org/bigint.html 1. https://timtaubert.de/blog/2018/08/bitslicing-an-introduction/ 1. [CT-Wasm: Type-Driven Secure Cryptography for the Web Ecosystem](https://arxiv.org/abs/1808.01348) 1. https://arstechnica.com/information-technology/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ 1. https://medium.com/@dbkats/a-gentle-introduction-to-attribute-based-encryption-edca31744ac6 1. https://cryptoswift.io/ # Language 1. https://cryptol.net/ 1. [Formally Verified Cryptographic Web Applicationsin WebAssembly](https://eprint.iacr.org/2019/542.pdf) # Randomness extractor 1. [An introduction to randomness extractors](https://cs.haifa.ac.il/~ronen/online_papers/ICALPinvited.pdf) # Homomorphic Encryption 1. [Practical Homomorphic Encryption Over the Integers](https://arxiv.org/abs/1702.07588)
mini_pile
{'original_id': 'a7f7f253d98393ffa70fcb1d1ea3f45469db81b2c14fe7a715ace566e52b97d1'}
Ken Bennett: No longer able to win elections, seeks appointment Ken Bennett is finished running for political office. With a failed 2014 bid for governor followed by a 2016 congressional loss under his belt, the former secretary of state and state senator — not up for anymore campaigns — now wants to be appointed. The lethargicguitar-strummingformer Prescott resident has bounced around the state in recent years as he’s sought various political posts. The closest he’s come has been as chairman of Republican Legislative District 24 in Phoenix — which he resigned in short order. In the interim he’s worked as a lobbyist for the state court system followed by a stint with SDB Contracting Services — but it’s the now out-of-reach political arena he still craves. So how best to achieve his goal? Bennett deserves an “A” for inventiveness. He’s been busying himself calling members of the Maricopa County Board of Supervisors, promoting himself as the answer to an unasked question. In the unlikely event the supervisors separate the Maricopa County Elections Department from the Recorder’s Office he wants them to know he’d be interested in being appointed elections director. Bennett is quoted as saying, “I would want to be the director of that (Elections) department and have the independence and report directly to the Board of Supervisors.” This all became an issue when longtime Recorder Helen Purcell, a Republican who has held the office nearly 30 years, lost the election in November.. In what turned out to be a monumental miscalculation, fewer polling places were made available for the March presidential preference election. Purcell said low turnout in previous elections played a part in the decision to reduce polling sites. Donald Trump’s arrival on the political scene dramatically changed that dynamic. Voters who stood in line for several hours waiting to cast their ballots during that election vented their fury in the November election. Purcell squeaked through the Primary by less than 1 percentage point, but was replaced in the General by political newcomer, Adrian Fontes, a Democrat.
mini_pile
{'original_id': 'a74001ec16b21a43e8f7d77a785da2f82cfef1c2eb97e4536e48da63139387ff'}
MF Global Files for Bankruptcy The filing is a humbling blow for the firm's chief executive, Jon S. Corzine, who joined the company after a decade as a United States senator and governor of New Jersey. MICHAEL J. DE LA MERCED and BEN PROTESS MF Global filed for bankruptcy protection for the United States parent company on Monday, the first American financial casualty of the European debt crisis. In the Chapter 11 filing in Federal Bankruptcy Court in Manhattan, the firm's parent company listed assets of $100 million to $500 million and liabilities of more than $1 billion. JPMorgan Chase is identified as the biggest creditor, as the administrative agent for a $1.2 billion revolving credit facility. The bank itself only has about an $80 million exposure to the MF Global loan, having syndicated the rest, according to a person briefed on the matter. Deutsche Bank is the second biggest, with a $325 million claim on behalf of bondholders. As recently as Sunday night, MF Global was expected to sell some assets to Interactive Brokers Group, a Connecticut-based brokerage firm. But by Monday afternoon, the deal appeared almost certainly dead, according to people briefed on the matter. An initial obstacle to the deal emerged over the weekend when the Commodity Futures Trading Commission, one of several federal regulators involved in the talks, raised questions about the capital levels at MF Global, these people said. Interactive Brokers later raised similar concerns, leading them to call off the deal. The acquisition would have been somewhat similar to what Lehman Brothers did in 2008, when its parent filed for bankruptcy but Barclays bought some of its assets. Earlier on Monday, the Federal Reserve Bank of New York and a number of exchanges said they had suspended MF Global from conducting new business with them. The bankruptcy filing is a humbling blow for the firm's chief executive, Jon S. Corzine, who took the reins of the firm in 2010 after a decade as a United States senator and governor of New Jersey. The law firm of Skadden, Arps, Slate, Meagher & Flom is representing MF Global in the bankruptcy proceedings. The descent into bankruptcy came after a week when investors fled MF Global and credit ratings agencies cut their ratings on the firm to junk status. The agencies said they were concerned that MF Global lacked a sufficient capital cushion if its $6.3 billion in European debt went bad. The firm took a gamble in buying the troubled bonds of Italy, Portugal, Spain and Ireland last year, calculating that they would soon recover.
mini_pile
{'original_id': 'c70ec470abda1b9aaf8366756aef7aa59910561686c48f61894fdaa11d1ed7d2'}
wood burning stoves 2.0* The moose likes Developer Certification (SCJD/OCMJD) and the fly likes User Interface Requirements Big Moose Saloon Register / Login Bookmark "User Interface Requirements" Watch "User Interface Requirements" New topic User Interface Requirements Carlo Spelgatti Joined: Mar 06, 2006 Posts: 10 Hello everybody What is meant by: My GUI has a JTable, above the Name and Location JTextFields and a SearchButton and below the table a JTextField for the customer id and next to it the BookButton. Carlo Spelgatti<br />Dipl. Informatik Ing. ETH / SCJP / SCJD<br />Ch�ngengass 3<br />8805 Richterswil<br /> <br />P: 044 793 10 50<br />M: 078 698 07 92<br />ICQ: 401810960 Jeroen T Wenting Ranch Hand Joined: Apr 21, 2006 Posts: 1847 I interpreted that as to being able to easily add new functions to the user interface. So I put all buttons on a JToolBar with Actions to launch them, created a JMenuBar using those same actions, and used abstract base classes for the search dialog content placed as a decorator into the actual dialog itself (which is a framework relegating actions to the panel containing the actual fields) so it can be easily swapped out for another one that has more functionality (like allowing searching on other fields, or different search algorithms). Different search algorithms are implemented at database level in easily extensible way. Adding methods to for example modify records instead of booking them would require just a new dialog box and adding a toolbar button and/or menu option. I'm even considering placing the menu and/or toolbar into classes external to the main window so that they can be swapped out, determining which class to actually load would then depend on a setting in the config file only, requiring no code changes. subject: User Interface Requirements
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '46', 'language_id_whole_page_fasttext': "{'en': 0.7974530458450317}", 'metadata': "{'Content-Length': '22864', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:C34WCM6R36S4YVEKFIFMXHMGR5TBX67T', 'WARC-Concurrent-To': '<urn:uuid:f6ad17ca-8b61-4320-83ee-f31a109a3440>', 'WARC-Date': datetime.datetime(2014, 10, 31, 13, 51, 34), 'WARC-IP-Address': '204.144.184.130', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:DRKWAFMPZ3OE2GUNETFUFF3EA5Z5GX7M', 'WARC-Record-ID': '<urn:uuid:14d552fc-2143-4aa7-b78b-3378359a58cd>', 'WARC-Target-URI': 'http://www.coderanch.com/t/188158/java-developer-SCJD/certification/User-Interface-Requirements', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b030565c-1603-443e-a54d-00d2385b8917>', 'WARC-Truncated': None}", 'previous_word_count': '358', 'url': 'http://www.coderanch.com/t/188158/java-developer-SCJD/certification/User-Interface-Requirements', 'warcinfo': 'robots: classic\r\nhostname: ip-10-16-133-185.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-42\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for October 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12693482637405396', 'original_id': '5f11d0b969e834e70e6e745bb58a9f7e3a28da2e9a3f4ece264b5b874fbe82f3'}
Find information on: Flu Shot Drive  | New Visitor Guidelines Logo star only COVID 19 Update hospitalizations rising July 23, 2021 As COVID-19 hospitalizations climb, University Health Chief Medical Officer Dr. Bryan Alsip addresses some of the latest questions about the highly contagious Delta variant, masking, boosters, and how getting everyone vaccinated now can prevent future mutations. Feel free to use the video and graphics in your reporting. 00:0 How worried should we be about the Delta variant? 00:31 What can we do to reduce infections & hospitalizations?   00:51 Does a vaccinated person who contracted COVID pose the same level of risk of spreading the virus to others as an unvaccinated person with COVID? 01:13 Talk about breakthrough infections – what do we know about vaccinated people who test positive? 01:49 Is there any information yet about which vaccinated group is more vulnerable to breakthrough infections, such as whether they got the Moderna or Pfizer? 02:14 What is the risk for this variant mutating into something that is not covered well by the current vaccines? 02:56 Why hasn't the FDA approved the vaccines? Wouldn't that be proof of government confidence in their safety? 03:41 Are hospitalizations on the rise again, and what kinds of patients are we seeing? 04:28 Have masking recommendations changed with the increasing infection rate? 05:17 Should vaccinated people mask indoors even with other vaccinated people? 05:47 With the positivity rate rising again, should people reconsider travel plans, indoor dining, gathering in groups? 06:27 When can people get booster shots? 06:46 Should people get a different vaccine on top of another? – i.e. would someone who got the Pfizer get additional protection if they get a J&J shot as their booster? 07:33 Are children more at risk for severe illness with Delta? 08:00 Are children likely to carry the virus to others? 08:32 Talk about the American Academy of Pediatrics’ recent recommendation on children wearing masks in schools. For news media: Back to Top
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.92415851354599}", 'metadata': "{'Content-Length': '31475', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CDEDSUYQE523SVGR5WPA2JYUVT77T2NT', 'WARC-Concurrent-To': '<urn:uuid:8cf57b95-3ab5-4a21-b011-5183a05ec5e4>', 'WARC-Date': datetime.datetime(2021, 9, 28, 7, 4, 47), 'WARC-IP-Address': '13.66.80.152', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WBEGGMU4P4F2OTNYQXTAJ2H7Z36VJI5J', 'WARC-Record-ID': '<urn:uuid:272006a2-e981-4738-a317-f0f27c6eb929>', 'WARC-Target-URI': 'https://www.universityhealthsystem.com/pediatrics/news/covid-19-update-hospitalizations-rising', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:11ff6dfa-5190-4c20-b762-d3fe06c2cb9c>', 'WARC-Truncated': None}", 'previous_word_count': '345', 'url': 'https://www.universityhealthsystem.com/pediatrics/news/covid-19-update-hospitalizations-rising', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06273680925369263', 'original_id': '9acaf4c342dede7f9692d97314d6aa64a5432e00c74f0cc209813a041c4a0875'}
ESTADO DE SANTA CATARINA PREFEITURA MUNICIPAL DE SÃO JOSÉ SECRETARIA DE ADMINISTRAÇÃO TERMO ADITIVO À ATA DE REGISTRO DE PREÇOS Nº 097/2020-01 – Proc. Adm. 7316/2020 – Contratado: MAYCON WILL EIRELI. DO OBJETO DO TERMO ADITIVO: O presente termo aditivo tem como objeto a ACRÉSCIMO QUALITATIVO, nos termos previstos na Ata de Registro de Preços nº 097/2020 e nos demais documentos que instruem o processo administrativo em epígrafe. DO ACRÉSCIMO QUALITATIVO: Será acrescido qualitativamente na Ata de Registro de Preços o 48 do processo, o que equivale ao montante total de R$ 5.100,00 (cinco mil e cem reais), referente a 600 (seiscentas) unidades de CLOREXIDINA ALCOÓLICA 0.5%, com valor unitário de R$ 8,50 (oito reais e cinquenta centavos), conforme solicitação da Secretaria Municipal de Saúde, constante do Memorando n.º 439/2020/COMPRAS/SMS/SJ de 06/11/2020; O referido acréscimo altera o valor global da Ata de Registro de Preços de R$28.059,35 (vinte e oito mil, cinquenta e nove reais e trinta e cinco centavos) para R$33.159,35 (trinta e três mil, cento e cinquenta e nove reais e trinta e cinco centavos). Data da assinatura: 19 de NOVEMBRO de 2020.
the_stack
{'hexsha': '279e34a4132ed1b039e4050d908249967e505aaa', 'size': '1169', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'data-processed/4216602/2020-12-09/37def1658540da1f5c482f5fb14b766106dd5d1b/content.txt', 'max_stars_repo_name': 'giuliocc/querido-diario-toolbox-codabr21', 'max_stars_repo_head_hexsha': '6bd743fbf6ca98d167743f0b8b8d668c2a947d64', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '4', 'max_stars_repo_stars_event_min_datetime': '2021-11-12T22:24:49.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-01-28T14:23:11.000Z', 'max_issues_repo_path': 'data-processed/4216602/2020-12-09/37def1658540da1f5c482f5fb14b766106dd5d1b/content.txt', 'max_issues_repo_name': 'giuliocc/querido-diario-toolbox-pybr2021', 'max_issues_repo_head_hexsha': '76c9cb73b9d38a4985df8a9ecfc5e47093aac405', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'data-processed/4216602/2020-12-09/37def1658540da1f5c482f5fb14b766106dd5d1b/content.txt', 'max_forks_repo_name': 'giuliocc/querido-diario-toolbox-pybr2021', 'max_forks_repo_head_hexsha': '76c9cb73b9d38a4985df8a9ecfc5e47093aac405', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '1', 'max_forks_repo_forks_event_min_datetime': '2021-11-12T12:28:48.000Z', 'max_forks_repo_forks_event_max_datetime': '2021-11-12T12:28:48.000Z', 'avg_line_length': '129.8888888889', 'max_line_length': '1075', 'alphanum_fraction': '0.7878528657', 'original_id': '65d20665b20e4e66351d3299a0369db3837f4e860e5ff0697a71a3983f4092a4'}
Compared to 5-10 years ago, there aren't as many public telephones around as there used to be, but you usually don't have to go far to find one. Virtually every convenience store, many bus stops etc have at least one. The problem is that while you can make domestic calls from any public phone, it is only possible to make an international call from a telephone that is designated as an "International" telephone. Some of the machinese still accept coins, but the best way to make a call is to use a telephone card. These can be bought at any convenience store or from vending machines. There are three kinds of public telephone: Green: These are the most common, and can use coins and cards. Only some of them can be used for international calls. Grey/Silver: Also very common. Most are enabled for international calls. Can use coins and cards. Orange (IC): TNot very common in Okazaki as of 2004, these are the newest type of public telephone. They only use "IC Cards" and coins. International calls will be OK. Cellphones Important Update (July 2006): Due to a change in laws in 2005, it is not possible anymore to obtain a mobile phone without an Alien Registration Card. Therefore, if you really need to have a mobile phone, go to the City Hall, apply for an Alien Registration Card, ask for the replacement document (see "Opening a Bank Account" for details) which you take to the mobile phone service provider of your choice to get a "keitai denwa" (mobile phone). You can see these everywhere, usually either glued to the ear of the owner or being used for text messages, as cameras etc. Due to a lack of standardization, cellphones from overseas usually will not work in Japan. If you are only staying for a short period, these are the easiest and most affordable route. There are two types; Pre-Paid: Not subscription based, well suited for people who don't use their mobile phone very often. You can buy replacement cards from convenience stores. Due to new anti-terrorism measures (see update box above) you need an Alien Registration Card from the City Hall to get a Pre-Paid mobile phone. Subscription: Same as for the Pre-Paid mobile phones, you need an Alien Registration Card to acquire a subscription-based mobile phone. The benefits are that you will have access to a wider range of telephone models, online service, better camera, nicer colors etc. You choose which plan you would like to use, and then pay on a monthly basis either by bank deduction, cash at convenience stores, or by credit card. Monthly subscription fees are around 3000 Yen per month. There are shops selling cellphones like these throughout Okazaki. If you make a lot of phone calls and plan to stay around or at least 10 months in Japan, then a subscription based mobile phone might be the better choice for you. Internet Resources, Cable Internet, Broadband, ISPs If you do not already have access provided via your workplace or accommodation, there are a growing number of internet cafes, and other public places that you can use. Broadband access is diffusing rapidly and high speed connections are very affordable. The ISPs and other vendors are in a constant state of change, we will try to maintain at http://key.mikawa.cc/xxx.html an up-to-date file of resources you can use if you wish to get good internet access at home. Bookshops There are a large number of bookshops in Okazaki, with the largest being Miraiya-shoten on the 3rd floor of the AEON shopping complex. For the most part the bookshops only sell Japanese language content. Magazines, maps, dictionaries and so on are also available in most of the shops. For foreign books, the best bet is to either head into Nagoya (to bookshops such as Maruzen, Kinokuniya etc), or order online from amazon.co.jp - which will (usually) give you a quicker delivery than amazon.com If you can't read Japanese, use amazon.com first to find your book, then copy the ISBN number to the Japanese site. The actual ordering (credit card details, confirmations etc) can be displayed in English. There is a very small foreign language bookshop at the Yamasa Institute in Hane-cho, the books largely catering to those learning Japanese (excellent dictionaries, textbooks etc) Local Newspapers and Magazine Reversible is a local (monthly) magazine containing a lot of useful information, store profiles and the like (it's in Japanese only) Also published (fortnightly) is "Okazaki News", published by volunteers. It's bilingual, and often contains a lot of useful information regarding upcoming events in Okazaki, particularly cultural ones. Always worth picking up a copy. Read the online edition here: http://www.city.okazaki.aichi.jp/oia/index_e.htm From Nagoya but slowly expanding its coverage and reach there is a useful English magazine called JapanZine. The advertisements are mostly concentrated on restaurants and bars in Nagoya and other larger cities, but it often contains interesting articles about local festivals, sightseeing places and so forth. Visit http://www.japan-zine.com/ for the online version. TV, Radio Apart from the free to air channels and the BS satellite channels of run by the publicly owned NHK network, it is possible to obtain pay TV. Skyperfect is the most common satellite TV provider. For cable TV try MICS, which also includes a local channel. On the AM band try NHK1 (729KHz), NHK2 (909KHz), CBC (1053KHz), Tokai (1332KHz). These are mostly talk stations and broadcast in Japanese only. On the FM band there is more music: NHK FM (82.5MHz), FM Aichi (80.7MHz), Radio I (79.5MHz), ZIP FM (77.8MHz). The latter two contain a large amount of foreign language broadcasting. For local radio, listen to FM Okazaki - as of 2004 the local community station is broadcasting on a 10KW signal, so in some parts of the city (due to hills, concrete buildings, interference etc) you might not be able to pick up the signal clearly (or at all). The FM Okazaki homepage is at http://www.763.fm Video System Okazaki makes a lot of digital video cameras (SONY has a large plant here) and Japan uses the NTSC standard. If you bring a PAL or NTSC video camera with you to Okazaki, you won't be able to buy any video cartridges. Bring them from home. Photography There are excellent camera shops (Map C, C3 - Kitamura Cameras is a good one), and film of all types is easy to obtain. If you run out of film during the middle of a day trip you usually buy a cheap disposable camera from most of the convenience stores.
mini_pile
{'original_id': 'f76d8f4b682c18828116deed39d91c6f6f22589d69fbb0d22576ac0ef9615b55'}
Mammographically detected breast cancers and the risk of axillary lymph node involvement: is it just the tumor size? In early breast cancer the knowledge of the risk of axillary node involvement is important in determining local as well as systemic therapy. Because of the increased acceptance of mammography, there has been an increase in the diagnosis of small, mammographically detected tumors. The objective of this study is to determine whether mammographically detected breast cancers have a lower risk of axillary node involvement compared to those detected clinically. From our patient database of stage I and II breast cancer we identified 980 patients with tumors < or = 2 cm whom had axillary node dissection. Four hundred thirty-five (44%) patients presented with abnormal mammograms without clinically palpable tumors; 545 (56%) patients had clinically detected tumors. The median size of the mammographically detected tumors is 1.0 cm, and the median size of the clinically detected tumors is 1.5 cm. The median age of the patients with mammographically detected tumors is 61 (range: 29-87) compared to 53 (range: 27-88) in those with palpable tumors. Fourteen percent of the patients with mammographically detected tumors had positive axillary nodes compared to 26% of those with clinically detected tumors. Eight percent of patients with mammographically detected tumors had a single positive, while the clinically detected tumors 11% had a single positive node. Thirteen percent of patients with < or = 1 cm tumors and 25% with tumors 1.1 cm to 2 cm had positive axillary nodes. Because the smaller size of the mammographically detected tumors could explain the lower proportion of positive axillary nodes, we analyzed separately the < or = 1 cm tumors. In the group of < or = 1 cm tumors, 9% had positive axillary nodes iftheywere mammographically detected compared to 19% if clinically detected. Four percent had a single positive node while 5% had multiple positive nodes. If the tumors were palpable and < or = 1 cm 9% had a single positive node and 10% had multiple positive nodes. Mammo-graphicallydetected tumors < or = 1 cm had similargrade to clinically detected tumors. In multivariate analysis, method of detection remains a significant variable impacting on the risk of axillary node involvement even in tumors < or = 1 cm. The risk of axillary node involvement is lower in mammographically detected tumors compared to clinically detected tumors independent of tumor size or grade. Mammography detects tumors early in their metastatic progression. The majority of the axillary node-positive patients who are mammographically detected have a single positive axillary node. Method of detection may need to be considered when assessing the risk of axillary node involvement and incorporated in the staging.
mini_pile
{'original_id': 'd7ed60ea6e55951fe7bae376d5ee811729cc56f4346e607c3a14be8ec7c30d3d'}
Candidate claims she didn’t get letters telling her she had violated election law FRIDAY, July 29 — An attorney representing a Lansing Community College Board of Trustees candidate accused of making false claims on an election document said yesterday his client “did not deliberately intend to violate Michigan’s Campaign Finance Act.” In a letter to Ingham County Clerk Barb Byrum, Joseph Garcia, an attorney at Honigman, Miller, Schwartz and Cohn, said Angela Mathews never received mailed notifications of her alleged violations. The letter was emailed to Byrum yesterday. Mathews filed Tuesday to run for the LCC board this year. Mathews However, a county election official said that Mathews was also informed in a phone conversation of the alleged violations. Byrum has referred the case to the Mason Police Department for investigation of perjury, a felony carrying up to a $1,000 fine and a five-year prison sentence. Garcia called the situation a “bureaucratic miscommunication.” He quoted William Shakespeare by calling it “much ado about nothing.” Garcia claimed Mathews has not lived in the 1000 block of Chester Road, to which the letters were mailed, since July 2014, when she signed another affidavit of identity to get on the ballot for LCC trustee race that year. Byrum released nine letters to Mathews regarding campaign issues, all sent to her Chester Road address. Garcia said in the letter that because Mathews had moved she did not get any of the nine letters Byrum’s office sent to her. The attorney also claimed that Mathews had decided not run for the office in 2014 but it was after the deadline to withdraw from the race when she did so. “She never received any contributions or expended any funds,” he wrote. “She could have easily qualified for a Campaign Finance Filing Waiver, however, it was her belief she was out of the race.” But Jennifer Shuster, who was Bryum’s elections coordinator in 2014, said yesterday she spoke with Mathews by phone in late July or August 2014 about her obligation to file for a candidate committee. “It’s the only time I have had to call a candidate,” she said. She added that she did so because she was trying to help Mathews avoid a violation. “She told me she was going through a difficult time and wasn’t sure if she was even going to campaign or try to win the LCC race,” Shuster recalled. During that conversation Shuster said she told Mathews she had to file her candidate committee paperwork. The one-page document also includes a spot to accept a reporting waiver because the campaign is unlikely to receive or expend more than $1,000. That one-page document was never filed. With her name still on the ballot, Mathews was obligated by Michigan Campaign Finance laws to file fundraising and expense reports with Byrum’s office. Failing to do so results in fines being levied. Because Mathews did not file three such reports, she was assessed a fine of $1,300, which she has not paid. Byrum has referred the situation to the Mason Police Department for a criminal investigation of perjury after Mathews filed her affidavit of identity with the Clerk’s Office on Tuesday to run again for LCC trustee this year. That document requires candidates to swear before a notary public that they do not owe any campaign fines or fees and have filed all required paperwork and reports. Garcia requested Byrum to waive the fees that Mathews owed. She replied in a letter yesterday rejecting that request because Mathews failed to provide a valid reason for failing to file her reports and pay her fines.
mini_pile
{'original_id': 'e3a31da99404b3ae7e45cf6816d373b13b892de2611d33fb4e475233d7194762'}
- Advertisement - - Advertisement - « News Home HELOISE Record of belongings kept off the premises Dear Heloise: We have photographed every item that we own by room and in the attic. This includes the hot-water heater and the heating and cooling units. We have filed these, along with paid receipts, in a folder. If we replace an item, we remove its picture and receipt and replace it with a picture of the new item and paperwork. The removed items go into a dead file for future reference, if needed. We place the folder in our bank safety-deposit box. In the event of a loss, all we have to do is furnish the insurance adjuster with a current picture or pictures and the associated paperwork. All important paperwork should be filed in a secure place other than in the house it pertains to. Ted and Sallie, Little Rock, Ark. Dear Heloise: I never miss reading your column and have a suggestion for travelers. In this day of security checks at all airports and traveling locations (which I agree with), I use small mesh laundry bags for packing bras, panties, hosiery and other personal items. It makes it very easy for security checkers to see what items are in my luggage without having to remove them piece by piece, and they're easier to replace in the luggage. I also use clear-plastic bags for cosmetics, toothpaste and brushes, and I double-bag items that might leak in transit. I have even been complimented by some security people after they checked my luggage for saving them time. B.K.H., California Dear Heloise: This hint has helped us in many different situations. I keep two plush bath towels in each of our vehicles. I buy them to blend with the interior color of the cars. We've used them to mop spills, to double as a pillow or blanket, prop up a book, block the sun from a baby and protect things when transporting them to and from the car in the rain. They have been used as tablecloths for the laps of my kids to keep food off the car. I've used them to keep warm at a soccer game when the wind picked up unexpectedly. When delivering meals or food trays, they help keep dishes from sliding around the trunk. They are also good for padding sharp or delicate things. Kelly Harris, via e-mail Dear Heloise: I have extra key rings, so I use them to put on all my key-ring store club cards. I keep that separately in my purse so I don't have them all dangling with my keys. At a register, when I need to use a club card, instead of handing over all the keys, it's nice to have a separate key ring. Mary from Pennsylvania XSend a money-saving or timesaving hint to Heloise, P.O. Box 795000, San Antonio, Texas 78279-5000; fax to (210) HELOISE or e-mail it to heloise@heloise.com. King Features Syndicate Don't Miss a Story HomeTerms of UsePrivacy StatementAdvertiseStaff DirectoryHelp 107 Vindicator Square. Youngstown, OH 44503 Sponsored Links: Vindy Wheels | Vindy Jobs | Vindy Homes
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '25', 'language_id_whole_page_fasttext': "{'en': 0.9269809722900392}", 'metadata': "{'Content-Length': '43895', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CG7CDAYNO7FSDMIOX63PTSI7ZGQORY7C', 'WARC-Concurrent-To': '<urn:uuid:3aee1152-bc92-4e66-8e72-dbaa23f5a9e0>', 'WARC-Date': datetime.datetime(2017, 10, 21, 10, 30, 45), 'WARC-IP-Address': '208.91.60.6', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:ZUYOKLVLJGIXULRBTRSMGEZ7OGS5T43L', 'WARC-Record-ID': '<urn:uuid:ee1b0285-ec43-4713-b87e-0b88cbe996b0>', 'WARC-Target-URI': 'http://www.vindy.com/news/2005/jan/28/heloise-record-of-belongings-kept-off-the-premises/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7ce0cc14-b3e8-44b7-b594-ee9f0497cbe9>', 'WARC-Truncated': None}", 'previous_word_count': '561', 'url': 'http://www.vindy.com/news/2005/jan/28/heloise-record-of-belongings-kept-off-the-premises/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-164-221-253.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.020095527172088623', 'original_id': 'a6c76e3c6d60672b1be9746956597c86916eca77b229d8fbb97a7c5b5103be9a'}
Field Evaluation of Plant Defense Inducers for the Control of Citrus Huanglongbing. Huanglongbing (HLB) is currently the most economically devastating disease of citrus worldwide and no established cure is available. Defense inducing compounds are able to induce plant resistance effective against various pathogens. In this study the effects of various chemical inducers on HLB diseased citrus were evaluated in four groves (three with sweet orange and one with mandarin) in Florida (United States) for two to four consecutive growing seasons. Results have demonstrated that plant defense inducers including β-aminobutyric acid (BABA), 2,1,3-benzothiadiazole (BTH), and 2,6-dichloroisonicotinic acid (INA), individually or in combination, were effective in suppressing progress of HLB disease. Ascorbic acid (AA) and the nonmetabolizable glucose analog 2-deoxy-D-glucose (2-DDG) also exhibited positive control effects on HLB. After three or four applications for each season, the treatments AA (60 to 600 µM), BABA (0.2 to 1.0 mM), BTH (1.0 mM), INA (0.1 mM), 2-DDG (100 µM), BABA (1.0 mM) plus BTH (1.0 mM), BTH (1.0 mM) plus AA (600 µM), and BTH (1.0 mM) plus 2-DDG (100 µM) slowed down the population growth in planta of 'Candidatus Liberibacter asiaticus', the putative pathogen of HLB and reduced HLB disease severity by approximately 15 to 30% compared with the nontreated control, depending on the age and initial HLB severity of infected trees. These treatments also conferred positive effect on fruit yield and quality. Altogether, these findings indicate that plant defense inducers may be a useful strategy for the management of citrus HLB.
mini_pile
{'original_id': '45824bf85f228b32443f7f1e02603c83824e624d26d8db062cf17dca4ae43283'}
Q: Designing binary search tree class inheriting from binary tree class I am creating a binary search tree class in c#. I am creating the class by deriving from a binary tree class because binary search tree is a kind of binary tree. So i will have most of the common methods inside binary tree class and share them inside binary search tree. Now: BinaryTree class has two methods "AddToLeft" and "AddToRight" methods, these two methods must able able to access outside this class, i.e in Main method to add nodes to the binary tree. so i made them public. and these two methods should also be accessible inside binary search tree class ( reusing) to add node to the binarysearchtree based on condition. But now since Insert method is the candidate for the binarysearchtree to insert nodes to BST but AddToLeft and AddToRight are not. so these two methods should not be exposed to the clients(outside world) of my binarysearch tree on the BST object. How to design this class.? I tried: making those two methods sealed in the binarytree class, it did not help. declared them public in base and protected in derived. that too did not help as public can't be inherited as protected in derived class. Please help to design the classes. public class BTNode { public int data; public BTNode Left { get; set; } public BTNode Right { get; set; } public BTNode(int data) { this.data = data; } } public class BinaryTree { public BTNode Root { get; set;} public BinaryTree() : this(null) { } public BinaryTree(BTNode node) { Root = node; } // this method common for its derived class too public void AddToLeft(BTNode current, BTNode node) { current.Left = node; } // this method common for its derived class too public void AddToRight(BTNode current, BTNode node) { current.Right = node; } } public class BinarySearchTree : BinaryTree { public BinarySearchTree(int val) { Root = new BTNode(val); } public void Insert(int val) { BTNode node = new BTNode(val); if (Root.data >= val) base.AddToLeft(Root, node); // I should be able to call this method here else base.AddToRight(Root, node); // I should be able to call this method here } } class Program { static void Main(string[] args) { BinaryTree bt = new BinaryTree(); BTNode root = new BTNode(3); BTNode node1 = new BTNode(4); BTNode node2 = new BTNode(7); bt.AddToLeft(root,node1); // i should be able to access this method here. bt.AddToLeft(root, node2); // i should be able to access this method here. BinarySearchTree bst = new BinarySearchTree(6); bst.Insert(4); bst.Insert(8); // This is the problem. // these two methods should not be visible on the bst object. // insertion to bst is done only through insert() method // but these two methods should be accessible inside the binarysearchtree class // to add the nodes. bst.AddToLeft(root,node1); // i should not access this method here on this object bst.AddToRight(root, node2); // i should not access this method here on this object } } A: What you are trying to do as you typed your code is a contradiction. You are saying your class is a type of BinaryTree, but you don't want to honor the contract that would make it a BinaryTree. What I would probably do is not derive from BinaryTree and instead have a private field that holds a BinaryTree in your BinarySearchTree class and expose the functionality you want to expose through public accessors in BinaryTree (So BinarySearchTree is no longer a type of Binary Tree, but still has access to the functionality through a private field initialized with an instance of a BinaryTree.) I can certainly understand the appeal of making BinarySearchTree a type of BinaryTree, but you either give up the encapsulation of those two methods or the classification of the base type. You can't claim to meet the requirements of classification of the base type when you aren't offering the same external API as it is. If you really wanted to be able to try to do things like you did above, you could override the methods you don't want clients using and throw InvalidOperationExceptions from those methods. But this isn't very elegant as it doesn't help you at compile time, and will only complain at run time which is not prudent design.
mini_pile
{'original_id': '6c71bcaacb0f8b9385f6f4b9e93a150314cdeaf6972f4ecd0bc4176800203174'}
Background Recent state Medicaid initiatives have demonstrated that delivery system reforms, when coupled with value-based payment (VBP) methodologies, can reduce costs and increase health care system capacity to provide efficient, high-quality care.[i] Federally qualified health centers (FQHCs), which are critical safety net providers for more than 12 million Medicaid beneficiaries,[ii] often have been excluded from participating in payment reform initiatives due to complexities in federal reimbursement requirements. Federally Qualified Health Centers Federally qualified health centers (FQHCs) are safety net providers that deliver a wide range of outpatient services primarily to complex and vulnerable populations, including Medicaid enrollees and the uninsured. Some FQHCs serve specialized populations, such as migrant workers and individuals experiencing homelessness. Health Center Program grantees and look-alikes are eligible to apply to the Centers for Medicare & Medicaid Services (CMS) for FQHC status after the Health Resources and Services Administration (HRSA) certifies that they meet Health Center Program requirements as authorized under Section 330 of the Public Health Services Act. FQHCs receive reimbursement from Medicaid through the Prospective Payment System (PPS). PPS and opportunities to develop value-based payment methodologies are explored in the Value-Based Payment Methodology Development section of this toolkit. Under Section 1902(bb) of the Social Security Act,[iii] Medicaid programs must reimburse FQHCs either through the Prospective Payment System (PPS), which requires states to set cost-based, per-visit payment rates for individual clinics, or through a qualifying alternative payment methodology (APM). APMs must reimburse FQHCs at least as much as they would receive under PPS, and be agreed to by each clinic.[iv],[v] Recently, states have begun to demonstrate that they can effectively engage FQHCs in VBP reform, implementing VBP methodologies through either a qualifying APM under Section 1902(bb), or through another Medicaid authority. Defining Terms Value-based Payment Methodology*: a methodology that rewards providers for quality and efficiency over volume of care delivered, and is tied to performance measures. VBP methodologies can be implemented using a number of Medicaid authorities. Alternative Payment Methodology (APM): a methodology, which can be value-based, specifically implemented for FQHCs under Section 1902(bb) of the Social Security Act. APMs must reimburse FQHCs at least as much as they would receive under PPS, and be agreed to by each clinic.
mini_pile
{'original_id': 'd1478ea0d8813d249e72c5640567664485f08f44b175fde88f2e4e734fc47273'}
HTML5 Accessibility Chops: the placeholder attribute Posted on Friday, 18 February 2011 by Steve Faulkner The placeholder attribute: The placeholder attribute can be used to place text inside an empty input type="text" or textarea, the text is removed when the element receives focus. Placeholder browser accessibility support tests updated: 31/10/2013 What the HTML5 specification says: HTML code example: Default Display Example: edit box with a label 'address' to the left and placeholder text '' in the edit area. Accessibility Issues? Placeholder text colour The default colour of the placeholder text, in browsers that support placeholder, is not of sufficient contrast with its default background colour. Sufficiency is measured using the WCAG 2.0 criteria 1.4.3 Contrast (Minimum): The visual presentation of text and images of text has a contrast ratio of at least 4.5:1. There are a number of tools you can use to check contrast ratio. If you choose to use the placeholder attribute be aware its support across browsers is incomplete and its styling support is still experimental. Apply a style to the placeholder attribute text that has a contrast ratio of at least 4.5:1. CSS code example: To target the placeholder text  it is currently required that browser specific CSS extensions are used: input::-webkit-input-placeholder {     color:    #626262; input::-moz-placeholder {     color:    #626262; Placeholder as an alternative to a label HTML code example: <input type="email" name="address" placeholder="address"> Placeholder text disappears when a text box receives focus: • For keyboard users this can be problematic as they must read ahead of current focus when filling in forms. • Users, especially those with memory impairments will not have the text label available for reference at the same time as filling in a field. Other issues with placeholders • Users may think a text field is already filled in and skip over it. Data suggests that this can be an issue. • If the placeholder hint text is useful information it should be available while the user is filling in the field. Use placeholder for what it is intended for, not what the HTML5 conformance criteria permits. The HTML5 specification says “placeholder should not be used as an alternative to a label.” But it stops short of saying it MUST NOT be used, so it is conforming to use it as an alternative in HTML5 and will be used as a label. To this end  browsers are using the content of the placeholder attribute, in the absence of a label, as the accessible name exposed to accessibility APIs. This does not mean that that it should be used as a text field label. Always provide an explicitly associated text label for a text field, using either the label element or the title attribute. Use placeholder for what it is intended for, not what the HTML5 conformance criteria permits. HTML code examples: <input type="email" name="address" id="address" placeholder=""> <input type="text" title="search" placeholder="enter search term"> About Steve Faulkner 1. I think it would make sense to expose the @placeholder attribute to AT such that e.g. screenreaders can read it out while the user is tabbing onto the input element. It could even be read out again while the user is considering what to put in if the user activates some kind of “help” key. It seems to be very useful information that should not be ignored by AT. 2. In terms of styling, using: You could then style it such that the label has “visibility: hidden” when input is not focused. That is, by default you see the placeholder, but when you don’t you see the label. 3. OK, so my tags get stripped, even in a code block. Basically, the example read: label “name” followed by input “name” with a placeholder also set to “name”. (Really like any of the already given examples). 4. Some big ecommerce websites already use placeholder (or a js implementaion) in place of label. I agree with you, they’re completely wrong! When you start typing, you won’t see anymore the hint! And it’s even worst when you have some form errors… Comments for this post are closed.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '134', 'language_id_whole_page_fasttext': "{'en': 0.8642578721046448}", 'metadata': "{'Content-Length': '47512', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HEMK5DNXSQRGUS35XTN7MNA2QTLBTFVA', 'WARC-Concurrent-To': '<urn:uuid:2b5548a9-7447-45d9-86ef-487e15e6b76e>', 'WARC-Date': datetime.datetime(2019, 10, 21, 9, 50, 20), 'WARC-IP-Address': '69.163.160.89', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:QTCQ4UEUYZIMZJYOXTDHLL3BIJ7NHZSG', 'WARC-Record-ID': '<urn:uuid:c8b3adfe-3c93-48a5-86ed-42466a6d02c3>', 'WARC-Target-URI': 'https://developer.paciellogroup.com/blog/2011/02/html5-accessibility-chops-the-placeholder-attribute/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5c33c354-14dc-4831-8e07-0e51827b2112>', 'WARC-Truncated': None}", 'previous_word_count': '795', 'url': 'https://developer.paciellogroup.com/blog/2011/02/html5-accessibility-chops-the-placeholder-attribute/', 'warcinfo': 'isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-214.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.059438884258270264', 'original_id': 'fa3bc019febdb9bafa63454fda17c7c87e65ad457f920a2c903419a900ce2b4b'}
Advantages Disadvantages Thumbs in the middle "The Ripping Friends" is a video game released for the Gameboy Advance console in 2002 by THQ. It is a side scrolling fighting game based on an animated cartoon series of the same name. In the United States, the game received a rating of "E" by the ESRB panel which deemed it suitable for all ages. The Ripping Friends are a group of four brothers that attempt to defend RIPCOT, or "Really Impressive Prototype City Of (Next) Tuesday", from an invasion of the undead. In this title, the players assume the role of one of the four brothers and compete in a simple side scrolling fighting release which is spread over seven stages. All characters on screen are hostile towards the player's presence so determining who is an enemy is quite the easy task. In terms of gameplay difficulty I found there to be none. Each of the enemies showcase a distinct lack of artificial intelligence and willfully allowed me to pummel them into submission without much retaliation. It is likely that this game was geared towards children as the animated series is as challenge and character development are not present. The game also sports a flaw in its control system. I found that when trying to move diagonally, my character would often move in linear motions; instead of moving diagonally to the lower right I would appear to move down, right, down, right. While this does not really hinder gameplay experience it is noticeable as a visual error. The graphics are presented from a side scrolling perspective which focuses on the selected character. The visual styling of the game is definitely something which appeals to me. Both the characters, enemies and the stages which they find themselves in are drawn in a very comic book fashion which almost bears resemblance to "Comix Zone" (Megadrive - 1995). The animations are often smooth but I did notice some periods of slow down when many enemies occupied the display. The soundtrack is filled with more upbeat and lively musical scores and an assortment of "scratch" sound effects to denote physical contact. Overall, The Ripping Friends is a game which I would be hesitant about recommending to prospective buyers. It is an exceptionally easy title to complete and shows some visual faults. It is likely that fans of the animated series are the only ones who would enjoy this release.
mini_pile
{'original_id': '27148888e02b68eb678716a926effbd1f1c2c54e69b81b71007b51a3618da468'}
Q: Changing max number of blog posts per page doesn't work WP 3.2.1 Changing the max number of posts to show on each page via Settings->Reading isn't working. Could this reported bug be the culprit? A: If it doesn't work then there must be some problem or overwrite in your custom theme, add this code in your index.php or where ever you want to show the custom number of posts, query_posts( $query_string . '&posts_per_page=1' ); change '1' to any number you want
mini_pile
{'original_id': 'f3d67f837382446fc1b80d4a0103ffabccc36413ae7b4b15c07913bb03076727'}
This documentary about stupidity tells us the history of the word “moron”, the difference between stupid, moron, smart, intelligent, genius and questions the regular practice of classifying peoples in a completely dumb way – or at least wants us to believe so. Albert Einstein said: “Only two things are infinite. The universe and human stupidity. And I am not sure about the former.” Join The Conversation 22 Comments / User Reviews Leave Your Reply 1. Is $ 35 too much to pay to take a Free Stupidity Test? 2. f**king idiots, fun viewing! soo inspirational I wrote a song about it! 3. Frustratingly pedantic. 4. IQ test’s test your cognitive skills (language, arithmetic, associative, analytic, spatial). Basically they evaluate how well/quick can you learn. Some people understand right away, some need more time. The IQ test doesn’t take into consideration the capability of training your brain by learning, remembering etc. So the more you train your brain the better your cognitive skills become. Nowadays many things are done automatically without involving ant thinking process. If one does not use his brain often enough his cognitive skills get worse. 5. yep,  most valid statement in this doc, Yo mrs D, bum sex!! 6. Bush, really? Are you people ever EVER gonna stop with that juvenile nonsense about Bush being dumb? The facts simply don’t serve your narrative. Dragging out this cheap trite silliness makes you look like someone with a lazy brain, to put it kindly, and makes the Title of this POS more that a little ironic • Bush is unintelligent and has little knowledge of the world.In my book that makes him dumb. His daddy probably bought him his degree and made him president.  If his daddy was not Bush senior he would probably clean bathrooms or park cars. He was a retarded leader that had advisers that did most of the work for him. He didn’t have to understand anything. Same thing with Sarah Palin. If you think they are smart, than what do you consider stupid? • Obama. The man is so stupid he can’t even speak without having a teleprompter hooked up in front of him. The man is so completely out of touch with reality it’s both sad and absolutely terrifying. Scout is right, no pun intended. People who think Bush is stupid obviously don’t care enough to think for themselves and buy into the crap that he is stupid. At least he had his own ideas instead of being a mindless puppet that has a panic attack when his script fails. • Wow, really? This again? I’ve seen him speaking without a teleprompter many times, and he’s actually a good speaker. This whole teleprompter thing is nonsense. What’s wrong with using a teleprompter? Many politicians have used teleprompters, including Ronald Reagan, and Lyndon B Johnson. Its use goes as far back as 1964 (maybe farther). Suddenly this is unacceptable? Sounds like his detractors were just trying to find some way to denigrate him. • I’m not dumb enough to think that Bush isnt! 7. Everyone is stupid in one aspect of life. Did Americans produce this? 8. What’s kind of sad is that really when watching this, I was just getting excited to see Canadian locations (definitely the Banff springs hotel) and actors (Fubar, made in my own city!). So I guess if that’s what I’m most excited about, this documentary must not be very good. It’s pretty stupid. 9. good documentary worth a watch, the problem defining the word as the documentary reveals was that in its infancy was applied to people with serious Cognitive declines , unable to fend for themselves. Over time the term has been degenerating and used to offend others or as a qualifier non-rational actions. if an action (stupid) is rewarded through a stimulus (peer recognition), the action is going to be strengthened (and worse, improved), Its the Same in this case. the biggest problem is not with the one who performs the stupid action but in the ones that celebrate or encourage the act. • I don’t that, “non-rational” actions is a good definition of stupidity. For one thing, most of our actions are non-rational, we mostly operate intuitively, on unconscious psychological motivations and modal behavior. This is because unconscious action is generally more useful (evolutionarily fit) than conscious rational behavior. Like art and pornography we all just “know it when we see it” when it comes to stupidity. Personally, I don’t believe that it exists, I don’t think that there is even a nearly objective way to measure it, we aren’t at that point in understanding cognition. I think that, what we mean by “stupid” has to do with affinity. The people who are closest to us in their thinking we consider smart. People who have advanced beyond us in the same line of thinking are considered brilliant. People who are on a completely different line are considered ignorant, particularly if they are intolerant of our line of thinking. So, it’s not a matter of how smart or stupid someone is, it’s how closely their brain functions to our own, and in what way. In that sense, attaching a value judgement to stupidity is pretty, well, stupid. 10. This movie is pure garbage. It’s in such poor taste. Nice job getting cheap laughs off interviewing obviously slow individuals. 11. stupid=stagnant stupid=bad maners stupid=evil at heart stupid=fun for the moment stupid=IQ 1…..X stupid=why not? stupid=human nature stupid=past,present and future stupid=Kanye West stupid=lieing to one self stupid=do not brag about it stupid=necesary for “The Man” stupid=evident pt cei ce nu sunt 12. Guerilla is not as you say. As you saw only 7,8 books were wrriten about stupidy and it can’t be measured or stuff like that. I don’t know if you watched the documentary but is not that bad as you are saying. It has some good and funny parts. 13. This documentary is pretty, well, stupid. Not only do they completely fail to define stupidity, or quantify it, or demonstrate what it is. Just a bunch of insecure intellectuals, relating their opinions, about a subject that they have completely failed to understand. One big old facepalm of a documentary.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '8', 'language_id_whole_page_fasttext': "{'en': 0.9616332054138184}", 'metadata': "{'Content-Length': '89696', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EJ6TBWM32RLGPZ5CSWZ6AUBSO4EQRIRV', 'WARC-Concurrent-To': '<urn:uuid:57d9be7d-c99c-427d-9f73-927b1f38fc30>', 'WARC-Date': datetime.datetime(2021, 1, 28, 8, 13, 11), 'WARC-IP-Address': '172.67.129.140', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4SK7WSSNU5TKAIC553HX66UTKRY6WDUL', 'WARC-Record-ID': '<urn:uuid:b760d0e4-8772-4766-a85b-6c4e558f96b2>', 'WARC-Target-URI': 'https://documentaryheaven.com/stupidity/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:16841bb5-8472-4c9d-a2d8-39439771d113>', 'WARC-Truncated': None}", 'previous_word_count': '1074', 'url': 'https://documentaryheaven.com/stupidity/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-172.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.048358380794525146', 'original_id': '68b366d12b50cd4af00a69dbbb0b9cdfbe4bd42f44424bbb5e49ef48e4a4cf8b'}
shiped by their visitors had made of them a powerful nation, given them books, guns, clothing, and a thousand things the red man did not possess. Other white men who came later w^hetted their already keen desire to learn about this powerful God, and possess that won derful book which he had given to these strange people. One tribe was presented by some irreverent trappers with a well-thumbed pack of cards, with the assurance that they were the bible for which they longed; but the deception was a brief one. Finally, in 1832, four (some authorities say five) Flathead Indians were delegated by their tribe to proceed to St. Louis, which they believed to be the great center of the white man's power, and procure this all- powerful book and some one to teach them its contents. It was a strange quest, and a stranger place in which to make it, for St. Louis then overflowed with that turbulent and ungodly class that in those early times swarmed along the western border of civiliza tion. The messengers were laughed at by the . few to whom they applied; and after two of their number had died in the city, the others set out sorrowfully on their return, without having procured the great book, and with their faith in its efficacy for good sadly shaken by the scenes they had witnessed. One of them died on the way, yet their journey was not wholly fruitless; for their lamentations were overheard one day by one who immediately wrote to the missionary societies in the East that there was a wide and ripe field for their labors in Oregon. The matter was taken in hand by two organizations, the Methodist Board of Missions, and the American Board of Commissioners for Foreign Missions, a society supported by the Congregational, Presbyterian and Dutch Reformed denominations. The Methodists were the first to take the field. Rev. Jason Lee was given direction of the work. Mr. Lee was born in Canada, of American parents, and was ordained to the ministry in the United States; yet his American citizenship has been questioned by secta rian writers, who imagine that by doing so they gain for themselves certain pioneer honors that are justly his due. His associates were Rev. Daniel Lee, Cyrus Shepard and P. L. Edwards. When Na thaniel Wyeth made his second journey to the Columbia, in 1834, as already related, this missionary party accompanied him. When Wyeth stopped to build Fort Hall the missionaries left him and FOUNDATION AND PROGRESS OF THE MISSIONS. 909 continued their journey with a brigade of Hudson's Bay Company trappers, under A. R. McLeod and Thomas McKay. On the first of September they reached Fort Walla Walla, a post the Hudson's Bay Company had established on the Columbia at the mouth of Walla Walla River, where the town of Wallula now stands. On the fifteenth they landed from boats at the company's headquarters at Vancouver. They were most cordially welcomed by Dr. Mc- Loughlin, who entertained them with the greatest hospitality. It had been their intention to locate east of the mountains, but the Chief Factor persuaded them to found their establishment in the Willamette Valley. It has been charged that his reasons for desir ing them to choose the latter place were that he might secure the services of one of them as teacher to children at the fort. If such was the case his motive was far from being an unworthy one ; and he did the Indians no wrong, since those on one side of the mountains were as much in need of missionary labors as those on the opposite- It was a fortunate thing for the United States that he did so, for the mission became the center about which American settlers rallied a few years later, and it became an important factor in wresting Oregon from the grasp of Great Britain. On this subject McLough- lin's document says:— In 1834, Messrs. Jason and Daniel Lee, and Messrs. Walker and P. L. Edwards came with Mr. Wyeth to establish a mission in the Flathead country. The location chosen was on the banks of the Willamette, some sixty miles above its mouth and ten below the site of the present city of Salem. They began the erection of a log house, 32x18 feet, and so eager were they to begin their labors that they took posses sion of it on the third of November in an uncompleted condition, and received Indian pupils before the roof was finished. Their re lations with the people at Vancouver were the most friendly and 210 HISTORY OF WILLAMETTE VALLEY. cordial. Twenty -one persons were baptized at the fort by Jason Lee on the fourteenth of December, seventeen of them children; and he received a donation of twenty dollars to aid in his mission ary work. They were viewed by the officers of the company solely in their character as missionaries, their nationality and creed not being considered; and as such they received hospitable treatment and hearty encouragement in a work which was deemed beneficial. They proposed not only to teach religion to the Indians, but to teach them to till the soil and to do other useful and productive labor, by means of which their moral, mental and physical condi tion might be elevated. Realizing that the plastic mind of youth is the easiest moulded, they opened a school for children, and fur nished them a house, where they could learn to read, worship God and till the soil. To do this required food for their support; and it became necessary for them to embark in farming in order to pro duce it. This they began the following spring, and their first harvest consisted of two hundred and fifty bushels of potatoes and a quantity of wheat, barley, oats and peas. To this they added six barrels of salmon, procured from the Indians. In September, one year after their arrival, the first of a series of misfortunes overtook them. An intermittent fever became prevalent, and four of the children died. The Indians had been watching their movements with considerable interest, and these sad occurrences had a powerful effect upon their superstitious natures, causing them to view with distrust the place where the Great Spirit was displaying his disap proval by causing the death of their children. One Indian, who had lost a little brother, paid the mission a visit with the avowed intention of killing Daniel Lee and Cyrus Shepard, but was dis suaded from doing so by a companion. He gave vent to his wrath against the " white medicines " by crossing the river and killing several of his own race, presumably his wife's relations. During the fall an addition, 16x32 feet, was built to the mission house, and the close of the year found them comfortably housed, with a suffi cient supply of provisions and only ten pupils under their charge, while the Indians generally entertained serious doubts of the ad vantage of having them there at all. The American Board dispatched Rev. Samuel Parker and Dr. Marcus Whitman in the spring of 1835, as a pioneer committee to FOUNDATION AND PROGRESS OF THE MISSIONS. 211 examine the field and select suitable locations for missionary work. They joined a party of the American Fur Company, and ac companied them to the grand rendezvous on Green River, where they encountered a band of Nez Perce Indians who had come across the mountains to trade with the trappers, with whom the tribe was on terms of warmest friendship. Among the Nez Perces was a young chief who was a most ardent friend of the Americans. He possessed great eloquence in debate, and was named " Lawyer " by the whites, because of his forensic efforts. With this chief the missionaries had a consultation, and resolved to establish at least two missions. Accordingly it was agreed that Dr. Parker would continue the journey across the continent for the purpose of explora tion, so that suitable locations might be selected; he was then to leave a letter of advice with the Nez Perces to be given to Whit man the next year, and return home by sea. This was decided upon because the peculiar characteristics of the two men were such as to prevent cordial co-operation. Dr. Whitman was the very soul of energy and devotion to duty, caring nothing for appearances or the opinion of others if they stood between him and the object to which he had devoted his life; while Dr. Parker seems to have been a self-important man to whom a little notoriety was extremely soothing. Dr. Whitman, accompanied by two young Nez Perces, returned to the East to procure the necessary assistance for the two missions to be founded. Dr. Parker resumed his journey westward on the twenty -second of August, and when he entered the Nez Perce country received such an ovation from the delighted Indians as must have gratified his vanity in the highest degree. No white man before or since was ever received by the natives of the Columbia with such cordial ity and ceremonious distinction as greeted Mr. Parker on his way to Fort Walla Walla. His approach to an Indian village was the occasion of general display of savage grandeur and hospitality. Here was one who had come to tell them of that unseen and myste rious power which had done so many wonderful things for the white man; and they hoped now to learn how to worship that Great Spirit of whom they had heard their first white visitors speak, and who, they hoped, might smile upon them and make them wise and powerful. With this thought they received the missionary every- 212 HISTORY OF WILLAMETTE VALLEY. where with outstretched arms and demonstrations of unbounded joy. He held religious services in several places, and to a degree inducted his eager neophytes into the mysteries of the white man's religion. He reached Fort Walla Walla on the fifth of October, receiving a cordial welcome from P. C. Pambrun, the gentleman in charge. A few days later he passed down the Columbia in a boat, and during the winter enjoyed the hospitalities of Dr. McLoughlin at Vancouver. In the spring he returned east of the mountains and made a journey through the Nez Perce, Spokane and Colville countries, after which he embarked from Vancouver for the Sand wich Islands, and thence for home, arriving in 1837. He soon after published an account of his travels, which was of special value at that time because of the deep interest the people were beginning to take in the Oregon Question. Dr. Whitman, with his two Indian companions, reached Rush- ville, N. Y., his home, late on Saturday night, and his presence there, instead of in the heart of the Rocky Mountains, was first known when he walked quietly into church the next morning with his copper-hued friends, his mother starting up with a cry of as tonishment and joy. During the winter all his arrangements were made, including his marriage in February, 1836, with Miss Nar- cissa Prentiss, daughter of Stephen H. Prentiss. Mrs. Whitman was a woman of refined nature, rare accomplishments of voice and manner, of commanding presence, firm in purpose and an enthu siast in the line of her accepted duty. In this cause her deepest sympathies had been enlisted, and she cheerfully yielded all her fair prospects among friends and kindred, and devoted her life to isolation in a country so far away that the very name conveyed to the mind a sense of loneliness and mystery, and where a martyr's grave was awaiting her. She was born at Pittsburg, N. Y., March 14, 1808, and was therefore but thirty-nine years of age when merciless and ingrate hands crowned with her death the sacrifice of her life. Marcus Whitman, M. D., was born September 4, 1802, at Rushville, N. Y., and at the age of forty-five offered up his life on the altar of duty. These two, accompanied by Rev. H. H. Spalding and wife, a lady of much firmness of character and devo tion to duty, and W. H. Gray, set out on their westward journey under the escort of a party of the American Fur Company. With FOUNDATION AND PROGRESS OF THE MISSIONS. 213 the party were Major Pilcher, an independent trader previously alluded to, and Sir William Druminond, an English nobleman traveling under the alias of " Captain Stewart " and accompanied by a companion and three servants. The missionary party took with them three wagons, eight mules, twelve horses and sixteen cows, besides farming utensils, blacksmith and carpenter tools, seeds, clothing, etc., to enable them to become self-supporting. At Fort Laramie all the wagons but one were abandoned, but Whitman in sisted upon taking this one for the ladies to ride in ; the trappers also concluded to try the experiment of wheels in the mountains, and safely took a small cart to the grand rendezvous on Green River. Here the missionaries met Nathaniel J. Wyeth on his return home from his second unfortunate effort to test the virtues of joint occu pation in Oregon, and they were by him introduced to McKay and McLeod, the two Hudson's Bay Company agents who had escorted Jason Lee two years before, and who were about to return to Van couver from a trapping and trading tour. Notwithstanding the urgent objection of the trappers and their assurances that it was impossible for a wagon to pass through the mountains, Whitman insisted upon taking the vehicle along; but when he reached Fort Hall he was compelled to reduce it to two wheels, and at Fort Boise they insisted upon an entire abandonment of it. Nevertheless, he had demonstrated that wagons could cross the Rocky Mountains, and was satisfied that the remainder of the route presented no more formidable obstacles. They were met on the route by a band of Nez Perces who had been informed in the spring by Dr. Parker of their expected coming, and their reception was only less impressive than had been that of their herald, whose failure to do anything for them had served somewhat to cool the ardor which his appearance had raised to fever heat. Mr. Pambrun gave them a hearty wel come to Fort Walla Walla on the second of September, which was repeated by Dr. McLoughlin a few days later when they landed from the company's boats at Fort Vancouver. Leaving the ladies to enjoy the hospitalities of the fort, the three gentlemen returned to Walla Walla, and, with the aid of Mr. Pam brun, sought for suitable locations for their proposed missions. It was decided to locate one among the Cayuses and the other among the Nez Perces. The former was located at Waiilatpu, on the 214 HISTORY OF WILLAMETTE VALLEY. Walla Walla River, six miles west of the present city of Walla Walla, and was taken charge of by Mr. and Mrs. Whitman. This was knowrn as the " Waiilatpu," or " Whitman, Mission," the former name signifying uthe people," being the proper title of the Cay use tribe. Mr. and Mrs. Spaldirig founded the " Lapwai Mission " among the Nez Perces, at a place on the Clearwater River a few miles from the site of Lewiston, Idaho. Mr. Gray rendered material aid in constructing the two posts, and assisted the two principals in their missionary labors. The next year, it being deemed advisable to extend the field of their operations, Mr. Gray returned East, to procure the necessary means and additional aid to accomplish that purpose. He was accompanied by four Nez Perces, who took a large band of horses with them, the price of which they intended to contribute to the Mission fund. On the Platte River the party was attacked by Sioux Indians, their horses stolen and the four Nez Perces killed, Mr. Gray barely escaping with his life. He returned in 1838, with Rev. E. Walker and wife, Rev. Gushing Eells and wife, Rev. A. B. Smith, Mrs. Gray, and Cornelius Rogers. With the party came Captain John A. Sutter, the honored pioneer of the Sacramento Valley. They brought with them fourteen cows of a superior breed, but at Fort Hall were persuaded to leave *them and accept in their place an order for a similar number to be delivered them by the agent of the Hudson's Bay Company when they reached their destination. They failed to fully appreciate the beauties of this transaction until after their arrival at the Whitman Mission in September, and wit nessed the efforts of an expert vaquero to catch some of the wild heifers roaming with the herds belonging to the company. The following brief and accurate account of the Missions of the American Board is taken from Rev. Myron Eells' book, entitled " Indian Missions," and carries them up to the time when the Amer ican settlers organized a government in Oregon, from which time they will only be considered in connection with concurrent events. Mr. Eells says:— On the arrival of this mission reinforcement, Mr. Gray was associated with Mr. Spalding. Mr. Smith was first stationed with Dr. Whitman, but the next year he opened a new station at Kamiah, sixty miles from Lapwai, among the Nez Perces, and Messrs. Walker and Eells likewise began another station among the Spokanes, ut Tshimakain, six miles north of the Spokane River, in the spring of 1839. The FOUNDATION AND PROGRESS OF THE MISSIONS. 215 first few years of the mission were quite encouraging. Owing partly to the novelty, the Indians seemed very anxious to labor, to learn at school, and to receive religious instruction. In 1837, as soon as a school was opened at Lapwai, Mr. Spalding wrote that a hundred, both old and young, were in attendance. As soon as one had learned something more than the others, they would gather around him, while he would become their teacher. In 1839 one hundred and fifty children, and as many more adults, were in school. Similar interest was shown in religious instruction. They sometimes spent whole nights in repeating over and over what they had but partly learned at a religious service. Two years later 1,000 to 2,000 gathered for religious instruction. Then 2,000 made a public confession of sin, and promised to serve God. Many of them evidently did so with imperfect ideas of what they were doing, yet not a few were believed to give evidence of conversion. Among the Cayuses, also, more were ready to attend school than the mission family could sup ply with books, or had ability to teach. Morning and evening worship was main tained in all the principal lodges, and a confession of sin was made somewhat similar to that among the Nez Perces. For a time, when Dr. Whitman or Mr. Spalding traveled through the country, they were followed by hundreds of Indians, eager to see them and hear Bible truths at night. They had a strong desire for hoes and other agricultural implements, and were willing to part writh any property they had, in order to obtain them, even bringing their rifles to be manufactured into such articles. From eighty to one hundred families planted fields near Mr. Spald ing, and many near Dr. Whitman raised enough provisions for a comfortable sup ply for their families. In 1838 Mr. Spalding reported that his field produced 2,000 bushels of potatoes, besides wheat and other articles. In the year 1841 a saw and grist mill were erected among the Nez Perces, and a grist mill among the Cayuses. At Kamiah a large part of the Indians gave up their roving habits for a time, and remained most of the year at home, and the Spokanes received Messrs. Walker and Eells with glad ness. In 1837 a church was organized, and in September, 1838, the first Indian was received into it; though, in July previous, two Indian girls, who afterwards died in Mr, Spalding's family, gave evidence of conversion, and were baptized as the first fruits of the work. In November, 1839, Joseph and Timothy, Nez Perces Indians, were admitted to the church. In 1840 Mr. Eells reported a school of eighty scholars. In 1839 the mission received a donation from Rev. H. Bingham's church, at Hono lulu, Sandwich Islands, of a small printing press, with types, furniture, paper, and other things, of the value of $450. The same church had, the year before, sent eighty dollars in money and ten bushels of salt to the Oregon mission^ Mr. E. O. Hall, a printer at the Sandwich Islands, on account of the health of his wife, came with the press, and the first book printed west of the Rocky Mountains, so far as known, was issued that fall in the Nez Perces language. This added new interest to the school, and other books in the same language, and one in that of the Spo kanes, followed. Mr. and Mrs. Hall remained until the spring of 1840, when they returned to the Sandwich Islands. *-£•** * * But the novelty gradually wore off', and discouragements began. The natural heart naturally resisted the truths of the Bible, and some of the Spokane chiefs led in the opposition. In 1838 two Roman Catholic priests arrived, spoke against the missionaries, and persuaded some of the Cayuses to be baptized by them. Others afterwards came, established a mission among them, and one of the Roman Catholic- Indians instigated some others of the tribe to treat Dr. Whitman and Mr. Gray with much insolence and abuse, to destroy some property, and to demand payment for the land, timber, fuel and water which had been used. But by moderation and firmness, and with the aid of the Hudson's Bay Company, the Indians afterwards 216 HISTORY OF WILLAMETTE VALLEY. admitted their guilt, and peace was apparently restored. In 1841, Mr. Smith, after suffering no little annoyance from the savage manners of the Nez Perces, on account of the failure of his own and his wife's health [he had located among Ellis' band of Nez Perces in 1839, and the following year was prevented from cultivating any ground under pain of death, at the command of Ellis himself], left that mission and Oregon, and joined the mission at the Sandwich Islands. He subsequently returned to the Eastern States. In his opinion the Indians were pharisaical, and desired to make money out of the missionaries. ****** By February, 1842, affairs seemed so discouraging that the Board of Missions concluded to give up the stations among the Cayuses and Nez Perces, and Rev. J. D. Paris and Mr. W. H. Rice, who had been sent to the mission by the way of Cape Horn and the Sandwich Islands, having reached the latter place, were induced to remain there temporarily, an arrangement which wras afterwards made permanent by the Board at Boston. The roving habits of the Indians, and the decrease in the attendance on the schools, increased the trials. Hence, Messrs. Spalding and Gray were to return East, and Dr. Whitman was to join the Spokane Mission. In the fall of 1842, however, affairs took a more favorable turn : the Spokane Indians showed more thoughtfulness and conscientiousness ; the school at Lapwai increased to an average of eighty, and afterwards to over 200; 1,000 Nez Perces attended a series of meetings for nine or ten days, seven of whom were examined for admission to the church ; the Cayuse Sabbath congregations varied in the spring from 200 to 400, in the fall from 50 to 200, and less during the rest of the year. The two Nez Perces received into the church four years previous, and some others of whom hope was entertained, stood well as Christian workers ; and there was abundant evidence that the truth was exerting a restraining influence over most of the Indians. Some of them were becoming more settled, so that 50 Cayuse and 150 Nez Perces families cultivated from a quarter of an acre to five acres each ; one Nez Perces chief raised 176 bushels of peas, 100 of corn, and 300 of potatoes. Mrs. Spalding had taught a few of the Nez Perces women to knit, card, spin, and weave, and a large number to sew. • ****** It was also becoming evident that more Americans were soon to come into the territory, and they would need something other than Roman Catholic preaching. All these things determined the missionaries in the fall of 1842, to continue all the stations, notwithstanding the instructions received from the Board at Boston, until the matter could again be reconsidered. These, and other considerations relating to the possession of the country, to which reference will afterwards be made, rendered it expedient, in the opinion of the mission, for Dr. Whitman to return East. He did so, leaving Walla Walla October 3d, 1842, and reaching Boston March 30th, 1843. He made such representations that the Board ratified the action of the mis sion, in continuing all the stations. After transacting important business at Wash ington, and visiting his friends, he returned to Oregon. He left the western frontiers of Missouri, May 31st, and after a short time overtook a company of about 875 emigrants, some of whom, when he was in the East, he had promised to aid, should they determine to go to Oregon. This journey was successfully made, and the first train of emigrant wagons rolled through to the Columbia River. The Methodist mission, founded by Jason Lee in the Willamette Valley, and which had met with such misfortune by sickness, was reinforced by Elijah White and wife, Alanson Beers and wife, W. H. Willson, Annie M. Pitman, Susan Downing and Elvira Johnson, FOUNDATION AND PROGRESS OF THE MISSIONS. 217 who sailed from Boston in July, 1836, and reached their destination the following May. The scourge of fever still afflicted the mission, and it consequently bore ill repute among the Indians of the Wil lamette, in spite of the most earnest and conscientious efforts of Mr. Lee and his associates to win the good will of those for whose ben efit they had made so great a sacrifice. In the fall of 1837 Rev. David Leslie, Rev. H. K. W. Perkins and Margaret Smith were added to their force of missionary laborers. Their field of opera tions was enlarged in the spring of 1838 by the establishment of a mission at The Dalles, under the charge of Daniel Lee and H. K. W. Perkins. To do this required money, if they would continue their plan of operations. The Protestant method of working em braced the instruction of the Indian in the methods of procuring food and clothing by his own intelligent effort, so that he might not experience those alternate seasons of feasting and famine to which he was subjected when relying solely upon the products of nature. They sought, also, to destroy his roving habits by trans forming him from a hunter to a farmer. Jason Lee accordingly started East to procure the necessary financial aid, accompanied by P. L. Edwards, F. Y. Ewing and two Indian boys. During his absence Mrs. Lee died, also Cyrus Shepard, who was teaching school at the Willamette Mission. Mr. Lee returned in 1840 with a party of forty -eight persons, eight of them being clergymen, and nineteen ladies. From this time the history of the missions be comes so closely interwoven with that of the settlements, that no further effort will be made to keep it distinct. A new element was introduced into the mission field in 1838, in the form of two zealous Catholic priests. Rev. Francis N. Blanchet and Rev. Modest Demers came overland from Montreal with the regular express of the Hudson's Bay Company, reaching Vancouver on the twenty-fourth of November, 1838, and having baptized fifty- three persons while voyaging down the Columbia. They came pre pared to stay, and not without having received a cordial invitation. The servants of the Hudson's Bay Company, such, at least, as were of Canadian descent, had a natural leaning toward the Catholic church, which had been the one to administer to the religious wants of them selves and parents, whenever they had been fortunate enough to come within the radius of Christian worship. When the Protestant mis- 218 HISTORY OF WILLAMETTE VALLEY. sionaries appeared it caused them to long for the presence of the pious fathers; not with that insatiable longing which has its source in the deepest fountains of our nature; they simply preferred, in case they were to enjoy religious privileges at all, to have those with which they most naturally sympathized. Not only did they feel thus themselves, but they told the Indians that there were other and better missionaries than those who had settled amongst them, men who wore long black gowns and who would teach them the true religion. This created a natural desire among the tribes to have these holy men come among them, a desire shared by the officers of the company, who naturally preferred that religion which would meet with the most favor among their servants and the In dians, and which was taught by subjects of Great Britain. This wras the reason why the society of Montreal sent out Fathers Blan- chet and Demers, and why the advent of the " Black Gowns," as they were called by the Indians to distinguish them from the Prot estants, was not unexpected by the natives. The coming of Catholics was the signal for the commencement of a contest for spiritual control of the Indians, whose terrible results will be seen as' this narrative progresses. For this both parties to the controversy were to blame. They were all firmly set in their religious convictions, and intolerant of opposing or differing opinions to the highest degree. Embued by the loftiest of motives themselves, they did not possess sufficient charity or liberality to ascribe equally exalted purposes to their opponents. This spirit is exhibited to the present day in the rancorous writings of certain participants on either side, in which they do not hesitate to charge upon their adversaries crimes for which the scaffold and peniten tiary are the only adequate penalty; or motives and conduct, which, being proven, would cause them to be shunned and despised by every honorable man. It is but a continuation of that sectarian rivalry, that battle of religious creeds, which has existed since first primitive man began to worship his shadow as a manifestation of some intangible and mysterious power, and which has caused so much bloodshed, misery and horror in the world, and will not end until man judges his fellow man more by his motives and deeds, and less by his purely religious opinions. A few instances will suffice to show the existence of this spirit FOUNDATION AND PROGRESS OF THE MISSIONS. 219 on both sides — a determination to impress upon the Indians the fact that their particular creed and form of worship were the only true and potent ones, and that all others were both false and harmful. The Catholics were the chief aggressors in this respect, the more energetic and crafty in undermining their opponents, but it was not entirely lacking with the other side; and it must be admitted that in the matter of subsequent acrimonious writings, the Protestants lead the van. The first gun was fired and the nature of the cam paign outlined by Dr. Parker when he first entered the country, and long before the Catholics appeared in the field. At the mouth of the Alpowa Creek, on Snake River, he came upon a burial party of the Nez Perces, who " had prepared a cross to set up at the grave," and because the symbol of the crucifixion offended his sight, and he feared it would make, as he expresses it, " a stepping-stone to idol atry," he took u the cross the Indians had prepared and broke it in pieces." As the Catholics had not yet appeared in the field, they consequently "didn't know they were hit"; and this incident is of interest only to show the spirit of religious intolerance which held possession of Dr. Parker, and which subsequent events proved to also pervade his successors. When the Catholics appeared they found the Protestants well entrenched, and they had either to attack them there or enter new fields. They did both. Their plan Of operations is outlined by Father Blanchet, who, in after years, wrote thus of the duties of the missionary priests:— They were to warn their flocks against the dangers of seduction, to destroy the false impression already received, to enlighten and confirm the faith of the waver ing and deceived consciences, to bring back to the practice of religion and virtue all of them who had forsaken them for long years, or who, raised in infidelity, had never known nor practiced any of them. * * In a word, they were to run after the sheep when they were in danger. Hence their passing so often from one post to another — for neither the white people nor the Indians claimed their assist ance in vain. And it was enough for them to hear that some false prophet (mean ing a Protestant missionary) had penetrated into a place, or intended visiting some locality, to induce the missionaries to go there immediately, to defend the faith and prevent error from propagating itself. Here is a direct statement from the Archbishop at the head of the church, that it was the Catholic plan to counteract the influence of the Protestants where they had already located missions, as well as to hasten to any new point they might select in order to prevent the founding of others. The first overt act of this kind was com- 220 HISTORY OF WILLAMETTE VALLEY. mitted at Nesqually, only a few months after their arrival. Rev. Blanchet says:— The first mission to Nesqually was made by Father Deniers, who celebrated the first mass in the fort on April 22, [1839], the day after he arrived. His visit at such a time was forced upon him by the establishment of a Methodist mission for the Indians. * * * After having given orders to build a chapel, and said mass out side of the fort, he parted with them, blessing the Lord for the success of his mis sion among the whites and Indians, and reached Cowlitz on Monday, the thirtieth, with the conviction that his mission at Nesqually had left a very feeble chance for a Methodist mission there. The priests introduced a novelty in the shape of a picture by some ingenious artist. It was a representation of a large tree, with many branches, and the different Protestant sects were shown as ascending the trunk and going out upon the various branches, from which they dropped into a fire, the blaze being fed by a priest with the heretical books of his roasting victims. This tickled the Indians immensely, and among the Nez Perces it seemed about to capture the whole tribe. As an offset to this, Mr. Spalding had his wife paint a number of illustrations of prominent Bible events, and this colored panorama soon crowded the Catholic cartoon from the field. Thus was the contest waged for several years. In 1841, the Cas cades Indians were won away from the The Dalles Mission in spite of Mr. Waller's strenuous efforts to hold them. This same Mr. Waller gave expression to his feelings on doctrinal points by cutting down a cross erected by the Catholics at Clackamas village. There was one thing which gave the Catholics a decided advan tage among the natives — the use of symbols and ceremonies. Mr. Blanchet says: "The sight of the altar, vestments, sacred vessels, and great ceremonies, were drawing their attention a great deal more than the cold, unavailable and long lay services of Brother Waller." These were more akin to their own ideas of religion than the simple services of the Protestants. The mystery was fascinating to them, and they preferred to see the priests "make medicine'7 to hearing so much " wa-wa " from the ministers. By thus working upon the superstitious nature of the savages, and making no effort to suddenly change their old habits and time -honored customs, the Catholics gained a firm hold upon them, and were thus able, gradually, to bring about the desired change. The Protestants, on the contrary, endeavored to accomplish too much at once, and having no censers FOUNDATION AND PROGRESS OF THE MISSIONS. 221 to swing, or imposing vestments to wear, could gain but slight influence over the natives when their opponents were about. There was also another distinction the Indians recognized, and one which gradually led them to entertain a spirit of bitterness and hos tility against the Protestants. This was their affiliation with the American settlers, whose presence was highly distasteful to the Indians, the reasons for which will be developed as the narrative progresses. CHAPTER XV. AMERICAN EMIGRANTS ORGANIZE A PROVISIONAL GOVERNMENT. Early Advocates of Oregon Emigration — Efforts of Hall J. Kelley — The American Society for the Settlement of Oregon Territory — It Memorializes Congress and Advertises fur Emigrants — Wyeth, Kelley and Ewing Young come to Oregon — Earliest American Settlers — McLoughlirfs Account of Settlement of French Prairie — The Wil lamette Cattle Company — Population of Oregon in 1840 — First Effort at a Government — Settlement at Willamette Falls — Radical Change in the Policy oj the Hudson 's Bay Company as Regards Set tlers The Company^ Deep Laid Plan — Attitude of the Company and its Chief Representative — Dr. McLoughlin Considered — Reasons for the Bitter Feelings Entertained by some Americans — Dr. Mc- Loughlirfs Statement of His Conduct and the Treatment Received from both English and Americans — A bad Showing for the Grati tude of some Americans — Classification of the Population as Regards Interests — Reasons for ' Desiring a Government — A Petition Sent to Congress in 1840 — First Meeting to Form a Government — Death of Ewing Young Leads to the Organization of a Government — The Officers Elected — Failitre to Form a Constitution — The Wilkes Ex pedition- — The Wolf Meeting — Thz First Legislative Committee — Organization of the Provisional Government — The First Officers — Condition of the Missions — Antagonism of the Indians to Ameri can Settlers— Dr. White Induces the Nez Perces, Wascopums and Cay uses to Adopt a Code of Laws. TO the missionaries belongs the credit of opening the route to Oregon and encouraging that large emigration of hardy pio neers of the Mississippi Valley which was the element to finally decide the Oregon Question in favor of the United States. This was not their object when they left their Eastern homes, but was simply the natural sequence of events. Emigration to Oregon was AMERICANS ORGANIZE A PROVISIONAL GOVERNMENT. 223 considered and advocated long before there was any thought of founding missions, but it was deemed impracticable, and remained to be so considered until the missionaries and their wives demonstrated that the intervening mountains and deserts presented no barrier which might not be overcome even by delicate ladies. It then be came but a matter of time, not a question of possibility, when emi grants should beat a well-worn trail to Oregon. O O The first recorded instance of an effort to induce emigration to seek the far distant coast of Oregon, was in 1817, when Hall J. Kelley, of Boston, advocated the immediate occupation of the coun try in dispute by American settlers. At that time the United States was making her first genuine effort to regain possession of the Col umbia, and was negotiating with Great Britain on the question of the restoration of Fort George, or Astoria. Mr. Kelley became an enthusiast upon the subject, and continued his exertions throughout the subsequent years of diplomatic negotiation. In 1829 he organ ized a company which was incorporated by the Legislature of Mas sachusetts as " The American Society for the settlement of the Oregon Territory." This society presented a memorial to Congress in 1831, setting forth that they were " engaged in the work of opening to a civilized and virtuous population that part of Western America called Oregon." Among other statements, the memorialists said: " They are convinced that if the country should be settled under the auspices of the United States of America, from such of her worthy sons who have drunk the spirit of those civil and religious institu tions which constitute the living fountain and the very perennial source of her national prosperity, great benefits must result to man kind. They believe that there the skillful and persevering hand of industry might be employed with unparalleled advantage; that there science and the arts, the invaluable privilege of a free and liberal government, and the refinement and ordinances of Chris tianity, diffusing each its blessing, would harmoniously unite in ameliorating the moral condition of the Indians, in promoting the comfort and happiness of the settlers, and in augmenting the wealth and power of the Republic." They further stated "that the coun try in question is the most valuable of all the unoccupied portions of the earth," and they believed Providence designed it "to be the residence of a people whose singular advantages will give them un- 224 HISTORY OF WILLAMETTE VALLEY. exampled power and prosperity." They continued: "That these things * have settled in the policy of the British nation the determined purpose of possessing and enjoying the country as their own, and have induced their Parliament to confer on the Hudson's Bay Company chartered privileges for occupying with their settlements the fertile banks of the Columbia.
common_corpus
{'identifier': 'histwillvalley00langrich_13', 'collection': 'US-PD-Books', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '7002', 'token_count': '8792', '__index_level_0__': '10210', 'original_id': 'e3a7af64c232047cdcce33ef4a16043d5a6971d67864c117d88980e6bc5d86ea'}
  电竞外围投注平台-十大外围投注平台:神庙逃亡电脑版 Railway Transport With professional railway transport personnel, we can provide door-to-door railway transportation and a series of railway 服务 such as LCL, FCL, chartering, etc. To date, our import and export 产品介绍s include 22 major categories such as auto parts, machinery, electronics, instruments, textiles, transportation equipment and animal/plant 产品介绍s. The six major advantages of our services - Space guarantee - Competitive pricing - Full multimodal transport via sea, air and rail - Quick and convenient customs brokerage - Full-process visual cargo safety supervision - Owned networks and agency throughout Europe (Central Asia, Russia and Belarus) Service points - China Guangzhou, Shenzhen, Xiamen, Yiwu, Zhengzhou, Hefei, Wuhan, Chengdu, Chongqing, Xi’an, Changsha, Nanjing, Suzhou, Tianjin, Ganzhou, Nanchang, Changchun, Shenyang and Harbin - Overseas Moscow (Russia), Novosibirsk (Russia), Yekaterinburg (Russia), Vladivostok (Russia) and St. Petersburg (Russia) Minsk (Belarus) and Brest (Belarus) Malaszewicze (Poland), Poznan (Poland), Warsaw (Poland) and Lodz (Poland) Hamburg (Germany), Duisburg (Germany), Nuremberg (Germany) and Munich (Germany) Prague (Czech Republic), Budapest (Hungary), Tilburg (Netherlands), Ghent (Netherlands), Liège (Belgium), Milan (Italy), Lyon (France) and Paris (France);London (UK), Madrid (UK), Gothenburg (Sweden) and Copenhagen (Denmark), etc. Others:Baku (Azerbaijan), Almaty (Kazakhstan) and Tashkent (Uzbekistan) We provide three major railway product services: public trains, dedicated chartered trains and customized freight transportation. - China-Europe Line Malaszewicze/Lodz/Warsaw (Poland); Hamburg/Duisburg/Nuremberg/Munich (Germany); Tilburg (Netherlands); Liège (Belgium) - China-Russia Line Vorsino (Russia)/Minsk (Belarus) - Central Asia Line Five Central Asian countries — Kazakhstan/Uzbekistan/Kyrgyzstan/Tajikistan/Turkmenistan. - ASEAN Line/Vietnam Line - Dedicated trains Lyon/Milan/Istanbul/Tashkent/Almaty, etc. - At the same time, as an overseas railway carrier, we provide seamless full-process 服务 connected with our platform We offer dedicated trains customized for special cargo categories and lines such as parallel imported cars, meat imports, wood imports, etc. baiduxml LOL竞猜app
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8272407650947571}", 'metadata': "{'Content-Length': '45076', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VB53CJURG3PYIX7N23WTSNIISNGI5OYJ', 'WARC-Concurrent-To': '<urn:uuid:b4a50616-da71-46e2-afc8-b89bed3469c3>', 'WARC-Date': datetime.datetime(2021, 1, 15, 23, 0, 39), 'WARC-IP-Address': '164.88.201.147', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ULXRZSMWYRR4GV2QX6T3HQYRUC53FK7Q', 'WARC-Record-ID': '<urn:uuid:65945e79-ffcd-430d-a8eb-d7513e42affe>', 'WARC-Target-URI': 'http://deacreativedesign.com/M1hV33.xml', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:421a5f78-ea5a-485b-adb4-28214663d26a>', 'WARC-Truncated': None}", 'previous_word_count': '236', 'url': 'http://deacreativedesign.com/M1hV33.xml', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-233.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10057568550109863', 'original_id': 'a99509a862e5585fb9c2f498a3b78f56e415c68a8c6f7dece93b96467d45870b'}
Fetal megacystis: prediction of spontaneous resolution and outcome. To investigate the natural history of fetal megacystis from diagnosis in utero to postnatal outcome, and to identify prognostic indicators of spontaneous resolution and postnatal outcome after resolution. This was a national retrospective cohort study. Fetal megacystis was defined in the first trimester as a longitudinal bladder diameter (LBD) ≥ 7 mm, and in the second and third trimesters as an enlarged bladder failing to empty during the entire extended ultrasound examination. LBD and gestational age (GA) at resolution were investigated with respect to likelihood of resolution and postnatal outcome, respectively. Sensitivity, specificity and area under the receiver-operating characteristics curve (AUC) were calculated. In total, 284 cases of fetal megacystis (93 early megacystis, identified before the 18th week, and 191 late megacystis, identified at or after the 18th week) were available for analysis. Spontaneous resolution occurred before birth in 58 (20%) cases. In cases with early megacystis, LBD was predictive of the likelihood of spontaneous resolution (sensitivity, 80%; specificity, 79%; AUC, 0.84), and, in the whole population, GA at regression was predictive of postnatal outcome, with an optimal cut-off at 23 weeks (sensitivity, 100%; specificity, 82%; AUC, 0.91). In the group with early megacystis, the outcome was invariably good when resolution occurred before the 23rd week of gestation, whereas urological sequelae requiring postnatal surgery were diagnosed in 3/8 (38%) cases with resolution after 23 weeks. In the group with late megacystis, spontaneous resolution was associated with urological complications after birth, ranging from mild postnatal hydronephrosis in infants with resolution before 23 weeks, to more severe urological anomalies requiring postnatal surgery in those with resolution later in pregnancy. This supports the hypothesis that an early resolution of megacystis is often related to a paraphysiological bladder enlargement that resolves early in pregnancy without consequences, while antenatal resolution occurring later in pregnancy (after the 23rd week of gestation) should suggest a pathological condition with urological sequelae. In fetal megacystis, LBD and GA at regression can be used as predictors of resolution and outcome, respectively. These parameters could help in fine-tuning the prognosis and optimizing the frequency of follow-up scans. Copyright © 2017 ISUOG. Published by John Wiley & Sons Ltd.
mini_pile
{'original_id': 'd765805d52c4fb2d8c68abd72eb32234b8cda90ff2c59736cdfad2b0882f8403'}
#!/usr/bin/ksh -p # # This file and its contents are supplied under the terms of the # Common Development and Distribution License ("CDDL"), version 1.0. # You may only use this file in accordance with the terms of version # 1.0 of the CDDL. # # A full copy of the text of the CDDL should have accompanied this # source. A copy of the CDDL is also available via the Internet at # http://www.illumos.org/license/CDDL. # # # Copyright (c) 2016 by Delphix. All rights reserved. # . $STF_SUITE/tests/functional/cli_root/zpool_import/zpool_import.kshlib # # DESCRIPTION: # A pool should be importable when up to 2 top-level devices are missing. # # STRATEGY: # 1. Create a pool. # 2. Write some data to the pool and checksum it. # 3. Add one or more devices. # 4. Write more data to the pool and checksum it. # 5. Export the pool. # 6. Move added devices out of the devices directory. # 7. Import the pool with missing devices. # 8. Verify that the first batch of data is intact. # 9. Verify that accessing the second batch of data doesn't suspend pool. # 10. Export the pool, move back missing devices, Re-import the pool. # 11. Verify that all the data is intact. # verify_runnable "global" function custom_cleanup { log_must set_spa_load_verify_metadata 1 log_must set_spa_load_verify_data 1 log_must set_zfs_max_missing_tvds 0 log_must rm -rf $BACKUP_DEVICE_DIR # Highly damaged pools may fail to be destroyed, so we export them. poolexists $TESTPOOL1 && log_must zpool export $TESTPOOL1 cleanup } log_onexit custom_cleanup function test_devices_missing { typeset poolcreate="$1" typeset addvdevs="$2" typeset missingvdevs="$3" typeset -i missingtvds="$4" log_note "$0: pool '$poolcreate', adding $addvdevs, then" \ "moving away $missingvdevs." log_must zpool create $TESTPOOL1 $poolcreate log_must generate_data $TESTPOOL1 $MD5FILE "first" log_must zpool add $TESTPOOL1 $addvdevs log_must generate_data $TESTPOOL1 $MD5FILE2 "second" log_must zpool export $TESTPOOL1 log_must mv $missingvdevs $BACKUP_DEVICE_DIR # Tell zfs that it is ok to import a pool with missing top-level vdevs log_must set_zfs_max_missing_tvds $missingtvds # Missing devices means that data or metadata may be corrupted. (( missingtvds > 1 )) && log_must set_spa_load_verify_metadata 0 log_must set_spa_load_verify_data 0 log_must zpool import -o readonly=on -d $DEVICE_DIR $TESTPOOL1 log_must verify_data_md5sums $MD5FILE log_note "Try reading second batch of data, make sure pool doesn't" \ "get suspended." verify_data_md5sums $MD5FILE >/dev/null 2>&1 log_must zpool export $TESTPOOL1 typeset newpaths=$(echo "$missingvdevs" | \ sed "s:$DEVICE_DIR:$BACKUP_DEVICE_DIR:g") log_must mv $newpaths $DEVICE_DIR log_must set_spa_load_verify_metadata 1 log_must set_spa_load_verify_data 1 log_must set_zfs_max_missing_tvds 0 log_must zpool import -d $DEVICE_DIR $TESTPOOL1 log_must verify_data_md5sums $MD5FILE log_must verify_data_md5sums $MD5FILE2 # Cleanup log_must zpool destroy $TESTPOOL1 log_note "" } log_must mkdir $BACKUP_DEVICE_DIR test_devices_missing "$VDEV0" "$VDEV1" "$VDEV1" 1 test_devices_missing "$VDEV0" "$VDEV1 $VDEV2" "$VDEV1" 1 test_devices_missing "mirror $VDEV0 $VDEV1" "mirror $VDEV2 $VDEV3" \ "$VDEV2 $VDEV3" 1 test_devices_missing "$VDEV0 log $VDEV1" "$VDEV2" "$VDEV2" 1 # # Note that we are testing for 2 non-consecutive missing devices. # Missing consecutive devices results in missing metadata. Because of # Missing metadata can cause the root dataset to fail to mount. # test_devices_missing "$VDEV0" "$VDEV1 $VDEV2 $VDEV3" "$VDEV1 $VDEV3" 2 log_pass "zpool import succeeded with missing devices."
mini_pile
{'original_id': '215dd6906791c9b8dbc0e2895ddb997fa933d5d5508421a2160d4cf6fdad11b1'}
What Is the Relationship Between GDP and the Business Cycle It is not easy to explain the relationship between GDP and Business Cycle in a few words. It has to be dealt separately in understanding their relationship. Before discussing how and why they affect each other let us understand the meaning of both these terms. Gross Domestic Product refers to the total of all goods and services that has been produced in a country at any given point of time. Business cycle deals with the entire flow of changes that takes place in an economy. Changes here refer to the nation’s economic health. Before we start with analyzing the relationship between GDP and business cycle, let us understand the four phases of business cycle. They are fall, recession, recovery and boom. Every country’s economy has to go through these cycles that have a great effect on the Gross Domestic Product. So how does each phase affect the GDP of a country? Let us discuss a bit in detail. During the fall or slump phase where the output is decreased that leads to a decrease in the demand for goods and services. The consumers will start saving more and spend less so that they can face the next phase of setback. Because of the GDP of the nations drops drastically, since this cycle experiences increase in imports. Hence Gross Domestic Product falls due to decrease in domestic activity. The recession phase has vital affects on employment and production. Both these things falls below par since there is lack of resource supply and the government expenditure goes to an all time high. Because of this GDP level drops further and fears of bankruptcy sets in at an alarming rate. Recovery is a phase where the economy starts to recover at a slow pace. Exports will start slowly thereby decreasing imports. This helps the gross domestic product to pick up a little slowly but steadily. The final cycle of business is the boom stage where one can see substantial increase in manufacturing. Thereby the volume of output is also enhanced, which results in speedy growth of money. The result of this stage is that the Gross Domestic Product increases considerably. Here again there are fears of higher inflation rates giving rise to increase in prices of essential commodities. Hence any changes in the business cycle will directly affect the gross domestic product of a country. There is a very close relationship between the two when it comes to the economy of a nation.  It is directly proportional to each other in terms of economic health of a country. Any kind of changes be it positive or negative will have the same effect on the gross domestic product. It is a continuous change that happens in every economy from time to time.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9514700770378112}", 'metadata': "{'Content-Length': '29049', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:L2VS3E6XLEPTJQB5FTEGB6QOELJWNDPK', 'WARC-Concurrent-To': '<urn:uuid:0dfe340c-e913-48a8-ac16-7c6ac964990d>', 'WARC-Date': datetime.datetime(2020, 1, 28, 23, 39, 54), 'WARC-IP-Address': '104.207.139.207', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:QLVI3DE3BEUJRHLLSZYFKA3VTEAZNON4', 'WARC-Record-ID': '<urn:uuid:ec8b3ab6-f388-423d-8970-57aa13b0e891>', 'WARC-Target-URI': 'https://trivology.com/what-is-the-relationship-between-gdp-and-the-business-cycle/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e18f3ce1-7d81-4fea-819e-08fcbf6081a8>', 'WARC-Truncated': None}", 'previous_word_count': '468', 'url': 'https://trivology.com/what-is-the-relationship-between-gdp-and-the-business-cycle/', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-103.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.21387815475463867', 'original_id': '92816e9a188b338e5b62cee15d2861d08da7977cf99f914068654c19bc89ccd9'}
{% extends "base.html" %} {% block container %} <div id="wiki_title">{{ title }}</div> <div class="pdf"> <embed src="/f/{{ uid }}" height="800" width="700" > </div> <style type="text/css"> .pdf{ margin: 0px; text-align: center; } </style> {% endblock %}
the_stack
{'hexsha': '796fd114d48fb3824214e10b9cf5c5ec3b25f788', 'size': '287', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'templates/pdf.html', 'max_stars_repo_name': 'phyng/simpleshare', 'max_stars_repo_head_hexsha': '5fd4cc6e22b558866d5da156c0a8a96dd582ad35', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '3', 'max_stars_repo_stars_event_min_datetime': '2015-12-26T11:40:29.000Z', 'max_stars_repo_stars_event_max_datetime': '2020-11-21T15:30:35.000Z', 'max_issues_repo_path': 'templates/pdf.html', 'max_issues_repo_name': 'phyng/simpleshare', 'max_issues_repo_head_hexsha': '5fd4cc6e22b558866d5da156c0a8a96dd582ad35', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'templates/pdf.html', 'max_forks_repo_name': 'phyng/simpleshare', 'max_forks_repo_head_hexsha': '5fd4cc6e22b558866d5da156c0a8a96dd582ad35', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '15.9444444444', 'max_line_length': '56', 'alphanum_fraction': '0.5261324042', 'original_id': '0d2e6634e1a3de0bbc53bb5c0af6c95ec06a620cb12ccd765840634438807579'}
Jump to content • Content count • Joined • Last visited • Days Won Everything posted by Boganlicious 1. Boganlicious Booking consult I'm phoning BMI Clinic first thing for an appointment. I'm ready to make this happen and fiancée is completely on board which is helpful. I'm hoping to get an appointment on Friday. How does the process work? I know I need to see a psychologist and dietician. Are blood tests usually done? I've recently had my cholesterol and blood sugar levels checked with my gp but haven't got the results back yet. What happens at the psychologist appointment? I'm not really looking forward to that part of it in case I start crying. Any other advice welcome too. 2. Boganlicious Excuses during liquid stage Tooth ache - very clever! 3. Boganlicious Excuses during liquid stage Just wondering if you kept your surgery a secret what excuses you have for not eating? We see my in laws for a roast dinner every fortnight so there will be times I can't eat as well as the purée stage too. I'm not sure if I want to tell them (I'm undecided because I'm worried they will ask the cost). I would take along my shake or soup to have so I've pretty much got to say something as to why I'm not eating with them. 4. Boganlicious Questions to ask at consult Yes it is for a band, should have mentioned that. Your list was so helpful, thank you very much. I have a 2 year who I do still lift and it hadn't even occurred to me about when I would be allowed to pick her up. 5. Boganlicious Booking consult Just thought I would update that I was sent info and a quote before my upcoming appointment and yes blood tests are done as well as an ultrasound (this is with BMI clinic in joondalup). 6. Boganlicious Excuses during liquid stage Both good ideas. I've told my immediate family but not extended family as one of cousins had it done list around 30kg then regained it all. I know this sounds bad but I'm so scared that I will fail especially because my dad wants to know the failure rate and my mum has told me a family friend had it done lost the weight then regained it all. I know I need to think positively and think yes this is going to work for me because it will reduce my appetite and I will make it work. His parents are on the big side especially his dad so maybe they would understand. I have until August to decide who I'm going to tell or not tell. 7. Boganlicious what is your fav food before than after sugary I'm pre band and hope you don't mind me replying. My 2 very favourite foods are Chinese and Indian food. Also most of my mum's cooking when we go over for dinner. I have my consult this Friday and I'm hoping to be banded in August. I think one of my favourite foods post band will be a banana smoothie made with skim milk. I also like stir frys with lots of veggies. Hopefully I will still be able to eat that but chopped up finely and in a much smaller portion. 8. Boganlicious Consult date I took the first step and booked my consult for Friday afternoon. I'm glad I could get in as my partner finishes early on a Fridays and my mum happens to have Friday off work so will look after our daughter so he can come to the consult with me. What exactly happens at my appointment? The lady I spoke to was really helpful. She mentioned blood tests and an ultrasound. What ultrasound and please tell me I don't need to drink a ridiculous amount of water? I felt like I had done the right thing now I'm freaking out and scared. 9. Boganlicious is any 1 being banded in july Maybe August for me. I have to wait for tax time now. Hopefully everything goes to plan and I have my op in August. 10. Boganlicious The first few weeks I'm wondering about the fluids only too. Some surgeons put you on meal replacement shakes prior to surgery. I personally have a real sweet tooth. I don't know if the band will magically get rid of that but cutting out sugary things would help. I know that if I bake paleo brownies with honey, coconut flour, etc in them I magically manage to eat smaller portions and there's plenty of leftovers but if they were regular brownies it's like I just have no self restraint. Sorry I'm not of more help as I'm new to this too. 11. Boganlicious Tablets post surgery I will make sure to ask my prescribing doctor, if that particular tablet doesn't come in wafer form I know there are other brands that do so I may be able to swap brands at first (that's if crushing it up isn't an option). I've had tablets get stuck in my throat before definitely not fun. 12. Boganlicious BMI clinic Hi I'm new and signed up to the forum as I'm considering a Lapband. If you had your surgery at the BMI clinic in joondalup how did you find them? They are by far the cheapest as I don't have private health insurance but I like that they have a psychologist and it's compulsory to see which I feel would be really good for me. Also can you see your port? Will go and introduce myself in the intro part of the forum now, Look forward to chatting with everyone soon. 13. Boganlicious A New Start Good for you. My partner is applying for finance in January and if it goes through I will be booking my consult. Best of luck on your journey. 14. Boganlicious New port Hope you're feeling better. 15. I was referred to the public system but my gp is unsure if I will be accepted as generally bmi must be 35 with a condition. Mine is 34 with slightly high cholesterol. I'm just wondering how long it takes to hear from the wait list to see if you have been accepted? In January we are going to start applying for finance to fix up our house as well as to fund this if I'm not accepted or if the wait list is years. I'm hoping to be banded late February - if we fund it ourselves that is, I realise the wait on the public waiting list would take longer. We are also getting private health insurance too not just in case I ever need revision but for physio, dental, etc. I know I was only referred Thursday I'm just curious how long it takes to find out one way or another. 16. Boganlicious New port Did you have problems with the old one? Glad you're doing ok. 17. Boganlicious I've been referred! My gp has referred me to be banded in the public system but he's unsure if I will be accepted. If not my partner will look into finance. The nurse that did my health care plan so I can see a dietician and claim most of it back and also my nail lady both told me that they know people who have had great results which is encouraging. I was expecting a lot of judgment. I'm feeling scared I won't be accepted, or my partner won't get finance, I'm scared I'll fail but I'm ready to do everything I can to make this work. 18. Boganlicious I've been referred! Yes, we will be getting family cover in January or by the latest February. If I'm not accepted as a public patient we will apply for finance and failing that will have no choice but to wait it out. I'm nervous about hearing back from the hospital. 19. Boganlicious Hey from WA Hi everyone, I'm a mum from Perth looking into a Lapband. I have struggled to lose the weight for almost 2 years now bmi is 34 and I have family history of obesity, diabetes on both sides as well as obesity, high blood pressure, stroke and heart attack. I won't lie I'm vain and unhappy about how I look but I also care about my health and don't want to leave my daughter without her mum. I'm not sure what else to write so will leave it at that and I look forward to chatting to everyone soon. 20. Boganlicious BMI clinic Oh I didn't realise it worked that way! I wonder why they told me they weren't seeing public patients then? Never mind I will make some calls today. Having it done as a public patient would be great if it was a possibility. 21. Boganlicious BMI clinic They told me currently there is a 5 - 7 year wait if I went on the public waiting list and that I would have to go through Joondalup hospital as they don't see public patients. My doctor is pretty good. He said it's not about diet it's about a lifestyle change and when I mentioned a lap band he wasn't against it. The referral to a dietician is actually being done through a health care plan and it means I can claim the Medicare rebate or something. I think I still end up a bit out of pocket but it entitles me to 4 visits. The lady at bmi was helpful and said get the referral to a psychologist otherwise I don't get any rebate back. 22. Boganlicious Hey from WA Hi everyone and thank you for making me feel so welcome. While it's great that so many of you face the same struggles I do and can relate it also saddens me too as I know how tough it can be sometimes. It's great that there is this forum not just for the surgery aspect but to talk about other parts too such as staying on track. I'm pretty certain I want a band. I lost around 13kgs after having my daughter but still have lots to lose and struggle. I lose 1 - 3 kgs then regain it, lose it again, then regain. I'm going to be referred to a dietician today and bmi clinic told me to be referred to a psychologist too so that I can claim a rebate as it's compulsory to see a psychologist which I think will be really helpful. 23. Boganlicious BMI clinic We will definitely be getting some private health insurance hopefully in January which we wanted anyway. I just don't feel I can wait another 12 months after signing up as I'm pretty miserable. I'm not too worried about seeing the port it was more a curiosity thing although I'm not sure if I will keep this a secret from my in laws which is why I had the port in the back of my mind. I want to go for a consult at BMI but my doctor is sending me to a dietician. The problem is I feel hungry a lot even yesterday half an hour after a small bowl of cereal I felt really hungry. My fiancée is on board which is great. He just said I have to work on my diet and he wants me to exercise more before the surgery. He said if I eat nothing but bad foods before I have my band that he will be against it (although I don't eat a lot of junk or fast food). Thank you for the advice and replies as well as making me feel welcome here. It feels like unless you have a weight problem it's hard for others to understand.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9845494031906128}", 'metadata': "{'Content-Length': '119098', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EXZZDFI4DQOSPEOXXUOJATVSWFWYF6UH', 'WARC-Concurrent-To': '<urn:uuid:47618cbe-57bd-4d13-b332-81de0023c38d>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 39, 43), 'WARC-IP-Address': '209.188.88.70', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:U32BM4KXGLEH4VSSTOLOVZSSHTEXM6FG', 'WARC-Record-ID': '<urn:uuid:24c4c9bc-3591-4a3d-b26c-a2d09b7c9eb0>', 'WARC-Target-URI': 'http://www.bandingtogether.com.au/community/profile/20927-boganlicious/?do=content&all_activity=1&page=18', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae365904-b67a-42d7-a127-1c16d788e03e>', 'WARC-Truncated': None}", 'previous_word_count': '1955', 'url': 'http://www.bandingtogether.com.au/community/profile/20927-boganlicious/?do=content&all_activity=1&page=18', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04314064979553223', 'original_id': '0884e7f1ff4457b27c142fe51b32b5572cb079392209cd815795eeddd1968158'}
City showcases immigration issues The city of Laredo, with a population of about 220,000, clearly has a culture different from that of many other Texas cities. Even Police Chief Carlos Maldonado likens Laredo to an island, since there are virtually no other large American cities within a 200-mile radius. This “island” embodies the constant American struggle to balance national security with sympathy for fellow humanity. The governing principles in place are failing. Thousands of undocumented immigrants enter the United States every day. However, becoming a citizen of this great nation the legal way is extremely difficult and takes several years. Photo by Crystal Donahue, The Bells Only the winding Rio Grande separates the border town of Laredo from Nuevo Laredo, Mexico, a place virtually cohesive with its United States counterpart by culture. Two main bridges grant legal passage from one country to another, creating much hustle and bustle. A constant flow of people cross the bridges carrying cardboard boxes, shopping bags and rolling suitcases behind them – full of the day’s purchases or personal belongings. A border patrolman explains his daily routine on the Rio Grande as a continuous cycle. He shared a trend in trickery used by undocumented immigrants who make it across the river, unknowingly being detected. One time the border patrol apprehended a mother and two daughters who had run for about 10 yards as fast as they could and then stopped in the middle of a city park, pretending they came there to play and had been there a while. Others try to blend in with Laredo citizens as they have barbecues on the park grounds. Hearing these stories put the process of legalization in a different light. Countless times people ask, “Why do undocumented immigrants take the risk of the river crossing, of being caught and of deportation? Why not just come the legal way?” The legal way is a long way, taking nearly seven years after paperwork and a series of tests. Looking from “our side of the river” to the other, Mexico is noticeably different economically. Even with all the media cries of the “economic crisis” in America, seeing the dusty roads and homes made of scrap metal in Mexico, where one is either poor or rich, Americans have much less to cry about. Why else would there be such draw to come to the United States? Since Laredo is so intertwined culturally with Nuevo Laredo, the issue of immigration (both legal and illegal) is complicated. Some issues are hardly talked about, such as the fact that when an undocumented immigrant is caught for a crime like prostitution, he or she must have a medical screening before being admitted into a jail and entering the legal system. Hospitals, however, can refuse (and often do) to do the screening because the person is undocumented and has no insurance or coverage for the fees. The police department cannot bear the financial burden of these screenings. It’s impossible. So what is the Laredo police officer to do with undocumented immigrants discovered because they violated the law? Often, the only option is to deport them back across the border, where they can try again tomorrow. Border Patrol agents do all they can, but they are often hindered. For example, they are not allowed to trim or mow the brush along the river’s edge on the U.S. side. However, “America lovers” (as a border patrolman called them) volunteer to trim the weeds along the Rio Grande, making it more difficult for undocumented immigrants to enter undetected. Laredo Police Chief Carlos Maldonado said, “We have a big Mexican population here, and I want to make sure that they’re comfortable when they call the Laredo Police Department we’re going to address needs without checking on their citizenry status. That’s kind of a secondary issue, not the primary issue that we’re focusing on.” Who, then, is responsible? The Border Patrol will continue to wait in the weeds along the Rio Grande. The Laredo police officers seek to maintain safety for all citizens (both legal and illegal). But as for the security of the United States border, it seems to be left up to the slippery wet “Big River” where failure today is met by tomorrow, which always offers another chance. Author: Kennan Neuman Share This Post On Commenting Policy
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '128', 'language_id_whole_page_fasttext': "{'en': 0.9597697257995604}", 'metadata': "{'Content-Length': '55062', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J42Q34C2KPAT5SVOM6XSUEH37YVE2SNI', 'WARC-Concurrent-To': '<urn:uuid:2d9b674c-b877-4381-8164-6417044d139d>', 'WARC-Date': datetime.datetime(2021, 5, 12, 8, 41, 50), 'WARC-IP-Address': '67.79.54.72', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BZSGJD556FDUQQKPTQVYSA6HAAWUCUUK', 'WARC-Record-ID': '<urn:uuid:8e1cf4bc-e017-43c3-b7c0-f458fad655cc>', 'WARC-Target-URI': 'http://thebells.umhb.edu/2009/01/27/city-showcases-immigration-issues/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b1cf6bd5-c907-4af9-b16d-5985709304ac>', 'WARC-Truncated': None}", 'previous_word_count': '850', 'url': 'http://thebells.umhb.edu/2009/01/27/city-showcases-immigration-issues/', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-224.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17889666557312012', 'original_id': 'e330d8586d73a7f856a68100e997bba2c0f3daa2c9ae70e6344f29b1ff99a7ab'}
Calais Jungle, France In 2016, Sarah hit the streets to the Calais Jungle in France to meet with the refugees and see the conditions they were surviving in so she could help in the best way to meet their needs. Sneaking in to steal their stories and snapping a few sly shots, journalists were not appreciated in the jungle. Sarah made the decision to leave her camera aside and instead, she delivered a drop-in workshop on entrepreneurship to the refugees, focusing on using their existing skills and talents as the primary asset to transform into a business. This would open up opportunities through the Auto-Entrepreneur programme in France, to set up a Limited company or register as Self-Employed in the UK or any other country they are granted asylum in. Focusing on the future by creating opportunities instead of hunting for opportunities, Sarah took her students on an adventure through a mini-business plan to realise each idea and taught them the value of using their time wisely in the jungle to advance and support their current situation. Sarah Begum_Calais Jungle_10
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9669106006622314}", 'metadata': "{'Content-Length': '33752', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BP2HHMZYHHG6UR27OIH6IJWB3RQ2GEZ4', 'WARC-Concurrent-To': '<urn:uuid:c1bb1306-a877-4b48-b9a6-920cb2658030>', 'WARC-Date': datetime.datetime(2019, 1, 19, 7, 17, 27), 'WARC-IP-Address': '104.27.176.240', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:D2TKDIHDSSV3QWKWDEBEBXCU2J3LSY23', 'WARC-Record-ID': '<urn:uuid:d3973ee7-9372-480e-b37b-0032bd3e5dff>', 'WARC-Target-URI': 'http://sarahbegum.tv/humanitarian/calais-jungle-france/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cc391800-58e4-422f-b1df-50553e61a9b6>', 'WARC-Truncated': None}", 'previous_word_count': '178', 'url': 'http://sarahbegum.tv/humanitarian/calais-jungle-france/', 'warcinfo': 'isPartOf: CC-MAIN-2019-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-152-117-40.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.055030882358551025', 'original_id': '1bc8baba068ddc1b5e63ed768cf99ef3710d1bb4292c46cf34792276eda2b385'}
Identification and characterization of the Bacillus subtilis D-glucarate/galactarate utilization operon ycbCDEFGHJ. In the course of the Bacillus subtilis functional genomics project, an open reading frame called ycbG whose product is classified as a transcriptional regulatory protein with a helix-turn-helix motif in the putative D-glucarate/galactarate utilization operon (ycbCDEFGHJ) was initially screened as the gene disruptant that exhibits a defect that blocked the early stage of sporulation. However, the transcription of ycbCDEFG was extremely highly induced in response to nutrient exhaustion by the disruption of ycbG, but inactivation of the transcription from upstream ycbC in the ycbG mutant restored the sporulation efficiency, suggesting that the inappropriate over-production of the ycbCDEFG gene products inhibits efficient sporulation. We further analyzed the role of the ycbCDEFGHJ cluster and found that (i) a unit of ycbCDEFGHJ was induced by either D-glucarate or D-galactarate, and (ii) the cell growth was inhibited by the mutation of the ycbF and ycbH genes, that respectively encode the putative proteins, D-glucarate dehydratase and D-galactarate dehydratase on plates supplemented with D-glucarate and D-galactarate, respectively, as the sole carbon source. Our results indicate that the ycbCDEFGHJ genes are involved in the utilization of D-glucarate and D-galactarate in B. subtilis.
mini_pile
{'original_id': '69d784ab0b5e263044914d77e96660d44ff175dfa31633aaaa98d4ada64dfaf1'}
You know that idiom about death & taxes? If you work in tech, you can probably extend that idiom to "death, taxes & filling up our damn blog". (I would also add "not making a profit" and "pretending we're solving world hunger through our omni-channel marketing tool") For those of us sods that have stuck around in the big bad world of tech all these years, one thing has become abundantly clear: it's easier than ever to start a business, it's harder than ever to scale. We built ContentFly because we were tech marketers in a past life, doing our jobs with a healthy ounce of self loathing. Content marketing is hard. It's doubly hard in tech when you rely on it. Past a certain point it's really the only marketing channel that scales. So why is hiring tech bloggers so damn hard? Here's a guide to growth-hack hiring tech writers that doesn't feel like watching a 72 hour marathon of James Woods' Batman. (Or you could just use ContentFly, but, y'know, whatever) If you're not going to outsource, insource OK, if my veiled attempt at selling you on our content outsourcing service failed, let's go a different route - go the exact opposite direction. I know what you're thinking: What are you even talking about Naeem? Get the hell out of my kitchen. Bare with me here. I'm definitely not making this up as I go. Instead of hiring a tech blogger who knows absolutely nothing about your business, why not outsource from within? Get your employees to write for your blog instead. Sure, you're going to agonize the hell out of your developers as they wonder why they're writing a guide to CRM integrations instead of building a f*cking CRM integration, but so what? In all seriousness, the Zapier blog is a great example of a company that gets their own employees to put out amazing content. And guess what - employees are usually more than happy to do that. Just, you know, proofread the articles before a slanderous post about what a dick your CEO is gets blasted to the airwaves. I'm looking at you, Annika. Get your customers to write articles I realize this entire article is turning into a "beg people to give you free stuff" article (and I promise the next one isn't "get your parents to write articles"). But there's a method to this madness. We all know how killer user-driven content can be to user growth, but we typically think of that in terms of things like Pinterest cards. You could actually get your customers to help write posts for you - they're called case studies! If you're in the b2b space, customers would jump at the bit to write a case study to attract their own traffic. In fact, if you've already got a reasonably well-trafficked business, guest posts are killer. Hell, outsource your entire blog to your customers - not like they're paying you any money anyway. *grumble grumble* Get your parents to write articles for you Just kidding. Har har. Have you noticed this entire article I haven't actually helped you hire a tech blogger? One of 2 things is happening: either you think we're a bunch of annoying jack...daws, or you find our insolence charming. Either way, we're firm believers that unless you're churning out 5 highly technical pieces of work a day, there's no need to hire a tech blogger. It's a waste of time and money. Tech bloggers thrive when they're writing all day long. Unless you're building a magazine, you don't need that much content. So why invest so much money? Either outsource it to us (or our competitors, who we despite), or use one of the 2 above strategies. It sounds silly but it actually works - you can go a long way without having to spend money. Bonus: Create a writer auction If you absolutely insist on hiring a writer for some reason, let me give you a strategy that works. Unfortunately, Upwork is a broken bid system, so writers put arbitrary pricing up and it's impossible to tell if you're getting your money's worth. So here's a better way to do it: get writers to bid on you. Create a shortlist of writers on Upwork that you like. Come up with a job, and then message them all and ask them for their best price. Once you have a set of prices, pick the lowest one, and ask the others if they can match it. Anyone that can't, you can disregard them since it's a price mismatch. Of the writers left, get them all to write an article for you - and then based on that, figure out who you move forward with. It's a simple, fair process for getting the best writer at your price point, that also enables the writers to have a fair shake based on their expectations. Or, you know, just sign up for ContentFly ya goof.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9589158296585084}", 'metadata': "{'Content-Length': '22263', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VLASCVOK2BDJBO3NO7BFTQB5IPQYXTWS', 'WARC-Concurrent-To': '<urn:uuid:5c24fbf0-0fae-44d7-840c-50a2632de33f>', 'WARC-Date': datetime.datetime(2021, 4, 20, 19, 3, 8), 'WARC-IP-Address': '138.197.132.237', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:Q3IPL5HLJV2MERJNPXYYRPMFPEKYIZ4Y', 'WARC-Record-ID': '<urn:uuid:4d4b77f8-100c-4583-b796-2e3658dc2d88>', 'WARC-Target-URI': 'https://contentfly.com/blog/the-unconventional-guide-to-hiring-tech-bloggers', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c66ffd31-f675-42fd-8a13-be0883b734e1>', 'WARC-Truncated': None}", 'previous_word_count': '811', 'url': 'https://contentfly.com/blog/the-unconventional-guide-to-hiring-tech-bloggers', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-232.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6102863550186157', 'original_id': 'b823f68b1b741ed9f57851e9f4871b6ce736e2f3ba489fd1b94f47eb4ffa8124'}
When everything is absolute–except definitions and deities’ desires–you too can be pro-life dullard A few days ago I wrote about a post by one of the Granite Grokkers (Groksters? Grok Stars?), a small collective of conservative bloggers I discovered only because they live in my state and previously featured the breathless screeching a notably hysterical homophobe (who appears to have moved on). Skip, writing about newly minted mother-of-fourteen Nadya Suleman, was expounding on the idea that “this case truly brings into focus is whether or not it is ethical for anyone to have more kids than they can afford.” He calls her selfish and sick, and refers to her as a “lady” using quotation marks (and was kind enough to explicitly say that the quotes implied he was being sarcastic). He adds, “Yet, there are those that will look at this and see nothing wrong,” although he doesn’t say who these alleged happy-go-lucky apologists are or where they are commenting. He writes, “Just because someone decides that having babies out of wedlock is not subject to ‘black and white’ means that it is,” a clumsy bit of wordsmithing I take to mean that having babies out of wedlock is, though perfectly legal and not necessarily indicative of a single-parent situation, plain wrong. Okay, we get it: The woman’s nuts and irresponsible. Skip, while acknowledging that Suleman is an outlier, complains that “you and I” will be footing the bill for her offspring. He asserts that an increasingly secular society with its attendant moral decline (yes, his thinking is that unsophisticated) is to blame, as society at large becomes resistant to properly judging those who go astray. But most conspicuously, he offers no solutions. Why? Because he doesn’t have any, and some part of his brain recognizes that he is pissing into the wind. Anyway, I asked him in a comment to his entry how he could reconcile his ranting with his anti-abortion views, and also invited him to expand on what he meant by “moral relativism. He informed me that he was traveling and would address the issue later. He hasn’t done this, instead choosing to ratchet up his incoherence as well as put the boilerplate nonsense proffered by categorical opponents of abortion on display. In a post last night, Skip complains that Barack Obama is employing a double standard when he says, “”There is no God who condones taking the life of an innocent human being. This much we know.” There is NOTHING more innocent than the unborn; yet, Obama has no problem in restarting funding of abortions with US taxpayer monies overseas. How can one take both sides of the argument, appear to be for both, and not have their head explode from the shear illogicalness of it? Yes, Doug and I are extremely pro-life, believe that a new life begins at conception, that this new life is very precious in God’s eyes, and wish that others that are so willing to keep other humans alive would make that logical connection. Shear illogicalness indeed. Skip says that Obama’s words represent “the same ideological grouping that will go the distance to keep a convicted killer from receiving the death penalty,” but somehow I don’t think that when Obama speaks of innocent people, he’s talking about those rightfully convicted of heinous crimes. And Skip apparently doesn’t understand that Obama’s repeal of the Mexico City Policy does not translate into funding abortions any more than it does into funding counseling, offering contraceptives, or what have you. What it does is remove the element of blackmail: “If you want our money, you will discourage abortions.” Then again, not understanding something not only fails to deter the Skips of the world from opining; it’s virtually essential. But the worst of this garbage is, of course, the part consisting of the central dogma of the pro-life playbook: Abortion is killing, life begins at conception, God hates abortions. Only people who equate abortion with infanticide see Obama as contradicting himself. Since this equivalency is specious–and I don’t think I need to explore the different capacities to experience pain of an adult serial killer and a first-trimester embryo (90 percent of abortions occur before 13 weeks) with an undeveloped neurological system–Skip’s contention, as with every other like it, collapses. These people blather about life beginning at conception as though this is something that happens in an instant, like flicking a light switch. Sorry, gang, but biology is more nuanced than that. This has given the Roman Catholic Church fits ever since science started outpacing mythology and humankind developed the capacity to physically investigate whether “soul” that supposedly winds up in everyone at the “moment” of conception actually exists. Surprise, surprise; not only is it not there, but people who believe in it can’t even decide what it would look like if it were. It sucks that life isn’t a the convenient assortment of blacks and whites that some pretend it is. And if you think “God” gives a rip about the legality or morality of abortion, give us evidence that this is true, because God himself is not only a murderous psychopath generally, but is also the most profligate abortionist in the history of the world, given the number of fertilized human ova that fail to implant or ultimately result in miscarriages (on the order of half). And if this is okay because it’s God’s will, well, what was that bit about moral relativism again? To Skip-like organisms, it’s okay if deities practice this, I guess, but not people. Welcome to moral subjectivism! So are Obama and other pro-choicers who oppose putting innocent people to death being hypocritical? Sure–if you ignore your own call for absolutism and redefine words themselves to suit your needs, like these clowns. And speaking of the H-word, I’m curious as to how Skip plans to reconcile the idea that there are too many babies in the world with an unyielding opposition to abortion. People who simultaneously hold two these ideas invariably set themselves up to fail, both rhetorically and psychologically. They are forced to ignore the realities of human behavior, claiming that people who are not prepared to be mothers shouldn’t have sex. This is kind of like claiming that people not prepared to have COPD or lung cancer should not take up smoking, except that pregnancy is neither a disease nor “incurable” and sex is a lot more natural and compelling than inhaling smoke (until the latter becomes habitual, that is). Though I am pro-choice, I can abide by certain pro-life arguments–but not those harvested from fantasyland and predicated on both the desires of nonexistent beings and the philosophically vacuous idea that everything is binary. Where I agree with pro-lifers is that abortion is a response to an unfortunate situation, which is why I dismiss terms like “abortionist” (as if terminating pregnancies is the only service doctors who do so offer) and “pro-abortion” and assume–often wrongly–that others see them as farcical on their face, too. After all, people who scream about proponents of the Iraq war being motivated first and foremost by a desire to kill aren’t taken seriously. What a Grok of…okay, that’s a really bad pun. I’m done. You atheist anarchists are sick and tired and we are sick of you, even if we are non-religious types.. Obama has proven to be the worst president in the least amount of time – 15 days. Marxism sucks. Obama is a puppet and a mere tool for the international bankers and he is helping them steal from us. These globalist sickos are also big advocates of eugenics. mgordon, that’s just a small sample of NH’s far-reaching incoherence–see more here. (Why is it, by the way, that the real Internet whackjobs almost always have to incorporate their home states into their handles?) Apparently the 40 years he claims to have spent in academia and his ability to paint with oils on canvas are reasons to take his bullshit seriously. It amazes me that people like Doug can complain that Obama’s going to ruin the economic profile of America after the past eight years of insane plunging into the red. I guess when you’re stupid enough to think that what’s happening in Iraq is actually contributing to keeping America safe from Islamofascist terrorists, you can overlook anything. Blogs like Granite Grok invariably attract the dangerously unhinged, which is about the only reason to look at them. mgordon, that’s just a small sample of NH’s far-reaching incoherence–see more here. (Why is it, by the way, that the real Internet whackjobs almost always have to incorporate their home states into their handles?) Apparently the 40 years he claims to have spent in academia and his ability to paint with oils on canvas are reasons to take his bullshit seriously. It amazes me that people like Doug can complain that Obama’s going to ruin the economic profile of America after the past eight years of insane plunging into the red. I guess when you’re stupid enough to think that what’s happening in Iraq is actually contributing to keeping America safe from Islamofascist terrorists, you can overlook anything. Blogs like Granite Grok invariably attract the dangerously unhinged, which is about the only reason to look at them. [Q] You atheist anarchists are sick and tired and we are sick of you, even if we are non-religious types.. Obama has proven to be the worst president in the least amount of time – 15 days. Marxism sucks. Obama is a puppet and a mere tool for the international bankers and he is helping them steal from us. These globalist sickos are also big advocates of eugenics.[/Q] Lessee… Anarchist (check), Marxist (check), Failure to understand both (check), personal attacks on Obama (check), International Jewish Banker Conspiracy (missed the Jewish, but we can forgive you – check) Standard right wing paranoid diatrib.. – hey, jackass! You missed commie, you dolt! If you’re going to insult me as a Liberal, I demand you do it right, damn it! I’m an Atheist-Commie-Anarchist-Big-government-loving-Baby-killing-Marxist-member-of-the-Global-Jewish-Banking-Conspiracy-(even though I’m not Jewish)-Socialist-who-feasts-on-the-souls-of-small-unborn-mammals-and-drinks-blood-from-young-Xtian-children-vegetarian-hippy-American-hating Liberal. And don’t you forget it! (the funny thing about that? I really am a socialist, and I’m almost a vegetarian :) ) Enigma Dr. Joan Bushwell's Chimpanzee Refuge Doc Bushwell is busy with other activities but continues to lend a moniker to this backwater of a blog. Jim is an engineering professor with a fondness for running shoes and drumsticks; and Kevin Beck is a self-exiled member of the clan who refuses to stay gone.
mini_pile
{'original_id': '3e993284089ab868d91b8c355216377f60e0260b3a566fcf6d1873f089097bf0'}
...awarded to our website! Anatomy of the Black Bear How does a black bear skull differ from the skull of another animal? Black bear skulls are typically massive; much bigger than those of most North American wildlife. It is quite long and wide across the forehead, but narrower in the muzzle area. The eyebrow ridge is well-defined and the nostrils are quite broad. The jawbone hinge is large to accommodate the heavy jaw muscles. A female skull may be narrower and more pointed than that of a mature male. An average measurement is 11.5 inches in length and 6.5 to 7 inches in width. The longest black bear skull recorded with the Boone and Crockett system was 14.75 inches and the widest black bear skull was 8.875 inches.                                                                       Skull illustrations from Skulls and Bones by Glenn Searfoss Why aren't bears good hunters, when they are considered predators? Black bears are not efficient predators, primarily because their skeletons are designed for strength rather than speed. They have thick limbs, massive shoulders, and a short back. None of these attributes is expressly designed to increase speed. Instead, they provide the black bear with strength and power. In addition, the muscles are thick the entire length of the leg, rather than tapered towards the foot, like a cat's. A thicker muscle close to the hip and shoulder improves speed, while a thick muscle mass stretching the entire length of the leg is equivalent to trying to run with weights on your feet! Longer metapodials, or foot bones, also increase stride length and improve speed. Black bears have relatively short metapodials.  Muscles illustration from National Bowhunters Educ. Foundation Skeleton illustration from National Bowhunters Educ. Foundation Why are bears being poached for their gall bladders? Unfortunately for bears, they are the only species with a gall bladder that produces fairly large quantities of bile, or bile salts, an ingredient that has been used in traditional Asian medicines for as long as 3,000 years. It is reported to cure a number of ailments, including cirrhosis of the liver, high blood pressure, jaundice, diabetes, heart disease, fever, headache, hemorrhoids, severe burns, and tooth decay. It also is used in health care products such as shampoo, and as a food delicacy. While synthetic forms of UDCA (the active ingredient in bile that has been proven to have some medicinal qualities) are available, there is a tradition that indicates the cure must come from nature to be effective. Prices for bear gall bladders are astronomically high in some countries — in Japan, gall bladders can sell for $1500 to $4000 each. A bear gall bladder is approximately the size of a human thumb, and is virtually indistinguishable from the gall bladder of a cow or a pig in its dried, "fig-like" state. Fakes have flooded the market, leading some people to go to extraordinary lengths to obtain authentic gall bladders. This has led to an increase in poaching across North America and Russia. Having the bear killed before your eyes ensures that the gall bladder is the real thing.  Organs illustration from National Bowhunters Educ. Foundation Why don't bears have tails? Bears did have large tails, several million years ago! Since that time, the tail has been reduced to a small, furry flap of skin measuring only about 4.8 inches in length. There are many folktales, stories, and legends that attempt to explain why the bear lost its tail. The scientific theory is far less exciting. It is believed that the bear lost its tail through the process of evolution, because it really did not need it. While dogs and other animals use their tails as a means of communication, bears tend to "face things" head on. Their display behavior often involves facing forward, either on two feet or four, leaving the tail practically invisible, and thus useless. Evolution & Taxonomy Habitat & Home Range Population and Distribution
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9546616673469543}", 'metadata': "{'Content-Length': '19446', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JFNMNB3XWVJI5J5DUMPWKXZXUDES2KWO', 'WARC-Concurrent-To': '<urn:uuid:4907f104-77b3-46ea-9bbf-b31d129d7f7a>', 'WARC-Date': datetime.datetime(2014, 12, 22, 1, 58), 'WARC-IP-Address': '208.68.104.138', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:BNYTCS3MZEX4X7RWHGNPUBTMRJTNOZGF', 'WARC-Record-ID': '<urn:uuid:7e2b88e4-80b6-45ae-b75c-061dd731f400>', 'WARC-Target-URI': 'http://www.americanbear.org/anatomy.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e6b37def-57d5-4f44-adf4-e0e441e34427>', 'WARC-Truncated': None}", 'previous_word_count': '642', 'url': 'http://www.americanbear.org/anatomy.htm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.8354650735855103', 'original_id': '35844e28cea143772ac20c4b335a11c36e50fd5a50892904950bed0d28a76ab0'}
<!DOCTYPE html> <!--[if lt IE 9]><html class="no-js lt-ie9" lang="fr" dir="ltr"><![endif]--> <!--[if gt IE 8]><!--><html class="no-js" lang="fr" dir="ltr"><!--<![endif]--> <head> <meta charset="utf-8"> <!-- Web Experience Toolkit (WET) / Boîte à outils de l'expérience Web (BOEW) wet-boew.github.io/wet-boew/License-en.html / wet-boew.github.io/wet-boew/Licence-fr.html --> <title>Page de contenu - Canada.ca</title> <meta content="width=device-width,initial-scale=1" name="viewport"> <!-- Meta data --> <meta name="description" content="La Boîte à outils de l’expérience Web (BOEW) rassemble différents composants réutilisables et prêts-à-utiliser pour la conception et la mise à jour de sites Web innovateurs qui sont à la fois accessibles, conviviaux et interopérables. Tous ces composants réutilisables sont des logiciels libres mis à la disposition des ministères et des collectivités Web externes."> <!-- Meta data--> <!-- Load closure template scripts --> <script src="../compiled/soyutils.js"></script> <script src="../compiled/wet-fr.js"></script> <noscript> <!-- Write closure fall-back static file --> <!-- refTop.html --> </noscript> <!-- Write closure template --> <script> document.write(wet.builder.refTop("~refTop~")); </script> </head> <body vocab="http://schema.org/" typeof="WebPage"> <div id="def-top"> <!-- Write closure fall-back static file --> <!-- top-fr.html --> </div> <!-- Write closure template --> <script> var defTop = document.getElementById("def-top"); defTop.outerHTML = wet.builder.top("~top~"); </script> <main property="mainContentOfPage" typeof="WebPageElement" class="container"> <h1 property="name" id="wb-cont">Page de contenu</h1> <section> <h2>Quitter un site sécurisé</h2> <ul class="lst-spcd"> <li> Ce lien <a href="https://www.google.ca">https://www.google.ca</a> affichera un avertissement puisque son nom de domaine (google.ca) est différent du vôtre. Et il vous redigera sur la page <code>exiturl-fr.html</code> car le paramètre <code>exitURL</code> contient la valeur <code>exiturl-fr.html</code>. </li> <li> Ce lien <a target="_blank" href="https://www.google.ca">https://www.google.ca</a> s'ouvrira dans une autre fenêtre. Grâce au paramètre targetWarning, vous pouvez définir un message qui avertira les utilisateurs que le lien s'ouvrira dans une autre fenêtre. Ce message ajoutera le message d'affichage existant. </li> <li> Ce lien <a href="breadcrumbs-fr.html">breadcrumbs-fr.html</a> n'affichera pas un avertissement car son nom de domaine est le même que le vôtre. </li> <li> Ce lien <a href="https://google.com">https://google.com</a> n'affichera pas un avertissement car son nom de domaine (google.com) est dans la liste d'exception <code>exitDomains</code>. </li> </ul> </section> <div id="def-preFooter"> <!-- Write closure fall-back static file --> <!-- preFooter-fr.html --> </div> <!-- Write closure template --> <script> var defPreFooter = document.getElementById("def-preFooter"); defPreFooter.outerHTML = wet.builder.preFooter("~preFooter~"); </script> </main> <div id="def-footer"> <!-- Write closure fall-back static file --> <!-- footer-fr.html --> </div> <!-- Write closure template --> <script> var defFooter = document.getElementById("def-footer"); defFooter.outerHTML = wet.builder.footer("~footer~"); </script> <!-- Write closure template --> <script> document.write(wet.builder.refFooter("~refFooter~")); </script> <script> $( document ).on( "wb-ready.wb", function( event ) { $("#wb-cont").after('<a name="wetInitializedMarker" id="wetInitializedMarker"></a>'); }); </script> </body> </html>
the_stack
{'hexsha': '301694db6633876d5368d480ba03f8098ac71762', 'size': '3850', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'test/html/gcintranet/template-exitscript-fr.html', 'max_stars_repo_name': 'plup2/cdts-sgdc', 'max_stars_repo_head_hexsha': '7eb6ae020d172e4ff152de493878eddf0d6f4682', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '16', 'max_stars_repo_stars_event_min_datetime': '2020-01-16T20:22:09.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-02-03T14:51:35.000Z', 'max_issues_repo_path': 'test/html/gcintranet/template-exitscript-fr.html', 'max_issues_repo_name': 'nschonni/cdts-sgdc', 'max_issues_repo_head_hexsha': '0ca001beabb6fcf37cf6e2942f20afc4146e4a46', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '274', 'max_issues_repo_issues_event_min_datetime': '2020-01-16T19:58:22.000Z', 'max_issues_repo_issues_event_max_datetime': '2022-03-23T18:40:05.000Z', 'max_forks_repo_path': 'test/html/gcintranet/template-exitscript-fr.html', 'max_forks_repo_name': 'alex-fang0/cdts-sgdc', 'max_forks_repo_head_hexsha': 'a65754b37745c0cc3f8b861bf0ab90e7b2cb70ff', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '16', 'max_forks_repo_forks_event_min_datetime': '2020-01-16T20:27:50.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-03T15:32:45.000Z', 'avg_line_length': '45.2941176471', 'max_line_length': '403', 'alphanum_fraction': '0.6537662338', 'original_id': '37dd3d2b27bfdee33ed65c26b1e9f6e1bdbedcc6fa927afefba1c13052a56c46'}
Buy Tramadol Online Buy Ambien Online Buying Xanax Online - YourTramadolStore.Com Tag - Buying Xanax Online Buy Xanax Online to Solve the Issue of Anxiety Attacks Anxiety Attacks issues would need Xanax to get calmness Anxiety issues are quite prominent in many people. The reason for this problem is either some injury or some fear that has taken up the mind since childhood. Some normal anxiety is common and almost every person suffers from it. However, if the anxiety problems increases then it can cause major issues in the life of the person. The major issues can be related to mental problems and so it would require instant solution with the help of medication. They can buy Xanax 1mg online from the site so that they can survive the adverse effects of anxiety attacks issues without any problem in future. Solving Anxiety Attacks with Xanax Xanax is a tablet that will help in generating some chemicals in the brain. These chemicals are the ones that are responsible for curing the problem of anxiety. Anxiety attacks are a byproduct of the void of chemicals that is generated in the brain because of some mental issues. However, the tablet will generate the missing chemicals and provide the desired calmness but at the cost of some side effects. So, the person will have to make sure that they take a monitored dose of the tablet because it can also cause some side effects. Anxiety Attacks, Buy Xanax Online Some Side effects Not every person will suffer from side effects of Xanax. However, the person needs to stay prepared for the probable side effects by consulting a doctor in advance. The doctor will be able to solve the issue by monitoring the dose of the tablet. The probable dose of Xanax available in the market are 0.5 mg, 1 mg, 2 mg and 5 mg. The doses will help in solving the problem of side effects along with providing the desired relief to the body from anxiety attacks. Thus, you can buy Xanax online from the site to solve the issue of anxiety attacks. However, there would be some severe side effects and consulting the doctor will help in solving the issues and getting the instant relief from the attacks. Thus, the problem would be solved without hindering the day to day life of the person. Buying Xanax Online How can I buy Xanax online? Buying Xanax online is always a wise decision but a customer needs to see the authenticity of the website. A subscriber gets cheap medication online as compared to a offline pharmacy but since many fake online pharmacies are operating, a user needs to be vigilant. It’s not uncommon that people keep some amount of Xanax on hand to self-medicate for relaxation during stress. Many customers are turning to online pharmacies to procure the medicines. Xanax is heavily regulated and hence, it is not easy to buy the drug online from legitimate agencies. There are many risks linked to buying Xanax online from an illegitimate source. Always procure medication from a licensed online pharmacy that is experienced and authentic. Many genuine online pharmacies also offer a valid prescription following which the drug can be procured. Xanax or alprazolam  is a prescription sedative that is prescribed for the treatment of panic disorders or anxiety disorders. Buying Xanax Online Precautions that I need to take while buying Xanax online? You can buy Xanax from the authentic and legitimate online pharmacies based in US. These pharmacies has often offline stores attached to them and after booking the order, you can collect the delivery from the attached brick-and-mortar store. These sites will need a prescription from your doctor. These online pharmacies make a call to verify that the script is genuine and then only process your order. When you buy Xanax from these legal pharmacies, you’re confident about the efficacy and quality of the drug. Rogue and illegal pharmacies are everywhere online and buying medications from these sources is completely unsafe. What are the risks of buying Xanax online? The number of illegal online pharmacies continues to grow. Many of them disappear or resurface with a different identity. Financial gain is the only objective of these sites. A customer needs to be cautious in identifying such fake pharmacies. Buy Xanax Online without Prescription Xanax For Treating Anxiety Disorders:: Buy Xanax online without prescription If you are having issues with your health then probably you need to work on solving it. However, not health problems are related to food or drinks. Some problems might arise because of more physical or mental work. Many times, some problems create mental turmoil that affects mental health very badly. So, the person would end up having a whirlpool of thoughts that would not find a way to stop. Thus, these thoughts might create many issues for the people and that might lead to anxiety disorders. However, the best way to treat them is through therapy but if it does not work then they need to opt for medication. Mental health medications are quite dangerous and so the best would be Buy Xanax online without prescription. Significance of Xanax The major role of Xanax is to solve the problem of anxiety. The issue has many faces and it can arise because of numerous issues that the person faces in daily life. These issues might be personal or professional that affect the person greatly. So, they need to consume the tablet to calm their mind. The major role of the pill is to release a chemical that would help in controlling the thoughts in the mind and providing calmness. However, there are many side effects that the person needs to know before adopting it. Dosage and side effects The regular dose of the tablet starts from 1mg and can go up to 2mg. However, the person needs to start from the minimum dose and if it does not work then they can alter it. However, the lowest possible dose would affect the person to a greater extent. Moreover, if the person continues to use the dose then there are chances that they would become dependent on it. There are many side effects that come along the tablets and that includes problem-related to the digestive system. However, the other persistent and serious problems would include hypotension and sexual problems. So, the person needs to take the doctor’s advice before consuming it. The serious side effects often play an important role in hindering the progress of a person. So, the best they can do is order Xanax online from several sites that have the option of overnight delivery. So, in this way, you can get the tablets on time and without any issue of prescription. However, consulting a doctor is very important.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9600194096565248}", 'metadata': "{'Content-Length': '60910', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EYLISPZ3KPEPVQTA4SFSP4PCHB7OZTJW', 'WARC-Concurrent-To': '<urn:uuid:af90d84c-76ce-4c30-865f-9b13dd80a4e3>', 'WARC-Date': datetime.datetime(2021, 5, 16, 17, 53, 19), 'WARC-IP-Address': '172.67.137.221', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:PWWW6LGBB7DPJ3EOH6LDJSFWKILRNZLO', 'WARC-Record-ID': '<urn:uuid:de5a5fd9-3d14-4fcd-84e9-63ee1b6a668d>', 'WARC-Target-URI': 'http://yourtramadolstore.com/blog/tag/buying-xanax-online/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c852032e-977d-474b-aa03-9f42a3a0aefa>', 'WARC-Truncated': None}", 'previous_word_count': '1128', 'url': 'http://yourtramadolstore.com/blog/tag/buying-xanax-online/', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-223.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04295223951339722', 'original_id': '944f7e7bdf9aeac8591201f5190b72e64646387f47de2dd8fc32f5af3cbde10a'}
Tag Archives: LGBT Gay, Lesbian, Bi, and Transgendered: GLBTQ / LGBTQ / GLBT / LGBT Catholic Church “donates” $500K to restrict gay rights Oh good, another reason for me to hate Catholicism (and Christianity in general): Ah yes, Christian charitable giving. Warms the cockles of the heart. Does anyone care to explain why Catholics think preventing gay couples from happy commitment is worth half a million dollars? I’ll take a stab at it: Because the Catholics are all about creating guilt for, and instilling control over, the sexual and reproductive nature of, well, everyone. Their dogma is that sex (which they define to include masturbation and oral sex) is only appropriate for married couples attempting to procreate. Gay sex — indeed, homosexuality itself — is a direct challenge to that idea; for if God made men who have sex with men, procreation can hardly be the only purpose of sex, can it? And then where will the Catholic babies come from, if Catholic couples no longer fear damnation if they use birth control?
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '30', 'language_id_whole_page_fasttext': "{'en': 0.9164367914199828}", 'metadata': "{'Content-Length': '27422', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VQUZVWSAYEJ7PKPQDFBUORURG4JTIC3O', 'WARC-Concurrent-To': '<urn:uuid:ad7865ea-dabc-4fd0-82f4-1d4d1eaec7df>', 'WARC-Date': datetime.datetime(2017, 3, 25, 13, 27, 43), 'WARC-IP-Address': '173.236.168.196', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:CW46E3F3DQG7VBVATBZNBHTQPQL7MOG5', 'WARC-Record-ID': '<urn:uuid:bd07c58a-052a-40bb-8769-59abdf3086ec>', 'WARC-Target-URI': 'https://wegoats.com/tags/lgbt/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f35ac197-d6fd-455b-bee1-f0ee20b387ee>', 'WARC-Truncated': 'length'}", 'previous_word_count': '193', 'url': 'https://wegoats.com/tags/lgbt/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03970831632614136', 'original_id': '84815e60177f2b59963d351bd5e2a6611faa6eaec38d9f98b2760670d848dae6'}
\section{Product Space is T3 iff Factor Spaces are T3/Factor Spaces are T3 implies Product Space is T3} Tags: T3 Spaces, Product Space is T3 iff Factor Spaces are T3, Product Spaces \begin{theorem} Let $\mathbb S = \family {\struct {S_\alpha, \tau_\alpha} }_{\alpha \mathop \in I}$ be an indexed family of non-empty topological spaces for $\alpha$ in some indexing set $I$. Let $\ds T = \struct{S, \tau} = \ds \prod_{\alpha \mathop \in I} \struct {S_\alpha, \tau_\alpha}$ be the product space of $\mathbb S$. For each $\alpha \in I$, let $\struct {S_\alpha, \tau_\alpha}$ be a $T_3$ space. Then $T$ is a $T_3$ space. \end{theorem} \begin{proof} Let $U$ be open in $T$ and $x \in U$. From Natural Basis of Product Topology, there exists $\ds U' = \prod_{\alpha \mathop \in I} U'_\alpha$ such that: :for all $\alpha \in I : U_\alpha \in \tau_\alpha$ :$J = \set {\alpha \in I: U_\alpha \ne X_\alpha}$ is finite :$x \in U'$ :$U' \subseteq U$ By definition of a $T_3$ space, for all $\alpha \in J$: :$\exists V_\alpha \in \tau_\alpha : x_\alpha \in V_\alpha$ and $V^-_\alpha \subseteq U'_\alpha$ For $\alpha \notin J$ let: :$V_\alpha = X_\alpha$ and let: :$\ds V = \prod_{\alpha \mathop \in I} V_\alpha$ By definition of the Cartesian product V: :$x \in V$ From Natural Basis of Product Topology: :$V$ open in $T$. Now consider the Cartesian product of closed sets: :$\ds \prod_{\alpha \mathop \in I} V^-_\alpha$ From Product of Closed Sets is Closed, $\ds \prod_{\alpha \mathop \in I} V^-_\alpha$ is closed. From Underlying Set of Topological Space is Closed, for $\alpha \notin J$: :$V^-_\alpha = X^-_\alpha = X_\alpha$ From Cartesian Product of Family of Subsets, it follows that: :$\ds V = \prod_{\alpha \mathop \in I} V_\alpha \subseteq \prod_{\alpha \mathop \in I} V^-_\alpha \subseteq \prod_{\alpha \mathop \in I} U'_\alpha \subseteq U$ It follows that $T$ is a $T_3$ space by definition. {{qed}} Category:Product Space is T3 iff Factor Spaces are T3 \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '542565c78cc53b72787526552f51f818ad72363da11e8171a859a3e223fcf529'}
Compare Listings Perfect for those needing sheds…. Sold 45 Gibson Rd, Warragul VIC 3820, Australia $650,000 Sold Description An exceptional opportunity for a lifestyle property in this highly sought-after area, offering privacy on 1.4 acres (approx.), just 5 minutes from Warragul CBD. This four bedroom north facing brick veneer home, has heaps of shedding! The home includes lounge room with wood heater, central kitchen with adjoining dining and family area. Master bedroom with WIR and ensuite, the other three bedrooms comprise of BIR’s and are located near the main bathroom. Other features include gas wall heater, split system, front and back Veranda, double garage, a two-car shed with workshop and 5 bay shed/workshop. Private inspection by appointment.
mini_pile
{'original_id': '69c38c2c49d8732bd445395645002e14c628d4c5af6f1304a40daae9f10aa412'}
2006 New York Code - Usurious Contracts Void. § 5-511. Usurious contracts void. 1. All bonds, bills, notes, assurances, conveyances, all other contracts or securities whatsoever, except bottomry and respondentia bonds and contracts, and all deposits of goods or other things whatsoever, whereupon or whereby there shall be reserved or taken, or secured or agreed to be reserved or taken, any greater sum, or greater value, for the loan or forbearance of any money, goods or other things in action, than is prescribed in section 5-501, shall be void, except that the knowingly taking, receiving, reserving or charging such a greater sum or greater value by a savings bank, a savings and loan association or a federal savings and loan association shall only be held and adjudged a forfeiture of the entire interest which the loan or obligation carries with it or which has been agreed to be paid thereon. If a greater sum or greater value has been paid, the person paying the same or his legal representative may recover from the savings bank, the savings and loan association or the federal savings and loan association twice the entire amount of the interest thus paid. 2. Except as provided in subdivision one, whenever it shall satisfactorily appear by the admissions of the defendant, or by proof, that any bond, bill, note, assurance, pledge, conveyance, contract, security or any evidence of debt, has been taken or received in violation of the foregoing provisions, the court shall declare the same to be void, and enjoin any prosecution thereon, and order the same to be surrendered and cancelled.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '46', 'language_id_whole_page_fasttext': "{'en': 0.9243719577789308}", 'metadata': "{'Content-Length': '14632', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TYY3R2TONDAQY3BBMAGHPCXJ2EEMQ7AI', 'WARC-Concurrent-To': '<urn:uuid:b1f6fef1-8d99-4596-b709-eb2e9d3be178>', 'WARC-Date': datetime.datetime(2013, 12, 13, 13, 8, 9), 'WARC-IP-Address': '50.17.254.73', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:MWGGW6B4LPDDBL7JUDIJZ3UEV52Q2J3G', 'WARC-Record-ID': '<urn:uuid:8add961e-6608-438f-b61c-2a7a3ef6f363>', 'WARC-Target-URI': 'http://law.justia.com/codes/new-york/2006/general-obligations/gob05-511_5-511.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5b518f9c-ef18-4600-9142-b7874f1a1793>', 'WARC-Truncated': None}", 'previous_word_count': '315', 'url': 'http://law.justia.com/codes/new-york/2006/general-obligations/gob05-511_5-511.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.7385587692260742', 'original_id': '6d35bf3744ec8a63186209c7c4a0cba8ee9656a60e732629b9e006975b6fb98f'}
The invention relates to a feeder insert for use in a mold utilized during pouring of metals, with a feeder body made of an exothermic and/or insulating material and having a feed volume, whereby the feed body is provided with an inner space, as the feed volume, delimited by side walls and a top portion, and in the base region of the feeder body a feed opening is formed as a communication to the hollow mold space. A feeder insert having the aforementioned features is described in DE 196 42 838 A1. The feeder body, which has a closed inner space in its top portion, as a feed volume, can be placed, during the molding, upon the mold surface of the mold. During the molding of the feeder insert, the problem exists that the molding pressure, which acts upon the mold sand, and hence also upon the feeder body, can lead to damage of the feeder body. To eliminate this problem, the company Chemex GmbH Has proposed and used a feeder insert, designated “telescopic feeder”, according to which the feeder body is comprised of two components that are displaceable relative to one another and together form the feed volume. In this connection, the lower portion of the feeder body, which can be placed upon the mold surface, is open at the top and is spanned from above by a second, bell-shaped part of the feeder body, whereby when molding pressure occurs the parts are pushed into one another and for this purpose the outer diameter of the lower part, and the inner diameter of the upper, bell-shaped part, must be coordinated with one another in an exactly fitting manner. The feeder insert, which has become known through use, has the drawback that the fines or rubbed-off material that results when the upper and lower parts of the feeder inserts are pushed into one another can fall into the feed volume and when the mold is poured off can come into contact with the liquid metal, so that impurities in the molten metal can result. A further drawback is that the exact size of the feed volume of the molded feeder insert defined by the two parts of the feeder insert is determined by the extent to which the upper and lower parts of the feeder insert are pushed into one another, so that no reliable statement about the size of the feed volume of the molded feeder insert can be made. This makes the design of the insert, and the selection of the size of the necessary feeder insert, difficult. It is therefore an object of the present invention to improve a feeder insert having the aforementioned features in such a way that despite maintaining a uniform, closed feed volume in the interior of the feeder insert, protection of the feeder insert against the effect of molding pressure is provided.
mini_pile
{'original_id': '413e32d212ca51b7295480620a691b7d368e21b00c0e696bd58be893ded9bfd5'}
5 tips on how to start a successful editing career So you want your new editing career to be successful? Having such a mindset is salutary. You can succeed as a dissertation editor or whichever niche you choose, even if you think it’s already saturated. But know that being saturated does not count that much. What matters most is your approach and creativity. You also need to do things differently to earn what others aren’t. If you can get it right from the very start, you will enjoy the freedom that the work from home jobs offers, and also can take care of your bills. Here are essential tips that can help give your editing career a great start. Image result for career 1. Get ready to learn new things Editing or proofreading, as you know it, is not all about correcting grammar and spelling mistakes. Some specific niches or projects will require you to use terms and terminologies peculiar to it. So, for you to succeed or make an impact in your editing career, you must be ready to learn and develop your vocabulary and knowledge in your preferred niche. Practice makes perfect. So, whenever you don’t have a project at hand, get articles in your area of interest, read, look at for mistakes and see how you can improve them also. Study the writing style, terminologies and every other aspect you feel will help you succeed in your career. But never give up the desire to practice consistently. 2. Pick your niche wisely As a beginner, you may want to use generic terms like “editing and proofreading” services so that clients can find you easily. But the result might not be pleasing. Instead of generalizing, choose a specific niche or area like “dissertation editing,” “children book editor,” “essay editor” and any other area you are good at. However, you will start having more projects when people know you are an expert in your niche. But you must prove that you are an expert in the quality of your output. If you are skilled in your niche, clients will keep coming back. They may also refer others to you. And according to my essay writing professionals, choosing a specific editing niche can help to reduce competition too. 3. Make your rates attractive As a beginner, your primary focus should not be on making more money. You should be more concerned about building your reputation and gaining more experience. And the more tasks you complete, the more exposure you will have regarding the needs of clients and the demands of different projects. However, your experiences will help you in fixing your rates and also know what the prices of some special projects should be. But as a beginner, ensure your rate is encouraging. Check what your close competitors are charging and make yours a little lower. You should also charge per word count. For instance, set range at $0.02 or more per word. 4. Create a website Before you start your editing career journey, the first thing you need to do is to create a website. Having a personal website will help clients find you with ease. It will also enable you to showcase your work. Write and upload SEO-friendly articles that will generate organic traffic to your blog. In other words, use keywords that potential clients might use whenever they are looking for a professional editor online. 5. Advertise your business In the past, advertising used to be a scary word because of the financial implication. But now, there are many cost-effective ways you can advertise your business. You can use social media, email newsletter and blog commenting to let people know what you do. Platforms like Fiverr, Upwork and many others, allow users to create and share their profile details on various social media channels. So you can join them to bid for jobs. The ratings you are going to receiving on these platforms will also boost your reputation. It doesn’t matter if you are starting your editing career today. You can become successful and make enough money to take care of your financial needs. But you need to follow the right path and create a good foundation for your business. If everything is right, you might achieve tremendous results in no time. Leave a Reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9532918930053712}", 'metadata': "{'Content-Length': '46792', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AZPQXZJ4Y6TZDG7NS4FBJ5J2KAXUWVD4', 'WARC-Concurrent-To': '<urn:uuid:7f7121e7-ffc4-4f85-976b-87bc0b21afed>', 'WARC-Date': datetime.datetime(2020, 5, 25, 0, 24, 27), 'WARC-IP-Address': '104.27.154.206', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:HDEFCLFPS6AIUGLWEOQV3PTFHOAGU7HQ', 'WARC-Record-ID': '<urn:uuid:01361ba5-1cdf-4aa6-bd77-ce74220a7829>', 'WARC-Target-URI': 'https://folkfests.org/5-tips-on-how-to-start-a-successful-editing-career/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6b5e3ff0-86b5-4260-997c-c77019260e4d>', 'WARC-Truncated': None}", 'previous_word_count': '725', 'url': 'https://folkfests.org/5-tips-on-how-to-start-a-successful-editing-career/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-253.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0227699875831604', 'original_id': 'bf627ec404a6c49610b20b760ebe8a9b676bd5ac58263b6b0d1393f21cfa5f62'}
Belum pernah dengar tentang Kota Pinrang? Kota Pinrang adalah salah satu kota yang ada di Sulawesi Selatan. Walaupun termasuk kota...
mini_pile
{'original_id': 'f8db928032f4dca162c10aecfd1d2173e22cd0f68b37c213f4334b54d7e38516'}