Datasets:

text
stringlengths
130
541k
id
stringlengths
47
47
date
stringdate
2013-05-18 04:54:19
2013-06-20 13:35:46
dump
stringclasses
1 value
embeddings
listlengths
1
351
file_path
stringclasses
916 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
30
166k
url
stringlengths
14
835
quality_score
float64
0.16
1
The disciples of communism claim that their ideological system is the cure for colonialism and imperialism. All the proletariats (working-class people) of the world, according to the prescriptions of Marx, are brothers. However, analysts observe that communism scarcely worked that way even in theory. Marx was a German nationalist who called for the extermination of Croats, Pandurs, and “similar scum.” He sneered at Danish culture as purely copied from Germany and rejoiced at the Prussia victory over France in 1871 because it would lead to the triumph of German, rather than French, socialism. He loathed Judaism and Jewish society, as well as Christians. The Bolshevik junta in late 1918, followed four years later by the formation of the Union of Soviet Socialist Republics (USSR), presented itself to the world as anti-colonialist and anti-imperialist. Click here to read the entire article. Photo: Karl Marx
<urn:uuid:a6018e03-40f6-40ea-80e4-4f94be0cc279>
2013-05-23T18:45:01Z
CC-MAIN-2013-20
[ [ -0.006292420905083418, 0.014210972934961319, 0.015342194586992264, 0.02757352963089943, 0.041289594024419785, -0.0882352963089943, -0.03125, 0.10690045356750488, -0.041289594024419785, -0.05486425384879112, 0.028563348576426506, 0.016685521230101585, -0.02927036...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968683
194
http://www.jbs.org/terrorism/colonial-oppression-communist-style
0.86838
Kwame Kilpatrick, the former mayor of Detroit, was convicted on federal corruption charges Monday, according to NBC News. Kilpatrick was found guilty of 24 criminal counts by a jury. They include extortion, racketeering, and bribery. The count of racketeering carries a maximum sentence of 20 years in prison alone. According to prosecutors, Kilpatrick gave friend and contractor Bobby Ferguson $83 million in city work. In return, Kilpatrick was given hundreds of thousands of dollars in kickbacks. Ferguson and Kilpatrick’s father were also found guilty by the jury on Monday. During testimony, a fundraiser said that she gave Kilpatrick a personal cut of his political donations totaling $200,000 and pulled money out of her bra during private meetings with the mayor. In 2008, the former mayor pled guilty to obstruction of justice for lying during a civil trial. The trial involved his affair with former chief of staff and then plotting with her to fire the deputy police chief. He resigned his post and subsequently spent three months in prison. He then violated probation, which sent him to jail for over a year. Kilpatrick was found not guilty on three charges and the jury could not reach a verdict on another three charges. Dave Bing, the current mayor of Detroit said in a statement that, “we can finally put this negative chapter in Detroit’s history behind us.” Ferguson was convicted of racketeering and Kilpatrick’s dad, Bernard, was convicted of submitting a false tax return.
<urn:uuid:c20e2c0f-a72c-4692-8fe3-36570ff40999>
2013-05-23T19:05:38Z
CC-MAIN-2013-20
[ [ -0.03757122531533241, 0.021011395379900932, -0.013532763347029686, -0.0021033654920756817, 0.08440171182155609, 0.0019920761696994305, -0.0020588496699929237, 0.06517094373703003, -0.04540598392486572, -0.014957264997065067, 0.09686609357595444, 0.021189458668231964...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986632
310
http://www.jdjournal.com/2013/03/11/former-detroit-mayor-convicted-of-racketeering-and-other-charges/
0.689229
Canada has implemented new economic sanctions measures targeting activities involving certain “politically exposed foreign persons”. The measures prohibit dealing directly or indirectly in any property of such persons, entering into or facilitating a related financial transaction, and providing financial services or other related services in respect of such property. The Freezing Assets of Corrupt Foreign Officials (Tunisia and Egypt) Regulations provide for specific measures to be taken against former Tunisian and Egyptian leaders and senior officials, and their associates and family members, suspected of misappropriating state funds or obtaining property inappropriately. Persons in Canada and Canadians outside Canada are subject to broad prohibitions and other requirements concerning the property of politically exposed foreign persons. All companies doing business internationally should be reviewing and revising their sanctions compliance policies, including their screening lists, to reflect these new obligations under Canadian law. The Freezing Assets of Corrupt Foreign Officials Act The Freezing Assets of Corrupt Foreign Officials Act (“FACFOA”) provides the Canadian government with the authority to freeze the assets or restrain the property of politically exposed foreign persons at the written request of a foreign state, where it has been determined that the foreign state is in a state of turmoil or political uncertainty, and where the making of such an order or regulation is in the interest of international relations. “Politically exposed foreign persons” are defined to mean persons who hold or have held certain identified offices or positions in or on behalf of a foreign state. They can include heads of state, members of legislatures, deputy ministers, ambassadors, military officers, presidents of state owned companies or banks, heads of government agencies, judges, or political party leaders. They can also include any person who, for personal or business reasons, is or was closely associated with such persons, including family members. The FACFOA provides that wilful contravention of its provisions or an order or regulation made pursuant to it is a summary conviction or indictable offence that is punishable with imprisonment for up to five years and/or a fine of up to $25,000. Measures Targeting Tunisia and Egypt On March 23, 2011, the Freezing Asset of Corrupt Foreign Officials (Tunisia and Egypt) Regulations came into force. They specifically target dealings involving former leaders of Tunisia and Egypt, including family members and associates, listed by name in Schedules 1 and 2 to the Regulations. The Regulations specifically prohibit persons in Canada from engaging in the following activities: (i) dealing, directly or indirectly, in property, wherever situated, of a listed person; (ii) entering into or facilitating, directly or indirectly, any financial transaction related to such a dealing; or (iii) providing financial services or other related services in respect of any property of a listed person. Other Key Elements Other key elements of the new sanctions against politically exposed foreign persons include the following: (i) Duty to Report – persons in Canada and Canadians outside Canada must, without delay, disclose to the Royal Canadian Mounted Police (a) the existence of property in their possession or control that they have reason to believe is the property of any listed politically exposed foreign person and (b) information about a transaction or a proposed transaction in respect of such property; (ii) Duty To Determine – financial institutions have a specific obligation to determine on a continuing basis whether they are in possession or control of property that they have reason to believe is property of listed politically exposed foreign persons; (iii) Relief from Civil Liability – provided one acts reasonably in taking or omitting to take measures to comply with an FACFOA order or regulation, one will not be held liable in any civil action if all reasonable steps to satisfy oneself that the property was property that is subject to the order or regulation were taken; (iv) Permits – Canada’s Minister of Foreign Affairs may issue permits allowing for certain activities or transactions, or classes of activities or transactions, to proceed that would otherwise be prohibited; and (v) Duration – orders or regulations issued in respect of politically exposed foreign persons cease to have effect after five years, although this period may be extended more than once. Canadian firms, especially financial institutions, should be carefully reviewing these new measures to ensure that they are in full compliance with the rules governing dealings involving politically exposed foreign persons. At a minimum, this should include a thorough review of existing business activity as well as ongoing screening of future transactions to identify any potential compliance issues. Canada’s Economic Sanctions At the present time, in addition to these new measures regarding politically exposed foreign persons, Canada currently imposes economic sanctions of varying degrees on activities involving any of the following countries: Belarus, Burma, Côte d'Ivoire, Democratic Republic of the Congo, Cuba, Eritrea, Iran, Iraq, Lebanon, Liberia, Libya, North Korea, Pakistan, Sierra Leone, Somalia, Sudan, Syria, and Zimbabwe. McCarthy Tétrault’s International Trade and Investment Law Group has extensive experience in dealing with these measures and is available to advise on related enforcement, compliance and strategic planning issues.
<urn:uuid:107283e4-b9f7-4af8-9403-5a84975acb86>
2013-05-23T18:32:05Z
CC-MAIN-2013-20
[ [ -0.041015625, 0.044189453125, -0.0067138671875, 0.00628662109375, 0.11376953125, -0.0595703125, -0.026611328125, 0.11865234375, -0.0155029296875, -0.044189453125, 0.095703125, 0.0223388671875, -0.0791015625, -0.007080078125, 0.04833984375, 0.00653076...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944975
1,048
http://www.jdsupra.com/legalnews/new-sanctions-measures-prohibit-dealings-14684/
0.165628
EPHRAIM SOLOMON BEN AARON OF LENCZIZA: Rabbi and popular preacher at Prague; born probably at Lencziza, Poland; died at Prague March 3, 1619. After having filled the office of rosh yeshibah at Lemberg, he was appointed in 1604 rabbi of Prague, and remained in this position until 1618. Ephraim was the author of the following works: "'Ir Gibborim," in three parts, the first, entitled "Petiḥot u-Shẹ'arim," containing a rhetorical introduction and an ethical treatise, and the second and the third being homilies on the Pentateuch, Basel, 1580; "'Olelot Efrayim," ethical sermons based upon Bible and Talmud, in four parts, Lublin, 1590; "Keli Yeḳar," annotations on the Pentateuch, ib. 1602; "Sifte Da'at," forming the second part of the preceding work and containing homilies on the Pentateuch, Prague, 1610; "Oraḥ le-Ḥayyim," two ethical sermons, one for the Sabbath between New-Year and the Day of Atonement ("Shabbat Teshubah"), and the other for Passover, Lublin, 1595; "'Ammude Shesh," sermons, Prague, 1617; "Ribebot Efrayim," homilies on the Pentateuch (mentioned in the introduction to his work "Oraḥ le-Ḥayyim"). Ephraim was also the author of three liturgical poems celebrating Adar 2 (Feb. 15), 1611, on which date a hostile army that had entered Prague was defeated. - Moritz Grünwald, Rabbi Salomo Efraim Luntschitz, Prague, 1892; - Zunz, Literaturgesch. p. 421; - Steinschneider, Cat. Bodl. col. 904; - Zedner, Cat. Hebr. Books Brit. Mus. p. 240; - Michael, Or ha-Ḥayyim, No. 501.
<urn:uuid:0a2f11ff-76f2-4721-a4aa-b1fc7365e70c>
2013-05-23T18:58:41Z
CC-MAIN-2013-20
[ [ 0.014880952425301075, 0.00734342634677887, -0.018245341256260872, -0.02342132478952408, 0.0838509351015091, -0.014363354071974754, -0.008475672453641891, 0.09109731018543243, -0.01507505215704441, -0.03442028909921646, 0.031573500484228134, 0.03467908874154091, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945693
478
http://www.jewishencyclopedia.com/articles/5807-ephraim-solomon-ben-aaron-of-lencziza
0.252864
1291 May 18, ACRE (Eretz Israel) After a two month siege, the fortress fell to the Mameluke (see 1250) Egyptians under Al-Ashraf Khalil(1262-1293). Any inhabitants Christian or Jews who did not succeed in fleeing were killed. To all intents and purposes the Crusades were at an end. The various crusading armies never succeeded in uniting as a cohesive force. They were defeated as much by infighting and separate treaties as by the Fatimid armies.
<urn:uuid:a0eb140d-6e0f-4d07-940d-55fae839f0fe>
2013-05-23T19:05:13Z
CC-MAIN-2013-20
[ [ 0.0101318359375, 0.0125732421875, -0.0126953125, 0.003753662109375, 0.09716796875, -0.0322265625, -0.055908203125, 0.10546875, 0.0078125, -0.060546875, 0.056396484375, 0.0125732421875, -0.10302734375, 0.0634765625, 0.0361328125, 0.03369140625, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.984809
110
http://www.jewishhistory.org.il/history.php?id=3598
0.356655
Max Moussazadeh, a convicted murderer, has won the right to have kosher food provided to him. The U.S. 5th Circuit Court of Appeals reversed the lower court’s ruling which found that Moussazadeh’s request for kosher food was “insincere,” and instead ruled that to deny him kosher food would constitute an infringement on his religious beliefs. Moussazadeh was convicted and sentenced to 75 years in prison for his part in the fatal shooting of a Texas man in 1993. The victim was shot to death by three of Moussazadeh’s accomplices, while he served as the lookout during a robbery in Houston. Although Moussazadeh was incarcerated at a prison in Rosharon, Texas, which had a “kosher kitchen,” he was later transferred to another facility where kosher products were available for purchase, but which did not provide free kosher meals for its inmates. In his original legal filing on July 15, 2005, Moussazadeh complained that he was “forced to eat non kosher foods” and asked that he be “allowed to receive kosher meals because it is part of [his] religious duty.” He claimed that he was born and raised Jewish, and that his family kept a kosher household. He also claimed that his faith required him to “eat kosher foods,” and not being able to do so forced him to violate his religious beliefs, for which he believed “God would punish” him. The lower court had rejected Moussazadeh’s request at least in part because it found that his religious beliefs were not sincere, but the Court of Appeals found that, In addressing whether Moussazadeh’s religious beliefs were sincere, the district court looked to his words and actions but incorrectly concluded that those factors established insincerity ‘as a matter of law. ’ The court decided that Moussezadeh was insincere based on a combination of three findings. First it found that he purchased “nonkosher” food items including cookies, soft drinks, coffee, tuna, and candy. The Court rebuked the lower court for failing to understand that there is a difference between food certified as kosher and food that is not certified as such. In its opinion, the Court of Appeals found that the lower court incorrectly “concluded that items that were not certified as kosher were per se not kosher, but, as Moussazadeh and amicus curaie relate, a certificate does not render food kosher or nonkosher.” As a matter of American law, “Individuals may practice their religion in any way they see fit, and ‘it is not for the Court to say it is an unreasonable one.’” Most state prisons and the federal government provide a kosher diet to all observant inmates, while Texas remains one of only 15 states that do not. According to The Becket Fund for Religious Liberty, which was co-counsel for this case with Latham & Watkins, “the cost of feeding all observant Jewish inmates in its prison system would be less than 0.02% of its annual food budget.” “If thirty-five states and the federal government can provide kosher diets to all of their observant Jewish inmates, there is no reason Texas cannot do the same,” said Luke Goodrich, Deputy General Counsel of the Becket Fund. The case was sent back to the lower court to determine whether there was an alternative way of providing Moussazadeh with kosher food which was less expensive and addressed any security issues. About the Author: Lori Lowenthal Marcus is the US correspondent for The Jewish Press. She is a recovered lawyer who previously practiced First Amendment law and taught in Philadelphia-area graduate and law schools. You might also be interested in: You must log in to post a comment.
<urn:uuid:69191b4c-720b-4f36-8151-61598eaf8ec8>
2013-05-23T18:53:07Z
CC-MAIN-2013-20
[ [ -0.04150390625, 0.0162353515625, -0.0028076171875, -0.0230712890625, 0.10302734375, -0.039794921875, -0.014892578125, 0.107421875, -0.0294189453125, -0.03271484375, 0.08447265625, 0.0301513671875, -0.07861328125, -0.01080322265625, 0.0380859375, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.987534
825
http://www.jewishpress.com/news/even-convicted-murderers-entitled-to-kosher-food/2013/01/02/comment-page-1/
0.866845
Jewish World Review Dec. 3, 2010 / 26 Kislev, 5771 Being Jewish at Christmastime By Greg Crosby Question: "I am a Jewish woman living in a predominantly Christian part of Florida. I am tired of people wishing me a Merry Christmas. My usual response to people I don't know well is, "Yeah, you too." If it's someone I see often -- like my hair stylist -- I usually tell them around November that our family is Jewish and we are looking forward to celebrating Hanukkah. How should Jews respond to "Merry Christmas" greetings?" Answer: Dear Judy, Thank you for your question. It is a question, I think, that almost every North American Jew has asked of themselves at some point: How do I respond when someone wishes me a "Merry Christmas"? Like you, I live in a part of the world where Jews are a small minority. To make matters worse, I have two young children, so I also have to deal with well-meaning strangers who ask my kids, "What is Santa bringing you for Christmas?" You can imagine the strange looks when I have to explain, politely, that our children do not celebrate Christmas and Santa does not visit our house. My advice is to be polite, but persistent, in telling people that you do not celebrate Christmas. When Jews and other non-Christians acquiesce to "Merry Christmas" greetings with responses like, "You, too," or just nervous smiles, we only perpetuate the idea that Christmas is for everyone. I am always amazed when people who know full well that I am Jewish ask me and my children questions like, "How does your family celebrate Christmas?", "Do you have a tree?" and "Don't you give presents on Christmas day?" It is not that people intend to dismiss the integrity of Judaism as a distinct religion; they just have internalized the assumption that, in America, everyone celebrates Christmas. What do you say when well-wishers wish you a "merry Christmas"? My answer is, "Thank you, but I don't celebrate Christmas. Let me wish you the best on your holiday." It's worth taking the time to get the point across. What about Hanukkah? I avoid saying, "We celebrate Hanukkah," as a response to Christmas greetings. Even more than I want to tell people that Christmas is not for everyone, I want to insist that Hanukkah is not the "Jewish Christmas." Hanukkah is a minor holiday. It is a time for Jewish families to spend a little extra time together on the darkest evenings of the year, to watch candles flicker, and to consider the presence of miracles in our lives. Hanukkah is best when it is kept small. It may sound strange to hear a rabbi say it, but I don't really want strangers to wish me a "happy Hanukkah," either -- especially if they think that it's just the way to wish a Jew a merry Christmas! I hope that this is helpful. Rabbi Jeffrey W. Goldwasser Writer, actor and political /social commentator Ben Stein, had a different take on the question back in December of 2005 on the CBS Sunday Morning show. His commentary has been repeated and sent worldwide on the internet ever since. He said the following: "Herewith at this happy time of year, a few confessions from my beating heart: I have no freaking clue who Nick and Jessica are. I see them on the cover of People and Us constantly when I am buying my dog biscuits and kitty litter. I often ask the checkers at the grocery stores. They never know who Nick and Jessica are either. Who are they? Will it change my life if I know who they are and why they have broken up? Why are they so important? I don't know who Lindsay Lohan is, either, and I do not care at all about Tom Cruise's wife. Am I going to be called before a Senate committee and asked if I am a subversive? Maybe, but I just have no clue who Nick and Jessica are. Is this what it means to be no longer young. It's not so bad. Next confession: I am a Jew, and every single one of my ancestors was Jewish. And it does not bother me even a little bit when people call those beautiful lit up, bejeweled trees Christmas trees. I don't feel threatened. I don't feel discriminated against. That's what they are: Christmas trees. It doesn't bother me a bit when people say, "Merry Christmas" to me. I don't think they are slighting me or getting ready to put me in a ghetto. In fact, I kind of like it. It shows that we are all brothers and sisters celebrating this happy time of year. It doesn't bother me at all that there is a manger scene on display at a key intersection near my beach house in Malibu. If people want a crèche, it's just as fine with me as is the Menorah a few hundred yards away. I don't like getting pushed around for being a Jew and I don't think Christians like getting pushed around for being Christians. I think people who believe in G0d are sick and tired of getting pushed around, period. I have no idea where the concept came from that America is an explicitly atheist country. I can't find it in the Constitution and I don't like it being shoved down my throat. Or maybe I can put it another way: where did the idea come from that we should worship Nick and Jessica and we aren't allowed to worship G0d as we understand Him? I guess that's a sign that I'm getting old, too. But there are a lot of us who are wondering where Nick and Jessica came from and where the America we knew went to." Throughout the 20th Century American Jewish writers, artists, and song writers have contributed to a lot of what we've come to think of as the American Christmas culture, along with American Jewish movie moguls, advertising men, retailers and toy manufacturers. It may sound laughable, but many claim that the best Christmas movies and Christmas songs of the last century were written by Jewish guys. I think it is altogether possible to be Jewish and to enjoy the American Christmas season with our fellow Americans. I'm not for "Jews for Jesus" or embracing the Christian religion in any way, shape, or form. We need to be true to our own religion. But one doesn't have to be a Christian to grasp the spirit of Christmas, to participate in the virtues of charity, faith, goodwill and love. Those values are as much Jewish as they are Christian. All of us Americans, Jews and gentiles, can and should come together as a nation at this happy, warm time of year. How could it hurt? Every weekday JewishWorldReview.com publishes what many in the media and Washington consider "must-reading". Sign up for the daily JWR update. It's free. Just click here. © 2008, Greg Crosby
<urn:uuid:669142ac-b26c-4755-b106-f3a7f25727ec>
2013-05-23T18:51:42Z
CC-MAIN-2013-20
[ [ -0.0281982421875, 0.00921630859375, -0.000789642333984375, 0.0040283203125, 0.0849609375, -0.0120849609375, -0.00201416015625, 0.10107421875, -0.031494140625, -0.052001953125, 0.08154296875, 0.0140380859375, -0.01531982421875, -0.018310546875, 0.05200195...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970518
1,463
http://www.jewishworldreview.com/cols/crosby120310.php3
0.597149
At 8:30 a.m. Pacific time today, NASA's 2001 Mars Odyssey spacecraft passed the halfway point on its journey to Mars. It has been 100 days since Odyssey's launch and 100 days remain until it arrives at the red planet. "Odyssey is now closer to Mars than Earth. The spacecraft is healthy and all systems are looking good," said David A. Spencer, the Odyssey mission manager at NASA's Jet Propulsion Laboratory. "Planning for Mars approach and orbit insertion in October is our primary focus right now." The navigation team reports the spacecraft is right on course. To date, the Deep Space Network has taken 11 separate measurements using the so-called delta differential one-way range measurement, a technique that uses two ground stations to determine the angular position of the spacecraft relative to the known position of a quasar. The measurements provide the navigation team with an additional source of information, adding confidence to their estimates of the Odyssey flight path. Today, Odyssey is 45.8 million kilometers (about 28.5 million miles) from Earth and 30 million kilometers (about 19 million miles) from Mars, traveling at a velocity of 26 kilometers per second (58,000 miles per hour) relative to the Sun. The Mars Odyssey mission is managed by JPL for NASA's Office of Space Science, Washington, D.C. JPL is a division of the California Institute of Technology in Pasadena. The Odyssey spacecraft was built by Lockheed Martin Astronautics, Denver.
<urn:uuid:e8842b27-980b-4eb5-8d6c-ae4d6e377dae>
2013-05-23T18:52:46Z
CC-MAIN-2013-20
[ [ -0.0416666679084301, 0.027717391029000282, -0.008740941993892193, 0.028804346919059753, 0.017844201996922493, -0.05978260934352875, 0.0016757246339693666, 0.08224637806415558, -0.022101448848843575, -0.05833333358168602, 0.09420289844274521, 0.007155796978622675, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.911412
302
http://www.jpl.nasa.gov/releases/2001/release_2001_145.html
0.334145
Most recently, I bought a small Sony digital recorder from you, in addition to heaters, kitchenware, computer and audio products over the past several years. Your service is excellent, your shipping gets items to me quickly and safely, and you dealt with the one item that had to be returned quickly and competently. Thank you! It is a pleasure to do business with you. See more Customer Testimonials Send us your Feedback
<urn:uuid:32a921ba-f84d-4321-9655-35a920a0811a>
2013-05-23T18:33:50Z
CC-MAIN-2013-20
[ [ -0.04488031938672066, -0.006150266155600548, -0.0014128988841548562, 0.0004908784758299589, 0.07413563877344131, -0.015874335542321205, 0.01163563784211874, 0.05585106462240219, -0.03008643537759781, -0.08011968433856964, 0.04205452278256416, 0.013630319386720657, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963912
89
http://www.jr.com/category/classical/classical/chorale-prelude/n/130/
0.296171
We're sorry, we found no results, but we want to help you find what you're looking for. If your search yielded no results, check your search term(s) for misspellings. Searching fewer or more general keyword(s) can have better results. Example: "bracelet" will display every type of bracelet, where "silver bracelet" will result in silver bracelets before only bracelets. Try searching other keyword(s) as items can be referred to by several names. Example: "mp3 player" instead of "portable audio player." May We Suggest Here are a few popular searches that may interest you:
<urn:uuid:744f6992-f2cc-4453-a65d-fb18c5e9c97f>
2013-05-23T18:31:44Z
CC-MAIN-2013-20
[ [ -0.02086900733411312, 0.005966395605355501, -0.006046661175787449, -0.016374144703149796, 0.0757705494761467, -0.07662671059370041, 0.0018862371798604727, 0.0719178095459938, -0.03210616484284401, -0.013805651105940342, 0.09246575087308884, 0.05244006961584091, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.898463
136
http://www.jtv.com/Up-To-30%25-Off/up_to_30%25_off,default,sc.html?prefn1=A_GEM_SHAPE&prefv1=Oval&prefn2=A_COLOR_PRIMARY&prefv2=white&srule=priceh&showProducts=1
0.951614
I am a beneficiary of a Trust in which the person who created it died (my ex stepfather). He had allowed my brother to borrow against $400,000 CD's to renovate apartment.s He is now at odds with the Trustee -- he said he can bypass her in paying back the Trust, following is what he wrote- can he do this??? The time table that I outlines is still doable provided that I do not get interference from Karen. Unfortunately, Karen is going to interfere - in fact I am expecting this matter to go "legal" which, if it does, will add another 2 to 3 years to the time table. That said, I will have opportunities to bypass the Trust and the Successor Trustee and deal with the beneficiaries individually. If I do elect to bypass the Trust altogether and deal with the beneficiaries on an individual-by-individual basis, those beneficiaries that gave me their unwavering support will see their money first - closer to the originally outlined time table - and obviously those who did not give me their unwavering support will have to receive their money according to the time table force on us by Karen - about 2-1/2 to 3 years from now. State/Country relating to question: Arizona Nothing am totally shocked Hi and thank you for your question. Before I can properly answer this, can you let me know if the CDs were assets of the Trust, if you know? Thanks! Yes the CD's were assetes of the trust of which are to go to the beneficiaries Directly to the beneficiaries Then the answer is very straight forward: no, he cannot bypass the trust. The money is owed to the trust, so he must repay it to the trust. He cannot repay the beneficiaries directly. There are legal reasons for this, but that's the answer. It would be like me borrowing money from you, then you die, and me saying, "No, I don't want to repay his estate, I want to pay it back to the beneficiaries." Or put another way, if I borrowed money from you, I cannot repay it to your neighbor simply because you owe your neighbor money. You would need to give me permission to do that. It doesn't work this way. He sounds like a controlling person who needs to learn lessons the hard way. I hope this helps. Please press the ACCEPT button so proper credit is provided for your answer. Over 12 years of practical experience in Estate Planning, Trust and Probate law. DISCLAIMER: Answers from Experts on JustAnswer are not substitutes for the advice of an attorney. JustAnswer is a public forum and questions and responses are not private or confidential or protected by the attorney-client privilege. The Expert above is not your attorney, and the response above is not legal advice. You should not read this response to propose specific action or address specific circumstances, but only to give you a sense of general principles of law that might affect the situation you describe. Application of these general principles to particular circumstances must be done by a lawyer who has spoken with you in confidence, learned all relevant information, and explored various options. Before acting on these general principles, you should hire a lawyer licensed to practice law in the jurisdiction to which your question pertains. The responses above are from individual Experts, not JustAnswer. The site and services are provided “as is”. To view the verified credential of an Expert, click on the “Verified” symbol in the Expert’s profile. This site is not for emergency questions which should be directed immediately by telephone or in-person to qualified professionals. Please carefully read the Terms of Service (last updated February 8, 2012).
<urn:uuid:e8151b56-bf79-4b88-a8a0-1a9c093a6a1d>
2013-05-23T18:46:37Z
CC-MAIN-2013-20
[ [ -0.020263671875, 0.0194091796875, -0.00885009765625, 0.00180816650390625, 0.07568359375, -0.05322265625, -0.01129150390625, 0.07958984375, -0.026123046875, -0.0150146484375, 0.04736328125, 0.01611328125, -0.080078125, -0.025146484375, 0.049072265625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965282
756
http://www.justanswer.com/estate-law/66q0d-beneficiary-trust-person-created.html
0.544559
A 40th minute goal from Sunday Mba secured a 1-0 victory for Nigeria over a very resilient Burkina Faso team to ensure that the Super Eagles were once again crowned as the Champions of Africa, ending a nineteen year wait. The team had to endure lots of criticisms and an initial lack of support from the fans and stakeholders alike, who faulted Keshi's selection of relatively inexperienced players, with only about six players out of his twenty-three-man squad having had previous Nations Cup experience. With this victory, Keshi has now equalled the record set by Egypt's Mahmoud El-Gohari as the only (living) player to have won the Nations Cup both as a player (1994) and as a coach (2013). The late El-Gohari won the Africa Cup of Nations as a player in 1959, finishing as the top scorer in that year's edition with three goals all of which came in a game against Ethiopia. He later coached Egypt to victory at Burkina Faso in 1998, with the Pharaoh’s defeating then defending champions South Africa in the final by two goals scored by Ahmed Hassan and Tarek Mustafa. On his part, Keshi captained the Nigerian team that were crowned African champions at Tunisia in 1994, and his victory nineteen years later has left him as the only man alive to hold the record. Keshi is also the third West African coach to lift the Nations Cup trophy. Following in the footsteps of Ghana's Charles Kumi Gyamfi who led the Black Stars win the African Cup of Nations trophy three times (1963, 1965 and 1982), and also Yeo Martial who led Ivory Coast to their only Nations Cup title in 1992. Keshi is now the most successful indigenous coach in Nigerian football history. Europe may have found a 'Special One' in Portuguese coach, Jose Mourinho, but here in Nigeria and Africa at large we know who the 'Big Boss' is.
<urn:uuid:0e1bc874-9edd-498d-8e7e-c9949cc767dc>
2013-05-23T18:58:42Z
CC-MAIN-2013-20
[ [ 0.03428329527378082, 0.020174942910671234, -0.00606659147888422, -0.010158013552427292, 0.08690744638442993, -0.028216704726219177, -0.016930023208260536, 0.09988713264465332, 0.006419300101697445, -0.06123024970293045, 0.03837471827864647, 0.03639954701066017, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982317
403
http://www.kickoff.com/news/32773/nigeria-coach-stephen-keshi-has-engraved-his-name-in-the-history-books-after-his-team-won-the-2013-africa-cup-of-nations-trophy
0.624903
President Obama is scheduled to arrive in Seattle Tuesday evening for two fundraising events that are expected to net $2 million for his reelection campaign. The visit, the president's fourth to Seattle since September, starts with a dinner at former Costco CEO Jim Sinegal's home in Hunts Point. Dinner attendees will pay $36,000. Afterward, the president will speak to 200 people who are paying much less. Obama will overnight at a downtown Seattle hotel. He is scheduled to fly out of Boeing Field on Wednesday morning. Obama has already raised nearly $6 million in Washington state for his reelection, compared to Mitt Romney who has raised about a third of that amount in the state.
<urn:uuid:eb98b267-0164-4b72-88e2-e8e9ae2678c9>
2013-05-23T18:58:45Z
CC-MAIN-2013-20
[ [ 0.012203839607536793, 0.05310457572340965, -0.010774101130664349, 0.015318627469241619, 0.0784313753247261, 0.017667483538389206, -0.00801674835383892, 0.0694444477558136, -0.04595588147640228, -0.04064542427659035, 0.057598039507865906, 0.020118463784456253, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.98003
139
http://www.king5.com/news/politics/President-Obama-visiting-Seattle-on-Tuesday-for-more-fundraisers-163488816.html
0.175851
of Florida and the Caribbean" Bartolomé de Las Casas Priest, missionary, landholder, fighter, writer and historian. Once a slave owner, then defender of the rights of native peoples, Bartolomé de Las Casas was a complex man who lived almost a century. Born in 1474 in Spain, Las Casas was the son of a merchant who had traveled with Columbus to the West Indies. Following his education at the University of Salamanca, Las Casas first became a lawyer, but in 1502, at the age of 28, he gave up his law practice and sailed to Hispaniola. He worked for the colonial governor first in Santo Domingo, then in Cuba. In 1512 he became the first person in America to be ordained a priest, but that didnt stop him from taking part in the brutal conquest of Cuba. For his service in several expeditions, Las Casas was awarded an encomienda, a royal grant of land including Native American slaves. Not long after, Las Casas began to rebel against the abusive practices of Europeans governing American lands and people. He knew firsthand the killing, capture and enslavement of native people and began a crusade to improve conditions and especially to abolish Native American slavery. He abandoned his own encomienda in 1514 and sailed back to Spain to appeal directly to King Charles V on the Native Americans behalf. He was named the official Protector of the Indians and spent the rest of his long life championing their interests. In 1520 he tried without success to establish a colony on the coast of Venezuela. He livedfor a while in Mexico and Guatemala and in 1544 at age 70 was named Bishop of Chiapas. He returned to Spain in 1547, but continued to plead the cause of Native Americans in prolific writings. Las Casas died in 1566 at the age of 92. Las Casas writings are significant, including the first full account of the Spanish conquest, his History of the Indies. He is most famous for his Brevísima relación de la destrucción de las Indias (Brief Account of the Destruction of the Indians) a short tract condemning the Spanish treatment of the Indians. Las Casas described atrocities committed by the conquistadors and documented the genocide that had taken place. The work was published in 1552 in Spain and quickly translated and circulated throughout Europe. It became the basis for the incriminating "Black Legend," an anti-Spanish propaganda tool that accused Spain of intolerance and persecution. Tale of Bartolome de las Casas Bartolome De Las Casas, Missionary, Priest, Defender of the Oppressed
<urn:uuid:22213581-35c7-4d67-8174-beebfb2c3420>
2013-05-23T18:43:59Z
CC-MAIN-2013-20
[ [ -0.03662109375, 0.0166015625, -0.0225830078125, -0.017822265625, 0.083984375, -0.027587890625, -0.008544921875, 0.0888671875, -0.01446533203125, -0.043701171875, 0.1025390625, 0.02099609375, -0.01904296875, 0.05322265625, 0.0361328125, 0.009582519531...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965837
552
http://www.kislakfoundation.org/millennium-exhibit/profiles1.htm
0.605612
Senate President Donna Mercado Kim is proposing six bills in her legislative package that directly impact the University of Hawaii after the Stevie Wonder concert hoax. The bills are based on findings and recommendations from the Senate Special Committee on Accountability’s informational briefings to review the oversight, accountability, and transparency of the operational and financial management of the University of Hawaii System, chaired by Senator Kim in September and October 2012. “The discussion and call for University of Hawaii flexibility and autonomy has been around since the 1980s. Over the past three decades the Executive and Legislative branches of the State of Hawaii have worked together to provide the University of Hawaii with more flexibility and autonomy. However, that autonomy and self governance has evolved to a point where the Senate feels that, in the interest of statewide concern, the University of Hawaii needs to be held more accountable and operate in full transparency,” explained Kim. The proposed bills range in topics from procurement for construction projects, to revising the number of University General Counsels, having the Board of Regents undergo annual training on board policies and procedures, requiring the Board of Regents to file annual disclosures of financial interest which would become public record, clarifying how the members of the Board of Regents are selected by the Governor, and revising the makeup of the Board of the Research Corporation of the University of Hawaii. For reference purposes, the bills are as follows: - SB 1383 – Repeals the President of the University of Hawaii’s authority to serve as the Chief Procurement Officer for construction contracts. - SB 1384 – Limits the Board of Regents to appointing one University General Counsel. - SB 1385 – Requires the Board of Regents to undergo annual training and certification. - SB 1386 – Requires the Board of Regents to file annual disclosure of financial interest. - SB 1387 – Gives the Governor the authority to reject the list of nominees to the Board of Regents presented by the Regents Candidate Advisory Council. - SB 1388 – Reduces the number of members of the Board of Directors of the Research Corporation of the University of Hawaii and removes the authority of the President of the University to also serve as the President of RCUH.
<urn:uuid:27bb5428-64ed-411f-926e-d750def45402>
2013-05-23T18:32:35Z
CC-MAIN-2013-20
[ [ -0.01936274580657482, 0.03125, -0.0029411765281111, -0.001263786805793643, 0.10000000149011612, 0.020710784941911697, -0.022794118151068687, 0.06715686619281769, -0.016789216548204422, -0.03235294297337532, 0.06372549384832382, 0.01617647148668766, -0.0661764740...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946421
454
http://www.kitv.com/news/politics/Bills-introduced-in-response-to-Wonder-Blunder/-/8905242/18343194/-/y8crsgz/-/index.html?absolute=true
0.177377
Kansas hits up sperm donor for child support Man says he has no intention of assuming paternal role if he loses case If you're planning to donate sperm in Kansas, you may want to do it through a doctor. That's one message from the case of William Marotta of Topeka. In 2009, he noticed a Craig's List advertisement from a lesbian couple, also in Topeka, seeking donated sperm. "Intrigued" by the ad, he agreed to donate and says he delivered three cupfuls of his sperm -- gratis -- to the women, one of whom gave birth to a daughter. "I donated genetic material, and that was it for me," he told CNN affiliate WIBW. Or so he thought. That changed when the parents separated and one of the women stopped working because of illness and applied to the state for help, he said. The state contacted Marotta for child support. Kansas officials were not persuaded by what Marotta says were agreements he signed before making his donations that he would assume no financial responsibility for the child, who is now 3 years old. The Kansas Department for Children and Families said any agreement would not apply because a physician did not perform the insemination, which Marotta said was news to him. "I didn't know that there was no doctor involved," Marotta said Friday. His lawyer, Ben Swinnen, accused the state, where same-sex marriage is not legal, of being politically motivated in its pursuit of $6,000 from his client. "The cost to the state to bring this case far outweighs any benefit the state would get," he said. Marotta said he met the child once -- a few months ago -- when he and his wife by chance crossed paths with one of the girl's parents at an area carnival. He said he had no intention of assuming a paternal role if he loses the case. "I'm not her parent," he said. But under Kansas law, he is her father. Had a physician carried out the insemination, that would not be the case, because Marotta would be able to document that he was a sperm donor and not the lover of the girl's mother, said CNN Senior Medical Correspondent Elizabeth Cohen. "For all they know, they were lovers," she said. "They need that documentation. He's the dad; he ought to be paying up." Though a physician would have tested the sperm for sexually transmitted diseases and certain genetic disorders, there are disincentives associated with going through a physician. A single attempt at artificial insemination costs about $3,000, and sometimes several tries are needed. "It's a lot cheaper to get someone to come on over with their donation, and then do it yourself at home," Cohen said. Meanwhile, Marotta owes legal fees and has taken his story to the news media. "If enough noise gets made about it, at this point, maybe things will change for the better," he said. Asked whether, knowing what he now knows, he would answer the advertisement again, Marotta said, "Probably not." Copyright 2013 by CNN NewSource. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:57c507d3-a535-412e-8130-2b379fb698d9>
2013-05-23T18:59:54Z
CC-MAIN-2013-20
[ [ -0.02001953125, 0.034912109375, -0.0076904296875, -0.0036163330078125, 0.09375, -0.051025390625, 0.00390625, 0.09228515625, -0.04345703125, -0.029296875, 0.08056640625, 0.04296875, 0.003997802734375, -0.0247802734375, 0.049560546875, -0.035400390625,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986553
672
http://www.kjct8.com/news/Kansas-hits-up-sperm-donor-for-child-support/-/163152/18020120/-/view/print/-/11g5uue/-/index.html
0.369972
more fax machines increasing the value of all previous machines--does not rely on the proliferation of Panasonic brand fax machines, or of any particular machine. Since many faxes are sent from laptop computers, or from a server somewhere, the power of plenty derives from opportunities rather than lumps of matter. As opportunities proliferate, unintended uses take off. In the late 1970s, the Shah of Iran exiled his rival, the Ayatollah Khomeini, to Paris. Since the Shah controlled his country's media he assumed Khomeini would not be able to reach the Iranian people from France to stir up trouble. But sympathetic Iranian clergy exploited an unsuspected technological opportunity: the cassette tape. Every week in Paris Khomeini's friends recorded his inflammatory speeches on cheap recorders and smuggled copies (easily disguised as music tapes) into Iran, to be multiplied on $200 duplication machines and passed out to every mosque. On Fridays, Khomeini's sermons were played throughout Iran on boomboxes. The clerics turned the common tape deck into a broadcast network. I'm sure that not a single engineer who developed cassette tape technology ever envisioned it being used for broadcasting. Electronic media, because it is animated by electrons, is highly susceptible to being subverted by new uses. Recently Sprint, the telecommunications company, pioneered flat cellular phone pricing--you could make all the cell phone calls you want for a fixed monthly fee. Within days of the pricing, the startled marketing experts at Sprint heard reports that people were using the cell phones as baby monitors. Parents would go into baby's bedroom with a cell phone, dial the kitchen, and then leave the line open. Voilà!
<urn:uuid:86e6ffbf-9d22-4720-bd8d-5103094e0311>
2013-05-23T18:52:07Z
CC-MAIN-2013-20
[ [ -0.015663202852010727, 0.031326405704021454, 0.002502292161807418, -0.005042787175625563, 0.06081907078623772, -0.04248166084289551, -0.003132640616968274, 0.09963325411081314, -0.009359719231724739, -0.03147921711206436, 0.07212714105844498, 0.01551039144396782, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954773
340
http://www.kk.org/newrules/blog/2009/08/the-power-of-the-fax-effect--.php
0.163342
What is my standard baggage allowance? Find out how much check-in baggage you can take with you free of charge.Everything about check-in baggage How many bags can I take along on board? Can I bring liquids and tax-free articles with me? What about medicines, baby food and batteries?All you need to know about hand baggage No hassle? Arrange your excess baggage online Want to take more baggage with you than the standard amount? Arrange it quickly and easily online and receive a discount!How to arrange your excess baggage Pets love to fly with KLM Don't want to leave your cat or dog behind, or will it be travelling by itself? KLM and AIR FRANCE offer a range of options to transport your pet.Find out more about your pet's travel options Can I take my sports equipment with me? Planning on playing golf, cycling, skiing, surfing or diving at your destination? You can take your own sports equipment or musical instrument with you.Find out how to arrange transport Delayed, lost or damaged baggage What can you do and how can we help you if your baggage is delayed?What to do in case of delayed or missing baggage Once you have checked in online, you can drop off your baggage on the day of departure at one of the self-service - or regular baggage drop-off points at the airport.About baggage drop-off Check until when you can drop off your baggage at airports around the world.Drop-off times
<urn:uuid:2aa2ba46-4342-47ab-b778-2492ad51ab53>
2013-05-23T18:38:33Z
CC-MAIN-2013-20
[ [ -0.015669014304876328, 0.035739436745643616, -0.021390845999121666, -0.027640845626592636, 0.11549295485019684, -0.02500000037252903, -0.020510563626885414, -0.008978873491287231, -0.014172535389661789, -0.05316901579499245, 0.11338028311729431, 0.03626760467886925,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928517
311
http://www.klm.com/travel/ng_en/customer_support/customer_support/delayed_baggage/index.htm
0.716754
Mitt Romney and his wife Ann were in Washington Friday for a "social visit," according to a former senior adviser to the 2012 GOP presidential nominee. Romney attended a reception in his honor Friday hosted by philanthropist Catherine Reynolds and businessman Bill Marriott Jr. He also attended a roundtable followed by a lunch at a DC hotel with financial backers, former staff and other supporters. The Romneys are expected to attend the black-tie Alfalfa Dinner, scheduled for Saturday, while in the nation's capital. According to one participant in at least one of the events, Romney said he would "stay involved in the policy debate," that he was "proud of the accomplishments" and noted the "innovation" of some Republican governors. The source said Romney made it clear he will not run again and that it was time for a new generation of leaders. Romney was not seen Friday morning outside the hotel where the reception was set to take place; however, his 2012 running mate Rep. Paul Ryan was spotted entering the building. Romney did not attend President Barack Obama's inauguration this week, remaining instead at his home in La Jolla, California. Romney was last in D.C. when he lunched with Obama at the White House last month. "He deliberately did not inject himself into the political discussion between the election and the inauguration while the President was laying out his agenda for a second term," the former senior adviser said. "But Gov. Romney does care deeply about America and its place in the world and from time to time he will speak out on issues."
<urn:uuid:6645aac0-5778-431a-8e87-9e98efa5c93a>
2013-05-23T18:46:15Z
CC-MAIN-2013-20
[ [ -0.012447771616280079, 0.03986768797039986, 0.001904160832054913, 0.000014196199117577635, 0.06545960903167725, -0.02524373307824135, 0.0015886141918599606, 0.05849582329392433, -0.033948466181755066, -0.04213092103600502, 0.07555710524320602, 0.028377437964081764, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.990719
321
http://www.kmbc.com/news/politics/Mitt-and-Ann-Romney-in-D-C-for-social-visit/-/11664068/18280556/-/2mt5i8z/-/index.html
0.198637
- Photos: Chelsea trains for Man City game at Busch Stadium - Photos: Warming up for Senior PGA Championship at Bellerive - Dresses Kellie Pickler wore on 'DWTS' - New photos from ground zero of Moore tornado - Photos: Forbes' list of world's most powerful women - Photos: Man City-Chelsea to battle at Busch on Thursday
<urn:uuid:e5b69678-481a-42e2-a2d4-a8eaa36706cc>
2013-05-23T18:33:23Z
CC-MAIN-2013-20
[ [ 0.015441176481544971, 0.0363970585167408, 0.003492647083476186, 0.0015165441436693072, 0.15000000596046448, -0.01608455926179886, -0.013694852590560913, 0.04411764815449715, 0.026838235557079315, -0.04099264740943909, 0.009007353335618973, 0.061764705926179886, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.805659
81
http://www.kmov.com/news/slideshows/176619381.html?gallery=y&c=y&img=21&c=y
0.263071
Enjoy this pie on a special occasion but remember to keep tabs on portions. Garnish each slice with a NILLA Wafer just before serving. How to Make Chocolate Curls Warm BAKER'S Chocolate slightly by heating it, unwrapped, in the microwave for a few seconds until you can just smudge the chocolate with your thumb. Hold the chocolate steadily between thumb and fingers of one hand and draw a peeler slowly over flat bottom of chocolate. Allow a thin layer of chocolate to curl as it is peeled off the bottom. This will make long, delicate curls. Make short curls using the same technique on the narrow sides of the square. To arrange curls on a dessert, use a toothpick to lift them into place.
<urn:uuid:fca917c6-6e84-45e6-8926-edf0727a451d>
2013-05-23T18:39:00Z
CC-MAIN-2013-20
[ [ -0.02222222276031971, 0.03663194552063942, 0.012239583767950535, 0.012934028171002865, 0.06562499701976776, 0.0034288193564862013, -0.02847222238779068, 0.07256944477558136, 0.01059027761220932, 0.014409721828997135, 0.05243055522441864, 0.01822916604578495, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.905913
155
http://www.kraftrecipes.com/recipes/Recipe-All-Ratings.aspx?recipe_id=105153&ct=1&pg=7&pf=true
0.191119
Interior Secretary Ken Salazar is heading to Colorado Springs to review the response to the worst wildfire on record in Colorado. Salazar plans to meet Monday with state and local officials involved in the wildfire response and receive a briefing. The fire that began more than two weeks ago killed two people and destroyed nearly 350 homes after it moved into Colorado Springs. At one point, the blaze prompted evacuations affecting more than 30,000 residents. The fire is nearly fully contained and many evacuees have returned home.
<urn:uuid:116cc50c-c994-4c0b-960e-1d48836a9c16>
2013-05-23T19:00:35Z
CC-MAIN-2013-20
[ [ -0.012609649449586868, 0.03207236900925636, -0.027549341320991516, 0.02837171033024788, 0.10581140220165253, -0.034950658679008484, -0.0032723410986363888, 0.1003289446234703, -0.016995614394545555, -0.03673245757818222, 0.05921052768826485, 0.060855261981487274, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962592
103
http://www.krdo.com/news/Interior-Secretary-Salazar-to-tour-Colorado-Springs-wildfire-damage/-/417220/15447174/-/15fcq47z/-/index.html
0.18365
The regime's state-run Korean Central News Agency said the satellite, named Kwangmyongsong-3, was "fitted with survey and communications devices essential for the observation of the earth." The satellite itself is probably not very sophisticated, said David Wright, a senior scientist with the Union of Concerned Scientists. The regime showed it in April, and it was a small box with solar panels and a simple camera with some basic communication devices, he said. He compared it to Sputnik 1, the first man-made satellite that Russia launched into space in 1957. The value lies in the launch rather than in the object that North Korea now has floating above the Earth, Wright said. The regime doesn't "really care so much what's in it." It's a statement, Wright said. In Japan and South Korea, people will hear about North Korea's achievement -- and will probably be struck by its power, he said. Any show of might can help strengthen North Korea's position in international talks on numerous issues, including nuclear negotiations. The South Korean government said the launch was confrontational and a "threat to the peace and stability of the Korean Peninsula and the world." Japan called it "intolerable." Iran praises the launch as much of the world assails it Iran, meanwhile, praised North Korea's move. Gen. Masoud Jazaeri, a senior Iranian military official, expressed happiness about the launch, the semiofficial Fars News Agency reported. "Experience has shown that independent countries, by self-confidence and perseverance, can quickly reach the height of self-sufficiency in science and technology. Hegemonic powers, such as the United States, are unable to stop the progress of such countries," he said. China expressed regret that the launch had taken place, noting "concerns among the international community." "We hope relevant parties stay calm in order to maintain peace and stability on the Korean Peninsula," said Hong Lei, a Chinese Foreign Ministry spokesman. Several governments criticized Pyongyang's decision to spend hundreds of millions of dollars on its rocket program rather than on assisting its poor, malnourished population. British Foreign Secretary William Hague said he deplored the fact that North Korea "has chosen to prioritize this launch over improving the livelihood of its people." The North's failed launch in April ended a deal for the United States to provide thousands of tons of food aid to the country. In his father's footsteps "I think this is very important to Kim Jong Un to build political legitimacy and bolster the spirits of his people," said James Schoff, a North Korea specialist with the Carnegie Endowment for International Peace. "He is doing this despite the fact that he knows he is going to come into a lot of criticism in the region for it." The launch has taken place during a period of power consolidation for Kim in which he has purged senior military officers in an apparent effort to stamp his authority on the regime's leadership. "If Kim Jong Un pulls off a successful long-range missile test, it's a very important signal saying that 'Yes, I, Kim Jong Un, have replaced the powerful generals,' " said John Park, a Stanton junior faculty fellow at the Massachusetts Institute of Technology. "It shows that 'I have found the right balance and I am now in charge.' " The launch also ties in with important dates for the regime's ruling dynasty. Pyongyang had said this rocket launch would be "true to the behests" of Kim Jong Il, the late North Korean leader and father of Kim Jong Un. Kim Jong Il died on December 17 last year, so the rocket launch took place just days before tearful mourners are expected to gather for the first anniversary of his death. Experts had also speculated that North Korea wanted this launch to happen before the end of 2012, the year that marks the centenary of the birth of Kim Il Sung, the founder of North Korea and grandfather of Kim Jong Un.
<urn:uuid:e9dbdd3f-23f9-4577-9759-86d45747c5cb>
2013-05-23T18:32:53Z
CC-MAIN-2013-20
[ [ -0.035888671875, 0.051513671875, 0.00848388671875, 0.0257568359375, 0.10400390625, -0.06396484375, -0.01416015625, 0.1103515625, -0.00408935546875, -0.0537109375, 0.083984375, 0.0225830078125, -0.000804901123046875, -0.01708984375, 0.041259765625, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968767
822
http://www.krdo.com/news/N-Korea-s-launch-sparks-worries-about-nukes/-/417220/17744272/-/item/1/-/10m6fk9/-/index.html
0.616966
This book introduces the reader to the concepts and principles of lunar and planetary mission engineering and provides an overview of the systems engineering which underlies space mission design/engineering. It covers a number of past and future space exploration missions, presenting the mission profiles, identifying radiation shielding requirements, and describing the characteristics of the Moon and the planets. Specific mission details such as atmospheric aerobraking and capture, orbital transfer, and interplanetary mission trajectories are presented, along with propulsion requirements and sizing.
<urn:uuid:dd02c64d-39d7-44ae-b6b5-a0ebc932fc0e>
2013-05-23T18:53:04Z
CC-MAIN-2013-20
[ [ -0.04931640625, 0.01611328125, 0.020263671875, 0.03515625, 0.058837890625, -0.064453125, 0.0233154296875, 0.119140625, -0.0322265625, 0.0004215240478515625, 0.07958984375, 0.004974365234375, -0.11376953125, 0.06689453125, 0.0272216796875, -0.00866699...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894787
102
http://www.krieger-publishing.com/subcats/titles/ActiveTITLES/W_ListforactivetitlesSTACK/w_listforactivetitlesstack_48.html
0.9548
Planes emergency landings at Dutch airport Official described issue as 'technical difficulties' Two planes made emergency landings at Amsterdam Schiphol Airport at almost the same time Monday, the Dutch airport said. The first plane was a KLM flight departing en route to Milan, Italy. The flight reported a possible technical problem and asked to return. The plane was inspected by engineers, and passengers were waiting to depart, the airport said. The second emergency landing involved a Delta Air Lines plane. It was not immediately clear what prompted that plane to land. Initially, the airport said a fire caused the landing. But a military police official described the issue as one of "technical difficulties." Delta would only say the plane, from Amsterdam to Mumbai, made the landing for "precautionary measures." "The aircraft landed without incident, and passengers deplaned normally," the airline said in a statement. It was "nothing big," Robert Van Kappel of Schipol Military Police of the incident. Schiphol is one of Europe's busiest transit sites. Copyright 2013 by CNN NewSource. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:9d94e88a-e633-42a6-a770-027a2f787378>
2013-05-23T18:32:18Z
CC-MAIN-2013-20
[ [ -0.016034644097089767, 0.05313670262694359, -0.012757490389049053, -0.007607677951455116, 0.08614232391119003, -0.08005618304014206, -0.008075842633843422, 0.05898876488208771, -0.005120552610605955, -0.04073033854365349, 0.10065542906522751, 0.06273408234119415, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966981
248
http://www.ksat.com/lifestyle/travelgetaways/Planes-emergency-landings-at-Dutch-airport/-/477882/19163602/-/view/print/-/90cmao/-/index.html
0.664586
2 killed, 1 hurt in San Antonio crash off bridge SAPD: Rosalio Roman Padilla, 31, charged with 2 counts intoxication manslaughter Two people died and another was injured when the car they were in flew off a bridge, landed on railroad tracks and was struck by a train on the city's southwest side. According to police, the driver, identified Monday afternoon as Rosalio Roman Padilla, 31, was speeding southbound on Cupples Road just past the General Hudnell Drive intersection just before 1 a.m. Monday when he lost control of the car, struck a median and flew off an elevated bridge. Investigators said the car traveled in the air for 150 to 200 feet before it flipped onto the railroad tracks. Both passengers died and Padilla was taken to the hospital. "I couldn't tell what kind of car it was at all. Luckily, there was a license plate that we found that we were able to identify what kind of car we suspect it is. That's how bad the car was mangled," said Sgt. Shane Nagy, with the San Antonio Police Department. The engineer of the train that struck the car told police he saw the mangled vehicle on the tracks, and could not tell which end he was hitting. "He said he got up on that car, and I guess there was just a portion of the vehicle on the tracks, and there was just no way of avoiding it," Nagy said. The names of the passengers killed in the crash have not been released. Padilla was taken to University Hospital for treatment. He was also given a blood test to check for alcohol, police said. He will be charged with two counts of intoxication manslaughter and is being held on a total bond of $150,000. For a list of recent stories Jenna Hiller has done, click here. Copyright 2013 by KSAT.com All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:65ab4aae-fecd-4e90-8f8a-c777ff04a15f>
2013-05-23T18:53:11Z
CC-MAIN-2013-20
[ [ -0.004558741580694914, 0.023802895098924637, -0.014476615004241467, -0.0007264406885951757, 0.10634744167327881, -0.0634743869304657, -0.00626391964033246, 0.07126948982477188, -0.024638084694743156, -0.0654231607913971, 0.07461024820804596, 0.04454343020915985, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.98572
407
http://www.ksat.com/news/2-killed-1-hurt-in-San-Antonio-crash-off-bridge/-/478452/18396678/-/view/print/-/14ef729z/-/index.html
0.164905
They stepped onto the evening ferries in Hong Kong's crowded harbor to watch the sky light up with fireworks to celebrate China's National Day. Instead, the night ended in chaos and tragedy. Two ferries collided Monday night, upending one of the vessels and sending passengers into the water. At least 38 people died. Rescuers picked up 123 survivors and are still searching for a countless number of others who are missing. Passengers on board the ferries said they had only moments to escape. "First it was up to here and then here. The water rose so quickly," one woman, who declined to be named, told CNN affiliate i-Cable. "We thought we were going to die for sure." The boat rolled violently before it partially sank. "I opened the window and pushed a child out. I put a life jacket on him and pushed him out first," he told i-Cable. "At the time, it was very chaotic. The boat was completely standing straight up in the water. It was chaotic. All the tables and chairs were everywhere. It was like a slide; everything was sliding down." Authorities are investigating what caused the crash, Hong Kong's most lethal maritime accident in more than 40 years. Police have arrested seven crew members from the vessels on suspicion of endangering passengers. The collision involved a passenger ferry traveling from Hong Kong Island to Lamma Island and a vessel owned by the Hong Kong Electric Company, which was carrying company employees and their families to watch the scheduled fireworks display. Government officials said it occurred off Lamma's coast about 8:20 p.m. "I thought we'd hit a rock or a lighthouse," said Chris Head, a teacher who was on the passenger ferry. He said the vessel went from what felt like full speed to "an abrupt halt." Head said the force of the impact threw him out of his seat at the back of the ferry, which was not very full of people. As the damaged ferry began to move toward a pier in the small town of Yung Shue Wan on Lamma, Head said, he could see the other boat had started to sink into the water vertically, like the Titanic. "It was very dark," he said. "There were very few lights on board." According to the Hong Kong Fire Services Department, which led the rescue, the vessel began to sink quickly after the impact. It said low visibility and many obstacles on board made work difficult for rescuers. "After 10 minutes out, a boat crashed into ours from the side at very high speed," one male survivor from the accident told the South China Morning Post, a local newspaper. "The rear of the ferry started to sink. I suddenly found myself deep under the sea. I swam hard and tried to grab a life buoy. I don't know where my two kids are." Residents on Lamma, a lightly populated island southwest of Hong Kong Island, reported being awakened in the middle of the night by the massive rescue operation going on offshore. On Tuesday, the front of the stricken vessel was still sticking out of the water, tethered to a barge equipped with a crane just a few hundred meters from the coast of Lamma. Emergency services boats surrounded the scene, and divers conducted a search. Despite a hole torn in its bow, the passenger ferry was able to dock safely after the crash. Government officials have not confirmed whether passengers aboard that vessel were injured, but Head said nobody around him appeared to have been hurt. The narrow sea lanes leading into Hong Kong's main deepwater harbor are some of the busiest in Asia, with giant commercial freighters, ocean liners, passenger ferries and private boats of all sizes sharing the waters. Hong Kong is home to more than 200 outlying Islands, including Lamma. Hong Kong Island is on the south side of Victoria harbor, with Kowloon forming its northern shore. North of Kowloon lie the New Territories, which stretch all the way to mainland China. Monday's crash is Hong Kong's most lethal maritime accident since 1971, when 88 people died after the ferry Fat Shan capsized between Hong Kong and Macau amid a typhoon.
<urn:uuid:9d55523f-2ce3-4d0e-b74f-8a95345cf80d>
2013-05-23T18:45:53Z
CC-MAIN-2013-20
[ [ -0.00958251953125, 0.05126953125, -0.013671875, 0.007415771484375, 0.12060546875, -0.0703125, -0.0166015625, 0.10400390625, -0.006744384765625, -0.05224609375, 0.060302734375, 0.0634765625, 0.056884765625, -0.020751953125, 0.0294189453125, -0.0035095...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982873
861
http://www.ksat.com/news/Search-for-missing-in-deadly-ferry-crash/-/478452/16813308/-/r09symz/-/index.html
0.349173
San Francisco police say they are investigating an allegation of sexual abuse against 49ers wide receiver Michael Crabtree. The inquiry comes as the San Francisco football team is preparing for an important playoff game. "Michael Crabtree has been interviewed with his lawyer present and has cooperated in this investigation," a San Francisco police statement said. "Michael Crabtree has not been detained or arrested and has agreed to make himself available to investigators in the future." The complaint is about an alleged assault that occurred in a San Francisco hotel Sunday morning, police said. A day before, the 49ers scored a playoff victory, beating the Green Bay Packers at Candlestick Park in San Francisco. Crabtree had two touchdowns in the game, continuing his sterling play that has propelled him to being the team's best wide receiver this year. "We are aware of the allegation against Michael and understand that he has fully cooperated with authorities," 49ers General Manager Trent Baalke said. "The 49ers take such matters very seriously. We will have no further comment at this time as the legal process is ongoing." The 49ers will play the Atlanta Falcons on Sunday with the winner going to the Super Bowl.
<urn:uuid:49d2b0be-5610-494c-9c47-93c2e71e6c03>
2013-05-23T19:07:37Z
CC-MAIN-2013-20
[ [ -0.0166514590382576, 0.004419479984790087, -0.00347855850122869, -0.004619069397449493, 0.08895985037088394, -0.01203239057213068, 0.006757527589797974, 0.05018248036503792, 0.0010906135430559516, -0.06113138794898987, 0.10036496073007584, 0.04835766553878784, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981884
243
http://www.ksat.com/sports/49ers-player-questioned-in-assault-probe/-/478218/18197604/-/gvddxez/-/index.html
0.553861
$1M bond for Phoenix policeman shooting suspect PHOENIX -- Bond is set at $1 million for a convicted felon who's accused of shooting and wounding a Phoenix police officer. Brandon McCabe made his initial court appearance Thursday. He's being held on suspicion of attempted first-degree murder, misconduct involving weapons, criminal trespassing and resisting arrest. Authorities say the 28-year-old McCabe is prohibited from possessing a firearm. McCabe allegedly shot Phoenix policeman Peter ``Chris'' Bennett six times last Sunday night. The 36-year-old Bennett survived and is recovering from surgery to his face, right arm and right hip. Police say Bennett approached McCabe in an area with a high burglary rate. They say McCabe ignored the officer's command and the two exchanged gunfire. McCabe was found hiding in a shed and arrested. He also was hospitalized with gunshot wounds to both hands.
<urn:uuid:d8f5b096-2587-4183-8d5f-1a7de94647d1>
2013-05-23T18:58:47Z
CC-MAIN-2013-20
[ [ -0.006194933783262968, 0.03221365809440613, -0.014248347841203213, 0.025330396369099617, 0.13766519725322723, -0.009361233562231064, -0.019273128360509872, 0.07764317095279694, -0.011839207261800766, -0.025330396369099617, 0.045154184103012085, 0.06305065751075745, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970818
182
http://www.ktar.com/22/1600961/1M-bond-for-Ariz-officer-shooting-suspect?nid=64
0.265389
EAST ST. LOUIS, Ill. (AP) - A former barge worker from Granite City has received the maximum sentence of 20 years for his role in a foiled plot to abduct, extort and electrocute a wealthy metro-east lawyer. A federal judge sentenced 46 year old Brett Nash on Thursday, fined him $500 and ordered a mental health evaluation. Nash pleaded guilty in December to a felony count of solicitation of a violent crime. Authorities said Nash's scheme involved forcing the intended victim into a hot tub and tossing in a radio to electrocute him. Nash then wanted to throw in the intended victim's cat with the hope that police would think the animal caused the electrocution. The intended victim hasn't been identified. Nash argued at the sentencing that he never planned to commit murder.
<urn:uuid:2417f545-5e40-406c-a2d2-0655743a5a03>
2013-05-23T18:32:46Z
CC-MAIN-2013-20
[ [ -0.025641025975346565, 0.028846153989434242, -0.0025641026441007853, 0.023878205567598343, 0.10769230872392654, -0.03076923079788685, -0.012339743785560131, 0.09038461744785309, -0.02708333358168602, -0.029006410390138626, 0.06634615361690521, 0.0426282063126564, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97278
170
http://www.ktrs.com/news/itemlist/tag/Murder%20plot
0.435097
Group aims to send 2 on Mars mission in 2018 501-day trip in spacecraft would fly by red planet If soon-to-be-unveiled plans pan out, a man and a woman may represent humanity on one journey that has never been attempted before: a mission to Mars. "It's incredibly feasible. It's not crazy talk," said Taber MacCallum, CEO of Paragon Space Development Corp. MacCallum and millionaire Dennis Tito are set to announce plans Wednesday to send a couple of earthlings on a 501-day trip in a spacecraft that would fly by the red planet. The proposal is to be unveiled at the National Press Club in Washington. The mission would lift off in 2018. It would not involve landing on Mars, making the proposed journey infinitely easier than putting people on the planet's surface, which NASA wants to do later this century. Tito has founded the Inspiration Mars Foundation, a nonprofit organization spearheading this effort. No stranger to space, the one-time NASA engineer became in 2001 the first space tourist flying on a Russian rocket to the International Space Station. The public-private initiative could, according to MacCallum, use an existing rocket and capsule. "If you take existing chemistry and technology and add some improved technologies," he said, "you can get a mission together." A life support system also would have to be developed. The group is not asking NASA for money, he said. "This is a philanthropic effort to be done for America," MacCallum said. It could be accomplished for under $1 billion, he said, a figure that's cheap compared with the tens of billions of dollars a NASA landing on Mars would cost. Despite MacCallum's optimism, pulling off such a feat within five years is no small task. Besides life support for the crew, one of the biggest challenges would be the return into the Earth's atmosphere. Heat shielding for a high speed re-entry hasn't been tested. NASA isn't even testing its new system on the Orion spacecraft until next year at the earliest. Orion is in development to take astronauts back to the moon and on to Mars. And there's also concern about radiation exposure. The man and woman whom MacCallum and Tito want to send would likely be a married couple. Because of the radiation risk, MacCallum said, they'd be older and "out of the childbearing years." The year for the mission was chosen because Mars will be 36 million miles away, about as close as it ever gets to Earth. But consider: The humans who have traveled the farthest from Earth were the Apollo astronauts -- nearly a quarter-million miles to the moon. Next to the Mars journey, that's like a walk around the block.
<urn:uuid:8a92abea-cd7a-478c-9244-96ca1c4f7497>
2013-05-23T18:34:12Z
CC-MAIN-2013-20
[ [ -0.0284423828125, 0.044921875, -0.01092529296875, 0.02001953125, 0.08642578125, -0.06884765625, 0.002197265625, 0.10888671875, -0.040283203125, -0.047607421875, 0.05615234375, 0.031494140625, 0.0111083984375, -0.007598876953125, 0.04736328125, -0.022...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959172
573
http://www.kxly.com/news/technology/Group-aims-to-send-2-on-Mars-mission-in-2018/-/5622068/19105044/-/view/print/-/14vfqwqz/-/index.html
0.167186
Use of selection procedures which have not been validated. A. Use of alternate selection procedures to eliminate adverse impact. A user may choose to utilize alternative selection procedures in order to eliminate adverse impact or as part of an affirmative action program. See section 13 below. Such alternative procedures should eliminate the adverse impact in the total selection process, should be lawful and should be as job related as possible. B. Where validity studies cannot or need not be performed. There are circumstances in which a user cannot or need not utilize the validation techniques contemplated by these guidelines. In such circumstances, the user should utilize selection procedures which are as job related as possible and which will minimize or eliminate adverse impact, as set forth below. (1) Where informal or unscored procedures are used. When an informal or unscored selection procedure which has an adverse impact is utilized, the user should eliminate the adverse impact, or modify the procedure to one which is a formal, scored or quantified measure or combination of measures and then validate the procedure in accord with these guidelines, or otherwise justify continued use of the procedure in accord with Federal law. (2) Where formal and scored procedures are used. When a formal and scored selection procedure is used which has an adverse impact, the validation techniques contemplated by these guidelines usually should be followed if technically feasible. Where the user cannot or need not follow the validation techniques anticipated by these guidelines, the user should either modify the procedure to eliminate adverse impact or otherwise justify continued use of the procedure in accord with Federal law. Title 29 published on 2012-07-01 no entries appear in the Federal Register after this date. This is a list of United States Code sections, Statutes at Large, Public Laws, and Presidential Documents, which provide rulemaking authority for this CFR Part.
<urn:uuid:f467ff94-a860-4997-82c5-63b43138fef4>
2013-05-23T18:46:39Z
CC-MAIN-2013-20
[ [ -0.01097972970455885, 0.025491399690508842, -0.00013676674279849976, -0.026719901710748672, 0.05743243172764778, -0.03808353841304779, -0.0031096437014639378, 0.12039311975240707, -0.03378378227353096, -0.029484029859304428, 0.10196559876203537, 0.032708846032619476...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935127
362
http://www.law.cornell.edu/cfr/text/29/1607.6?quicktabs_7=1
0.951701
(a) The ALJ shall issue an initial decision based only on the record, which shall contain findings of fact, conclusions of law, and the amount of any penalties and assessments imposed. (b) The findings of fact shall include a finding on each of the following issues: (1) Whether the claims or statements identified in the complaint, or any portions thereof, violate § 35.3 of this part ; (2) If the person is liable for penalties or assessments, the appropriate amount of any such penalties or assessments considering any mitigating or aggravating factors that he or she finds in the case, such as those described in § 35.31 of this part. (c) The ALJ shall promptly serve the initial decision on all parties within 90 days after the time for submission of post-hearing briefs and reply briefs (if permitted) has expired. The ALJ shall at the same time serve all parties with a statement describing the right of any defendant determined to be liable for a civil penalty or assessment to file a motion for reconsideration with the ALJ or a notice of appeal with the Director. If the ALJ fails to meet the deadline contained in this paragraph, he or she shall notify the parties of the reason for the delay and shall set a new deadline. (d) Unless the initial decision of the ALJ is timely appealed to the Secretary, or a motion for reconsideration of the initial decision is timely filed, the initial decision shall constitute the final decision of the Department and shall be final and binding on the parties 30 days after it is issued by the ALJ. Title 43 published on 2011-10-01 no entries appear in the Federal Register after this date. This is a list of United States Code sections, Statutes at Large, Public Laws, and Presidential Documents, which provide rulemaking authority for this CFR Part.
<urn:uuid:474ee583-0d32-46d5-92ff-0e7eb629c4eb>
2013-05-23T19:01:11Z
CC-MAIN-2013-20
[ [ -0.058453235775232315, 0.0245803352445364, 0.01851019263267517, -0.0023980815894901752, 0.07793764770030975, -0.02982613816857338, -0.019784172996878624, 0.07134292274713516, -0.050359711050987244, 0.007494004908949137, 0.10851319134235382, 0.03432254120707512, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930744
380
http://www.law.cornell.edu/cfr/text/43/35.37
0.258458
HIGGINS and another, Partners, etc., v. MCCREA. 116 U.S. 671 (6 S.Ct. 557, 29 L.Ed. 764) HIGGINS and another, Partners, etc., v. MCCREA.1 Decided: March 1, 1886 The defendant, in an amended answer, averred that the plaintiffs were engaged in carrying on for themselves and others gambling transactions in pork, lard, and other commodities on the Chicago Board of Trade; that, being solicited by the plaintiffs, and being desirous himself to gamble and speculate on the prices of pork and lard, he engaged with the plaintiffs in such gambling transactions; that on May 19, 1883, he directed the plaintiffs to deal for him in prok and lard options, to the amounts specified in the plaintiffs' petition; that the plaintiffs did, on or about the nineteenth of May, 1883, enter into contracts in their own name, but, as they now claim, upon account of this defendant, with certain named persons and firms, to-wit, G. C. Eldridge & Co. and others; that they did not contract for the actual delivery of any pork or lard whatever, but the pretended purchases were mere options, and that it was the understanding of all parties to said transactions that no pork or lard should be delivered on the contracts, and that the same should be settled upon the differences between the contract and the market price. The answer further averred that soon after the making of the contracts the plaintiffs disposed of the same for their own benefit, converted the proceeds to their own use, and released the parties with whom they had made said contracts, and that at no time after June 16, 1883, did the plaintiffs hold any contracts whatever for the account of defendant, but falsely reported to him that they were carrying said contracts for his benefit, and required him, from time to time, to pay, and he did pay, into their hands, large sums of money, amounting in the aggregate, with a balance already in their hands due to the defendant, to $19,895, and that in the latter part of June, 1883, the defendant gave the plaintiffs notice that he would no longer participate in said gambling transactions, and that he repudiated the same. The answer also denied that any pork or lard was actually delivered to the plaintiffs on said contracts, or that they paid any money thereon for account of defendant, and pleaded in bar the statute of the state of Illinois, which declares option contracts to be illegal and void. By way of counter-claim the defendant, in his answer, demanded judgment against the plaintiffs for his said advances, amounting in all to $19,895, and averred that this money was paid by him to the plaintiffs to promote and carry on said gambling transactions; that said transactions, belong the purchase of option contracts, were forbidden by the statute of Illinois, and were illegal and void; that the said sum was so lost by the defendant to the plaintiffs in the said gambling transactions and option contracts as set forth. The reply of the plaintiffs put in issue the new matter set up in the answer and counter-claim of the defendant. The issues made by the pleadings were tried by a jury. The bill of exceptions states that the plaintiffs first offered in evidence section 6 of rule 26 of the Chicago Board of Trade, which was as follows: 'In case any member of the association, acting as a commission merchant, shall have made purchases or sales by order and for account of another, whether the party for whom any such purchase or sale was made shall be a member of the board of trade or otherwise, and it shall subsequently appear that such trades may be offset and settled by other trades made by said commission merchant, he shall be deemed authorized to make such offset and settlement, and to substitute some person or persons for the one from or to whom he may have purchased or sold the property originally: provided, that in case of such substitution the member or firm making the same shall be held to guaranty to his or their principal the ultimate fulfillment of all the contracts made for account of such principal which have been so transferred, and shall be held liable to such principal for all damages or loss resulting from such substitution.' Frederick F. Gilbert, one of the plaintiffs, was put on the stand as a witness in their behalf, and testified in substance as follows: The plaintiffs actually bought the property mentioned in the petition, in pursuance of orders received from the defendant. None of the transactions were made with an understanding that the property was not to be delivered, and the property was delivered to the plaintiffs on the first of August, and was received and paid for by them. They notified the defendant of such receipt, and that, unless he took the property, and reimbursed the plaintiffs for their advances, the same would be sold for his account. The defendant gave no orders, and consequently the property was sold by the plaintiffs on the board of trade, and the proceeds of sale credited to his account. The witness produced the checks given to George W. Higgins and others, of whom the property was bought, and stated that these checks were given in payment for defendant's account; that the difference between the purchase and selling price, and the consequent loss to the plaintiffs, was the sum mentioned in their petition. The plaintiffs having rested, the deposition of the said Frederick F. Gilbert, taken by the defendant, was offered by him in evidence, in which the witness testified in substance as follows: Neither Eldridge & Co., nor any other parties with whom the plaintiffs made contracts for the defendant, delivered any pork or lard for him on August 1st, or at any time. During the latter part of the month of May and the month of June the plaintiffs canceled all the contracts they had made for the defendant with Eldridge & Co. and others, for pork and lard, and released them from the performance thereof, but gave the defendant no notice of these facts. The contracts were canceled by offsetting them with contracts they had made with other parties for the sale of pork and lard, and this was done for the advantage of the plaintiffs, and to facilitate their business transaction. When the contracts for the defendant were made with Eldridge & Co. and others, they were entered upon the books of the plaintiffs, and the books showed that the contracts were made for account of the defendant; but, after the contracts made for the defendant were canceled by the process of offsetting them against other contracts, no contracts were substituted for them by any mark or sign upon the books of the plaintiffs. The substituted contracts were afterwards canceled by the process of offsetting them against other contracts, and this process was continued as the convenience of the plaintiffs required, but none of the substituted contracts were at any time specially assigned to the defendant on the books of the plaintiffs. The plaintiffs, however, took care to have on hand contracts for the sale of pork and lard equal in quantity to their contracts for the purchase of the same commodities, and it was their purpose and practice to apply the first produce delivered on contracts of sale to the oldest contract of purchase, but the plaintiffs could not tell what produce would be applied to a contract of purchase until it was delivered. There was no special lot in reserve for any one customer. The plaintiffs had the produce coming in. 'They aggregated their books and balanced every few days to see whether they had stuff enough coming to fill their contracts.' When the produce was delivered to them, it was common property, like wheat put in an elevator. Out of 7,000 barrels of pork delivered to the plaintiffs on August 1st they applied a sufficient quantity to satisfy the defendant's contracts of purchase. 'It did not matter who it came from first, whatever came thers first it was reserved for' the defendant. The plaintiffs received and paid for no lard on defendant's account on August 1st, or at any other time. After the cancellation of the contracts made for the defendant by the plaintiffs, the latter were the only persons to whom the defendant could look for the pork and lard mentioned in the canceled contracts. He could hold no one else liable to him for the delivery of the produce. The pork delivered to plaintiffs on August 1st was delivered, not on contracts made in behalf of defendant, but made for other persons, and all the checks for money paid by the plaintiffs on August 1st were on contracts of purchases made in behalf of other persons, and not for the defendant. The witness further testified that on May 19, 1883, there was standing to the credit of defendant on the books of plaintiffs $1,895, and that after that date the defendant paid them on the transactions set out in the petition the additional sum of $18,000. The deposition of Edward M. Higgins, the other plaintiff, taken in behalf of the defendant, was also introduced in evidence by the latter. So far as it went it was in substance the same as the deposition of Gilbert. There was conflicting evidence upon the question whether the defendant, at the time of the transactions out of which the suit arose, knew what were the rules and customs of the board of trade. The defendant, as a witness in his own behalf, testified in regard to his transactions with the plaintiffs as follows: 'I always knew it was gambling. I never bought any property for future delivery and received it, or expected to. I never bought any property, or any pork or lard, or an option, for future delivery and received it. I never intended to receive it. I never intended to receive this or any portion of it. I had no use for it. All I wanted was the difference, if it went my way.' The foregoing is the substance of the evidence necessary to be stated to show the bearing of the charge of the court to the jury. The bill of exceptions then proceeded to state that the court, having explained to the jury what would and what would not constitute a gambling contract, said, among other things not excepted to: 'It is legitimate for the parties to make a contract for the delivery of property at some future period, provided they mean a real and bona fide contract, and the law recognizes the obligation and will enforce it. If the contract is foid for the reason heretofore stated, the plaintiffs cannot recover anything, nor could the defendant recover on his cross-action. The law, in that contingency, would leave the parties in the situation that they have placed themselves in, and no recovery could be had by either plaintiffs or defendant. But if you should be of opinion that, although the defendant entertained the opinion that it was a gambling transaction, the plaintiffs did not participate in that view of the question, but contemplated and intended an actual purchase and an actual sale, the contract would be binding between the parties, it will become your duty to go further, and make an additional finding. 'Assuming that this contract was valid and enforceable, the defendant says that he is not bound, for the reason that, after the purchases were made by these plaintiffs as his agents, and for his account, they calceled the contracts, and released the vendors therefrom, and that they did that without authority from him, and without his knowledge or his subsequent ratification. Upon that state of facts, if found to be true, the plaintiffs could not recover anything. That cancellation of the contracts and release of the vendors would have absolved the defendant from any obligation to pay the plaintiffs for the property so purchased by them for his account. But the plaintiffs, in reply, say that the board of trade has certain rules and regulations, which the court has permitted to be offered in evidence to you, and that under and in accordance with these rules they had a right to cancel these contracts, and substitute others in place of them; that these rules were known to and understood by the defendant, and that he, with that knowledge, acquiesced in the cancellation of the contracts, and the alleged substitution of others in the place of those canceled. 'For present purposes, and without expressing any opinion upon this proposition, the court instructs you that you may, for the purposes of this case, assume that the defendant did know and did consent that these plaintiffs might act under the sixth section of the twenty-sixth rule, and that such knowledge and acquiescence of his authorized the plaintiffs to cancel the first contracts and substitute others in their place. But the court instructs you that, assuming plaintiffs' contention in this regard to be true, and assuming that the plaintiffs themselves have told the truth in this case, there has been no valid substitution of other contracts for those that were canceled, and that the plaintiffs cannot, therefore, for that reason, upon their own testimony, recover anything in this action. 'If you find, upon that question, the original contract to have been valid, and that the defendant is excused or absolved from liability because of this attempted substitution, which the court instructs you was not made in accordance with said rule, then and in that case the defendant will be entitled to recover upon his cross-action against the plaintiffs for all the money which he advanced in pursuance of these contracts.' To the last two paragraphs of the charge the plaintiffs excepted. The jury returned a verdict in favor of the defendant, and against the plaintiffs, upon the cause of action set forth in their petition, and in favor of the defendant and against the plaintiffs upon the counter-claim set forth in defendant's answer, for the sum of $22,662.42. In accordance with the verdict the court rendered judgment. To reverse that judgment the plaintiffs have brought this writ of error. C. C. Bonney and Francis J. Wing, for plaintiffs in error. S. Burke and Wm. B. Sanders, for defendant in error. It is not disputed that, if the transactions out of which this suit arose were of the character described in the counter-claim and testimony of the defendant, they fell under the ban of section 130 of chapter 38 of the Revised Statutes of Illinois of 1885, p. 405, which was in force when the transactions took place. That section, so far as applicable to this case, was as follows: 'Whoever contracts to have or give to himself or another the option to sell or buy, at a future time, any grain or other commodity, * * * shall be fined not less than $10 nor more than $1,000, or confined in the county jail not exceeding one year, or both, and all contracts made in violation of this section shall be considered gambling contracts, and shall be void.' The errors assigned by the plaintiffs relate exclusively to the charge of the court, and the rendering of judgment in accordance with the verdict of the jury. The first complaint made against the charge is that the court withdrew from the jury the question of fact whether the plaintiffs had or had not complied with the rules of the board of trade in reference to the substitution of other contracts for those made by them for the defendant, and which they subsequently offset and settled, and charged the jury that certain substitutions of contracts alleged by the plaintiffs to have been made by them were not, as matter of law, made in accordance with the rules of the board of trade. We think there was no error in the charge of the court complained of. The rule of the board of trade upon this subject (section 6, rule 26) provides that where purchases or sales shall have been made by a commission merchant, a member of the board, by order or for account of another person, and it shall subsequently appear that such 'trades' may be offset and settled by other 'trades' made by the same commission merchant, he shall be 'authorized to make such offset and settlement, and to substitute some person or persons for the one from or to whom he may have purchased or sold the property originally.' The meaning of this rule is plain, namely, that when a commission merchant, having made a contract for his principal with a third person, assumes to offset or cancel the contract, he shall substitute therefor another equivalent contract with some other person, who shall be bound to his principal for its performance. It is well settled, as a general rule, that a written contract made by a factor in his own name for the purchase or sale of goods for his principal will bind the principal, and he may sue and be sued thereon exactly as if he were named in it, for it is treated as the contract of the principal as well as of the agent. Higgins v. Senior, 8 Mees. & W. 834; Huntington v. Knox, 7 Cush. 371; Taintor v. Prender gast, 3 Hill, 72; Ford v. Williams, 21 How. 287. The rule of the board of trade provided, as has been seen, that where the commission merchant has substituted one contract for another he shall guaranty to his principal the performance of the substituted contract. It follows that, upon the original contracts made by the plaintiffs for the defendant, the latter, upon their breach, had a right of action against the parties with whom the contracts were made. The purpose of the rule was therefore plain, namely, to provide that when contracts were canceled and others substituted, the commission merchant, as well as the party bound in the substituted contract to sell or buy, should be liable to the other party for its performance. The rule, therefore, does not authorize the commission merchant to release the party to the original contract unless he provided some one else to assume the obligation, or, as the rule states it, 'substitute some person or persons for the one from or to whom he may have purchased or sold the property originally.' The only evidence in the case in regard to the cancellation of the original contracts made by the plaintiffs for the defendant, and the substitution of other contracts, was the testimony of the plaintiffs themselves. They do not contradict each other, and there is no contradiction or impeachment of their testimony on this point in the record. These witnesses make it clear that, after the contracts made by them for the defendant had been offset against others, and thereby canceled, no other contracts were substituted in their place which the defendant could have enforced. In fact there was no substitution. No contracts were designated to take the place of those canceled. All that the plaintiffs say on this point is that it was their purpose to apply the first produce delivered in August on contracts of sale, first to the oldest contract of purchase, and it was uncertain on what contract the first delivery would be made until the delivery actually took place. If there was any substitution of other contracts for the canceled ones, it was only in the mental operations of the plaintiffs, to which no outward expression whatever was given. The plaintiffs admit in their evidence that, after the original contracts made for the defendant were offset and released, they alone were bound to the defendant, and that there were no other persons against whom the defendant could have maintained an action. It is plain, therefore, that upon their own showing the plaintiffs did not make the substitution required by section 6 of rule 26 of the board of trade. The facts of the case being shown and not disputed, the question whether there had been a valid substitution of contracts under the rule referred to was a question of law. It depended on the construction of the rule, which it was the duty of the court to interpret. Levy v. Gadsby, 3 Cranch, 180; Walker v. Bank of Washington, 3 How. 62; Goddard v. Foster, 17 Wall. 123. When, therefore, the circuit court said to the jury that, assuming that the plaintiffs themselves have told the truth in this case, there has been no valid substitution of other contracts for those that were canceled, it was merely applying the rule of the board of trade, as it construed it, to the plaintiffs' own version of the facts, and, in so doing, discharged its own duty without invading the province of the jury. It is quite clear, also, from what has been said, that the construction put on the rule by the circuit court was correct. We do not see how the rule could have been differently construed. The case, as shown by the testimony, was this: The plaintiffs had been employed by the defendant as his agents to make contracts in his behalf for the purchase of pork and lard. They made contracts under this authority, and almost immediately canceled them, and substituted no other contracts which the defendant could have enforced. There is nothing in the record to show that the plaintiffs were liable to the defendant upon the original contracts made by them for the latter, and there were no substituted contracts on which either the plaintiffs or other persons were liable. The defendant, therefore, on August 1, 1883, had no contract on which he could have demanded the delivery of a pound of pork or lard, or have sustained an action against any one for failure to deliver. The money which the plaintiffs seek to recover in this suit was not, therefore, paid out for the use of the defendant, and an action therefor cannot be maintained against him. The court would therefore have been justified in charging the jury that, upon the plaintiffs' own testimony, they were not entitled to a verdict against the defendant upon the cause of action set out in their petition. Pleasants v. Fant, 22 Wall. 116; Griggs v. Houston, 104 U. S. 553; Randall v. Baltimore & O. R. Co., 109 U. S. 478; S. C. 3 Sup. Ct. Rep. 322. We are of opinion, therefore, that the charge of the circuit court, so far as it related to the right of the plaintiffs to recover, was not open to any of the objections urged against it by the plaintiffs. The next objection made to the charge has reference to that instruction in which the court said: 'If you find the original contract to have been valid, and that the defendant is excused or absolved from liability because of the attempted substitution, which the court instructs you were not made in accordance with said rule, then, and in that case, the defendant will be entitled to recover, upon the cross-action against the plaintiffs, for all the money which he advanced in pursuance of these contracts.' This part of the charge was specifically pointed out by an exception taken by the plaintiffs, to the effect that it allows the defendant to recover, notwithstanding his confession of record that the transactions in which he was engaged with the plaintiffs were gambling transactions, and allows him to recover what he admits were advances made for the purpose of carrying on the business of gambling. We think, therefore, that the record fairly presents the question whether this instruction was right. The Ohio Code of Civil Procedure requires that a cause of action set up as a counter-claim in the answer of the defendant 'must be one * * * arising out of the contract or transaction set forth in the petition as the foundation of the plaintiff's claim, or connected with the subject of the action.' Section 94. The counter-claim pleaded by the defendant was within the terms of this section. A counter-claim, under the Ohio Code, is regarded as a cross-action. When it has been set up in an answer, the plaintiff will not be allowed to dismiss his suit without the defendant's consent, (Wiswell v. First Congregational Church, 14 Ohio St. 31,) and it must state facts recognized by courts of law or equity as constituting a cause of action, (Hill v. Butler, 6 Ohio St. 207.) If a plaintiff dismiss his action against the defendant, or fail to appear, that will not prevent the defendant from prosecuting the counter-claim set up in the suit to final judgment against the plaintiff. Code Proc. § 373. The court may, at any time before the final submission of the cause, allow a counter-claim set up in the answer to be withdrawn, and on motion of either party an action on the same shall be docketed and proceeded in as in like cases after process served. Code Proc. § 119. The defendant's counter-claim is therefore to be tested by the same rule as if it had been the basis of an independent action, and the question is whether, under any circumstances, the defendant should have been allowed, upon the pleadings and evidence, to recover a judgment thereon. The instruction of the court now under review directed the jury, if they found the original contract to have been valid, but the defendant not liable thereon, because the substitution was not made as required by the rules of the board of trade, that the defendant was entitled to recover the money advanced by him to the plaintiffs. The verdict of the jury for the defendant on his counter-claim must have been based on a finding that the original contracts were valid and not gambling contracts, and the question is therefore whether the instruction was right, and, if not, whether the error was cured by the verdict of the jury. We think the charge objected to was erroneous. The cross-action of the defendant, as an independent suit, it is clear, could not have been maintained. His case, as stated by himself in his answer and counter-claim, was that the money was advanced by him to carry on a gambling transaction; that with his concurrence the money so advanced was used in such gambling transactions; and that by the statutes of Illinois, where the contracts were made, they were treated as gaming contracts, and declared illegal and void, and the making of them a criminal offense. The counter-claim thus stated was supported by the testimony of the defendant himself, given upon the trial. There was no statute of Illinois to authorize the recovery of money paid on such contracts. The crossaction, therefore, of the defendant, stated in his pleading and supported by his own deposition, was not one on which any recovery could be had. Armstrong v. Toler, 11 Wheat. 258; Brown v. Tarkington, 3 Wall. 377; Davidson v. Lanier, 4 Wall. 447; Hanauer v. Doane, 12 Wall. 342. The court was bound to take judicial notice of the fact that the dealings recited in the counter-claim were forbidden by law, and of its own motion should have directed a verdict against the defendant thereon. Oscanyan v. Arms Co., 103 U. S. 251. If the defendant had withdrawn his counter-claim, and docketed it as a separate suit against the plaintiffs, as permitted to do by the Code, it needs no discussion to show that his action must have failed. His rights are not changed by the fact that the two causes go on pari passu, and are tried at the same time. We do not see on what ground a party who says in his pleading that the money which he seeks to recover was paid out for the accomplishment of a purpose made an offense by the law, and who testifies and insists to the end of his suit that the contract on which he advanced his money was illegal, criminal, and void, can recover it back in a court whose duty it is to give effect to the law which the party admits he intended to violate. In the present case the plaintiffs alleged and insisted that their transactions with the defendant were carried on with no unlawful purpose. On the other hand, the defendant alleged and insisted that in the same transactions he intended to violate the law. We see no reason why, in such a case, the plaintiffs might not, if they had not canceled the contracts, recover the money paid by them for the defendant, while at the same time the defendant could not recover the money advanced to the plaintiffs for what he intended to be an unlawful purpose. In Holman v. Johnson, Cowp. 342, it was said by Lord MANSFIELD that 'the objection that a contract is immoral or illegal, as between plaintiff and defendant, sounds at all times very ill in the mouth of the defendant. It is not for his sake that the objection is ever allowed, but it is founded on general principles of policy, which the defendant has the advantage of, contrary to the real justice as between him and the plaintiff, by accident, if I may say so. The principle of public policy is this: ex colo malo non oritur actio. No court will lend its aid to a man who founds his cause of action upon an immoral or illegal act. If, from the plaintiff's own stating or otherwise, the cause of action appear to rise ex turpi causa, or the transgression of a positive law of the country, then the court says he has no right to be assisted. It is upon that ground the court goes, not for the sake of the defendant, but because they will not lend their aid to such a plaintiff. So, if the defendant and the plaintiff were to change sides, and the defendant were to bring his action against the plaintiff, the latter would then have the advantage of it, for when both are equally in fault potior est conditio defendantis.' If, therefore, the defendant intended to embark his money in an illegal and criminal venture, we do not see how his case is helped by the fact that the purpose of the plaintiffs was to invest the money so advanced in what they understood to be a lawful and innocent transaction. The paragraphs of the charge of the court excepted to amounted in substance to this: that if the plaintiffs, in making the contracts for the defendant, contemplated and intended an actual purchase and an actual sale, but the defendant did not, but, on the contrary, meant to engage in a gambling venture, the contract would nevertheless be binding on both parties; and if the plaintiffs canceled the contracts, the defendant, notwithstanding his intention to violate the laws, could recover from the plaintiffs the money advanced by him to carry out his unlawful purpose. We think this charge was erroneous. Upon the case made by his counter-claim the defendant was not entitled to recover, and the fact that the plaintiffs were innocent of any unlawful purpose did not inure to the benefit of the defendant, who confessed that the money which he sought to recover had been paid by him to promote an illegal and criminal venture. Upon the pleadings, the verdict of the jury cannot help the defendant's case. Section 5228 of the Revised Statutes of Ohio of 1880 provides 'that when, upon the pleadings, one party is entitled by law to judgment in his favor, judgment shall be so rendered by the court, though a verdict has been found against such party.' It is clear that, upon the defendant's counterclaim, which showed that he had no valid cause of action against the plaintiffs, no valid judgment could be rendered against them. Notwithstanding the verdict, the judgment should have been against the defendant, and for the plaintiffs, upon the counter-claim of the former. We are of opinion, therefore, that the judgment in favor of the defendant on the cause of action alleged in the plaintiff's petition should be affirmed, and the judgment in favor of the defendant, on the cause of action set up in his answer by way of counter-claim, should be reversed, and the cause remanded, with directions to enter a judgment for the plaintiffs and against the defendant on the counter-claim of the latter; and it is so ordered. CC∅ | Transformed by Public.Resource.Org S. C. 23 Fed. Rep. 782.
<urn:uuid:ef6e3ec3-d0a7-4442-b974-5cb6470e345f>
2013-05-23T18:54:17Z
CC-MAIN-2013-20
[ [ -0.0194091796875, 0.022216796875, -0.007781982421875, -0.0262451171875, 0.12353515625, -0.0291748046875, -0.007568359375, 0.072265625, -0.04052734375, -0.08203125, 0.12890625, 0.02197265625, -0.0673828125, -0.035888671875, 0.0458984375, 0.00276184082...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.983641
6,452
http://www.law.cornell.edu/supremecourt/text/116/671
0.51883
Prior to the enactment of the Nationality Act of 1940, act Oct. 14, 1940, ch. 876, 54 Stat. 1137 , this section, act Mar. 2, 1917, ch. 145, § 5b, as added June 27, 1934, ch. 845, 48 Stat. 1245 , provided as follows: “All persons born in Puerto Rico on or after April 11, 1899 (whether before or after June 27, 1934) and not citizens, subjects, or nationals of any foreign power, are hereby declared to be citizens of the United States: Provided, That this section shall not be construed as depriving any person, native of Puerto Rico, of his or her American citizenship heretofore otherwise lawfully acquired by such person; or to extend such citizenship to persons who shall have renounced or lost it under the treaties and/or laws of the United States or who are now residing permanently abroad and are citizens or subjects of a foreign country: And provided further, That any woman, native of Puerto Rico and permanently residing therein, who, prior to March 2, 1917, had lost her American nationality by reason of her marriage to an alien eligible to citizenship, or by reason of the loss of the United States citizenship by her husband, may be naturalized under the provisions of section The second proviso thereof was repealed by section 504 of the Nationality Act of 1940. Provisions relating to citizenship of persons born in Puerto Rico, are contained in section , Aliens and Nationality.
<urn:uuid:8bdf6712-a8c0-425b-95ef-7ea2d38d18d7>
2013-05-23T18:40:27Z
CC-MAIN-2013-20
[ [ -0.04674220830202103, 0.03966005519032478, -0.006639518309384584, -0.015757789835333824, 0.07825779169797897, -0.0754249319434166, -0.028505666181445122, 0.06763456016778946, -0.04249291867017746, -0.027974504977464676, 0.13172803819179535, 0.021689092740416527, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961962
309
http://www.law.cornell.edu/uscode/text/48/733b?quicktabs_8=2
0.510113
Four supermarket chains sell seafood in a particular state. Three of the companies secretly agree to sync up their prices. The companies then engage in predatory pricing by undercutting the seafood prices offered by the fourth supermarket chain. A year later, the fourth supermarket chain closes its seafood department because it can no longer compete. The three companies then modify their horizontal scheme: they push seafood prices far above the national average and take turns offering discounts in an effort to avoid accusations of violating antitrust laws.
<urn:uuid:950e63ac-b0cd-4600-a181-aecb2576bdae>
2013-05-23T18:45:45Z
CC-MAIN-2013-20
[ [ -0.02417200803756714, 0.03365384787321091, 0.0026542467530816793, 0.018830128014087677, 0.08600427210330963, -0.06410256773233414, -0.0086805559694767, 0.10256410390138626, -0.01909722201526165, 0.03899572789669037, 0.03498931601643562, 0.03111645206809044, -0.1...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938824
96
http://www.law.cornell.edu/wex/price-fixing
0.961889
Definition from Nolo’s Plain-English Law Dictionary A sudden statement (also known as an "excited utterance") made by someone who has seen a surprising, startling, or shocking event (such as an accident or a death), or has suffered an injury. For example, "Oh my God, that blue car hit the little girl!" Spontaneous exclamations are often introduced at trial as evidence of the speaker's state of mind or the truth of the matter being spoken about, and will be admitted if the judge decides that the circumstances surrounding the statement make it likely that the speaker was telling the truth. Without this determination, the statement is simply hearsay; that is, a statement made out of court and offered for the truth of the matter it deals with. (See also: hearsay Definition provided by Nolo’s Plain-English Law Dictionary. August 19, 2010, 5:24 pm
<urn:uuid:f46e42da-05f9-4938-b23a-fc8dffdaa09e>
2013-05-23T18:58:33Z
CC-MAIN-2013-20
[ [ -0.051305968314409256, 0.008162313140928745, 0.014070273377001286, -0.004780783783644438, 0.08644278347492218, -0.03746890649199486, -0.0034009639639407396, 0.11504974961280823, -0.018501244485378265, -0.018656715750694275, 0.0833333358168602, 0.02829601988196373, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959051
191
http://www.law.cornell.edu/wex/spontaneous_exclamation?quicktabs_3=1
0.567032
The Deity as we see it today is not the original statue of God Brahma. In 2006, a mentally-illed person vandalized and smashed the statue into pieces. After smashing the statue, the man was beaten to death by devotees of the Shrine. Two months later, a new Brahma statue containing fragments of the broken one was installed in the Shrine. Monday, August 18, 2008 Bangkok's Erawan Shrine One of the most popular tourist attraction in the central district of Bangkok is The Erawan Shrine. This Hindu shrine houses a statue of Phra Phrom, the Thai representation of the Hindu creation god Brahma. It often features performances by resident Thai dance troupes, who are hired by worshippers in return for seeing their prayers at the shrine answered.
<urn:uuid:10183497-c974-4090-908b-6809d9a15441>
2013-05-23T18:44:25Z
CC-MAIN-2013-20
[ [ -0.03725961595773697, -0.0005714500439353287, -0.006095467135310173, 0.015625, 0.12225274741649628, -0.0446428582072258, -0.020604396238923073, 0.05528846010565758, -0.018801510334014893, -0.05872252583503723, 0.05975274741649628, 0.018629807978868484, 0.0631868...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952088
161
http://www.lawstude.net/2008/08/bangkoks-erawan-shrine.html?showComment=1219070580000
0.372763
1 Thus saith the Lord, verily, verily I say unto you my son, thy sins are a thee, according to thy petition, for thy prayers and the prayers of thy brethren have come up into my ears. 2 Therefore, thou art blessed from henceforth that bear the a of the kingdom given unto you; which b is coming forth for the last time. 3 Verily I say unto you, the keys of this a shall b be taken from you, while thou art in the world, neither in the world to come; 4 Nevertheless, through you shall the a be given to another, yea, even unto the church. 5 And all they who receive the a of God, let them beware how they hold them lest they are accounted as a light thing, and are brought under condemnation thereby, and stumble and fall when the storms descend, and the winds blow, and the b descend, and beat upon their house. 6 And again, verily I say unto thy brethren, Sidney Rigdon and a, their sins are forgiven them also, and they are accounted as b with thee in holding the keys of this last kingdom; 7 As also through your administration the keys of the a of the prophets, which I have commanded to be organized; 8 That thereby they may be a in their ministry for the salvation of Zion, and of the nations of Israel, and of the Gentiles, as many as will believe; 9 That through your administration they may receive the word, and through their administration the word may go forth unto the ends of the earth, unto the a b, and then, behold, and lo, they shall turn unto the Jews. 10 And then cometh the day when the arm of the Lord shall be a in power in convincing the nations, the b nations, the house of c, of the gospel of their salvation. 11 For it shall come to pass in that day, that every man shall a the fulness of the gospel in his own tongue, and in his own b, through those who are c unto this d, by the administration of the e, shed forth upon them for the f of Jesus Christ. 12 And now, verily I say unto you, I give unto you a commandment that you continue in the a and presidency. 13 And when you have finished the a of the prophets, you shall from thenceforth b over the affairs of the church and the school; 14 And from time to time, as shall be manifested by the Comforter, receive a to unfold the b of the kingdom; 15 And set in order the churches, and a and b, and become acquainted with all good books, and with c, tongues, and people. 16 And this shall be your business and mission in all your lives, to preside in council, and set in a all the affairs of this church and kingdom. 17 Be not a, neither confounded; but be admonished in all your high-mindedness and b, for it bringeth a snare upon your souls. 18 Set in a your houses; keep b and c far from you. 19 Now, verily I say unto you, let there be a a provided, as soon as it is possible, for the family of thy counselor and scribe, even Frederick G. Williams. 20 And let mine aged servant, a, continue with his family upon the place where he now lives; and let it not be sold until the mouth of the Lord shall name. 21 And let my counselor, even a, remain where he now resides until the mouth of the Lord shall name. 22 And let the bishop search diligently to obtain an a, and let him be a man who has got b in store—a man of God, and of strong faith— 23 That thereby he may be enabled to discharge every debt; that the storehouse of the Lord may not be brought into disrepute before the eyes of the people. 24 Search a, b always, and be believing, and c things shall work together for your good, if ye walk uprightly and remember the d wherewith ye have covenanted one with another. 25 Let your families be a, especially mine aged servant Joseph Smith’s, Sen., as pertaining to those who do not belong to your families; 26 That those things that are provided for you, to bring to pass my work, be not taken from you and given to those that are not worthy— 27 And thereby you be hindered in accomplishing those things which I have commanded you. 28 And again, verily I say unto you, it is my will that my handmaid Vienna Jaques should receive a to bear her expenses, and go up unto the land of Zion; 29 And the residue of the money may be consecrated unto me, and she be rewarded in mine own due time. 30 Verily I say unto you, that it is meet in mine eyes that she should go up unto the land of Zion, and receive an a from the hand of the bishop; 31 That she may settle down in peace inasmuch as she is faithful, and not be idle in her days from thenceforth. 32 And behold, verily I say unto you, that ye shall a this commandment, and say unto your brethren in Zion, in love greeting, that I have called you also to b over Zion in mine own due time. 33 Therefore, let them cease wearying me concerning this matter. 34 Behold, I say unto you that your brethren in Zion begin to repent, and the angels rejoice over them. 35 Nevertheless, I am not well pleased with many things; and I am not well pleased with my servant a, neither with my servant Sidney Gilbert; and the bishop also, and others have many things to repent of. 36 But verily I say unto you, that I, the Lord, will contend with a, and plead with her strong ones, and b her until she overcomes and is c before me. 37 For she shall not be removed out of her place. I, the Lord, have spoken it. Amen.
<urn:uuid:fafb5d36-e537-49dc-8f60-0b80de5e76bd>
2013-05-23T19:02:01Z
CC-MAIN-2013-20
[ [ -0.01531982421875, -0.00848388671875, -0.050048828125, -0.006317138671875, 0.181640625, -0.1240234375, -0.034912109375, 0.04638671875, 0.00640869140625, -0.0257568359375, 0.05224609375, -0.038818359375, -0.01470947265625, -0.033203125, 0.04833984375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959893
1,271
http://www.lds.org/scriptures/dc-testament/dc/90?lang=eng&country=at
0.302203
Expand each section to read more. 1600s Western Igbo kingdoms dominate trade in the lower Niger region. 1815 Following the end of the Napoleonic wars between France and Great Britain, Britain begins to trade with the interior, calling the region "Nigeria" based on the path the Niger River takes through the area. 1914 Igbo, Yoruba, and Hausa areas are officially united under Britain as the Colony and Protectorate of Nigeria. 1930 Chinua Achebe is born in the Igbo village of Ogidi. 1958 Things Fall Apart is published in England. 1960 Nigeria gains independence, as a parliamentary democracy. This story of the Igbos around 1900 was written by one of their grandchildren; Chinua Achebe was born in 1930 in southeastern Nigeria, in the Igbo village of Ogidi. He grew up speaking English and reading English literature, but Achebe kept a deep attachment to his Igbo roots; eventually he came to question the English literary portrayal of Africa and Africans as violent, ignorant, and primitive. Achebe wanted to give Africans their own voice, to take control of how they were seen, and to repair their own self-image. The result was Things Fall Apart. The hero of the story is Okonkwo, a self-made man who has been unstoppable in his determination to rise in his society, the village of Umuofia. His greatest fear is being weak, like his father, whom he detested. Okonkwo will go to any lengths to prove to the world and to himself that he is strong and fearless—even to the point of destroying himself. Umuofia is not a paradise or a hell. Its people are not evil and ignorant, nor are they innocent, noble savages. These European points of view are discarded. Umuofia is filled with real people who have complex personalities. When the British missionaries arrive in Umuofia, it is shocking to realize that most of them would destroy Igbo culture without a second thought. But Achebe's refusal to paint the conflict in black and white is what makes Things Fall Apart so powerful. Just as Umuofia was not perfect, the British are not all evil. The missionaries offer acceptance, love, and respect to those Igbos who have been outcast by their village for religious reasons. If only the two groups could have met in a spirit of compromise, they might have been able to live peacefully together. But the British insistence on domination, and the Igbo fear and rejection of their people who convert to Christianity, spell doom for Umuofia. Each side fears the other, and, like Okonkwo, each side is so fearful of appearing weak that it will resort to violence to keep the upper hand. Achebe shows that the coming of Europeans to Africa was not light coming to darkness, or pure evil destroying a people; it was two imperfect societies set on a collision course from which neither could emerge whole again. Achebe wrote Things Fall Apart in English. The decision was controversial amongst African writers at the time, some of whom wanted to promote native African languages, while others accepted English. If Achebe wrote in English, he was using the language of the colonizer, a non-African voice, to tell an African story, once again. But if he wrote in Igbo, he was limiting the potential audience for the novel to a single group of people in Nigeria. In an essay called "The African Writer and the English Language," Achebe describes the problem: For an African writing in English is not without its serious setbacks. He often finds himself describing situations or modes of thought which have no direct equivalent in the English way of life. Caught in that situation he can do one of two things. He can try and contain what he wants to say within the limits of conventional English or he can try to push back those limits to accommodate his ideas... I submit that those who can do the work of extending the frontiers of English so as to accommodate African thought-patterns must do it through their mastery of English and not out of innocence. In other words, African writers can use English to change it, and turn it into a language of African experience and not just English experience. Achebe changed English by infusing it with Igbo syntax, usage, and vocabulary so that while Things Fall Apart is clearly written in English, it is a new kind of English that serves an Igbo purpose. - Mr. Brown - The first white missionary to arrive in Umuofia, Mr. Brown is respectful and patient, never attacking clan customs or religion directly. His early success is endangered by his ill health. - The District Commissioner - The highest English official in the region arrives with the missionaries and oversees the fall of the villages from a distance. - Okonkwo's second wife, who left her first husband for Okonkwo. She has borne ten children and lost all but one, her daughter Ezinma. Her love for Ezinma leads her to stand up to Okonkwo on occasion. - She is Okonkwo's favorite child, beautiful and connected to her father in a deep way. Only she can understand him and his moods. Her only flaw, in his eyes, is being a girl. - A boy from a neighboring clan who is seized by Umuofia warriors. He lives with Okonkwo's family as a peace offering, and is a more satisfying son to Okonkwo than Nwoye. - This self-made man has worked his way up from poverty and, as he sees it, freed himself from the disgrace of having a lazy, "feminine" father. While Okonkwo possesses real virtues of hard work, far-sightedness, devotion to his clan, and love, these co-exist uneasily with impulses of fear, pride, and impatience. - Okonkwo's eldest son shows every sign―so far as Okonkwo is concerned―of being a lazy, weak man like Unoka. Beaten and belittled by his father, Nwoye will become a prime target for conversion by the English missionaries. - Nwoye's mother - Okonkwo's first wife, whose name is not told to the reader. She, unlike her husband, understands the value of pity, gentleness, and forgiveness. Her stories instruct and delight the children. - A thoughtful member of the clan who is Okonkwo's best friend. He tries to help Okonkwo navigate the troubles that come to him, and is left cleaning up after Okonkwo's catastrophic end. - Ogbuefi Ezeudu - The highest-ranking man in the village, and holder of three titles―a great rarity. - Mr. Smith - The far more zealous Smith replaces Brown and leads his new converts on a full-scale war of ideas against the village. - Okonkwo's father, a gentle musician who left his family poor and in debt at his death. He held no titles of rank in the village―driving Okonkwo to vow that he would hold many.
<urn:uuid:c2aad512-af01-45f9-884d-747083b43f3e>
2013-05-23T18:37:57Z
CC-MAIN-2013-20
[ [ 0.0086669921875, -0.007537841796875, -0.01312255859375, 0.00946044921875, 0.0859375, -0.05712890625, -0.022705078125, 0.11767578125, -0.014404296875, -0.007568359375, 0.06689453125, -0.0012969970703125, 0.015869140625, 0.00897216796875, 0.03173828125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971096
1,511
http://www.learner.org/courses/worldlit/things-fall-apart/read/getting-started/
0.269639
(1) A candidate may appoint one or more scrutineers in order to observe voting by electors under section 114Q.(2) Subject to subsection (3), a scrutineer so appointed is entitled to be present at any part of a place in which voting under section 114Q takes place, during the ordinary business hours of that place on that day.(3) If a scrutineer so appointed leaves that part of that place during the period he or she is entitled to be present, another scrutineer so appointed may act in his or her place, but only one scrutineer is entitled to be present at that part of that place in respect of a candidate at any one time.(4) A scrutineer appointed under subsection (1) shall not:(a) fail or refuse to comply with any lawful direction given to him or her by the returning officer,(b) interfere with or attempt to influence an elector who is making an application under section 114P (1) or who is voting under section 114Q,(c) communicate with any such elector, except so far as it is necessary to do so in the discharge of his or her functions, or(d) misconduct himself or herself at a place when voting under section 114Q takes place at that place pursuant to subsection (2) or (3). Maximum penalty: 10 penalty units or imprisonment for 6 months, or both.(5), (6) (Repealed)
<urn:uuid:2b4b61cd-a1df-47c6-8165-c65406c3a611>
2013-05-23T19:00:15Z
CC-MAIN-2013-20
[ [ -0.04371044412255287, 0.04331487417221069, -0.0008529470069333911, -0.01859177276492119, 0.0957278460264206, -0.06052215024828911, -0.04074367135763168, 0.04371044412255287, -0.01859177276492119, -0.032634492963552475, 0.11075949668884277, 0.01829509437084198, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968011
293
http://www.legislation.nsw.gov.au/fragview/inforce/act+41+1912+pt.5-div.10-sec.114u+2006-10-20+N?fragid=221
0.707094
Excerpts from interview with Radio VIVA: "It's fifty-fifty. I guess I could go back on ice in September to see how it goes. I have to practice a lot, because I haven't been playing for quite some time. You always feel different when you are in civilian clothes compared to wearing hockey gear on ice. The important thing will be how I'd feel. I don't want to force it, but I'd like to resume my career." Palffy would be eligible to return to Pittsburgh in February 2007 (apparently retired players have to wait exactly one year before coming back). "I miss hockey, though I guess so does everybody who retires. I could return to Pittsburgh in February, but they can trade me as well." About the shoulder: "Right now it feels good. I take various massages. The crucial thing is how I'd feel in September." Palffy's career stats: Team Slovakia: Gold WC 2001, Bronze WC 2003; 64 games, 36 goals. NHL: 708 games (incl. 24 during play-offs); 338 goals, 394 assists.
<urn:uuid:16ecdc4d-47ea-4976-8c7b-be1576ad9c81>
2013-05-23T18:39:19Z
CC-MAIN-2013-20
[ [ 0.008646245114505291, 0.013833992183208466, 0.0002837049250956625, -0.0058053359389305115, 0.042984191328287125, -0.05508893355727196, 0.0035048171412199736, 0.06521739065647125, 0.004354001954197884, -0.09239130467176437, 0.04940711334347725, 0.07855731248855591, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972986
240
http://www.letsgopens.com/scripts/phpBB3/viewtopic.php?p=54923
0.54619
The Ninth Circuit Court of Appeals recently held that a Taser manufacturer had no duty to warn of the risk that repeated shocks administered by its products could lead to death caused by metabolic acidosis, given the state of the art at the time the product was manufactured. (Rosa v. Taser International, Inc., -- F.3d --, 2012 WL 2775006 (Cal.), July 10, 2012). In Rosa, the plaintiffs’ decedent died after being administered a number of electric shocks by police officers applying their Tasers in an attempt to control him. The autopsy report stated that the cause of death was ventricular arrhythmia caused by methamphetamine intoxication, with “Taser application and arrest by police” listed as contributing conditions. The death was later linked to metabolic acidosis, a condition of increased lactic acid, which increases the risk of cardiac arrest. The decedent’s parents sued the manufacturer of the Taser under theories of both strict products liability and negligence, arguing that the manufacturer had a duty to warn the police officers of the specific dangers of the product. In opposing the manufacturer’s motion for summary judgment, the plaintiffs argued that the manufacturer had a broad duty to warn of risks even if those risks were unsubstantiated in the medical and scientific literature or based on isolated case reports. In upholding the trial court’s granting of the motion, the Ninth Circuit rejected the plaintiffs’ overly broad characterization of the manufacturer’s duty to warn. The court noted that, under California law, a manufacturer had a duty to warn of a particular risk if the risk was known or “knowable in light of generally recognized and prevailing best scientific and medical knowledge available at the time of manufacture and distributing.” The court also stated that a manufacturer was required to keep up with scientific discoveries and would be presumed to know of any advances in knowledge concerning hazards posed by its products. Here, however, the court found that there was no issue of triable fact that the risk of metabolic acidosis was known or knowable when the product was manufactured or supplied, stating that a manufacturer does not have a duty to warn based on “speculative, conjectural or tentative” reports of possible risks. The court rejected the plaintiffs’ reliance on a 2001 article published in the prestigious English medical journal The Lancet. The court pointed out that the authors of the study, while finding previous attempts to explain “in-custody death syndrome” to be unsatisfactory, “hypothesized” that such deaths could be caused by electronic control devices affecting the body’s acid-base balance. The court held that mere hypothesis, rather than firm conclusions based on adequate evidence, could not give rise to a duty to warn under California law. The court also rejected a second study by the Department of Defense on the grounds that the study did nothing more than speculate as to a causal connection between use of Tasers and death caused by metabolic acidosis, rather than establishing a causal link. Noting that this study was published after the decedent’s death, the court noted that, under California law, a manufacturer may be liable in negligence under some circumstances for a failure to warn of a risk that became known only after the injury. However, this study (like the first) merely stated an untested hypothesis and thus could not support a finding that a reasonable manufacturer would have issued a supplemental warning. The court’s opinion in Rosa was closely tied to the specific facts regarding the state of knowledge concerning the risks of metabolic acidosis posed by electronic control devices such as Tasers. However, the case suggests more generally that the court will reject a broad reading of a manufacturer’s duty to warn and will look closely into what was actually knowable at the time the product was manufactured or, alternatively, at the time of injury. The opinion is therefore favorable for products manufacturers raising a defense based on the state of the art concerning specific risks allegedly posed by their products.
<urn:uuid:f6688eef-7597-46e5-8788-57e5b81f122d>
2013-05-23T18:45:29Z
CC-MAIN-2013-20
[ [ -0.051025390625, 0.0245361328125, 0.02783203125, -0.028564453125, 0.1240234375, -0.059814453125, -0.01220703125, 0.111328125, -0.0517578125, -0.0250244140625, 0.0810546875, 0.025146484375, -0.146484375, 0.0086669921875, 0.04150390625, -0.0224609375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975615
824
http://www.lexology.com/library/detail.aspx?g=c3d26590-3b97-4318-a33c-d155b698e7df
0.245569
Que. woman charged with terrorism: RCMP 0 A Quebec woman was charged Friday with aiding what the Canadian government considers a terrorist group by allegedly trying to smuggle gun parts to Lebanon in 2011. The RCMP told QMI Agency that Mouna Diab, 26, was allegedly working with a contact in Lebanon associated with Hezbollah, a political party and militant group that is on Canada's official list of terrorist organizations. Diab used to be an activist and travelled to small-town Quebec in 2007 to try to dispel negative stereotypes about Muslims. She was originally arrested in May 2011 at Montreal's main airport. Police said she was caught on her way to Lebanon with parts of AR-15 semi-automatic rifles in her luggage. She was charged in 2011 with contravening Section 3 of Canada's Regulations Implementing the United Nations Resolution on Lebanon: "No person in Canada and Canadian outside Canada shall knowingly export, sell, supply or ship directly or indirectly, arms and related material, wherever situated, to any person in Lebanon." She was released on $15,000 bail to her Laval home, just north of Montreal, pending trial. However, police said they didn't know at the time that she had alleged ties to Hezbollah. RCMP Cpl. Carine Cordey said police received information about a possible link between Diab and Hezbollah, which led police to re-arrest Diab and charge her with committing an offence for a terrorist group. She appeared in court Friday morning. The RCMP, Quebec's provincial police and Montreal police started an investigation in February 2011 into the purchase of AR-15-type firearm parts in the Montreal area. The RCMP alleged that Diab recruited members of Montreal's Lebanese community to unknowingly transport gun parts in their luggage to Lebanon. QMI Agency reached Diab by phone Friday afternoon. She directed all calls to her lawyer, Pacal Lescarbeau. She wouldn't say if she will plead guilty or not guilty to the charges. "I have absolutely nothing to say about any of this," she said. "You'll have to speak with my lawyer." Lescarbeau didn't want to comment either and wouldn't say how his client would plead. Cordey said she didn't know how many people Diab used to export gun parts, nor if any of them will be charged. However, considering police don't believe the people knew they were allegedly transporting weapon parts, Cordey said that charges against them were unlikely. Minister of Public Safety Vic Toews released a statement Friday that said: "Canadians can rest assured that terrorism and those who support terrorist activity has not and will not undermine our way of life." --with files from Kinia Adamczyk
<urn:uuid:42861aa8-c332-4bf2-bf46-16040e90f494>
2013-05-23T18:59:55Z
CC-MAIN-2013-20
[ [ -0.0225830078125, 0.029296875, -0.01007080078125, 0.0023345947265625, 0.1162109375, -0.03564453125, -0.0084228515625, 0.07666015625, -0.01953125, -0.0284423828125, 0.062255859375, 0.018798828125, -0.032470703125, -0.019287109375, 0.0281982421875, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.98242
565
http://www.lfpress.com/news/canada/2012/07/13/19983381.html
0.310569
Guide to writing history papers Reading, Writing, and Researching for History: A Guide for College Students A comprehensive but easy-to-skim web guide to writing history papers. Recommended by History Dept faculty. Using call numbers to find books Books and journals are arranged on our shelves according to the Library of Congress (LC) classification system. Each is assigned a unique call number based on its subject matter and other characteristics. Items on the same subject will often be grouped together. In using a call number to locate a book on the shelf, consider each element in turn before moving on to the next segment. These call numbers are arranged as they should appear on the shelves. In each case, the element shown in boldface distinguishes the number from the preceding one: Each call number consists of several elements. For example:: The FIRST line, TK, is based on the broad subject of the book. Within Class T for technology, TK represents electrical engineering. The SECOND line, 7881.6, defines the subject matter more finely. When looking for the book, read this as a whole number with a decimal component. In this example, TK7881.6 represents magnetic recording (a subdivision of TK— electrical engineering). The THIRD line, M29, usually indicates author, but may also represent a further subject subdivision, geographic area, etc. There may also be a fourth line, formatted the same way. When looking for the book, read the numeric component as if it were preceded by a decimal point. In the example above, the numeric part of M29 should be read as ".29" (and the call number TK7881.6 M29 comes before TK7881.6 M4). The YEAR of publication, such as 1993, may also be present. These file in chronological order and often indicate successive editions of a book. The call number may also have additional elements, such as volume numbers. To use library databases from off campus you have to set up the proxy server: this changes your browser settings. Where's the PDF? Many article databases contain information about articles (citations or abstracts), not the entire text of the article. Once you've used an article database to find articles on your topic, you may need to use this button: in order to locate and read the full text of the article. The UC-eLinks button appears in nearly all the databases available from the UCB Library website. UC-eLinks will link you to the online full text of an article if UCB has paid for online access; otherwise, UC-eLinks will help you locate a print copy on the shelf in the library. If UCB doesn't own the article in print or online format, UC-eLinks can also help you order a copy from another library. For more information, watch this video tutorial (about 4 min.) You can also set up UC-eLinks to work with Google Scholar. For more information, watch this video tutorial (about 2 min.)
<urn:uuid:61f86099-fc1b-4956-94f2-7779fb6f43aa>
2013-05-23T19:01:12Z
CC-MAIN-2013-20
[ [ -0.0302734375, 0.02099609375, -0.0126953125, -0.01287841796875, 0.032470703125, -0.039794921875, 0.006805419921875, 0.10302734375, -0.030029296875, -0.004058837890625, 0.08984375, 0.006622314453125, -0.030517578125, -0.00555419921875, 0.0303955078125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.892992
631
http://www.lib.berkeley.edu/alacarte/course-guide/416-HIST101
0.170721
Maury family papers, 1788-1888. Creator: Maury family. Collection number: 1788 View finding aid. Abstract: Family members include Abram Poindexter Maury (1801-1848), U.S. representative from Franklin, Tenn.; his brother-in-law, Carey A. Harris of Arkansas; their cousin Matthew Fontaine Maury (1806-1873); and another cousin, Ann Maury of New York, N.Y. Chiefly family and business papers of Abram Poindexter Maury and Carey A. Harris. Also included are some papers of Matthew Fontaine Maury, including a few letters from him, but chiefly papers about his death and the international testimonial fund for his family; and some family correspondence of Ann Maury. The collection includes a letter, 1865, from Matthew Fontaine Maury describing a plan for re-settling Southerners in Mexico; and letters 1853-1854, from Carey A. Harris, a student at the University of Virginia, describing student life, including a duel. Repository: Southern Historical Collection Collection Highlights: Includes a letter discussing a plan for southerners to emigrate to Mexico with their former slaves as bound apprentices (1865).
<urn:uuid:7f7f86a5-497f-40ea-bcb2-2682bd091c0f>
2013-05-23T18:44:17Z
CC-MAIN-2013-20
[ [ -0.01265967171639204, 0.030337590724229813, -0.015625, 0.006757527589797974, 0.09534671902656555, -0.008040602318942547, 0.011861314065754414, 0.04105839505791664, -0.031021898612380028, -0.023722628131508827, 0.11085766553878784, 0.003535583848133683, 0.0903284...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932285
260
http://www.lib.unc.edu/blogs/afam/index.php/maury-family-papers-1788-1888/
0.475294
The Ives family papers constitute correspondence primarily of relatives of Rev. Levi Silliman Ives. In addition, the collection includes correspondence by Joseph Moss Ives, the brother of the renowned composer,Charles Edward Ives, and by the former's son, Walter Bigelow Ives. Levi Silliman and Joseph Moss Ives were both descendants of William Ives who arrived in Boston, Massachusetts, from London in 1635, and was one of the original settlers of Quinnipiac (New Haven), Connecticut, in 1638. There does seem to be a tie between the former two and I.M. Ives or Ella Gilbert Ives. The collection was part of the Old Archives of Georgetown University.It is likely that these papers were placed together based simply on the similarity of the surnames. The history of the acquisition cannot now be traced. Since most of the collection consists of correspondence written to the Georgetown presidents of the times (e.g., Patrick Healy, S.J.; Coleman Nevils, S.J.; John B. Creeden, S.J.) it is logical that it should have ended up in the university's archives . One might also deduce that as far as the relatives (i.e., Edward, Eugene, and Frank Ives) of Levi Silliman Ives were concerned, a genuine love of their alma mater was reason enough to deposit the family papers at Georgetown. The size of the collection is 0.25 linear feet and is arranged chronologically beginning with the earliest material, that of Rev. Levi Silliman Ives. Brief biographies of the main figures of the correspondence in this collection follow. Levi Silliman Ives (Sept. 16, 1797-Oct.13, 1867) was born in Meriden,Connecticut, son of Levi and Fanny Silliman Ives. Early education was at the Lowville Academy, New York, where his family had moved. After serving in the War of 1812, Ives enrolled at Hamilton College in 1816, but did not graduate because of illness . In 1819 he affiliated with the Protestant Episcopal Church and studied under Bishop J.H. Hobart whose daughter, Rebecca, he married in 1822. That year he was ordained a deacon by Bishop Hobart, in 1823 a priest, and was finally consecrated bishop of North Carolina in 1831. Ives was attracted to the Oxford Movement while studying about the Protestant revolt in England. Subsequently, he founded the brotherhood of the Holy Cross at Valle Crucis, North Carolina, and in 1848 was arraigned before the Episcopalian Church for heterodox practices, but was pardoned after dissolving the brotherhood. On December 22, 1852, while visiting Rome, he resigned his see, and was accepted into the Catholic church together with his wife. He wrote a "defense" of his conversion in 1853 "Trials of a Mind in its Progress to Catholicism." After some years abroad, Ives returned to New York as an English instructor at St. John's College and St. Joseph's Seminary. His remains are buried at the Catholic Male Protectory, New York, of which he was founder and first president. Joseph Christmas Ives (1828-Nov. 12, 1868) was born in New York City and a graduate of the United States Military Academy (1852). From 1853 to 1854 he was appointed by the U.S. Army to the Topographical Engineers as assistant to Lt. A.W. Whipple in the Pacific Railroad survey along the 35th parallel. From 1857 to 1858 he commanded an expedition to explore the Colorado River and subsequently wrote many invaluable reports on his findings. He served as engineer and architect for the Washington national monument (1859-1860). During the Civil War he served in several engineering capacities, and was finally appointed aide-de-camp to President Jefferson Davis (1863-1865). After the war he settled in New York City where he died. He is probably the Joseph C. Ives mentioned (along with his sons Edward,Eugene and Frank) in the will of Levi Silliman Ives, who may have been an uncle or older brother. Cora Semmes Ives was presumably Joseph Christmas Ives' wife. Her sister is the Clara Semmes Fitzgerald mentioned in Levi Silliman's will,and the same "Aunt Clara" referred to in the letters of Edward, Eugene, and Frank Ives. Edward Bernard Ives was the son of Joseph Christmas and Cora Semmes Ives. He entered Georgetown College September 16, 1868. He withdrew in 1874and shortly thereafter enrolled at West Point Academy, graduating in 1878.He died in Washington D.C., December 31, 1903, and is buried in Arlington Cemetery, Virginia. Eugene Semmes Ives, brother of Edward Bernard Ives, was born November11, 1859 in Washington D.C. He entered Georgetown University in November 1870, graduating in 1878 with a B.A., with an M.A. in 1888, and with a Ph.D. in 1889. He held a degree in law from Columbia College and practiced his profession in New York and served as state senator until 1895 when he resettled in Tucson, Arizona, where he quickly made a name for himself through his professional ability. In 1910 he was a Democratic candidate for the Constitutional Convention in Pima County but was defeated. He was also a candidate for Democratic nomination for U.S. senator after Arizona became a state but was defeated in the primary. He did not run again for public office. His marriage to Ann M. Waggaman, in 1889, produced seven children:Annette, Cora, Helen, Marian, Eleanor, Thomas Ennals, and Eugene. Ives died on August 25, 1917, while visiting his daughters Annette and Cora. He was buried there in Alhambra County, California. Frank J. Ives, brother of Eugene Semmes Ives, entered Georgetown University in September 1871. In 1874 he withdrew to accompany his mother on a religious pilgrimage in Europe. He continued his schooling at Stella Matutina's College, Feldkirch, Vorarlberg, Austria. From a clipping of his obituary that appeared in the Washington Times (see GU Alumni Card catalogue) it is known that he served in the U.S. Army Medical Corps. He saw service in the Geronimo campaign of 1886 and was stationed in the Philippines for two years retiring for physical disability in 1906. He lived in Toronto until his death in November 30, 1908, and was buried in Arlington Cemetery, Virginia. Joseph Moss Ives (Feb. 5, 1876-April 8, 1939) was born in Danbury Connecticut, the son of George Edward and Mary Parmelee Ives. He received his LL.B. from Yale Law School in 1899, and LL .D. from Loyola College, Baltimore, Maryland, 1934. He was admitted to the Connecticut bar in 1899 also serving in various other capacities including the Connecticut General assembly, director of Danbury national and savings banks, vice-president and trustee of Danbury Public Library, Child Welfare Commission, and secretary of National Conference on Uniform State Laws. In later years he devoted his time to research and writing about the settlement of Maryland and its Catholic founders resulting in his book "The Ark and the Dove"(1936). He also contributed articles on constitutional law to "Thought" magazine and "The Catholic Historical Review" e.g. article entitled " The Catholic Contribution to Religious Liberty in Colonial America" (1935). In December 1900 he married Minnie Louisa Goodman, Worcester, Massachusetts, and they had six children: Richard Goodman, Lyman Brewster, Moss White, Walter Bigelow, Chester Brown , and Sarane Wilcox. Ives died in Danbury Connecticut. For I.M. Ives whose lectures on the Spanish Inquisition were originally included in this collection (reason unknown), there is no obtainable biographical information. Ella Gilbert Ives was an author and poet (1847-1913); a clipping of her article on Alice Stone Blackwell was also originally included in the collection, although it is unclear what her connection is with either the Levi Silliman Ives family or the Joseph Moss Ives family. BULK DATES: 1874 - 1941 SPAN DATES: 1874 - 1953 EXTENT: 0.25 linear feet
<urn:uuid:d21969ff-1faf-458a-934b-864fda8c07b9>
2013-05-23T18:53:47Z
CC-MAIN-2013-20
[ [ -0.0027313232421875, 0.02490234375, -0.01446533203125, -0.02099609375, 0.08251953125, -0.033447265625, -0.005645751953125, 0.0810546875, -0.02294921875, -0.05810546875, 0.1083984375, 0.01092529296875, -0.02587890625, -0.00604248046875, 0.044921875, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.979214
1,761
http://www.library.georgetown.edu/dept/speccoll/cl72.htm
0.304332
The term Unix-like is widely used to describe operating systems that share many of the characteristics of the original UNIX, which was written in 1969 by Ken Thompson at Bell Labs, and its early successors. The popularity of this term is mainly due to the fact that it is a very convenient and logical way of describing the numerous and diverse operating systems that fit into this category. It is also due in part to the controversy about what really is UNIX and how this term should be used. This controversy, in turn, has arisen largely as a result of the complex history of UNIX and the operating systems that have been based on it. The category of Unix-like operating systems clearly includes those systems that have all three of the following characteristics: a direct source code lineage from the original UNIX, obvious UNIX characteristics and officially describe themselves as being UNIX. Source code is the version of software as it is originally written (i.e., typed into a computer) by a human in plain text (i.e., human readable alphanumeric characters). Such systems include AIX (developed by IBM), HP-UX (developed by HP), IRIX (developed by Silicon Graphics), Solaris (developed by Sun Microsystems) and True64 (developed by Compaq for alpha processors and now owned by HP). The category of Unix-like operating systems also includes UNIX clones. A clone is a program (i.e., an operating system or an application program) that has functions and behavior similar to another program but which does not contain source code from that program. The functions and behavior of the UNIX clones are so similar to those of the early (and later) versions of UNIX, in fact, that many knowledgeable users consider them to be UNIX. However, they do not have a direct lineage to the original UNIX source code, and most of them do not officially describe themselves as being UNIX. This category includes the BSDs (i.e., FreeBSD, NetBSD, OpenBSD and Darwin), Linux, MINIX, QNX and Cygwin. Unix-like operating systems also generally contain most or all of the enhancements and new features that were subsequently added at the University of California at Berkeley (UCB) and which are known as the Berkeley extensions. The Berkeley extensions include such now nearly universal innovations as the C shell, also referred to as csh, TCP/IP (transmission control protocol/Internet protocol), which forms the basis for both the Internet and most local networks, virtual memory, which allows a hard disk drive (HDD) to simulate additional main memory, and the vi text editor. Thus, it has been suggested that operating systems that refer to themselves as UNIX might more appropriately call themselves something such as UNIX/Berkeley. BSD (Berkeley Software Distribution), the version of UNIX developed at UCB in the 1970s and early 1980s, was widely considered to be a type of UNIX, as are its modern day descendants. In fact, BSD even included UNIX in its name, such as BSD UNIX 4.0, which was released in October 1980. The original name for the operating system developed at Bell Labs was UNIX (all upper case). This term became a trademark that was eventually acquired by The Open Group, an industry consortium that was formed in 1996. The Open Group attempts to permit operating systems to call themselves UNIX only if they both conform to its Single UNIX Specification and pay a substantial fee (which is one of its main sources of revenue). Thus, at least theoretically, an operating system would not have to contain any of the original UNIX source code or bear much superficial resemblance to the original UNIX to be permitted to call itself UNIX. Adding to the complexity of the situation is the fact that there is some controversy as to whether the term UNIX is actually a valid trademark. This is because trademark law states that when a term becomes very widely used as a generic term (i.e., a term that describes a class of products rather than just a single brand) it can lose its legally protected trademark status. Apple Computer, which uses Darwin (a Unix-like operating system based on BSD) as the core of its increasingly popular Mac OS X operating system, claims that the term UNIX has become generic and thus that it is not a legally valid trademark. Apple has vastly greater legal and financial resources than the BSDs or most of the Linux distributions (i.e., versions), and thus it is not afraid to call its operating system UNIX. In fact, it makes a number of statements on its website explicitly referring to itself as UNIX (and not as Unix-like), including the following: "Don't let its elegant and easy-to-use interface fool you. Beneath the surface of Mac OS X lies an industrial-strength UNIX foundation hard at work to ensure that your computing experience remains free of system crashes and compromised performance." As a result, the Open Group is suing Apple Computer for alleged trademark violation. This is a necessary move for the Open Group, as attempting to protect a trademark from abuse can be an important factor in legal decisions about the validity of the trademark. However, some industry observers expect that this case will be settled quietly out of court because neither side wants to risk a negative judgment1. The BSD operating systems are widely regarded as free (both in a monetary sense and with regard to use) implementations of UNIX, and thus as UNIX. However, in contrast to Apple, they make a point of not referring to themselves as being UNIX on their websites or other materials in order to avoid potentially costly legal problems. For example, FreeBSD, the most popular of the BSD systems (at least until the recent rise of Darwin), describes itself as being " . . . a very economical alternative to commercial UNIX® workstations." NetBSD describes itself on its homepage as " . . . a free, secure, and highly portable Unix-like Open Source operating system available for many platforms, . . . " OpenBSD describes itself as " . . . a FREE, multi-platform 4.4BSD-based UNIX-like operating system." Some operating systems do not seek UNIX branding because the royalties would be prohibitively expensive for them due to the facts that they are updated frequently (which would require costly recertification) and that they are made available freely over the Internet. Moreover, developers of such systems generally feel that such branding would not provide any significant advantage, as their users are generally well informed and are interested in the intrinsic values of the systems rather than in their names. The term Unix-like does not have any negative implication about the validity of the UNIX trademark. In fact, it could even be argued that it supports the trademark by providing a convenient term for describing operating systems that resemble the original UNIX and its early successors so that they, and their users, will not be tempted to inappropriately use the term UNIX. Other terminology is also sometimes used to refer to Unix-like operating systems, particularly UN*X, Un*x, *NIX and *nix. Created April 19, 2005. Updated June 18, 2006.
<urn:uuid:7b1c054f-8032-42b9-949c-4ed73394b7ec>
2013-05-23T18:52:11Z
CC-MAIN-2013-20
[ [ -0.03564453125, 0.00144195556640625, 0.0308837890625, -0.0252685546875, 0.060546875, -0.06787109375, 0.002471923828125, 0.1162109375, -0.0537109375, -0.0269775390625, 0.06494140625, 0.0240478515625, -0.0167236328125, 0.01904296875, 0.0206298828125, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968517
1,484
http://www.linfo.org/unix-like.html
0.9688
I think It's going to be "Dance in the Dark" but my friend has argued that the next single should be "Monster" or "Speechless". Press Release Distribution PLEASE let that song be a single ( when the come for me). I wanna see a video to that. it is definitely my favorite song on whole album.... but i love the whole album so let the whole album have videos lol. but if i had to choose one it would be when the come for me
<urn:uuid:7617a4e5-1a1e-46db-9981-798af8f3ff3e>
2013-05-23T19:00:24Z
CC-MAIN-2013-20
[ [ -0.06704545766115189, 0.02187499962747097, -0.00037508876994252205, 0.005752841010689735, 0.07727272808551788, -0.07897727191448212, -0.0072443182580173016, 0.046875, -0.040340907871723175, -0.02968749962747097, -0.036221589893102646, -0.0017489346209913492, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958696
102
http://www.linkinpark.com/forum/topics/when-they-come-for-methe-next
0.164471
Your daily news briefing, with the video of the day, top news and quote of the day. News to know A meteor exploded in Russia's Urals region, injuring roughly 1,000 people, CNN reports. Reports indicate that about 3,000 building were also damaged. The majority of injuries caused by the meteor are not thought to be serious, but 20,000 emergency response workers had been mobilized. Scientists have stated that the meteor is not related to the asteroid that passed near Earth today, and that the meteor entering Earth's atmosphere on the same day is just a coincidence. Quote of note "It is with great sadness and heavy hearts that we express our deepest sympathies and condolences to anyone that suffered losses or injuries resulting from Christopher's actions. We do not condone Christopher's actions. The family has no further comments and ask that our privacy be respected during this difficult time." - Statement from Christopher Dorner's mother. Dorner's body was positively identified earier today, according to CNN. Four people were killed and three others were wounded when Dorner went on a rampage against the Los Angeles police force. Hot video: Oscar Pistorius officially charged with murder GateHouse News Service
<urn:uuid:2c360d78-f9ba-4903-9778-166c15b597eb>
2013-05-23T19:08:15Z
CC-MAIN-2013-20
[ [ -0.006117876619100571, 0.028607536107301712, -0.0012709674192592502, -0.0014361212961375713, 0.1305147111415863, -0.030101103708148003, -0.007697610184550285, 0.06295955926179886, 0.0034466912038624287, -0.04250919073820114, 0.06847426295280457, 0.037454042583703995...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973745
243
http://www.linncountyleader.com/article/20130215/NEWS/302159966/0/Community
0.323342
I am having problems with other tape devices other than /dev/st0. My current configuration is Suse Linux 8.0. with a Sony SDT-D110000 DDS4 tape drive. I can successfully use the tar command to extract, create and get table of contents when I use the following device. "/dev/st0" However I have recieved a tape from a customer and when I do the following command "tar -xvf /dev/st0" and error is produced stating I have and Input/Output error. Several people have mention that the tape could have been created using some type of low level format and that I need to use one of the other devices in the /dev directory. For instance "/dev/st0m" When I attempt to use this device or others in the /dev directory the tar command tells me this is not a recgonized device. Any comments on how to configure these other devices "/dev/stxxxx" to work with my tape drive or how to find out the details of that tape that was given to me? I have been trying to find some online documention about this problem but have been unsuccessfull. Any help would be greatly appreciate.
<urn:uuid:eb4529b2-cfee-46c6-a769-2e1a8a223ed8>
2013-05-23T18:31:49Z
CC-MAIN-2013-20
[ [ -0.033129699528217316, -0.004023731220513582, 0.0026580123230814934, -0.02878289483487606, 0.09069548547267914, -0.05028195306658745, 0.0038768798112869263, 0.033364661037921906, -0.01715225540101528, -0.010103383101522923, 0.038063909858465195, 0.03265977278351784,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955426
254
http://www.linuxhomenetworking.com/forums/showthread.php/14243-Creating-new-tape-devices-dev-st0xxx
0.852277
[linux-dvb] How to compile the firmware into the driver? zzam at gentoo.org Sun Dec 4 14:09:39 CET 2005 On Sunday 04 December 2005 13:57, Klaus Schmidinger wrote: > What is the simplest method to build this driver and have > it compile the firmware into it? Why do you want to do it this way? I don't know how to get make to do it, but I think it is better to use hotplug to load the firmware as it simplifies updating/testing different firmware More information about the linux-dvb
<urn:uuid:52996885-8f2a-4898-ae72-e2228e89a358>
2013-05-23T18:58:06Z
CC-MAIN-2013-20
[ [ -0.033672481775283813, 0.012839146889746189, 0.03875968977808952, -0.0011279674945399165, 0.07509689778089523, -0.08236434310674667, -0.01047722902148962, 0.08042635768651962, -0.025314923375844955, 0.01132509671151638, -0.0024679021444171667, 0.03875968977808952, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.826382
132
http://www.linuxtv.org/pipermail/linux-dvb/2005-December/006686.html
0.424672
Chapter 16 - On The Way It was not without a certain apprehension - nothing seemed to justify it, however - that Dick Sand, three hundred steps from the steep bank of the river, penetrated into the thick forest, the difficult paths of which he and his companions were going to follow for ten days. On the contrary, Mrs. Weldon herself, a woman and a mother, whom the perils would make doubly anxious, had every confidence. Two very serious motives had contributed to reassure her; first, because this region of the pampas was neither very formidable on account of the natives, nor on account of the animals which were found there; next, because, under the direction of Harris, of a guide so sure of himself as the American appeared to be, they could not be afraid of going astray. Here is the order of proceeding, which, as far as possible, would be observed during the journey: Dick Sand and Harris, both armed, one with his long gun, the other with a Remington, kept at the head of the little troop. Then came Bat and Austin, also armed, each with a gun and a cutlass. Behind them followed Mrs. Weldon and little Jack, on horseback; then Nan and Tom. In the rear, Acteon, armed with the fourth Remington, and Hercules, with a hatchet in his belt, closed the march. Dingo went backwards and forwards, and, as Dick Sand remarked, always like an uneasy dog seeking a scent. The dog's ways had visibly changed since the "Pilgrim's" shipwreck had cast it on this sea-coast. It seemed agitated, and almost incessantly it kept up a dull grumbling, rather lamentable than furious. That was remarked by all, though no one could explain it. As to Cousin Benedict, it had been as impossible to assign him an order of marching as Dingo. Unless he had been held by a string, he would not have kept it. His tin box strapped to his shoulder, his net in his hand, his large magnifying glass suspended to his neck, sometimes behind, sometimes in front, he scampered away among the high herbs, watching for orthopters or any other insect in "pter," at the risk of being bit by some venomous serpent. During the first hour Mrs. Weldon, uneasy, called him back twenty times. It was no use. "Cousin Benedict," she finished by saying to him, "I beg you very seriously not to go far away, and I urge you for the last time to pay attention to my entreaties." "Meanwhile, cousin," replied the intractable entomologist, "when I perceive an insect?" "When you perceive an insect," replied Mrs. Weldon, "you would do well to let it go in peace, or you will put me under the necessity of taking your box away from you." "Take away my box!" cried Cousin Benedict, as if it were a question of snatching away his heart. "Your box and your net," added Mrs. Weldon, pitilessly. "My net, cousin! And why not my glasses? You will not dare! No; you will not dare!" "Even, your glasses, which I forgot. I thank you, Cousin Benedict, for reminding me that I have that means of making you blind, and, in that way, forcing you to be wise." This triple menace had the effect of making him keep quiet - this unsubmissive cousin - for about an hour. Then he began to go away again, and, as he would do the same, even without net, without box, and without glasses, they were obliged to let him do as he pleased. But Hercules undertook to watch him closely - which quite naturally became one of his duties - and it was agreed that he would act with Cousin Benedict as the latter would with an insect; that is, that he would catch him, if necessary, and bring him back as delicately as the other would with the rarest of the lepidopters. That rule made, they troubled themselves no more about Cousin Benedict. The little troop, it has been seen, was well armed, and guarded itself carefully. But, as Harris repeated, there was no encounter to fear except with wandering Indians, and they would probably see none. At all events, the precautions taken would suffice to keep them respectful. The paths which wound across the thick forest did not merit that name. They were rather the tracks of animals than the tracks of men. They could only be followed with difficulty. So, in fixing the average distance that the little troop would make in a march of twelve hours at only five or six miles, Harris had calculated wisely. The weather, however, was very fine. The sun mounted toward the zenith, spreading in waves his almost perpendicular rays. On the plain this heat would be unbearable, Harris took care to remark; but, under those impenetrable branches, they bore it easily and with impunity. The greater part of the trees of this forest were unknown, as well to Mrs. Weldon as to her companions, black or white. However, an expert would remark that they were more remarkable for their quality than for their height. Here, it was the "banhinia," or iron wood; there, the "molompi," identical with the "pterocarpe," a solid and light wood, fit for making the spoons used in sugar manufactories or oars, from the trunk of which exuded an abundant resin; further on, "fusticks," or yellow wood, well supplied with coloring materials, and lignum-vitæs, measuring as much as twelve feet in diameter, but inferior in quality to the ordinary lignum-vitæs. While walking, Dick Sand asked Harris the name of these different trees. "Then you have never been on the coast of South America?" Harris asked him before replying to his question. "Never," replied the novice; "never, during my voyages, have I had occasion to visit these coasts, and to say the truth, I do not believe that anybody who knew about them has ever spoken to me of them." "But have you at least explored the coasts of Colombia, those of Chili, or of Patagonia?" "But perhaps Mrs. Weldon has visited this part of the new continent?" asked Harris. "Americans do not fear voyages, and doubtless - - " "No, Mr. Harris," replied Mrs. Weldon. "The commercial interests of my husband have never called him except to New Zealand, and I have not had to accompany him elsewhere. Not one of us, then, knows this portion of lower Bolivia." "Well, Mrs. Weldon, you and your companions will see a singular country, which contrasts strangely with the regions of Peru, of Brazil, or of the Argentine Republic. Its flora and fauna would astonish a naturalist. Ah! we may say that you have been shipwrecked at a good place, and if we may ever thank chance - - " "I wish to believe that it is not chance which has led us here, but God, Mr. Harris." "God! Yes! God!" replied Harris, in the tone of a man who takes little account of providential intervention in the things of this world. Then, since nobody in the little troop knew either the country or its productions, Harris took a pleasure in naming pleasantly the most curious trees of the forest. In truth, it was a pity that, in Cousin Benedict's case, the entomologist was not supplemented by the botanist! If, up to this time, he had hardly found insects either rare or new, he might have made fine discoveries in botany. There was, in profusion, vegetation of all heights, the existence of which in the tropical forests of the New World had not been yet ascertained. Cousin Benedict would certainly have attached his name to some discovery of this kind. But he did not like botany - he knew nothing about it. He even, quite naturally, held flowers in aversion, under the pretext that some of them permit themselves to imprison the insects in their corollas, and poison them with their venomous juices. At times, the forest became marshy. They felt under foot quite a network of liquid threads, which would feed the affluents of the little river. Some of the rills, somewhat large, could only be crossed by choosing fordable places. On their banks grew tufts of reeds, to which Harris gave the name of papyrus. He was not mistaken, and those herbaceous plants grew abundantly below the damp banks. Then, the marsh passed, thickets of trees again covered the narrow routes of the forest. Harris made Mrs. Weldon and Dick Sand remark some very fine ebony-trees, much larger than the common ebony-tree, which furnish a wood much blacker and much stronger than that of commerce. Then there were mango-trees, still numerous, though they were rather far from the sea. A kind of fur of white moss climbed them as far as the branches. Their thick shade and their delicious fruit made them precious trees, and meanwhile, according to Harris, not a native would dare to propagate the species. "Whoever plants a mango-tree dies!" Such is the superstitious maxim of the country. During the second half of this first day of the journey, the little troop, after the midday halt, began to ascend land slightly inclined. They were not as yet the slopes of the chain of the first plane, but a sort of undulating plateau which connected the plain with the mountain. There the trees, a little less compact, sometimes clustered in groups, would have rendered the march easier, if the soil had not been invaded by herbaceous plants. One might believe himself in the jungles of Oriental India. Vegetation appeared to be less luxuriant than in the lower valley of the little river, but it was still superior to that of the temperate regions of the Old or of the New World. Indigo was growing there in profusion, and, according to Harris, this leguminous plant passed with reason for the most usurping plant of the country. If a field came to be abandoned, this parasite, as much despised as the thistle or the nettle, took possession of it immediately. One tree seemed lacking in this forest, which ought to be very common in this part of the new continent; it was the caoutchouc-tree. In fact, the "ficus primoides," the "castilloa elastica," the "cecropia peltats," the "collophora utilis," the "cameraria letifolia," and above all, the "syphonia elastica," which belong to different families, abound in the provinces of South America. And meanwhile, a rather singular thing, there was not a single one to be seen. Now, Dick Sand had particularly promised his friend Jack to show him some caoutchouc trees. So a great deception for the little boy, who figured to himself that gourds, speaking babies, articulate punchinellos, and elastic balloons grew quite naturally on those trees. He complained. "Patience, my good little man," replied Harris. "We shall find some of those caoutchoucs, and by hundreds, in the neighborhood of the farm." "Handsome ones, very elastic?" asked little Jack. "The most elastic there are. Hold! while waiting, do you want a good fruit to take away your thirst?" And, while speaking, Harris went to gather from a tree some fruits, which seemed to be as pleasant to the taste as those from the peach-tree. "Are you very sure, Mr. Harris," asked Mrs. Weldon, "that this fruit can do no harm?" "Mrs. Weldon, I am going to convince you," replied the American, who took a large mouthful of one of those fruits. "It is a mango." And little Jack, without any more pressing, followed Harris's example, He declared that it was very good, "those pears," and the tree was at once put under contribution. Those mangos belonged to a species whose fruit is ripe in March and April, others being so only in September, and, consequently, their mangos were just in time. "Yes, it is good, good, good!" said little Jack, with his mouth full. "But my friend Dick has promised me caoutchoucs, if I was very good, and I want caoutchoucs!" "You will have them, Jack," replied Mrs. Weldon, "because Mr. Harris assures you of it." "But that is not all," went on Jack. "My friend Dick has promised me some other thing!" "What then, has friend Dick promised?" asked Harris, smiling. "Some humming-birds, sir." "And you shall have some humming-birds, my good little man, but farther on - farther on," replied Harris. The fact is that little Jack had a right to claim some of these charming creatures, for he was now in a country where they should abound. The Indians, who know how to weave their feathers artistically, have lavished the most poetical names on those jewels of the flying race. They call them either the "rays" or the "hairs of the sun." Here, it is "the little king of the flowers;" there, "the celestial flower that comes in its flight to caress the terrestrial flower." It is again "the bouquet of jewels, which sparkles in the fire of the day." It can be believed that their imagination would know how to furnish a new poetical appellation for each of the one hundred and fifty species which constitute this marvelous tribe of humming-birds. Meanwhile, however numerous these humming-birds might be in the forests of Bolivia, little Jack was obliged to still content himself with Harris's promise. According to the American, they were still too close to the coast, and the humming-birds did not like these deserts so near the ocean. The presence of man did not frighten them at the "hacienda;" they heard nothing all day but their cry of "teretere" and the murmur of their wings, similar to that of a spinning-wheel. "Ah! how I should like to be there!" cried little Jack. The surest method of getting there - to the "hacienda" of San Felice - was not to stop on the road. Mrs. Weldon and her companions only took the time absolutely necessary for repose. The aspect of the forest already changed. Between the less crowded trees large clearings opened here and there. The sun, piercing the green carpet, then showed its structure of red, syenite granite, similar to slabs of lapis-lazuli. On some heights the sarsaparilla abounded, a plant with fleshy tubercles, which formed an inextricable tangle. The forest, with the narrow paths, was better for them. Before sunset the little troop were about eight miles from the point of departure. This journey had been made without accident, and even without great fatigue. It is true, it was the first journey on the march, and no doubt the following halting places would be rougher. By a common consent they decided to make a halt at this place. The question then was, not to establish a real camp, but to simply organize a resting-place. One man on guard, relieved every two hours, would suffice to watch during the night, neither the natives nor the deer being truly formidable. They found nothing better for shelter than an enormous mango-tree, whose large branches, very bushy, formed a kind of natural veranda. If necessary, they could nestle in the branches. Only, on the arrival of the little troop, a deafening concert arose from the top of the tree. The mango served as a perch for a colony of gray parrots, prattling, quarrelsome, ferocious birds, which set upon living birds, and those who would judge them from their congeners which Europe keeps in cages, would be singularly mistaken. These parrots jabbered with such a noise that Dick Sand thought of firing at them to oblige them to be silent, or to put them to flight. But Harris dissuaded him, under the pretext that in these solitudes it was better not to disclose his presence by the detonation of a fire-arm. "Let us pass along without noise," he said, "and we shall pass along without danger." Supper was prepared at once, without any need of proceeding to cook food. It was composed of conserves and biscuit. A little rill, which wound under the plants, furnished drinkable water, which they did not drink without improving it with a few drops of rum. As to dessert, the mango was there with its juicy fruit, which the parrots did not allow to be picked without protesting with their abominable cries. At the end of the supper it began to be dark. The shade rose slowly from the ground to the tops of the trees, from which the foliage soon stood out like a fine tracery on the more luminous background of the sky. The first stars seemed to be shining flowers, which twinkled at the end of the last branches. The wind went down with the night, and no longer trembled in the branches of the trees. The parrots themselves had become mute. Nature was going to rest, and inviting every living being to follow her in this deep sleep. Preparations for retiring had to be of a very primitive character. "Shall we not light a large fire for the night?" Dick Sand asked the American. "What's the good?" replied Harris. "Fortunately the nights are not cold, and this enormous mango will preserve the soil from all evaporation. We have neither cold nor dampness to fear. I repeat, my young friend, what I told you just now. Let us move along incognito. No more fire than gunshots, if possible." "I believe, indeed," then said Mrs. Weldon, "that we have nothing to fear from the Indians - even from those wanderers of the woods, of whom you have spoken, Mr. Harris. But, are there not other four-footed wanderers, that the sight of a fire would help to keep at a distance?" "Mrs. Weldon," replied the American, "you do too much honor to the deer of this country. Indeed, they fear man more than he fears them." "We are in a wood," said Jack, "and there is always beasts in the woods." "There are woods and woods, my good little man, as there are beasts and beasts," replied Harris, laughing. "Imagine that you are in the middle of a large park. Truly, it is not without reason that the Indians say of this country, 'Es como el pariso!' It is like an earthly paradise!" "Then there are serpents?" said Jack. "No, my Jack," replied Mrs. Weldon, "there are no serpents, and you may sleep tranquilly." "And lions?" asked Jack. "Not the ghost of a lion, my good little man," replied Harris. "Ask your mama if she has ever heard tell of tigers on this continent." "Never," replied Mrs. Weldon. "Good!" said Cousin Benedict, who, by chance, was listening to the conversation: "if there are neither lions nor tigers in the New World, which is perfectly true, we at least encounter cougars and jaguars." "Are they bad?" asked little Jack. "Phew!" replied Harris; "a native has little fear of attacking those animals, and we are strong. Stay! Hercules would be strong enough to crush two jaguars at once, one in each hand!" "You will watch well, Hercules," then said little Jack, "and if a beast comes to bite us - - " "It is I who will bite it, Mr. Jack!" replied Hercules, showing his mouth, armed with superb teeth. "Yes, you will watch, Hercules," said the novice, "but your companions and I will relieve you, turn about." "No, Mr. Dick," replied Acteon, "Hercules, Bat, Austin, and I, we four will be enough for this labor. You must rest the whole night." "Thank you, Acteon," replied Dick Sand, "but I ought to - - " "No! let those brave men do it, my dear Dick!" then said Mrs. Weldon. "I, also; I shall watch!" added little Jack, whose eyelids were already closing. "Yes, my Jack, yes, you will watch!" replied his mother, who did not wish to contradict him. "But," the little boy said again, "if there are no lions, if there are no tigers in the forest, there are wolves!" "Oh! wolves in jest!" replied the American. "They are not even wolves, but kinds of foxes, or rather of those dogs of the woods which they call 'guaras.'" "And those guaras, they bite?" asked little Jack. "Bah! Dingo would make only one mouthful of those beasts!" "Never mind," replied Jack, with a last yawn; "guaras are wolves, because they are called wolves!" And with that Jack fell asleep peaceably in Nan's arms, beside the trunk of the mango. Mrs. Weldon, lying near her, gave a last kiss to her little boy, and her tired eyes quickly closed for the night. A few moments later Hercules brought back to the camp Cousin Benedict, who had just gone off to commence a chase for pyrophores. They are "cocuyos," or luminous flies, which the stylish put in their hair, like so many living gems. These insects which throw a bright and bluish light from two spots situated at the base of their corselet, are very numerous in South America. Cousin Benedict then counted on making a large collection, but Hercules did not leave him time, and, in spite of his recriminations, the negro brought him to the halting-place. That was because, when Hercules had orders, he executed them with military preciseness, which, no doubt, prevented the incarceration of a notable quantity of luminous flies in the entomologist's tin box. A few moments after, with the exception of the giant, who was watching, all were reposing in a profound sleep.
<urn:uuid:4921a4cd-50e7-4022-9803-d5482d0cb80a>
2013-05-23T18:59:16Z
CC-MAIN-2013-20
[ [ -0.004852294921875, 0.0247802734375, -0.004791259765625, 0.006256103515625, 0.0859375, -0.06005859375, -0.01177978515625, 0.10595703125, -0.006195068359375, -0.056640625, 0.050048828125, 0.0211181640625, 0.0159912109375, -0.0281982421875, 0.037841796875,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982237
4,801
http://www.literature.org/authors/verne-jules/dick-sand-a-captain-at-fifteen/part-01/chapter-16.html
0.167949
Home / News 14. CHAPTER XIV : KULAN TITH'S SACRIFICE (continued) "With Kar Komak, the bowman," he replied. "There will be fighting and forgetfulness." The girl put her hands before her eyes, as though to shut out some mighty temptation from her sight. "May my ancestors have mercy upon me," she cried, "if I say the thing I have no right to say; but I cannot see you cast your life away, Carthoris, Prince of Helium! Stay, my chieftain. Stay--I love you!" A cough behind them brought both about, and there they saw standing, not two paces from them Kulan Tith, Jeddak of Kaol. For a long moment none spoke. Then Kulan Tith cleared his throat. "I could not help hearing all that passed," he said. "I am no fool, to be blind to the love that lies between you. Nor am I blind to the lofty honour that has caused you, Carthoris, to risk your life and hers to save mine, though you thought that that very act would rob you of the chance to keep her for your own. "Nor can I fail to appreciate the virtue that has kept your lips sealed against words of love for this Heliumite, Thuvia, for I know that I have but just heard the first declaration of your passion for him. I do not condemn you. Rather should I have condemned you had you entered a loveless marriage with me. "Take back your liberty, Thuvia of Ptarth," he cried, "and bestow it where your heart already lies enchained, and when the golden collars are clasped about your necks you will see that Kulan Tith's is the first sword to be raised in declaration of eternal friendship for the new Princess of Helium and her royal mate!" This is page 140 of 144. [Mark this Page] Mark any page to add this title to Your Bookshelf. (0 / 10 books on shelf) Buy a copy of Thuvia, Maid of Mars at Amazon.com Customize text appearance: (c) 2003-2012 LiteraturePage.com and Michael Moncur. For information about public domain texts appearing here, read the copyright information and disclaimer.
<urn:uuid:af16115b-0969-4d14-8011-a22c1f967025>
2013-05-23T18:44:36Z
CC-MAIN-2013-20
[ [ -0.0038299560546875, 0.01397705078125, -0.01507568359375, 0.01611328125, 0.12158203125, -0.0537109375, -0.01422119140625, 0.07958984375, -0.0130615234375, -0.03857421875, 0.048583984375, -0.004241943359375, -0.00113677978515625, -0.00665283203125, 0.0332...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948377
489
http://www.literaturepage.com/read.php?titleid=maidofmars&abspage=140&changecolor=1
0.16789
Gamer Goddess Ch. 03byTx Tall Tales© Gamer Goddess Surrenders As mentioned in chapter 1, this story is very online-gaming-centric. It uses a lot of concepts, vocabulary and acronyms from games, especially Diablo 3, which this story revolves around. This chapter's a little less voyeuristic than the first two, so I went with the Group Sex category. It's just a recurring threesome. Could have been Romance, Erotic Couplings or even Loving Wives. I even gave thought to First Time, although 'technically' it wasn't her first. I'm sure you, the reader will let me know if I got it wrong. I had one last checkup with my doctor, and was given strict directions on how to take care of my wounds. I was forced to take the obligatory wheelchair ride, with a large escort. Dan, Jaime, Sandy, Maria, Angela, even Carolyn, Sheri's Mom. I was kind of disappointed that Sheri wasn't there. Sandy leaned over and gave me a kiss on the cheek. "Cheer up, handsome. How about a little smile. You're finally free." I forced a smile and Angela grabbed my hand and gave me a squeeze. "Lousy timing asshole. All the excitement, and I'm stuck in Spain. Next time give a girl a little heads up, Ok?" I laughed. "Sorry. What was I thinking? I promise, no more late night stabbings unless you're no more than a couple of hours away. Deal?" "No more late night stabbings period, dickbreath. Do I have to take you home and lock you in my attic, to keep you safe?" "Maybe just on Tuesdays and Thursdays," I told her, grinning. "You know Tuesdays and Thursdays are Mark's training nights." "Yes I do." She grinned, looking around at the crowd walking with us. "What are you saying, rotten man?" "Maybe you and me should spend some more time together," I teased. She leaned down and gave me a kiss on the cheek. "I thought you didn't like Maria and me. Stealing your guys away." I grabbed her hand, holding it. "I've been an ass. You know my issues. Forgive me?" Her smile was touching. "Nothing to forgive. Good to see you back. I think we all owe your girl a lot." "Tuesdays and Thursdays?" I chuckled. "Right. I heard what she did to the last guy that messed with you. No chance I'm getting on her bad side." She squeezed my hand. "Besides, you couldn't handle this." I was loaded into the Limo, Mark driving again, with Dan, Jaime, Maria and Angela joining me in the spacious interior. I was still sore and tender, and looked at Dan. His face was a rainbow of bruises. "Gotta tell you, buddy. The new look is an improvement." "Eat shit and die, asshole," he laughed. I had left Jaime alone, most of the last week, but the opportunity was too good. "Sheri tells me that one of those guys hit you so hard, he left you crying like an 8 year old. Tiny little girl beating the hell out of the bunch of 'em, and you're watering the alley." He blushed before responding. "Tears of laughter. Seeing you lying there like a little bitch, whining over a few pin-pricks, while you left your girlfriend to the do the heavy lifting. Just like in game." That got a laugh out of everyone. I was out of practice, on the losing end against Jaime of all people. What was the world coming to? We talked a little about our latest business venture, which Dan, Jaime and Mark were all invested in. Angela handled Mark's money and investments so the entire team was together for the first time in a week. I got updated on the status of our deal, with the papers signed, and first cash payments paid out, we were putting one of our guys on staff, and doing some deeper research into their technology. It had Jaime working with them on site, and Dan attending their staff meetings. We hadn't been this involved in a new business effort in years. Then again, $40 million was a lot of money. My share was almost a quarter of my worth, a huge risk. Oddly, I hadn't given it a thought in the last week, even with all my free time. We pulled up to the Carlyle, where I learned that Dan had moved me into one of their two-bedroom suites, with a remarkable view of Madison Avenue. I was a little nervous about the expense. Sure, money wasn't a problem, but a couple of weeks there would probably buy a luxury car. Dan reassured me the cost was reasonable, only around two grand, unlike the central tower suites which ran better than $8k a day. What a bargain. Inside the lobby, I said goodbye to everyone except Dan who escorted me to my suite. He handed me my keycard, and gave me a pat on the shoulder. "Don't strain yourself. Take it easy for a few days. Use the amenities here, you're paying for them." "Complete. New gear, matching your old, Jaime configured everything. You're good to go." I opened the door, and he stayed behind. I looked at him curiously, but he just grinned. "You got it from here." I walked past a small kitchenette and powder room into the luxurious living room. It wasn't going to be too tough to stick it out a while. Beautifully laid out, tasteful furniture, fireplace, and a stunning view from the 12th floor. I saw a door to my left, and looked in to a fully furnished office. The bed had been removed, and dual desks had been installed, face to face, each fully outfitted with a computer station and 32" monitors. Back through the living room, I found the entrance to the bedroom. I opened the door and smiled. "Hey sailor, in port for long?" Sheri asked, stretched out on the king-size bed. She was wearing one of her new outfits, a cobalt blue lace halter style babydoll, that showed off her beautiful breasts to their best advantage. Mostly sheer, with flowery designs throughout. "They'll let anybody in this place, won't they?" "You don't know the half of it. I had to fight off half-a-dozen sluts to keep you to myself." "You've always been a hell of a fighter." "Miss me?" she asked, squirming sexily. "You have no idea, gorgeous." She laughed sweetly. "I'd say I have a very good idea." She got up, and slipped into my arms. She tilted her head up and I kissed her, softly at first, then more passionately, until I groaned under the pain of a tight hug. I'd have to remind her to avoid the actual wounds. Wasn't worth interrupting the hug over. "Pussy," she teased, working my tie, and the buttons of my shirt free. I was dressed casually, clothing the guys had brought me for the trip home, so I wouldn't be stuck wearing my tux. My torso was completely wrapped, and she walked around me, her hands fluttering against my skin, her lips pressing against my back. "Don't you ever scare me like that again," she whispered. "I'll try not to." Her lips pressed against my shoulder, as her arms wrapped around my body, undoing my belt and opening my pants. I had been told she was past her contact-with-males issue, but this was still surprising. She dropped to her knees, leaned over and untied my laces. She nudged my leg up, and pulled off my shoes, one at a time. Still on her knees, she pulled my pants down, leaving me in my boxers and socks. Sheri drew me over to the bed, getting me to sit, and removed my socks. She ran her hands slowly up my legs, gently, lovingly. At my thighs she looked up at me. "You gave me this. This ability." She leaned over and kissed my skin, tenderly. I lay back and relaxed while she took her time becoming acquainted with my body. She avoided my boxers but a few minutes later her lips were on my neck, her soft body pressed against mine. My face was bathed in kisses, before her lips finally met mine. I don't know how long we spent there, quietly kissing, our lips joined, our breath one. Her tongue was gentle and tentative, then more forceful, teasing, battling, exploring. Our lips separated, my eyes boring into hers. "I love you, Sheri." She grinned. "No shit, Sherlock. I think you've made that pretty obvious. The whole fucking city knows about it by now. The man who'd fight three guys for his girl, ending up half-dead in the hospital for a week." "If you hadn't destroyed that one guy, I doubt it would have been newsworthy." She kissed me again. "I'm yours, big guy. What are you going to do with me?" She got up on her knees, and peeled off her top, sitting there in small blue lace panties. I started to rise, but she pushed me back down and brought her tits to my face. "The girls have been dying for this moment," she giggled. I kissed, fondled, and sucked away to my heart's content. She appeared to enjoy it, moaning sweetly. Her nipples were hard, standing up proud, and received more than their share of attention. Sheri backed away, and moved off of me. She pulled off her panties, then moved to my waist and pulled my boxers down. She was staring at my hard cock, and her hand moved forward tentatively, a single finger reaching out and touching me cautiously. She kept her eyes on it, lying down beside me, her fingers floating across my skin. Her breath was loud, heavy. She wrapped her fingers around my shaft and shivered. I held her close, my hand stroking her back. "Relax, baby. We don't have to do everything at once," I told her. She shook her head. "I want to. I need to, Steve." Sheri scooted down for a better view, her hand stroking me ever-so-slowly. Her grip loosened, and she curled her hand around the crown, her palm smearing my pre-cum across the head. "It feels so weird," she murmured. "An iron rod, wrapped in velvety skin. Hard and soft." She looked up at me. "I want to do it. Can we?" "I'd love to," I confessed. "You're sure?" I'd love to say it was the greatest ever. The culmination of all my dreams. Perfection personified. It was horrible. She straddled me nervously, holding me upright. She lowered herself and as soon as my skin touched hers, she started shaking and was soon sobbing, crying inconsolably. I drew her down into my arms, and she pulled away, rolling onto her side, her back to me. I left her alone for a few moments, before placing my hand on her shoulder. When she didn't struggle, I closed in behind her, holding her. I didn't say anything. She got herself together and turned into my arms, pressing her head into my neck. "I'm sorry. It'll get better." I hushed her. "We're rushing things. Take it easy. I love being here with you. Don't force it. I love you and I'm in no hurry. I'm going to spend the rest of my life with you, Angel. Time is not an issue." "I...I thought I was ready." We cuddled, kissed, and I was surprised when she wanted to try again. It was only slightly better. I actually settled the head between her lips before she lost it. After that, we stayed in bed for a while, holding each other, before getting up. I was suffering a pretty bad case of blue-balls, but wasn't about to say anything. We got dressed, and had a meal in the restaurant. I sent her off to the spa for some spoiling and relaxation, while I returned to the suite and checked on emails, trying to get a little work done. She was in a great mood when she returned to the suite. She was glowing, laughing, and leaped into my arms, stealing a kiss. "Game time?" I asked. "Hell yeah! We need to kick Diablo's ass in inferno. You've been slacking and we're behind." She got comfortable, wearing a t-shirt and panties. I dressed in shorts and a jersey. Turned out she'd had time to get setup, had her home keyboard and mouse hooked up. Our machines where back-to-back, and we sat down, facing each other. If I sat up high, I could see her over the top of the monitor. The guys were online, and Dan offered to sit out the final battle. He'd already completed it solo, and with a couple of teams. For the rest of us it would be the first time. We started about 3 save points from the end, to get warmed up. Half-an-hour later we were ready to face the final nemesis. With all the issues we had getting there, he went down remarkably easily, taking only about 5 minutes. We worked like a well-oiled machine, the two cannons firing from a distance, while Cherry and I took care of the melee. We had to be careful, and timed our moves to the animations, warning us before each of his big moves, giving us a chance to interrupt them. None of us died. When he went down, we were whooping it up, laughing. The loot was nothing to brag about, but we'd done it. End game. We bowed out of team play, and Sheri and I switched to our softcore alts, and went after him again. It was a little more difficult, with me running my Demon-hunter and Cherry playing her barbarian. It took a good 10 minutes, and it was close a couple of times, but we did take him down, talking throughout, planning our strategies, advising each other on our strategies and planned moves. I was ready to do some hardcore farming, when Sheri insisted on a break. "We're going to dinner," she told me. I was a little surprised. I thought we'd just spend some time together, relaxing but I realized my life wasn't my own anymore. We got dressed, with Sheri taking only about half-an-hour to get ready. My preparations were simple enough. Shirt, slacks and tie, another dose of pain-killers. Turned out we had reservations in-house. We were escorted to a candle-lit table, where Sandy and Robert were waiting. They both stood and welcomed us with hugs. Dinner was pretty amazing. The company was wonderful. Robert and I discussed what we did for a living. He was a lawyer, and I was stunned. The first lawyer I'd met that I could stand, to be honest. I even told him as much, and he laughed. He knew every lawyer joke ever made, and regaled us with a few. Robert was in mergers and acquisitions, and was familiar with the legal team I'd worked with on our latest investment. I knew that in the future, Robert's firm would at least get a shot at working with me. We lingered over our second bottle of wine and coffee. They were fun to be with, comfortable. I was feeling no pain, literally, by the time we were ready to call it an evening. I offered to have them come up and visit, but Robert excused himself. He kissed the girls goodbye, and insisted I meet with him for lunch in the upcoming week. Sandy agreed to join us, and we headed back up. I thought it was nice that the elevator operator, with his elegant white gloves, remembered us. "Your floor, Mr. Jeffery?" "Please," I glanced at his nametag, "William." He nodded, tipped his hat to the ladies who were chatting quietly. In the room, we settled into the living room, and Sandy hopped on the phone, ordering champagne and a snack from room service. I was sitting between the two beauties, when Sandy hung up the phone and pulled her dress all the way up to her waist before straddling me. "So it didn't go so well the first time," she said nonchalantly. "What do you say we play around and see what she is comfortable with? We can work our way up to the big finale. Nobody here is in that big a rush are they?" She was grinding away on my lap, her arms casually resting on my shoulders, looking me in the eye. "No hurry here," I told her. I looked over at Sheri, "That alright with you?" She nodded slowly. "I'm sorry..." Sandy leaned over and gave her a kiss on the lips, shutting her up. "No sorries, silly girl. We're both ecstatic to see how far you've gotten. No need to go crazy the first night. Let's drag it out." She sat back upright, and ran her fingers through my hair. "Now don't think I'm selfish, but I figured maybe you both could play with me. Nobody seems to have a problem with that. Then anything you two want to do together can be an offshoot of that." I think my grin was answer enough for her. She turned toward Sheri. "That work for you?" Sheri leaned against me, reaching out and running her hand down Sandy's side. "I'd like that." "Good," Sandy said. "The zipper's on the back. Undress me for your man." Sheri stood up and moved behind her best friend. She slowly drew the zipper down, her lips brushing Sandy's shoulder as it was slowly uncovered. Then she gripped the bottom of Sandy's dress, and pulled it up and over her head, leaving her sitting on my lap, completely naked. "Oops!" Sandy giggled. "I guess I forgot underwear. I hope you both will forgive me." Sheri dropped to her knees, her arms wrapped around Sandy's waist. I wish I could see what was going on behind her. I leaned forward and took a nipple in my mouth, sucking on it, feeling the nipple harden. She had amazing tits, high and firm, smaller than Sheri's but perfect on her body. The doorbell to the suite rang at that moment. Of course. Sheri stood, grabbed my jacked and wrapped it around Sandy's shoulders, then went to the door. A moment later a bellboy was wheeling in a cart, with a bottle of champagne, and a plate of chocolate covered cherries. Sheri signed for it, while the young man's eyes tried to burn a hole through Sandy's impromptu cover-up. She was leaning against me, still straddling my lap, her long, luscious legs exposed. Her head was resting on my shoulder, watching the poor boy. He walked the cart right into a chair, apologizing and blushing profusely. As soon as he was gone, Sandy hopped off of me, shedding the jacket. She grabbed the handle of the cart that had been left behind, and started steering it to the bedroom. "Let's go," she laughed, "and two people here are wearing way too much clothing." In minutes there were three of us naked on the bed, cuddling and kissing, with Sandy in the middle. Sheri and I took turns kissing and feeding her, then kissing and feeding each other. If we spent too much time away from Sandy, she reminded us. It was better. Playful, casual. Lots of touching and fondling, kissing and licking. Nothing overtly sexual, except for a lot of breast play. I was achingly hard, and Sandy was kind enough to notice. "Did you try to blow him earlier?" she asked her cousin. Sheri shook her head no. "Well I'm going to. If you want, come on down here. Any time you feel like helping, jump in." With no more adieu than that, she squirmed her way down the bed, and took me in her mouth. Sheri laughed. "Looks like you're pretty comfortable down there." Sandy pulled off with a loud sucking pop. "Twice a day for the last few, thanks to you. You'd get him all worked up, and leave me to clean up after you. Looks like you did it again. He's ready to pop any moment." Sheri blushed. "Damn! I...I guess I should have helped him finish when I couldn't go through with the whole thing." Sandy giggled. "No sweat. Good for him to get teased a bit. We spoil him too much anyway. We'll finish this one off quick, and then we have the whole night ahead of us." She gave me a lick. "Kiss it?" she said to Sheri. Sheri leaned over and pressed her lips quickly to the shaft. She looked up at me, grinning, and brought her face down again, kissing it more slowly, several small kisses, working her way upward, until she placed a kiss on the very top. Sandy moved in and did the same on the opposite side, her final kiss extended, her lips slowly opening, as she took me into her mouth. She bobbed up and down a couple of times, then pulled back, and pointed my cock toward Sheri. Sheri was a little hesitant, but she kissed the crown a couple of times, her tiny tongue reaching out and running along the bottom ridge, making me moan. She looked up nervously, then smiled. "Yeah, he enjoyed that. It takes a lot for me to get him to moan that way. I think he likes you," Sandy said. It took a few minutes, with Sandy doing most of the work, but Sheri did, at one point, take me in her mouth for a moment, before pulling away. "Jesus, that was nice, Sheri," I gasped. She giggled. "I'm hardly doing anything," she said. "Maybe, but it's you doing it," I told her. I was dying, and Sandy took pity on me. She sucked me for real, taking me deep, working her tongue. Sheri's hand reached down to the base, moving up and down just a couple of inches.
<urn:uuid:d1bf767e-a791-4967-915f-18808ee85e6c>
2013-05-23T18:45:01Z
CC-MAIN-2013-20
[ [ 0.003326416015625, 0.010498046875, 0.00433349609375, 0.0032501220703125, 0.083984375, -0.01287841796875, 0.00543212890625, 0.083984375, -0.047607421875, -0.051513671875, 0.055419921875, 0.01068115234375, 0.0277099609375, -0.018310546875, 0.04345703125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988807
4,861
http://www.literotica.com/s/gamer-goddess-ch-03
0.313518
Earth from Space: Easter Island Easter Island as seen by astronauts aboard the International Space Station on Sept. 25, 2002. On Easter Sunday in 1722, Dutch explorer Jacob Roggeveen became the first known European to encounter this Polynesian island and gave it the name it has become most widely known by. Easter Island (also known as Rapa Nui in the native language) is one of the most isolated spots on Earth, lying some 2,000 miles from the nearest areas of human habitation (Tahiti and Chile) — even more remote than the astronauts orbiting at 210 nautical miles above the Earth.. The island, which is only 15 miles long, was annexed by Chile in 1888. (In Spanish, it is called "Isla de Pascua," which means "Easter Island.") Archaeological evidence suggests that Polynesians from other Pacific Islands discovered and colonized Easter Island around the year 400. The island and its early inhabitants are best known for the giant stone monoliths, known as Moai, placed along the coastline. It is thought that the population grew bigger than was sustainable on the small island, resulting in civil war, deforestation and near collapse of the island ecosystem . Today, a new forest (primarily eucalyptus) has been established in the center of the island (the dark green in the image), according to a NASA statement. Volcanic landforms dominate the geography of the island, including the large crater Rana Kao at the southwest end of the island and a line of cinder cones that stretch north from the central mountain. Near Rana Kao is the longest runway in Chile, which served as an emergency landing spot for the space shuttle before its retirement in 2011. MORE FROM LiveScience.com
<urn:uuid:02e8e579-65c8-4c0a-b405-7a29e289fea9>
2013-05-23T19:06:26Z
CC-MAIN-2013-20
[ [ -0.019473522901535034, 0.026477832347154617, -0.019704433158040047, 0.012007389217615128, 0.06280788034200668, -0.07543103396892548, -0.006157635245472193, 0.10406403988599777, -0.005926724057644606, -0.036483991891145706, 0.08559112995862961, 0.040640395134687424, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966228
370
http://www.livescience.com/31329-easter-island-image.html
0.340028
Ray Buckland has been actively involved in the occult for over fifty years and was responsible for introducing Gardnerian Wicca to the United States. He has written over two dozen books; has had numerous articles published in magazines and newspapers; has appeared on many TV shows; and has worked as a technical advisor on movies and stage productions. I am very lucky to know Ray, and the metaphysical world should be thankful that he shares his learning with us. Practical Candleburning Rituals is one of his most popular books, and rightly so. Hundreds of thousands of people use it as a guide to simple, practical, powerful, and usable magic on a daily basis. There are three reasons you should use this book, too. First, if you have never done any sort of magic before, this book is an ideal introduction to the subject from a practical point of view. Second, although many people are involved in Pagan religions, many others are involved in Christianity. Most of the rituals in this book are presented in two ways, one for Pagans and one for Christians. This book can really be used by just about anyone. Third, by practicing the techniques in this book, you'll learn the underpinnings of magic. In no time you'll be able to come up with your own rituals based on the ones listed. When you can design your own rituals, and be successful with them, you will truly be a magician. And the place to start is with this book. The sands of time cannot erase the ancient ways of the Middle East. Generations of selective history and the destruction of sacred sites cannot destroy them. Elusive, like shimmering heat from a sun-warmed mudbrick, the magic endures. Cast your eyes over the ruins glittering in the golden sun and embrace their foundation. The sun set on the... read this article
<urn:uuid:10c13616-9cf6-4497-b9fd-b7473eeea273>
2013-05-23T19:05:28Z
CC-MAIN-2013-20
[ [ -0.03192124143242836, -0.0034680787939578295, -0.005630966741591692, 0.009061753749847412, 0.06175417825579643, -0.04295942559838295, 0.002796837594360113, 0.09725537151098251, -0.02431384287774563, -0.03296539559960365, 0.05190930888056755, 0.010739856399595737, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973024
379
http://www.llewellyn.com/product_publisher_reviews.php?ean=9780875420486
0.172449
High blood pressure, or hypertension, affects almost one in three adults in the United States. However, this serious health condition isn't limited to just those ages 18 and older. The number of children and adolescents with high blood pressure is increasing. This rise can be partly blamed on the increasing number of overweight and obese children. High blood pressure is a major risk factor for heart disease and is the primary risk factor for stroke. Prehypertension is a condition that increases a child's risk of developing high blood pressure in the future. Children with hypertension have a higher risk for high blood pressure as adults. High blood pressure in childhood is also correlated with early development of atherosclerosis in adulthood. Systolic pressure is the top number in a blood pressure reading and corresponds to the pressure in arteries when the heart contracts. Diastolic pressure is the bottom number in a blood pressure reading, and corresponds to the pressure in the arteries between heart beats, when the heart relaxes. The American Academy of Pediatrics recommends that children ages 3 years and older have their blood pressure measured each time they see their health care provider for routine checkups. Normal blood pressure in children depends on their gender, age, and height. Parents and health care providers encourage children with high blood pressure to make lifestyle changes, such as losing weight. Other changes may include increased exercise and improved diet. A doctor may also give a child prescription medication to help control blood pressure. Regular exercise helps control weight and may keep blood pressure in check. Regular exercise means 30 to 60 minutes of moderate physical activity on most days. Sedentary activities should be limited to less than two hours a day. A healthy diet for a child with prehypertension or high blood pressure includes fresh vegetables and fruits, additional fiber, and nonfat dairy products, as well as limited salt and sodium. The American Heart Association recommends a maximum daily sodium intake of 1,500 mg/day; however, this number may be lower, depending on your child's age and other health considerations. Please consult your child's pediatrician regarding the recommended sodium intake for your child.
<urn:uuid:83301d2b-55fc-46d7-9610-72e8d22fefa8>
2013-05-23T18:33:07Z
CC-MAIN-2013-20
[ [ -0.005880021024495363, 0.024180760607123375, 0.02497357316315174, -0.0033198995515704155, 0.0919661745429039, -0.10887949168682098, -0.0025601214729249477, 0.08773784339427948, -0.018234672024846077, 0.0061773257330060005, 0.09408033639192581, 0.05232558026909828, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941197
427
http://www.lnrmc.com/health-education/1,2650
0.493311
South Korea (officially, Republic of Korea) encompasses an area of 98,477 sq. km. (38,022 sq. mi.), about the size of state of Indiana. Its capital is Seoul (population 10.3 million); other major cities are: Busan, Daegu, Inchon, Gwangju, Daejeon, and Ulsan. The terrain of South Korea consists of forested mountain ranges separated by deep, narrow valleys and cultivated plains along the coasts. South Korea is bordered by North Korea to the North and is surrounded by the Sea of Japan, Korean Strait, and Yellow Sea. An independent Korean state or a collection of states has existed almost continuously for several millennia. Between its initial unification in the 7th century, until the 20th century, Korea existed as a single independent country. In 1905, following the Russo-Japanese War, Korea became a protectorate of imperial Japan, and in 1910 it was annexed as a colony. Korea regained its independence following Japan's surrender to the United States in 1945. After World War II, the Republic of Korea (ROK) was set up in the southern half of the Korean Peninsula. During the Korean War (1950-53), US troops and UN forces fought alongside soldiers from the ROK to defend South Korea from Democratic People's Republic of Korea attacks supported by China and the Soviet Union. An armistice was signed in 1953, splitting the peninsula along a demilitarized zone at about the 38th parallel. After 1953, South Korea achieved rapid economic growth. In 1993, Kim Young-sam became South Korea's first civilian president, following 32 years of military rule. In June 2000, a historic North-South summit took place between South's President Kim Dae-jung and the North's leader Kim Jong Il. The natural hazards facing South Korea consist of occasional typhoons bringing high winds and floods and low-level seismic activity. In 2004, South Korea's oil consumption was 2.149 barrels per day (bbl/day); its exports were 644,100 bbl/day and imports were 2.83 million bbl/day. U.S. State Department Background Notes; CIA World Factbook, 2007/9; 2007/12
<urn:uuid:3701a0ff-43ac-4036-b785-8394f1550363>
2013-05-23T19:05:32Z
CC-MAIN-2013-20
[ [ -0.004730224609375, 0.0380859375, -0.0250244140625, 0.030517578125, 0.0546875, -0.06787109375, -0.033447265625, 0.1025390625, -0.005706787109375, -0.03173828125, 0.0732421875, 0.01611328125, 0.025390625, -0.01385498046875, 0.0220947265625, 0.00017929...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956092
460
http://www.loc.gov/today/placesinthenews/archive/2007arch/20071210_southkorea.html
0.959297
Well, there are a lot of errors with your sentence structure, and a lot of punctuation and grammar errors in this as well. It is not entirely bad for the first chapter but...she does seem a bit Mary-sueish in that she's just randomly walking down a road and comes upon Glorfindel who takes her for a ride on his white horse into the sunset... Tell us more about this character, and maybe get a beta reader for those sentence structure errors Ex: "Two hours later I take a break and sit down next to the road to eat. Yesterday I had found some red berries. Some birds were eating them so I decided that they probably weren't poisonous. I have collected enough to last me a few days, my trouser pockets are full of them. Looking up I check the position of the sun, it is just barely touching the mountaintops in the distance. I get back on the road and continue walking. An hour later the sky clears and the sun starts to shine." This Paragraph was very stilted, so try working on the flow of your sentences using connecting words. Ex: "The rest of the body is also protesting it doesn't like fast movements at the moment." There should be an 'as' or something similar between 'protesting' and 'it doesn't' Ok, those are just some tips, hope it helps. Author's Response: Thanks for your review. I know I need a beta reader but so far I haven't found someone who wants to do it for me. And believe me she won't be a Mary-Sue at least I don't intend for her to be. Would you tell me after I have uploaded the next two parts of chapter one if you still think she is a bit Mary-sueish? Thanks I appreciate your tips and I hope you give more in the future.
<urn:uuid:f7b12cbb-174d-4fa4-b5a6-94f0dd27b4f7>
2013-05-23T18:59:57Z
CC-MAIN-2013-20
[ [ -0.03552158176898956, 0.006894484627991915, 0.005807853769510984, 0.010566546581685543, 0.07314148545265198, -0.04466426745057106, 0.009442445822060108, 0.07224220782518387, -0.01776079088449478, -0.02817745879292488, 0.031474821269512177, 0.01491306908428669, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981176
386
http://www.lotrfanfiction.com/reviews.php?type=ST&item=13853
0.324284
Hong Kong Flights Find the lowest airfare to Hong Kong. Find cheap airline tickets to Hong Kong, In its multi-faceted role as a repository of traditional Chinese culture, the last jewel in the crown of the British Empire and one of the key economies of the Pacific Rim, HONG KONG is East Asia's most extraordinary city. The territory's per capita GNP, for example, has doubled in a decade, overtaking that of the former imperial power. Yet the inequality of incomes is staggering: the conspicuous consumption of the few hundred super-rich (all Cantonese) for which Hong Kong is famous tends to mask the fact that most people work long hours and live in crowded, tiny apartments. - All rates are quotes in US Dollars - Our site only accepts US addresses, phone numbers and credit card billing addresses In spite of this, the population of almost seven million is generally sophisticated and well informed compared to their mainland cousins, the result of a vibrant and free press (although self-censorship is a constant and growing concern). The territory is currently the largest trading partner and largest source of foreign investment for the People's Republic of China, a country of 1.2 billion people. And the view of sky-scrapered Hong Kong Island, across the harbour from Kowloon, is one of the most stunning urban panoramas on earth. The territory of Hong Kong comprises an irregularly shaped peninsula abutting the Pearl River Delta to the west, and a number of offshore islands, which cover in total more than a thousand square kilometres. The bulk of this area, namely the land in the north of the peninsula as well as most of the islands, is semi-rural and is known as the New Territories - this was the land leased to Britain for 99 years in 1898. The southern part of the peninsula, known as Kowloon , and the island immediately south of here, Hong Kong Island , are the principal urban areas of Hong Kong. They were ceded to Britain in perpetuity, though the British government in 1984 saw no alternative but to agree to hand back the entire territory as one piece, so that from midnight on June 30, 1997, it has been the Hong Kong Special Administrative Region (SAR) of China. The island of Hong Kong offers not only traces of the old colony - from English place names to ancient trams trundling along the shore - but also superb modern architecture and bizarre cityscapes of towering buildings teetering up impossible slopes, as well as unexpected opportunities for hiking and even bathing on the beaches of its southern shore. Kowloon, in particular its southernmost tip, Tsimshatsui , is where many visitors end up staying. This is not only the budget accommodation centre of Hong Kong, but also the most cosmopolitan area of perhaps any Chinese city, with a substantial population of immigrants from the Indian subcontinent. And as the territory's principal tourist trap, it boasts more shops offering a greater variety of goods per square kilometre than anywhere in the world (not necessarily at reasonable prices, though). North of Tsimshatsui, Kowloon stretches away into the New Territories, an area of so-called New Towns as well as ancient villages, secluded beaches and rural tranquillity. In addition, there are the offshore islands , which are well worth a visit for their fish restaurants, scenery and, if nothing else, for the experience of chugging about on the inter-island ferries . The islands of Lamma and Lantau , in particular, offer a relatively rural and traffic-free contrast to the hubbub of downtown Hong Kong. Some visitors dislike the speed, the obsessive materialism and the addiction to shopping, money and brand names in Hong Kong. As in many a Western city, the locals are reserved towards strangers, and, with its perennial massive engineering projects (something else which hasn't been changed by the handover), downtown is certainly not a place to recover from a headache. On the other hand, it's hard not to enjoy the sheer energy of its street- and commercial life, which continues despite the uncertainties over the long-term future of the city Flight to Hong Kongwith Lowest-airfare.com!
<urn:uuid:19bfd303-63e0-4a2e-aa29-cede00d0a333>
2013-05-23T18:45:20Z
CC-MAIN-2013-20
[ [ 0.004974365234375, 0.039306640625, -0.00811767578125, 0.01611328125, 0.0712890625, -0.06884765625, -0.03271484375, 0.11083984375, 0.0023345947265625, -0.0027008056640625, 0.09033203125, 0.0167236328125, 0.0302734375, -0.0087890625, 0.0257568359375, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952721
875
http://www.lowest-airfare.com/airline-tickets/cheap-flights-to-hong-kong.php
0.263979
I can't think of a solo album by Mike where he sings all the vocals, I mean, when you hear Mike singing in Linkin Park, his verses are 95% the quieter ones (IB, BITS, Blackout HHH, the LT songs, etc.), and I'm not sure if he can pull a wide enough range of vocals to sustain an album. There is No Roads Left though, but it's more of an exception. He's an awesome musician, but he's not ready for that... Yet. mike is good in LP if he made a solo album it would be interesting cant say it will happen though Path of the Sith Peace is a lie, there is only passion. Through passion, I gain strength. Through strength, I gain power. Through power, I gain victory. Through victory, my chains are broken. The Force shall free me. Path of the Jedi There is no emotion, there is peace. There is no ignorance, there is knowledge. There is no passion, there is serenity There is no chaos, there is harmony There is no death, there is the Force He probably could and it would still beat Meteora(high five!) When Mike sings, he has a sincereness to his voice. I would rather see that focused into more Linkin Park songs rather than another side project. HAVE YOU EXPERIENCED PICTUREBOARD YET? The cycle repeated as explosions broke in the sky all that I needed was the one thing I couldn't find And you were there at the turn waiting to let me know We're building it up to break it back down We're building it up to burn it down We can't wait to burn it to the ground The colors conflicted as the flames climbed into the clouds I wanted to fix this but couldn't stop from tearing it down And you were there at the turn caught in the burning glow And I was there at the turn waiting to let you know You told me yes you held me high And I believed when you told that lie I played that soldier you played king And struck me down when I kissed that ring You lost that right to hold that crown I built you up but you let me down so when you fall I'll take my turn and fan the flames as your blazes burn His passion first is Linkin Park. I would say his second passion and his very first in the beginning is hip-hop/rap. So I couldnt see him putting an honest effort into a project like that. It would be interesting though. This aint no sham. I am what I am. I'll leave no tide for a cynic's mind. Agent O:Derek Long is the Ron Jeremy of LPA Although I love Mike singing, I donīt think there is a need of a solo project, he just should sing more with LP as he does in Living Things. Besides, like some others in here, I donīt think he would be interested in such a project. I couldnīt compare Mike and Chester singing, because I love them both singing, but I guess that Chester has a wider spectre of using his voice as he is much more experienced in that. Last edited by Maemi; 08-01-2012 at 12:17 PM. There are currently 1 users browsing this thread. (0 members and 1 guests)
<urn:uuid:36b59234-03e6-4aed-8df3-5e1f840a20f2>
2013-05-23T18:53:04Z
CC-MAIN-2013-20
[ [ -0.034423828125, -0.0037384033203125, -0.0022430419921875, 0.000751495361328125, 0.0859375, -0.050537109375, -0.0011749267578125, 0.10546875, -0.01708984375, -0.038330078125, 0.0517578125, 0.0164794921875, 0.0296630859375, 0.032470703125, 0.039306640625,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.979947
721
http://www.lpassociation.com/forums/showthread.php?t=37088&page=3
0.188044
Historical diversification of migration patterns in a passerine bird Förlag: Society for the Study of Evolution Migratory strategies of birds require complex orientation mechanisms, morphological adaptations, and life-history adjustments. From an evolutionary perspective, it is important to know how fast this complex combination of traits can evolve. We analyzed mitochondrial control-region DNA sequences in 241 blackcaps (Sylvia atricapilla) from 12 populations with different migratory behaviors. The sample included sedentary populations in Europe and Atlantic archipelagos and migratory populations with different distances of migration, from regional to intercontinental migrations, and different heading directions (due to a migratory divide in central Europe). There was no genetic structure between migratory and sedentary populations, or among populations from different biogeographic areas (Atlantic islands, the Iberian Peninsula, or the continent), however we found evidence of a genetic structure when comparing populations located on either side of the migratory divide. These findings support an independent evolution of highly divergent migratory strategies in blackcaps, occurring after a postglacial colonization of the continent along western and eastern routes. Accordingly, mismatch-distribution analyses suggested an expansion of blackcaps from a very small population size, and time estimates dated such an expansion during the last postglacial period. However, the populations in Gibraltar, located in a putative Mediterranean refuge, appeared to be independent of these processes, showing evidence of restricted gene flow with other populations and demonstrating insignificant historical changes in effective population size. Our results show that the interruption of gene flow between migratory and sedentary populations is not necessary for the maintenance of such a polymorphism, and that even the most divergent migratory strategies of a bird species are susceptible to evolution in response to historical environmental changes. - Biology and Life Sciences - Molecular Ecology and Evolution Lab - ISSN: 0014-3820
<urn:uuid:45ee2487-eb43-419e-9772-0b745f90bff8>
2013-05-23T19:00:13Z
CC-MAIN-2013-20
[ [ 0.015625, 0.005910326261073351, 0.0052309781312942505, 0.030978260561823845, 0.08043478429317474, -0.11032608896493912, -0.005706521682441235, 0.11358695477247238, -0.011684782803058624, 0.0030230977572500706, 0.08423913270235062, 0.0038383151404559612, -0.07010...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.842244
384
http://www.lu.se/lup/publication/136904
0.301547
The .git file uses an annoying vector system for determining the rotation of a character. The values are entered in the XOrientation fields in the Creature List structure. I have not seen any tutorials on this, so I thought I would post the information I have. OK, imagine that your character is standing in the center of a giant peice of graph paper at the intersection of the X and Y axes. This is the 0,0 coordinate. By default, the character is facing due North. The y axis runs N-S, the x axis runs E-W. North and East are positive values, South and West are negative values. In order to determine the direction that your character is going to face, you have to draw a line from the 0,0 coordinate to an x,y coordinate. If your x,y=1,1 the line would run NE at a 45 degree angle. We'll call this 45E, since it would rotate the character 45 degrees to the East. If you want your character rotated 45 degrees to the West, your line would go from 0,0 to -1,1. In other words, you would have determined the angle by going 1 gridline to the West (-1), and 1 gridline to the North (1). In the .git file, you would enter -1 in the XOrientation field, and 1 in the YOrientation field. My math skills are not good enough to come up with a formula to convert angles to vectors, so I got some graph paper and a protractor and came up with this: 0 (due N)= 0,1 180 (DUE s)= 0,-1 So, if you want your character facing 30 Degrees to the NorthEast, you would enter 4 as the X and 7 as the Y orientations. North is "up" on the mini-map in most of the modules, and most characters face North when you enter a 0,1. One module (I forget which) is rotated so that E or W is "up", and some characters, such as Zax, are 90 degrees off. Hopefully, someone who has an easier way of dealing with the vector system will read this and post their wisdom. Edit: This does not work with doors and placeables, which use a different type of unit in a field called Bearing The "bearing" measurements for doors and placeables in the .git file use radians instead of degrees.
<urn:uuid:b0987046-0fae-4f40-87bf-7da8b0c84001>
2013-05-23T19:00:11Z
CC-MAIN-2013-20
[ [ -0.0211181640625, -0.005706787109375, -0.00836181640625, -0.007415771484375, 0.0123291015625, -0.06591796875, 0.0240478515625, 0.09765625, -0.0235595703125, 0.0052490234375, 0.1083984375, 0.007080078125, 0.0252685546875, 0.03369140625, 0.01373291015625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.893151
512
http://www.lucasforums.com/showpost.php?p=2408884&postcount=1
0.713256
X-Men, also known as X-Men: The Animated Series, is an American animated television series which debuted on October 31, 1992 in the United States on the Fox Network as part of its Fox Kids Saturday morning lineup (see 1992 in television). … see full wiki Normal humans live in constant fear of a race called mutants, and sometimes with very good reasons. Mutants are people who are born with special powers ranging from telekinesis, to manipulation of the weather. Humanity's fear causes them to act out in very negative and violent ways. A mutant by the name of Charles Xavier has a dream. He believes that one day humans and mutants can coexist in peace, and to help see his dream realized, Xavier created the X-Men. A team of mutants who are every bit as determined to see the dream come to reality. But, there are humans and mutants who don't share the same beliefs, and they're every bit as determined to see their own dream realized. X-Men Volume One X-Men Volume Two X-Men Volume Three X-Men Volume Four: Life never seems to get any better for the X-Men. After barely surviving the conflict with The Dark Phoenix, which took place during The Dark Phoenix Saga. They soon find themselves locked in battle with a young, and very powerful mutant named Proteus. Later, Magneto returns with a plan to segregate all mutants from the human race, by offering all mutants haven on his base, and things only get worst when the immortal mutant Apocalypse returns in an attempt to reshape time. -summary I'm not at all surprised that the series still some how managed to remain interesting up to this point. Normally, when series run past a certain number of episodes they begin to over stay their welcome, due to redundancy or lacking of good ideas. However, X-Men had been running for so many years by this time. One would have to believe it impossible for the writers to actually run out of fresh material, with so many stories they can pull from the comic. This volume opens up by introducing Proteus, who happens to be a young, yet very powerful and dangerous mutant, whose powers are only limited by his imagination. This young boy has the ability to completely transform and reshape reality with only a mere thought. The action scenes against this out of control mutant are simply amazing. Words can't really do this two parter justice because it has to be seen to really understand where I'm getting at, but what makes this character interesting is his very realistic and down to earth motive, which has nothing to do with world domination or even genocide. The next two story arcs are clearly the best, and are the biggest reasons to see this volume. The two parter called Sanctuary begins when Magneto invades a conference, and forces the members to hear him out. Magneto truly sounds as if he has finally had enough of mutant oppression, and mutant liberation truly begins now. Those who are familiar with the comic, will quickly see where this one's headed once another mutant by the name of Fabian Cortez is introduced. The best of the volume is the four part series Beyond Good and Evil. Apocalypse travels from the time of 3999 to the present, with the intention of capturing all existing mutant psychics, in order to obtain his final victory. This chapter contains the best action scenes and many character appearances, most notably the return of the time travelers Bishop and Cable. Wolverine even mentions that it seems as if every mutant on earth is involved. This is a very good chapter complete with betrayals. The voice acting deserves a lot of credit this time around. Most notably in regards to Magneto who is voiced by David Hemblem. I feel his character was very well acted during the Sanctuary chapter. Overall, there are quite a few good and very fun performances as always. The animation is airtight for the most part, but the first two episodes don't appear to be of the same quality. The artwork is still very good with the female psychic Psylocke being the standout of the female characters, and appearing almost as sexy as she does in the comic. The soundtrack is still strong but it doesn't really give off that epic feel, which was so well done during The Phoenix Saga. This volume does have its problems. One stands out in regards to the Beyond Good and Evil arc, and it's the character development. Several of the characters but most notably Psylocke, happens to be poorly developed, and unless the viewer has extensive comic book knowledge of the villains gallery, in this case, the Fantastic Four or Avengers. They won't understand the purpose of a certain character who makes a brief cameo at the end of the arc. Another problem that I have is with the second disk, which I actually do believe is more a matter of taste. These episodes for me were hard to get through. The entire second disk is packed with uninteresting stand alone episodes. Perhaps these episodes didn't appeal to me because the entire first half was so good. In any case, I didn't care for them and they felt too much like filler, but don't take this comment the wrong way, the episodes aren't really bad. This is the episode listing spread across the two disk set: 49) Proteus Part 1 50) Proteus Part 2 51) Sanctuary Part 1 52) Sanctuary Part 2 53) Beyond Good and Evil Part 1: The End of Time 54) Beyond Good and Evil Part 2: Promise of Apocalypse 55) Beyond Good and Evil Part 3: The Lazarus Chamber 56) Beyond Good and Evil Part 4: End and Beginning 57) Have Yourself a Morlock Little X-Mas 58) The Lotus and the Steel 59) Love in Vain 60) Secrets, Not Long Buried 61) Xavier Remembers 62) Family Ties Although this volume isn't on the same level as the second and third volumes. This is still a solid set, with the first disk being worth the price tag alone. Like the previous volumes, the series is still fine for kids to watch. It can also be enjoyed by non fans of the comic. In fact, to my experience, non fans seem to enjoy the series more. Fans of the comic book, as I mentioned many times before. It's better to come in with an opened mind, and try to enjoy the series. This volume has a 322 minute run time. -Still entertaining with the first half being the best -Second half lacking the style of the first What did you think of this review? Third volume of animated series. Second volume of animated series
<urn:uuid:729b11f6-a6b8-4d81-9ab3-762347e01bf6>
2013-05-23T19:06:43Z
CC-MAIN-2013-20
[ [ -0.010986328125, -0.00616455078125, -0.00848388671875, 0.01483154296875, 0.07421875, -0.02001953125, -0.012451171875, 0.115234375, -0.002471923828125, -0.033935546875, 0.052490234375, 0.0128173828125, 0.00982666015625, 0.016845703125, 0.033447265625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973682
1,371
http://www.lunch.com/Reviews/movie/X_Men_Volume_4_Marvel_DVD_Comic_Book_Collection_-1436520.html
0.165936
love the Creator. my family and friends. love peace, justice and equality. love learning. love school. love music [of course the Fiasco himself...]. love singing and playing my keyboard and trumpet. love poetry. love life and love. love sports.love traveling. love happiness, pain, joy, anger and all that's in-between. love people. love my community. love when people are at their full potential. love when people create better opportunities for themselves and others in a positive way.
<urn:uuid:46928db7-2c05-44af-bdb8-2e4571bfe682>
2013-05-23T18:33:07Z
CC-MAIN-2013-20
[ [ -0.02866847813129425, 0.0679347813129425, -0.015081522054970264, -0.0076766302809119225, 0.049728259444236755, -0.042391303926706314, -0.006351902149617672, 0.07065217196941376, 0.015625, -0.027309782803058624, 0.061141304671764374, 0.004755434580147266, 0.04673...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921414
103
http://www.lupefiasco.com/member/amirah
0.29493
Well, I'm pretty easy to get along with I'm single and horny if I'm online! Get to know me, you probably won't regret it No favourite stories listed. Not following any authors No forum posts. No videos posted yet. No playlist added yet. Attach a note to this member, which only you can see. Please tell us why you think this profile page is inappropriate. What would you like to do?
<urn:uuid:9a656e07-5689-4253-8656-f4b021f2099d>
2013-05-23T18:58:00Z
CC-MAIN-2013-20
[ [ -0.01699420064687729, 0.0401095375418663, 0.013128221966326237, 0.020618556067347527, 0.11211340129375458, -0.07248711585998535, -0.02206829935312271, 0.06088917702436447, -0.0301224235445261, -0.0401095375418663, 0.09020618349313736, 0.051868557929992676, -0.01...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9541
94
http://www.lushstories.com/lusciousme
0.233948
Prilosec Otc Side Effects If you suffer from heartburn or any other stomach problems, you need to know about these Prilosec OTC side effects. Prilosec is an oral medication that is used for heartburn, ulcers and acid damage to the esophagus and stomach. Although it's a popular medication, there are some side effects you should be aware of. Here's the rundown on Prilosec OTC. - Headaches: This over-the-counter drug may give you headaches. Users of Prilosec should report this side effect if it continues to be a problem. It is considered one of the less severe side effects of taking this medication. - Stomach cramps: Although stomach cramps are common side effects, you should report it to your physician. It may be causing problems with the lining of your stomach. It is recommended that you report stomach cramping immediately if they become severe. - High blood pressure: Some medications like Prilosec OTC may raise your blood pressure. But this side effect is not as common as cramping or headaches. Symptoms of high blood pressure include dizziness, headaches and blurred vision. - Liver failure: There are some side effects that are rare, but severe. Liver failure is one that is only diagnosed by the physician. This side effect causes swelling, jaundice and bleeding when severe. Less severe symptoms include loss apetite and fatigue. You can have liver failure without knowing you do. Some people may think that they are having symptoms from the medication rather than other complications. It's best to report any side effects and symptoms immediately. Treatment for liver failure includes medications. These medications are based on the extent and type of damage you have. - Anemia: Anemia is a decrease in red blood cells. This may lead to weakness, fatigue and shortness of breath. This severe side effect rarely happens but can affect your lifestyle while taking Prilosec. Until the symptoms of anemia affect your daily living, you may not even notice that you have this condition. Your physician will need to run certain blood tests to diagnose the condition. Treatment can include iron supplements and diet change. However, your physican will need to consider how Prilosec interacts with other drugs and supplements. It is important to tell your doctor how long you have been taking Prilosec and when. Treating the side effects of Prilosec may be as simple as discontinuing the medication. If your side effects have caused other health damage, you may need more in-depth treatment.
<urn:uuid:73d23546-e959-4dec-ad08-870e8f7c8dce>
2013-05-23T18:45:24Z
CC-MAIN-2013-20
[ [ 0.00830078125, 0.01104736328125, 0.01458740234375, -0.019287109375, 0.138671875, -0.06689453125, -0.0036163330078125, 0.11474609375, -0.0380859375, -0.040771484375, 0.09619140625, 0.035400390625, -0.0185546875, 0.040283203125, 0.06494140625, -0.03710...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949392
531
http://www.mademan.com/mm/prilosec-otc-side-effects.html
0.318903
FRANKFURT, Germany (AP) — Germany's central bank has finally recovered most of the billions in loans that a local subsidiary of Lehman Brothers defaulted on when the U.S. investment bank went bust in 2008. Lehman's German subsidiary, Lehman Brothers Bankhaus, owed the Bundesbank €8.5 billion ($11.36 billion) when it and its U.S. parent filed for bankruptcy. The subsidiary had been eligible to borrow from the central bank just like other banks by offering collateral, in this case 33 separate securities. The Bundesbank said Wednesday it has now restructured and sold off the collateral. The proceeds of the sales, along with redemption payments and interest coming in on the securities, have led to a recovery of €7.4 billion. And it expects to regain at least part of the rest, plus interest, from bankruptcy proceedings. The recovery helped shrink the total amount in default to the Eurosystem — Europe's central bank network under the aegis of the European Central Bank — from €5.6 billion at the end of 2008 to €300 million at the end of last year. The European Central Bank in Frankfurt, Germany sets monetary policy including interest rates for the 17 countries that belong to the euro — including Germany. However its credit operations, such as the loans to Lehman, are conducted through member countries' national central banks, such as the Bundesbank. Earlier this year, the Bundesbank said it sold the largest item in Lehman's collateral portfolio — real estate loans bundled together as securities and dubbed Excalibur — to private equity firm Lone Star for €1.4 billion. Excalibur had a face value of €2.16 billion. Lehman Brothers Bankhaus was the chief way in which the Lehman group tapped central bank funding in Europe. Its U.S. parent, Lehman Brothers Holding Inc. filed for bankruptcy on Sept. 15, 2008. The failure worsened the global financial turmoil at the time and helped cause a global recession. The Bundesbank says it is still owed €3.5 billion by Lehman Brothers Holdings Inc. but expects further payments from bankruptcy proceedings. The Bundesbank pointed out that it did not purchase the securities through its own investment decision but accepted them under the collateral rules in effect at the time. Many complex investments backed by real estate loans became illiquid in the panicky days after the Lehman failure, meaning they lacked buyers and it was hard to tell what they were worth. However if the loans backing them are repaid they can keep at least some of their value. The Eurosystem has tightened its risk control measures as a consequence of the Lehman failure, the Bundesbank statement said. The ECB has said that it manages risk of default by making sure the amount of a loan is less than the face value of the securities it accepts, giving it a margin of safety against the chance that the collateral will fall in value after a default.
<urn:uuid:63c3bb21-10df-4c88-9ef8-93362e46a3a6>
2013-05-23T19:06:17Z
CC-MAIN-2013-20
[ [ 0.015869140625, 0.06494140625, -0.025390625, -0.00162506103515625, 0.06689453125, -0.068359375, 0.0107421875, 0.140625, -0.0498046875, -0.03662109375, 0.050048828125, -0.0052490234375, -0.03564453125, -0.0208740234375, 0.04736328125, -0.05126953125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964844
606
http://www.mail.com/in-en/business/economy/1903476-german-central-bank-recovers-lehman-losses.html
0.1885
Welcome to MS. I am glad you have found this place of healing and support. It is understandable that the thought of seeing those who harmed you would bring forth a lot of anxiety and rage. Cry and find other ways to express those feelings so you won't feel like you are going to explode. If smashing things makes you feel better, perhaps you can smash some cinder blocks with a sledge hammer (wear eye protection). There are a lot of ways in which you can release these feelings without hurting yourself or breaking things that you didn't really mean to break. Before you go to your mother's, you may want to create a few exit strategies for yourself. Plan ways in which you can leave the premises or the activity. Practice what you will say if you are questioned about why you are isolating/ leaving. Knowing that you have an "out" may make it a little more tolerable to be there. It is also important that you tell yourself, and believe, that it is "ok" for you to leave. If all you can manage to do is walk in the door, wish your mother a happy birthday and leave, then that is what you can do. Do not force yourself to stay to the point where you are so uncomfortable or enraged that you lose it. Taking care of yourself is not only important, it is a necessity. Having an exit strategy is part of your self care. Though you do not yet know us, know that we will be with you while you are at your mother's. You are not alone. Take your time and look around. You do not want to trigger yourself by reading too many posts at one time. At your own pace, read the boards and wander into chat. The lounge (chat) is open 24 hours a day though it isn't always populated. We also have moderated chats called Healing Circles. They meet on Sunday and Wednesday evenings at 9pm eastern time and one on Tuesday at 19:00 UTC (European and African time zone) which translates to 2 PM Eastern US time zone. The Healing Circle on Tuesdays is scheduled to resume in September. Again, welcome to MS.
<urn:uuid:165939c8-788f-473f-9b70-4abd2f332bf3>
2013-05-23T19:07:49Z
CC-MAIN-2013-20
[ [ -0.004468945786356926, 0.021398747339844704, 0.01578810065984726, -0.001883807359263301, 0.08924843370914459, -0.03549060598015785, 0.010568893514573574, 0.07620041817426682, -0.01800626330077648, -0.01865866407752037, 0.06497912108898163, 0.012982776388525963, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968514
447
http://www.malesurvivor.org/board/ubbthreads.php?ubb=showflat&Number=407849
0.15946
'Mmmmkay, so I have a week to finals, and then I'll leap right into Summer. So, as I was sitting in class today, I thought about improving some of my manga. Now there is one thing you should know - out of every manga idea I created, two are sequels to another one. Now, out of these three, I believe the first is 'good', the second is 'okay', and the third is my best manga idea. The sad part is, I didn't pay much attention to the antagonists in this. I know it's probably standard to introduce a sub-antagonist or a rival in the first few chapters, and the 'real' villain about four or five chapters in. Remember, this is still under development, but I expect most people to show me flaws - meaning I don't want too many comments on the positive views of the manga, however I will appreciate it greatly if someone tells me if I'm taking the right path or not. So, without further delay, here's some info on my wretched manga, '+Judgement+': A failed clone of the best fighter that has ever lived. Sai is not deformed, but just average - so most of the people studying him found no use in him. Sai has a hatred for humanity that cannot be quenched. After slaughtering a mass of people, he decides he will become an 'anti-human', and end humanity. A robot programmed with destructive capabilities. To protect this from falling into the wrong hands, the programmers decided to tell Pibo to follow the commands of anyone who tells it what is was not capable of not doing - something only the programmers believed they knew. Sai found Pibo in a wreck site, and abruptly told it that it cannot feel emotions. This awoke Pibo, and he became Sai's first companion. A small skeleton with a black cloak and huge eye-sockets. He was carved out of Sai's soul and separated from Sai after Sai felt anger for the first time. Since Death is a chip of Sai's soul, Sai is able to use him as a doll whenever he feels necessary. The only human Sai feels sympathy for. Arche was a defenseless orphan living on the streets. When Sai caught sight of him, he understood that he wasn't living - he was just surviving. Sai felt it necessary to have Arche live a good life before death, and took him under his wing. (Arche is actually Nakala in disguise.) Fear is one of the three plague-creatures. Fear has no shape, and usually takes the shape of a pitch-black humanoid. Fear is able to transport to places where someone or something feels paranoia, insanity, or fear. Anger is one of the three plague-creatures. Anger appears as a short and scrawny body hidden behind red and black armor. As anyone in a mile's range grow in hatred, rage, and anger, Anger's body will become more masculine, and he will be able to move faster. Misery is one of the three plague-creatures. Misery appears as a thin creature with masculine arms, and a purple mask. When people feel sadness, denial, or misery, Misery's body will start growing spikes, which will render most melee attacks useless against him. Another failed test to revive the world's best fighter. Nakala failed to become the world's best fighter, but was able to mimic anything he thinks of. Nakala dons the disguise of Arche to infiltrate Sai's forces. After many tests, the world's best fighter was cloned perfectly. Perfect Ryan is several times stronger than Sai, and claims he fights to defend humanity, when he is actually slowly destroying it by taking control of the three plague creatures. Perfect Ryan plans to take out all 400 of the failed duplicates before turning on humanity. (Note: As the story progresses, Sai finds out Perfect's plan, and decides he must take responsibility for that which cannot defend itself - humanity. After this, Sai confronts Perfect and the final battle of the manga begins.) So that's pretty much it. I'm going to add supporting characters soon, but I just want criticism on the characters and the plot. All criticism will be appreciated. Thanks.
<urn:uuid:7bf85e2e-231b-4084-b7f5-82b7f0d2b69c>
2013-05-23T19:09:27Z
CC-MAIN-2013-20
[ [ -0.0272216796875, 0.0101318359375, 0.01116943359375, 0.0015869140625, 0.05908203125, -0.046875, -0.006622314453125, 0.1005859375, 0.000659942626953125, -0.055908203125, 0.0167236328125, 0.027099609375, 0.0245361328125, -0.00225830078125, 0.0291748046875,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969349
875
http://www.mangatutorials.com/forum/showthread.php?892-Judgement&mode=hybrid
0.262048
Talking About Economic Troubles Download MP3 (Right-click or option-click the link.) I'm Susan Clark with the Special English program WORDS AND THEIR STORIES. In the nineteen thirties, a song, "Brother, Can You Spare a Dime?," was very popular in the United States. It was the time of the big Depression. The song had meaning for many people who had lost their jobs. A dime is a piece of money whose value is one-tenth of a dollar. Today, a dime does not buy much. But it was different in the nineteen thirties. A dime sometimes meant the difference between eating and starving. The American economy today is much better. Yet, many workers are concerned about losing their jobs as companies re-organize. Americans have special ways of talking about economic troubles. People in businesses may say they feel the pinch. Or they may say they are up against it. Or, if things are really bad, they may say they have to throw in the towel. A pinch is painful pressure. To feel the pinch is to suffer painful pressure involving money. The expression, feel the pinch, has been used since the sixteenth century. The famous English writer William Shakespeare wrote something very close to this in his great play "King Lear." King Lear says he would accept necessity's sharp pinch. He means he would have to do without many of the things he always had. Much later, the Times of London newspaper used the expression about bad economic times during the eighteen sixties. It said, "so much money having been spent ... All classes felt the pinch." Worse than feeling the pinch is being up against it. The saying means to be in a lot of trouble. Word expert James Rogers says the word "it" in the saying can mean any and all difficulties. He says the saying became popular in the United States and Canada in the late nineteenth century. Writer George Ade used it in a book called "Artie." He wrote, "I saw I was up against it." Sometimes a business that is up against it will have to throw in the towel. This means to accept defeat or surrender. Throwing in the towel may mean that a company will have to declare bankruptcy. The company will have to take legal steps to let people know it has no money to pay its debts. Word expert Charles Funk says an eighteen seventy-four publication called the Slang Dictionary explains throwing in the towel. It says the words probably come from the sport of boxing, or prizefighting. The book says the saying began because a competitor's face was cleaned with a cloth towel or other material. When a boxer's towel was thrown, it meant he was admitting defeat. Most businesses do not throw in the towel. They just re-organize so they can compete better. This WORDS AND THEIR STORIES was written by Jeri Watson. I'm Susan Clark.
<urn:uuid:35e3dfde-f26f-46fa-8fb9-6e39068eaed8>
2013-05-23T18:38:01Z
CC-MAIN-2013-20
[ [ 0.00067138671875, 0.0218505859375, -0.018310546875, -0.00823974609375, 0.0751953125, -0.08056640625, 0.01165771484375, 0.10791015625, -0.02685546875, -0.017578125, 0.0966796875, 0.014892578125, -0.0023345947265625, -0.01202392578125, 0.0361328125, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985529
610
http://www.manythings.org/voa/words/36.html
0.321755
Frilled Sharks, Chlamydoselachus anguineus Taxonomy Animalia Chordata Elasmobranchii Hexanchiformes Chlamydoselachidae Chlamydoselachus anguineus Description & Behavior Frilled sharks, Chlamydoselachus anguineus (Garman, 1884), aka frill sharks, frill-gilled sharks, Greenland sharks, scaffold sharks, and silk sharks are members of the most ancient frill and cow sharks order, Hexanchiformes. Hexanchiform sharks have a single dorsal fin, either six or seven gill slits (versus the 5 found in all other existing sharks), and no nictitating membranes (protective third eyelids). The frilled shark, Chlamydoselachus anguineus, is currently one of only two known species of frilled sharks. The southern African frill shark, C. africana, was recently discovered (2009) off southern Angola, Namibia and South Africa. They are both very different in other ways from the cow sharks and are likely to be moved to their own order Chlamydoselachiformes in the near future. Frilled sharks, Chlamydoselachus anguineus, are deepwater eel-like sharks that reach lengths up to 2 m and are thought to reach sexual maturity when they are 1.35 to 1.5 m long. They are dark brown or gray in color above, sometimes lighter below, and have six pairs of "frilly" gill slits where the first gill slit is joined under their jaws forming a sort of collar. Frilled sharks' heads are broad and flattened with short, rounded snouts. Their nostrils are vertical slits, separated into incurrent and excurrent openings by a leading flap of skin. The moderately large eyes are horizontally oval (like a cat's). Their mouth is located at the leading edge of their snout (terminal) rather than underneath like most sharks and they have small tricuspid teeth in both jaws. Their rows of teeth are rather widely spaced, numbering 19–28 teeth in their upper jaws and 21–29 teeth in their lower jaws. Each tooth is small, with three slender, needle-like cusps alternating with two cusplets. Their very long jaws are positioned terminally (at the end of the snout), as opposed to the underslung jaws of most sharks. They have a small lobe-like dorsal fin set far back over their pelvic fins with an anal fin that is larger than their dorsal fin. Their pectoral fins are small and paddle-shaped and their very long caudal fin (tail fin) has a small ventral lobe and without a subterminal notch. Frilled sharks also have a pair of thick skin folds of unknown function (possibly to help allow for expansion when digesting larger prey) running along their bellies, separated by a groove, and their midsections are relatively longer in females than in males. Frilled shark differs from their southern African relative, C. africana, by having more vertebrae (160–171 vs 147) and more turns in the spiral valve intestine (35–49 versus 26–28), as well as differences in various proportional measurements such as a longer head and shorter gill slits. The maximum known length is 1.7 m for males and 2.0 m for females. Frilled sharks are highly specialized for life in the deep sea with reduced, poorly-calcified skeletons and enormous livers filled with low-density lipids, which allows them to maintain their position in water with little effort. They are also one of the few sharks with an "open" lateral line, in which the mechanoreceptive hair cells are positioned in grooves that are directly exposed to the surrounding seawater. This configuration is thought to be the most primitive in sharks and may enhance their sensitivity to minute movements of prey in their proximity. Many frilled sharks are found with the tips of their tails missing, probably from predatory attacks by other shark species. These sharks, or a proposed giant relative, have been suggested as a source for reports of sea serpents. World Range & Habitat Frilled sharks, Chlamydoselachus anguineus, are an uncommon "primitive" shark species typically found near the sea floor in waters over outer continental and island (insular) shelves and upper slopes, usually at depths between 120 and 1,280 m but up to 1,570 m and occasionally even at the surface. Frilled sharks are thought to have a wide though patchy distribution (74°N - 58°S, 169°W - 180°E) in the Atlantic and Pacific Oceans. In Suruga Bay, Japan they are most common at depths between 50 m and 200 m. In the western Indian Ocean they are found off South Africa as C. africana. In the western Pacific, frilled sharks are known to live off Japan and south to New Zealand, New South Wales and Tasmania in Australia. In the eastern/central Pacific they have been observed off Hawaii, southern California to northern Chile. Frilled sharks have also been observed in the eastern Atlantic from waters off northern Norway to northern Namibia, and possibly off the eastern Cape of Good Hope in South Africa. In the central Atlantic, they have been caught at several locations along the Mid-Atlantic Ridge, from north of the Azores to the Rio Grande Rise off southern Brazil, as well as over the Vavilov Ridge off West Africa. In the western Atlantic, it has been reported from off New England, Georgia, and Suriname. Feeding Behavior (Ecology) Frilled sharks, Chlamydoselachus anguineus, feed on cephalopods (mainly squid), other sharks, and bony fishes. Feeding behavior has not yet been observed by this weak-swimming species, though they are thought to capture active, fast-moving squid by taking advantage of injured squid or those that are exhausted and dying after spawning. Alternatively, they may surprise their prey by curving their body like a spring, bracing themselves with rear positioned fins, and launching quick strikes forward like a snake. They may also be able to close their gill slits creating negative internal pressure to suck prey quickly into their mouth. They have many small, sharp, rear-pointing (recurved) teeth that function much like squid jigs which could easily snag the body or tentacles of a squid, particularly as they are rotated outwards when their jaws are protruded. Observations of captive frilled sharks swimming with their mouths open might also suggest that the small teeth, light against their dark mouths, may even fool squid into attacking and entangling themselves. Using their long, extremely flexible jaws they should be able to swallow large prey (up to half its size!) whole, while their many rows of needle-like teeth would make escape essentially futile. Examining the length and articulation of their jaws appears to show that frilled sharks cannot deliver as strong a bite as more conventionally built sharks. Most captured individuals have been found with no or barely identifiable stomach contents, suggesting that they have a fast digestion rate and/or long intervals between feedings. One 1.6 m long individual, caught off Japan, was found to have swallowed an entire 590 g Japanese catshark, Apristurus japonicus. Squid comprise some 60% of the diet of these sharks in Suruga Bay and this includes not only slow-moving, deep-dwelling squid such as Chiroteuthis and Histioteuthis, but also relatively large, powerful swimmers of the open ocean such as Onychoteuthis, Sthenoteuthis, and Todarodes. Frilled sharks, Chlamydoselachus anguineus, are aplacental viviparous (aka ovoviviparity) where the embryos emerge from their egg capsules inside their mother's uterus and are nourished by their yolk until birth. Frilled sharks' gestation period may be as long as three and a half years, the longest of any vertebrate. Between 2 and 15 young are born at a time (average is 6) measuring 40–60 cm long, and there appears to be no distinct breeding season (which is expected as these sharks inhabits depths at which there is little to no seasonal influence). Male frill sharks attain sexual maturity at 1.0–1.2 m long and females at 1.3–1.5 m. A possible mating aggregation of 15 male and 19 female frilled sharks was recorded over a seamount on the Mid-Atlantic Ridge. Conservation Status & Comments Frilled sharks, Chlamydoselachus anguineus, are listed as Near Threatened (NT) by the IUCN Red List: "A generally rare to uncommon deepwater species, with a few localities where it is taken more commonly as bycatch in several fisheries. Not an important target species, but a regular though small bycatch in many bottom trawl, midwater trawl, deep-set longline, and deep-set gillnet fisheries. As bycatch, this species is variously either used for meat, fishmeal, or discarded. Occasionally kept in aquaria (Japan). There is some concern that expansion of deepwater fisheries effort (geographically and in depth range) will increase the levels of bycatch. Although little is known of its life history, this deepwater species is likely to have very little resilience to depletion as a result of even non-targeted exploitation. It is classified as Near Threatened due to concern that it may meet the Vulnerable A2d+A3d+4d criteria." On August 27, 2004, the first observation of this species in its natural habitat was made by the ROV Johnson-Sea-Link II, on the Blake Plateau off the southeastern United States (see the first photo above). On January 21, 2007, a Japanese fisherman discovered a 1.6 m long female alive at the surface, perhaps there because of illness or weakness from the warm water. It was brought to Awashima Marine Park in Shizuoka, where it died after a few hours (see the video above). Garman, and numerous authors since, have advanced the frilled shark as an explanation for sea serpent sightings. Because of the shark's modest size, some cryptozoologists have posited the existence of a giant relative, particularly as larger Chlamydoselachus species are known from the fossil record. References & Further Research Research Chlamydoselachus anguineus » Barcode of Life ~ BioOne ~ Biodiversity Heritage Library ~ CITES ~ Cornell Macaulay Library [audio / video] ~ Encyclopedia of Life (EOL) ~ ESA Online Journals ~ FishBase ~ Florida Museum of Natural History Ichthyology Department ~ GBIF ~ Google Scholar ~ ITIS ~ IUCN RedList (Threatened Status) ~ Marine Species Identification Portal ~ NCBI (PubMed, GenBank, etc.) ~ Ocean Biogeographic Information System ~ PLOS ~ SCIRIS ~ SIRIS ~ Tree of Life Web Project ~ UNEP-WCMC Species Database ~ WoRMS Feedback & Citation Find an error or having trouble with something? Let us know and we'll have a look! Help us continue to share the wonders of the ocean with the world, raise awareness of marine conservation issues and their solutions, and support marine conservation scientists and students involved in the marine life sciences. Join the MarineBio Conservation Society or make a donation today. We would like to sincerely thank all of our members, donors, and sponsors, we simply could not have achieved what we have without you and we look forward to doing even more.
<urn:uuid:e5679202-a3e8-4aa9-8403-181d8b06bc4f>
2013-05-23T18:38:24Z
CC-MAIN-2013-20
[ [ 0.004974365234375, 0.02197265625, -0.00750732421875, 0.0159912109375, 0.07275390625, -0.048828125, -0.001129150390625, 0.1044921875, -0.00732421875, -0.0361328125, 0.095703125, 0.0198974609375, 0.01214599609375, 0.0281982421875, 0.01214599609375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953043
2,451
http://www.marinebio.org/species.asp?id=1485
0.185576
Hey there folks, and welcome back to the good ol’ blog! Today’s tidbit about me is: I think that the entire concept behind “Abraham Lincoln: Vampire Hunter” is so ridiculous that the REAL Abe Lincoln must have spun in his grave when it premiered. That doesn’t mean I won’t go see it with the right friend/friends, tho. It’s pretty common knowledge that the way ships fight each other has changed dramatically over time. Everyone knows, for example, that during the Revolutionary War and the Civil War, ships shot cannons at each other as the primary method of fighting. In World Wars I and II, ships shot much bigger cannons at each other, and then started shooting at each other with airplanes. Nowadays, most fighting between ships is intended to be with airplanes and missiles. But there’s another component to ship-to-ship fighting: a human component. A marine component. Marines have been serving in the United States Navy since the Revolutionary War. Their purpose was not to help fire the cannons – instead, they shot their personal firearms at the other ship’s men, and if the enemy tried to board their vessel, they would fight them off in hand-to-hand combat. You may be surprised to learn that before cannons were widely used, hand-to-hand combat was the primary way ships fought each other. In the ancient and middle ages, opposing fleets would shoot arrows back and forth before pulling up next to each other. Then, each ship would try to board an enemy ship and kill all the crew so they could capture the ship itself as a prize. Even during the age of cannons, capturing enemy ships was more common than actually sinking them. After exchanging broadsides, one sailing ship might try to board and take the enemy sailing ship using marines. During the Battle of Hampton Roads, the US Navy had marines (or plain old infantry) on their warships to help defend against Confederate boarding parties. When the CSS Virginia attacked the USS Congress, the 99th New York Co. D was on board serving in place of marines as the defensive force for the ship. Sadly, they were completely unnecessary since the CSS Virginia just shot the USS Congress with her cannons and didn’t try boarding her at all. Nevertheless, marines were crucial for helping to defend ships against boarding actions, and for shooting at marines and sailors on board enemy ships. After the Civil War, as ship armor and firepower advanced, boarding actions became less and less important. The focus of naval war turned to the outright destruction of enemy vessels, and the days of capturing an enemy ship as a prize faded away. Well that about does it for today, folks. Tune in next time for another fun Civil War topic!
<urn:uuid:f015b6d1-07b8-4bfc-81cb-557e8a1c73fc>
2013-05-23T18:39:16Z
CC-MAIN-2013-20
[ [ -0.00958251953125, 0.0283203125, -0.003082275390625, 0.01190185546875, 0.059326171875, -0.0419921875, -0.0250244140625, 0.11572265625, -0.02587890625, -0.039794921875, 0.08154296875, 0.03369140625, -0.016357421875, 0.0115966796875, 0.040771484375, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974401
570
http://www.marinersmuseum.org/blogs/civilwar/?p=1834
0.297957
The world's markets are becoming more and more efficient as the demand to drive inefficiency out of companies continues to expand—and dramatically impact the marketing organization. As the increasing complexities and the rate of change continue to accelerate, marketing departments are becoming the center of attention. As a result, we face both external challenges from competition as well as internal challenges around people, process, systems, and tools. To rise to these challenges, marketing is undergoing a transformation to enable it to improve its operational and business performance. The stronger the linkage between what we envision in our strategy and what we execute in the market place, the more we can ensure that marketing is providing value. As a result, there has been a movement toward creating a marketing operations role to drive the connection between marketing strategy and execution and actual results. The Rise of Marketing Operations As the need for a more transparent, efficient, and accountable view of marketing became increasingly more important, the marketing operations function emerged. For example, across the technology sector, organizations began staffing and/or expanding the marketing operations role in the last two years, according to IDC. The purpose of the function is both to increase marketing efficiency and to build a foundation for excellence by reinforcing marketing with processes, technology, metrics, and best practices. Marketing operations enables an organization to run the marketing function as a fully accountable business. Marketing operations is about performance, financial management, strategic planning, marketing resource, and skills assessment and management. If you are considering developing a marketing operations function, this article outlines some of the primary responsibilities. As the role has evolved, it has come to encompass the following five main responsibilities: - Defining and managing systems and tools - Developing and implementing metrics, infrastructure, and business processes - Establishing and communicating best practices - Managing the overall marketing budget and budgeting process - Identifying and deploying technology to support performance measurement and reporting Let's explore each of these areas and try to understand how each role functions and why they are important. Process, Systems, and Tools Process is the foundation for alignment—and one of the critical complaints with marketing is that it lacks alignment with sales, finance, and R&D. Therefore, it is essential for marketing to define and establish processes that facilitate alignment with these areas. The role of marketing operations in terms of process, systems, and tools is to develop and manage an integrated process that includes setting performance goals, modeling, planning, and reporting. A marketing operations function should ensure that the right processes are in place to support performance management and measurement. In addition, the marketing operations personnel should be able to define and secure the systems and tools needed to enable marketing operations. These tools and processes will analyze and identify overlaps, gaps, bottlenecks, and redundancies in order to suggest process improvements. These improvements will in turn support marketing's ability to help the organization achieve its goals and objectives. It also falls to the marketing operation's function to develop the infrastructure and marketing systems that will promote the effective use of technology throughout the marketing organization. It will be imperative for the marketing operations staff to define, document, and standardize core marketing processes and collaborate with finance, sales, and R&D to ensure organizational alignment around the processes and well as performance targets. Metrics and Measurement Reporting Marketing dashboards and marketing operations are often linked together. It's important to understand why. Today there really is no shortage of data. The gap is in our ability to use this data to gain a sustained, competitive advantage and to drive specific business outcomes. To be successful, marketing needs both accurate historical data and the ability to recognize patterns that link seemingly unrelated data points. One of our key challenges in marketing is to develop a baseline for metrics that helps us better evaluate performance and drive marketing decisions. Marketers need to understand measurement and create a metrics framework that links marketing to a bigger business objective. Marketing measurement is about more than just the finances and payback; it is about creating value and growth. Therefore, it is critical to have a function that helps define the measurement system, process, and performance targets. Marketing operations fulfills this role while creating access to the data needed to create dashboards. Because marketing operations creates a repository of information and facilitates implementing the systems, support, and infrastructure, it provides a much-needed focal point for performance management. The difference between success and failure is really not the dashboard, or even the information reflected in the dashboard, but what we do with the information and how we use this information to make decisions. This truly is the point behind marketing metrics and marketing performance management: to use metrics to fine-tune investments, to manage the marketing mix, and to provide guidance and governance for decision making. Marketing metrics should reflect the company's priorities and objectives, and the dashboards created by marketing operations should guide effective and timely decision making. Dashboards synthesize our knowledge and highlight gaps. They visually align tactics, strategies, and objectives with business outcomes. They serve as a visual representation and guides for performance. Marketing operations helps set realistic expectation of performance and accountability. For marketing to take a leadership role in an organization, it needs a set of core marketing and change management processes and practices. These will help to ensure that the marketing personnel know how to best use the processes, systems, and metrics. Marketing operations needs to be the keeper of techniques, methods, activities, and processes that are effective at delivering a particularly superior outcome or result. As the keeper, marketing operations is responsible for the knowledge transfer, skills development, and benchmarking needed to sustain success. Marketing's best practices need to be able to span activities and tactical execution around marketing campaign management, marketing and sales effectiveness tools, Internet and direct marketing, and market and customer research, as well as enterprise marketing management, brand and marketing resource management, digital asset management, and marketing process management. The trend of demanding that marketing have great accountability shows no sign of abating. The need to be able to tie marketing activities and investments to results will continue. As a result, there will be continued pressure on marketing executives and professionals to demonstrate our understanding of how we are driving a company's brand value, incremental revenue, and customer equity. As marketers we need to focus on developing and enhancing the science-side of our skill set and leveraging marketing operations either as a function or a discipline to create a culture based more on facts than intuition. Even with a marketing operations function, a marketing organization cannot be successful without embracing a performance-driven culture. Such a culture requires knowledge to be accessible to everyone on the team so that each person has a view into the entire scope of work and visibility into the processes, budget, execution, metrics, and reporting needed. A performance-driven culture has an unwavering belief that performance starts with accountability. Marketers in a performance-driven culture never lose sight of the need to be both efficient and effective and realize that metrics and measurement practices not only are essential to tracking performance but also are the means for improving results. Note: Make metrics history in 15 minutes by taking the VisionEdge Marketing annual marketing metrics and business performance survey. Participants can request a complimentary copy of the survey results summary and enter into a drawing. Follow this link to the survey.
<urn:uuid:1f4bb9fc-78dc-42d6-9c58-78c610782786>
2013-05-23T19:00:02Z
CC-MAIN-2013-20
[ [ -0.0218505859375, 0.0205078125, 0.02099609375, 0.0062255859375, 0.0849609375, -0.043212890625, -0.00115203857421875, 0.12890625, -0.033447265625, -0.02490234375, 0.0908203125, 0.01275634765625, -0.09765625, 0.05615234375, 0.039794921875, 0.0294189453...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936243
1,492
http://www.marketingprofs.com/7/emergence-of-marketing-operations-patterson.asp
0.165838
SHORT TALK BULLETIN - Vol.XI May, 1933 No.5 "Thou shalt not remove thy neighbor's landmark, which they of old have set in thine inheritance, which thou shalt inherit in the land the Lord thy God hath given thee (Deuteronomy XIX:14). The Masons "of old time set thine inheritance" (Masonry) certain fundamental principles which are named as "Landmarks" as early as the Constitutions of 1723. Men have quarreled about the stone markers set up as boundaries for land ever since sections of the earth were claimed as property; in like manner have Masons differed about what are and what are not Landmarks of the Order. In this country particularly, with forty-nine Jurisdictions, each sovereign within its own territory, arguments about Landmarks are never ending. This Bulletin attempts not to settle any of these numerous controversies, but only to bring before the average Lodge Member some of the reasons why his neighbor's Masonic Landmarks may differ from those his own Grand Lodge may have set up for him to follow. In 1858 Albert Gallatin Mackey, the great Masonic jurist and authority, listed twenty-five fundamental principles as the true Landmarks of Freemasonry. Although critical scholarship has since riddled the list as to accuracy, Mackey's ideas of what constitute the essential qualities of a Landmark - antiquity, universality and irrevocability - are still respected. This definition excludes from the classification of Landmarks any principle which is any two of these but no the third, It is by his own standards that many critics have measured Mackey's Landmarks and found them wanting. As an example of what is meant; it is "ancient," in the sense that it was recognized in the "Constitutions" of the Grand Lodge in 1723, that a Grand Master appoints own Deputy Grand Master. But the practice is by no means universal. Lodges are now universally governed by Grand Lodges, but the practice has antiquity of only two hundred and sixteen years. According to Mackey's dicta, neither the manner of creating a Deputy Grand Master not the fundamental governing body of the Craft can be considered as Landmarks. A few principles are so universally recognized that they are freely admitted to be essentials, even in Jurisdictions which have no pronouncements as to the Landmarks. Belief in a Supreme Being, the Volume of sacred Law as a necessary part of the furniture of the Lodge, that a Masons must be a man are essentials all over the world, though not necessarily listed in all Jurisdictions. On the validity of certain principles all authorities agree, but differ as to their antiquity, universality and irrevocability. A substantial minority of American Grand Jurisdictions have Officially adopted Mackey's twenty-five Ancient Landmarks, but a majority either follow other compilations, use other Old Charges, or decline to specify what are and what are not the Landmarks of the Craft. The right and power of any Grand Lodge to determine for itself just what is and what is not "law" in its Jurisdiction is unquestioned. Therefore, when a Jurisdiction sets forth any list of Landmarks in its Code, they have all the force of Ancient Landmarks in that Jurisdiction, whether they are actually so or not. "Actually so" refers to inherent nature; that which cannot be altered by law, no matter what the lawmaking authority. The National Legislature has the undoubted "right" to enact a law that unsupported objects must fall. "Per contra," it then has the right to repeal the law of gravity, and forbid things to fall when no longer supported. But it has not the "power" to enforce, change or suspend the law of gravity! A Grand Lodge which says "Thus and such is an Ancient Landmark "in that Jurisdiction," give that pronouncement the full force and effect of an Ancient Landmark "in that Jurisdiction, but its edict does not "actually" make it such. One Jurisdiction follows Lockwood's list of nineteen landmarks, of which number 8 reads: "That every Lodge has an inherent right to be represented in Grand Lodge by its first three officers, or their proxies." This is good Masonic law in most Jurisdictions, but not all; the Mason from this Jurisdiction (Washington, D.C.) who moves to New York or Texas and there affiliates finds that this is not a Landmark in either of these Jurisdictions, since neither New York not Texas admit Wardens to Grand Lodge. In the General Assemblies of Ancient times each Mason, Craftsman or Entered Apprentice, represented himself. In Grand Lodges Masons are represented by their officers. Evidently a change has been made in the manner of governing the Craft. As a Landmark is not subject to change, this particular principle of law does not conform to Mackey's definition of a Landmark. No wonder his neighbor's landmark is a matter of confusion to brethren from neighboring but differing Jurisdictions! Mackey's fourteenth Landmark asserts that every Mary Mason has the right of visitation. Just what is a "right?" Until that word is defined this so-called Landmark cannot be discussed intelligently. If it here means "power superior to all other powers," then it is merely nonsense. If it here means "privileged until a higher privilege overcomes it," how may it be considered to conform to the requirements of a Landmark? Even so, how can the word "right" be translated "privilege?" A privilege may be withdrawn; an inherent right cannot! as many Jurisdictions rule on the "right of visit" in different ways - even those which have adopted Mackey's list - it can hardly be considered a true Landmark, "if" we judge by Mackey's own pronouncement on what constitutes a Landmark and "if" the word "right" means what it says. In some jurisdictions a Mason cannot visit without a good standing card; in others any member may object to any visitor and the Master must exclude; in still others, some Masters close the doors of their lodges to all visitors on election nights, and so on. Occasionally there is a conflict between ritual and Landmarks as adopted. A certain Jurisdiction lists fifty-four Landmarks, of which Number 18 reads: "Every Lodge, Grand or Subordinate, when lawfully congregated, must be regularly clothed, tyled and opened before it can proceed to work." Many other Jurisdictions agree that it is a Landmark that a Lodge must be "duly tiled." Our ancient brethren met on high hills and low vales to observe the approach of cowans and eavesdroppers. Did they "truly tile?" California Lodge No. 1 of the District of Columbia was chartered to go to California during the gold rush of 1849. Had that Lodge (now California No.1 on the register of the Grand Lodge of California) been wrecked going around the horn; had only the members of the Lodge, with their charter, been saved upon an otherwise uninhabited island; if they then held meetings with no tiler - since there were no cowans or eavesdroppers against whom to tile - would they have violated the so-called Landmark? Many rituals give "three" as the irreducible minimum for a Master Mason's Lodge; a Lodge must have a Master and two Wardens. If under some strange circumstances, three and only three met as a Lodge, what becomes of the so-called Landmark which requires a Tiler? Secrecy undoubtedly conforms to the classification of the three essentials of a Landmark; but about "the means" of securing secrecy is at least room for argument. Other Masonic laws, good where in force but not necessarily Landmarks, are Mackey's 8th: "The prerogative of the Grand Master to make Masons at sight" and the 11th Landmark of a Western Grand Lodge which reads: "Every person, to be made a Mason must be a man of lawful age, free born and; hale and sound, as a man ought to be." Several Grand Jurisdictions have enacted legislation preventing a Grand Master from convening an Emergent Lodge for the purpose of Making a Mason "at sight." Others consider that it is an inherent right of Grand Masters to convene Emergent Lodges (that is, give a certain number of brethren a dispensation to hold a Lodge) and that no law can take this right from him. If a Landmark cannot be changed, and this "has been" changed, is it truly a Landmark, or merely a matter of common law? All will agree that no woman can be made a Mason. But what becomes of the "lawful age" provision in the face of the fact that Washington - and many another man - was made a Mason before he was twenty-one? He would be a daring debater who argued that the Father of His Country was not regularly and legitimately initiated. The "hale and sound" provision is by no means universal; many Jurisdictions stick to the strict letter of the "doctrine of the perfect youth" while others admit the lame and the halt under a Grand Master's dispensation, Worshipful Master's judgment or even Grand Lodge law relaxing restrictions in favor of men of the Army or Navy who had arms or legs shot off in the war! A number of Grand Jurisdictions have never adopted any list or classification of Landmarks. The thought back of such absence of legislation may be understood from the following, from R.W. Charles C. Hunt, Grand Secretary and Grand Librarian of the Grand Lodge of Iowa. "We hold that the power of the Grand Lodge of Iowa in the Jurisdiction of Iowa is limited only by the Ancient Landmarks. We do not attempt to make a list of the Landmarks. "We believe it as unnecessary to adopt an official list of scientific laws, such as the law of gravitation. The Landmarks. like scientific laws, are valid only in so far as they are true and their adoption by any so-called body has no effect whatever on their validity. Individual scientists may list what they conceive to be the laws of nature, but no scientific society would undertake officially to adopt these laws as the official laws of the science in which they are interested. "The very definition of a Landmark is a fundamental law or principle of Masonry which no body of men or Masons can change or modify. Anything that can be adopted can be repealed. If a Grand Lodge has the power to adopt, it has the power to modify or repeal. It is the very fact that they unalterable that makes them similar to scientific laws which cannot be changed or altered by any man or body of men." Some authorities have attempted to formulate lists of Ancient Landmarks which no Mason would question. For instance, one very old Jurisdiction states that the Landmarks are: a. Monotheism, the sole dogma of Freemasonry. b. Belief in immortality. c. The Volume of Sacred Law, an indispensable part of the furniture of a Lodge. d. The legend of the Third Degree. f. The symbolism of the operative art. g. A Mason must be a freeborn male adult." But then adds "The above list of Landmarks is not declared to be exclusive." Dr. Joseph Fort Newton suggests five fundamentals on which all Masons can agree: "The Fatherhood of God, the brotherhood of man, the moral law, the Golden Rule and the hope of a life everlasting." Those who question these as Landmarks usually qualify by agreeing that they are teachings of the Order, but are in doubt as to just how old all of them may be, as such. Dean Roscoe Pound, whose "Masonic Jurisprudence" is generally considered to be among the most profound analyses of Landmarks, thinks seven are unquestionable: (1) Belief in God; (2) Belief in the persistence of personality; (3) a Book of the Law as an indispensable part of the furniture of every Lodge; (4) The legend of the Third Degree; (5) Secrecy; (6) The symbolism of the operative art; and, (7) That a Mason must be a man free born and of age." Of thirty-nine Jurisdictions of our forty-nine, eighteen either have adopted, recognized or follow Mackey's list of twenty-five Landmarks; two use the Old charges, or Old Charges and General Regulations as Landmarks; eight have adopted, recognized or follow lists of Landmarks of their own, and eleven either have not adopted, do not recognize, or do not follow any special compilation of Landmarks, preferring to leave the question untouched. Reduced to a percentage basis, Mackey is followed in 46.1% plus of these thirty-nine Jurisdictions; Old charges and Regulations in 5.1%; own Landmarks in 20.5% plus and no special list in 28.2% plus. Obviously there is no universality of opinion as to what is and what is not a Landmark, and yet all Jurisdictions agree there "are" Landmarks. Many "Laws of Nature" recognized in former times are believed in no longer; knowledge of science and of nature is in a state of flux. What appears to be the truth today may be the error of tomorrow. Possibly this is true also of our conception of the ancient Landmarks, and that no list of all those fundamentals of the Craft which are "actually" Landmarks is possible. Both that statement and this bulletin are without prejudice to the undoubted fact that in those Jurisdictions which have adopted any list of Landmarks, whether all inclusive or not, the principles there denominated as Landmarks have the force of Landmarks within the borders of those Jurisdictions.
<urn:uuid:7b76d64d-e9d9-4fc6-b749-956fbc1d26e7>
2013-05-23T18:39:11Z
CC-MAIN-2013-20
[ [ -0.0250244140625, 0.00494384765625, 0.0021209716796875, 0.01031494140625, 0.07666015625, -0.044921875, -0.0145263671875, 0.10498046875, -0.0208740234375, -0.005523681640625, 0.0380859375, 0.0238037109375, -0.052978515625, 0.01507568359375, 0.024169921875...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957709
2,870
http://www.masonicworld.com/education/articles/thy_neighbor.htm
0.263947
Ethics Commission's Enforcement Division Alleges Conflict of Interest Law Violations by Winthrop Harbormaster Charles Famolare, III Received from a town contractor free finger piers plus installation, and free cleaning of his jet ski float at his private dock According to the OTSC, in October 2006, Boston Towing and Transportation ("Boston Towing") entered into a $2 million contract with the Town of Winthrop to build a pier in Winthrop Harbor. Famolare participated officially in the project by acting in an advisory, oversight and liaison capacity. In July 2007, personnel from Boston Towing and from Boston Forging and Welding ("Boston Welding") attached two finger piers to Famolare's private dock. Famolare had no private relationship with any of the Boston Towing or Boston Welding employees who did the work. In addition, in July 2007, Boston Towing employees scraped barnacles and mussels from Famolare's jet ski float at no charge. The value of the finger piers was approximately $3,500 each, while the installation of the finger piers to Famolare's dock was valued at approximately $3,600. The value of the work scraping Famolare's jet ski float was approximately $1,900. Section 23(b)(2) of the conflict law prohibits a municipal employee from using his official position to secure for himself or others unwarranted privileges of substantial value not available to similarly situated individuals. As stated in the OTSC, Famolare violated section 23(b)(2) by receiving two finger piers, installation of the finger piers, and work performed on his jet ski float, all at no charge. The Commission will schedule the matter for a public hearing within 90 days.
<urn:uuid:b8abb38f-089c-4b75-be4d-40566e85759c>
2013-05-23T18:37:59Z
CC-MAIN-2013-20
[ [ -0.021984925493597984, 0.029365578666329384, -0.005692525301128626, -0.003768844297155738, 0.0841708555817604, -0.03831658139824867, -0.013505024835467339, 0.0898241177201271, -0.03360552713274956, -0.03815954923629761, 0.0885678380727768, 0.044597990810871124, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960207
365
http://www.mass.gov/ethics/press-releases-meetings-and-publications/press-releases/2011-press-releases/charles-famolare-otsc.html
0.264889
Appeals Court (December 8, 2005) A filed conviction may be revived for sentencing when a related conviction is reversed on appeal, or when the defendant violates a condition imposed at the time of filing. The defendant pleaded guilty to 12 indictments. He was sentenced to concurrent terms of 8 to 12 years on 6 of the convictions, and the remaining 6 convictions were "placed on file." After serving his sentences, the defendant was released, and soon thereafter he was charged with armed robbery. This new charged prompted the Commonwealth to bring forward his filed conviction for armed assault with intent to rob, and the defendant was sentenced to 18 to 20 years on this revived conviction. On appeal from the denial of his Rule 30(a) motion, the Appeals Court held that his filed conviction was improperly brought forward for sentencing. The court held that the procedure of reviving a filed conviction has been approved in only two circumstances: (1) when a related conviction is reversed on appeal; and (2) upon a breach of explicit conditions imposed in connection with the filing. Because the filed conviction did not relate to a conviction reversed on appeal, and because no conditions were set on the file conviction at time of his guilty plea, the court vacated his sentence.
<urn:uuid:b8624d01-6ee5-429d-bc75-7fd0828c94f1>
2013-05-23T18:39:46Z
CC-MAIN-2013-20
[ [ -0.07716049253940582, 0.013117283582687378, -0.015721451491117477, -0.02565586380660534, 0.0868055522441864, -0.004123263992369175, -0.028935184702277184, 0.06172839552164078, -0.06905864179134369, -0.00848765391856432, 0.11419752985239029, 0.020640432834625244, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985911
250
http://www.mass.gov/mdaa/court-decisions/by-topic/sentencing/lifetime-parole-supervision/commonwealth-v-pagan.html
0.880011
I like to laugh, but am mature. I often think outside of the box and yet can actually think inside the box as well. I'm dedicated, honest and caring. I would expect the same of you. I like to cook, drink wine or beer, play board games, hike, bike, shop, explore, relax on the couch, or go to a movie.
<urn:uuid:50376bdb-85c2-4a17-ba79-3aafad3b4588>
2013-05-23T18:45:43Z
CC-MAIN-2013-20
[ [ -0.020007621496915817, 0.04992378130555153, 0.01005144789814949, -0.02372332289814949, 0.051448170095682144, -0.04211128130555153, -0.011623475700616837, 0.03239329159259796, -0.003215510630980134, -0.05525914579629898, 0.05907012149691582, 0.022961128503084183, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986639
78
http://www.match.com/profile/showprofile.aspx/?handle=R8383&tp=prtbk
0.95728
I'm someone who thrives on connection. I can't imagine life without people. I love learning about what other people feel, where they come from and what makes them tick. I value diversity, authenticity, thoughtfulness, partnership and the ability to be perceptive. I value a man who can be introspective and is willing to grow and be open. I am very warm and giving, but know how to take care of myself. It would be nice to find a partner who is also giving in return.
<urn:uuid:3ea6e77f-7d57-43b0-b02e-4e27e3835e52>
2013-05-23T19:07:41Z
CC-MAIN-2013-20
[ [ -0.017146017402410507, 0.03249447047710419, 0.011269357986748219, 0.0010068099945783615, 0.060287609696388245, -0.04037610441446304, -0.017007743939757347, 0.09955751895904541, -0.0199115052819252, -0.07300885021686554, 0.08628318458795547, 0.03622787445783615, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.983178
103
http://www.match.com/profile/showprofile.aspx/?handle=peagreen957&tp=prtbk
0.946974
Here is a fun one, There was a man who greatly enjoyed golf. He also could make a perfectly consistent swing. So out of curiosity he decided to challenge a mathematician. So first he brought the mathematician to a golf field, with his golf club, a tee, and a ball. He sets the ball on the tee, all ready to swing, and then he asks the mathematician, “Write me a formula where z is the total distance the ball will travel, assuming there is no wind, the ground is level, The ball starts one inch off the ground, and I hit it with x force at y angle, all before I hit the ball.” He then swings his club, hits the ball and much to his surprise the mathematician succeeds. Not only did the mathematician have a flawless formula, but he also had the shortest formula he could have possibly written. What was his formula? Last edited by TheTick (2013-02-28 15:50:15)
<urn:uuid:070e6cdd-a083-43f2-9577-27e03e835620>
2013-05-23T19:05:31Z
CC-MAIN-2013-20
[ [ -0.034583333879709244, 0.0050694444216787815, -0.01298611145466566, -0.010555555112659931, 0.046666666865348816, -0.03194444626569748, -0.003802083432674408, 0.05111110955476761, -0.000629340298473835, -0.07222222536802292, 0.04055555537343025, 0.015347221866250038,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985892
201
http://www.mathisfunforum.com/viewtopic.php?pid=255533
0.335865
Story of World War I hero who captured German position single-handedly. Film also portrays York's earlier life in the mountains of Tennessee. Gary Cooper plays Alvin York, the real-life country lad and sharpshooter drafted to fight during World War I but blocked from killing by his pacifist sentiments. Howard Hawks makes a rousing, heroic film out of the tale, and Cooper gives one of his best performances (for which he won an Oscar). The 1941 feature seems as much a valentine to wartime America (and a not-so-subtle piece of propaganda) as anything, with Hawks capturing splendidly shot scenes of life in York's home state of Tennessee, which in turn provide a striking contrast to the battlefield. A key scene in the film, in which York is presented with an argument in favor of killing in war, is still thought provoking. --Tom Keogh Theatrical release date DVD release date
<urn:uuid:88cf4f16-e42c-4c8c-a823-53e67421f9d1>
2013-05-23T18:45:34Z
CC-MAIN-2013-20
[ [ -0.010778356343507767, 0.013093171641230583, -0.011863426305353642, 0.03139467537403107, 0.06799768656492233, -0.022280093282461166, -0.012297453358769417, 0.08796296268701553, -0.03761574253439903, -0.06568287312984467, 0.04224536940455437, 0.039351850748062134, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949551
190
http://www.matttrailer.com/sergeant_york_1941
0.335597
Along with its needed effects, a medicine may cause some unwanted effects. Although not all of these side effects may occur, if they do occur they may need medical attention. Check with your doctor immediately if any of the following side effects occur: - Difficulty with breathing or swallowing - Itching, especially of the feet or hands - Reddening of the skin, especially around the ears - Swelling of the eyes, face, or inside of the nose - Unusual tiredness or weakness that is sudden and severe Some side effects may occur that usually do not need medical attention. These side effects may go away during treatment as your body adjusts to the medicine. Also, your health care professional may be able to tell you about ways to prevent or reduce some of these side effects. Check with your health care professional if any of the following side effects continue or are bothersome or if you have any questions about them:Less common or rare - Skin rash - Stomach cramps or pain Other side effects not listed may also occur in some patients. If you notice any other effects, check with your healthcare professional. Call your doctor for medical advice about side effects. You may report side effects to the FDA at 1-800-FDA-1088.
<urn:uuid:dab48cdc-0dc0-44e1-a7e1-01fd3652803b>
2013-05-23T18:54:25Z
CC-MAIN-2013-20
[ [ -0.003703703638166189, -0.002792245475575328, 0.025231480598449707, -0.02187499962747097, 0.1509259194135666, -0.05069444328546524, -0.011921295896172523, 0.09259258955717087, -0.044675927609205246, -0.04120370373129845, 0.0902777761220932, 0.030092593282461166, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943756
260
http://www.mayoclinic.com/health/drug-information/DR601397/DSECTION=side-effects
0.207651
When exposed to cold temperatures, especially with a high wind chill factor and high humidity, or to a cool, damp environment for prolonged periods, your body's control mechanisms may fail to keep your body temperature normal. When more heat is lost than your body can generate, hypothermia, defined as an internal body temperature less than 95 F (35 C), can result. Wet or inadequate clothing, falling into cold water and even not covering your head during cold weather can increase your chances of hypothermia. Signs and symptoms of hypothermia include: - Slurred speech - Abnormally slow breathing - Cold, pale skin - Loss of coordination - Fatigue, lethargy or apathy - Confusion or memory loss - Bright red, cold skin (infants) Signs and symptoms usually develop slowly. People with hypothermia typically experience gradual loss of mental acuity and physical ability, so they may be unaware that they need emergency medical treatment. Older adults, infants, young children and people who are very lean are at particular risk. Other people at higher risk of hypothermia include those whose judgment may be impaired by mental illness or Alzheimer's disease and people who are intoxicated, homeless or caught in cold weather because their vehicles have broken down. Other conditions that may predispose people to hypothermia are malnutrition, cardiovascular disease and an underactive thyroid (hypothyroidism). To care for someone with hypothermia: - Call 911 or emergency medical assistance. While waiting for help to arrive, monitor the person's breathing. If breathing stops or seems dangerously slow or shallow, begin cardiopulmonary resuscitation (CPR) immediately. - Move the person out of the cold. If going indoors isn't possible, protect the person from the wind, cover the head, and insulate the individual from the cold ground. - Remove wet clothing. Replace wet things with a warm, dry covering. - Don't apply direct heat. Don't use hot water, a heating pad or a heating lamp to warm the person. Instead, apply warm compresses to the center of the body — head, neck, chest and groin. Don't attempt to warm the arms and legs. Heat applied to the arms and legs forces cold blood back toward the heart, lungs and brain, causing the core body temperature to drop. This can be fatal. - Don't give the person alcohol. Offer warm nonalcoholic drinks, unless the person is vomiting. - Don't massage or rub the person. Handle people with hypothermia gently because their skin may be frostbitten, and rubbing frostbitten tissue can cause severe damage. - Mechem CC, et al. Accidental hypothermia in adults. http://www.uptodate.com/home/index.html. Accessed March 3, 2012. - Corneli HM, et al. Clinical manifestations of hypothermia in children. http://www.uptodate.com/home/index.html. Accessed March 3, 2012. - Ferri FF. Ferri's Clinical Advisor 2011: Instant Diagnosis and Treatment. Philadelphia, Pa.: Mosby Elsevier; 2011. http://www.mdconsult.com/books/page.do?eid=4-u1.0-B978-0-323-05611-3..00017-3--sc0285&isbn=978-0-323-05611-3&uniqId=321844243-3#4-u1.0-B978-0-323-05611-3..00017-3--sc0285. Accessed March 3, 2012. - Hypothermia. The Merck Manuals: The Merck Manual for Healthcare Professionals. http://www.merckmanuals.com/professional/injuries_poisoning/cold_injury/hypothermia.html. Accessed March 3, 2012.
<urn:uuid:df6a67d6-62c2-4c01-9bbd-a0927b3efcc4>
2013-05-23T19:00:26Z
CC-MAIN-2013-20
[ [ 0.005950927734375, -0.0068359375, 0.0185546875, -0.0130615234375, 0.130859375, -0.07080078125, -0.00104522705078125, 0.142578125, -0.003936767578125, -0.058837890625, 0.083984375, 0.047607421875, 0.052978515625, -0.00885009765625, 0.0546875, -0.00747...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.867378
828
http://www.mayoclinic.com/health/first-aid-hypothermia/FA00017/rss=1
0.498778
WASHINGTON — The presumptive Republican nominee for president and the leading contender for the Democratic nomination are exaggerating what's known about Iran's nuclear program as they duel over how best to deal with Tehran. Sens. John McCain, R-Ariz., and Barack Obama, D-Ill., say that Iran is developing nuclear weapons. The U.S. intelligence community, however, thinks that Iran halted an effort to build a nuclear warhead in mid-2003, and the U.N. International Atomic Energy Agency, which is investigating the program, has found no evidence to date of an active Iranian nuclear-weapons project. The candidates' comments raise questions about how carefully the two have studied the public record on what's become a major campaign issue and is one of the most difficult foreign-policy challenges likely to confront the next president. The issue is also significant because the Bush administration inflated assessments of the Iraqi nuclear threat and the possibility that former dictator Saddam Hussein could pass nuclear weapons to terrorists as it sought to whip up public support for the March 2003 invasion of Iraq. Iran has been expanding an industrial-scale uranium enrichment program in defiance of U.N. Security Council demands that it be suspended. Enrichment is the process that produces low-enriched uranium fuel for nuclear generating stations and highly enriched uranium for nuclear weapons. Iran, whose known enrichment facilities are under IAEA monitoring, says it's making low-enriched uranium reactor fuel and has no intention of developing weapons. Few experts, however, think that Iran has come clean about all its nuclear activities. In a major speech Monday to a powerful Jewish American lobbying group, McCain asserted that Iran is actively developing nuclear weapons that threaten the security of Israel and could be passed to terrorist groups. "Tehran's pursuit of nuclear weapons poses an unacceptable risk, a danger we cannot allow," he told the American Israel Public Affairs Committee. Israel, however, is thought to have a significant nuclear arsenal of its own, and an Iranian nuclear attack on Israel would invite a devastating nuclear counterstrike. In criticism aimed at Obama, McCain said, "The idea that they now seek nuclear weapons because we refused to engage in presidential-level talks is a serious misreading of history." McCain was referring to an interview Friday with Fox News in which Obama rebuked President Bush for rejecting direct negotiations with Iran on its nuclear program. "Iran is stronger now than when George Bush took office," Obama said. "And the fact that we have not talked to them means that they have been developing nuclear weapons." Neither campaign immediately responded to requests for comment on its candidate's assertions. The 16 agency-strong U.S. intelligence community said last November in an unclassified National Intelligence Estimate that it concluded with "high confidence" that Iran had halted an effort to develop a nuclear weapon in fall 2003. A senior U.S. intelligence official, who requested anonymity because he wasn't authorized to speak publicly, said that U.S. intelligence agencies stuck by the NIE's judgment of "moderate confidence" that Iran hadn't reactivated the alleged effort. In Vienna, Austria, IAEA Director General Mohamed ElBaradei told his board of governors Monday that the agency is continuing to look into allegations that Iran conducted secret studies related to developing a nuclear warhead for a missile. The allegations are based on documents provided to the agency by the United States and other IAEA members that purport to show that Iran conducted the research until March 2004. Iran has dismissed the documents as forgeries. ElBaradei said the IAEA couldn't give the Iranian program a clean bill of health until Tehran had implemented "all the transparency measures required to clarify this cluster of allegations and questions." Democratic Sen. Hillary Clinton, who's battling Obama for the Democratic presidential nomination, has been more nuanced in describing Iran's nuclear program, telling MSNBC on April 21 that Iran "appears" to have a "continuing goal of obtaining nuclear weapons."
<urn:uuid:dfff2a9f-ff07-4cd3-ae68-9eb18ab16c82>
2013-05-23T18:45:58Z
CC-MAIN-2013-20
[ [ -0.014404296875, 0.0311279296875, 0.0035247802734375, 0.03857421875, 0.109375, -0.05615234375, -0.010498046875, 0.1318359375, -0.0284423828125, -0.05419921875, 0.07568359375, 0.031982421875, -0.035888671875, 0.0126953125, 0.04541015625, -0.0031738281...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965684
815
http://www.mcclatchydc.com/2008/06/02/39423/both-mccain-obama-exaggerating.html
0.482057
Resort Man Charged With Pot Distribution OCEAN CITY -- A local man was arrested with a significant amount of marijuana in an Ocean City hotel room after resort police earlier in the day arrested his caretaker for possession. Around 9:40 a.m. on Friday, Ocean City Police were conducting a follow-up check on the welfare of Brian Daniel Sterner, 37, of Ocean City, who was staying in a hotel room in the area of 32nd Street and Baltimore Ave. Earlier on Friday morning, another occupant in the hotel, identified as Jody Lyn Paull, 26, of Ocean City, was arrested for possession of marijuana and told officers she was the caretaker of the wheelchair-bound Sterner, who was staying in a neighboring room. OCPD officers went to check on Sterner’s welfare and got no response after several attempts. When officers attempted to contact Sterner from outside the room, they detected an odor of marijuana coming from the unit. OCPD officers located Sterner on the balcony of the unit, and after he appeared unconscious at first, he eventually responded to officers. Once inside the unit, officers observed a large amount of marijuana in Sterner’s lap and he was arrested for possession. After placing Sterner under arrest, police executed a search warrant for the room and located approximately 23 ounces of marijuana in various containers and bags. In addition, police seized over $600 in currency, several items of paraphernalia, computers, ledgers and phones. In all, Sterner was charged with possession, possession with intent to distribute marijuana and distribution of marijuana. After an initial appearance before an Ocean City District Court Commissioner, Sterner released on personal recognizance.
<urn:uuid:da01304d-474f-492a-9e98-ff5a25fd7cb2>
2013-05-23T18:30:59Z
CC-MAIN-2013-20
[ [ -0.00020239637524355203, 0.011819948442280293, -0.01659650169312954, 0.005383743438869715, 0.11204662919044495, -0.0051611075177788734, -0.007002914324402809, 0.08484455943107605, -0.014167746528983116, -0.029145076870918274, 0.10103627294301987, 0.03707901388406753...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971708
350
http://www.mdcoastdispatch.com/articles/2013/01/04/Top-Stories/Resort-Man-Charged-With-Pot-Distribution
0.176007
The right-leaning Heritage Foundation has thrown cold water on the revival a conspiracy theory pushed on Fox News by contributor Dick Morris and the National Rifle Association that the United Nation's Arms Trade Treaty (ATT) is actually a sinister Obama administration plot to eliminate the right of private individuals to own a firearm. During a Heritage Blogger Briefing, senior research fellow Ted Bromund stated, "I don't think that the ATT is a gun confiscation measure for a variety of reasons. First, because I don't regard that as within the bounds of possibility in the United States and secondly, because that is not what the text says." Bromund's assessment is correct. The stated goal of the treaty is to regulate the international trade of firearms in order to prevent the diversion of arms to human rights abusers, and the most recent version of the treaty's text expressly prohibits the regulation of firearm ownership within sovereign nations. The preamble of the July 26 treaty draft clearly "reaffirm[s] the sovereign right and responsibility of any State to regulate and control transfers of conventional arms that take place exclusively within its territory, pursuant to its own legal or constitutional system." Furthermore, the Department of State has stated that it will oppose any treaty that contains "restrictions on civilian possession or trade of firearms otherwise permitted by law or protected by the U.S. Constitution." Despite convincing evidence that the treaty seeks only to regulate international trade -- and that any treaty limiting rights granted by the United States Constitution would be considered invalid -- the conspiracy theory persists. Morris, who has pushed theory on Fox News, and NRA Executive Vice President Wayne LaPierre, both dedicated space in their latest books to advance the claim. "Here Come The Black Helicopters!" a book released by Morris on October 9 devotes an entire chapter -- "UN Forces Gun Control on America" -- to the subject. Morris first erroneously writes that "[t]he Second Amendment to the US Constitution, granting our citizens the right to bear arms, may be facing de facto repeal in the Arms Trade Treaty now being pushed by the UN." [Here Come The Black Helicopters!, p. 43] Morris, citing the claims of "Second Amendment rights" publication The Independent Sentinel, states that the treaty would allow the Obama administration to "[c]onfiscate and destroy all 'unauthorized' civilian firearms (all firearms owned by the government are excluded, of course)" and "[b]an the trade, sale and private ownership of all semi-automatic weapons." [Here Come The Black Helicopters!, p. 46] In fact, Heritage's Bromund himself is cited as a supporter of Morris' confiscation theory, even though Bromund -- a critic of other aspects of the ATT -- clearly does not believe that threat of gun confiscation is real. [Here Come The Black Helicopters!, p. 48] Following a November 7 vote by the U.S. Mission to the U.N. to continue treaty negotiations, the NRA was quick to cite the United States' ongoing commitment as evidence of an Obama conspiracy to confiscate firearms. LaPierre, who has also pushed U.N. gun confiscation claims on Fox News, wrote about the ATT at length in his 2011 book "America Disarmed: Inside the U.N. & Obama's Scheme to Destroy the Second Amendment." According to LaPierre, the ATT would ban the importation of firearms in the United States by classifying American gun owners as human rights abusers "because U.S. laws allow crime victims to shoot rapists, arsonists, and carjackers." [America Disarmed, p. 66] Ignoring that the United States would not a support a treaty that regulates domestic firearm ownership, LaPierre went on to claim that "any U.N. firearms treaty that becomes law in the U.S. could become a platform for the imposition of extremist gun control, with U.N. bureaucrats, not U.S. voters, making the decisions." [America Disarmed, p. 119] Not one to limit his fearmongering, LaPierre also attacked the U.N. Programme of Action, the framework the U.N. uses to address small arms violence, writing, "Any Americans who aren't worried about firearms being confiscated have their heads in the sand." [America Disarmed, p. 13]
<urn:uuid:bd94e221-b249-4482-9d8e-edb61f226a38>
2013-05-23T18:41:15Z
CC-MAIN-2013-20
[ [ -0.052490234375, 0.0308837890625, 0.0137939453125, 0.03466796875, 0.08203125, -0.0693359375, -0.01275634765625, 0.12060546875, -0.0289306640625, -0.001434326171875, 0.0517578125, 0.04052734375, -0.08642578125, -0.00732421875, 0.029052734375, 0.026367...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9463
891
http://www.mediamatters.org/print/blog/2012/11/15/heritage-foundation-shoots-down-right-wing-un-g/191396
0.206312
Little Games, Big Engagement Take "Doodle or Die," a little game that won the Node Knockout hacking competition for "Most Fun." The game was built in 48 hours, and has extremely simple mechanics. One player draws a picture or provides a short descriptive phrase, and the next player describes the picture or draws a picture based on the description. Players take turns either drawing what's been described, or describing another player's drawing, creating chains of doodles that can take hilarious turns. Of course, given the nature of anonymity and the Web, right now "Doodle or Die" tends to be full of racism and crude penis drawings, but for every troll there are some artists with a bit of wit, a bit of skill, or a healthy dose of both. And the game is enormous -- tens of thousands of people are playing at any given moment. So what propelled this simple game's success? Well, the creator thought of a simple mechanic that almost anyone could do -- anyone can doodle a drawing or write a short description, and each contribution only takes a few minutes. And, perhaps more importantly, the game captured the imagination of Reddit, an online community that can generate a tremendous amount of interested traffic in a very short period of time. There's a wealth of games out there that might not require a full team of creatives and developers months to create. All it takes is a little playfulness and the right audience to create something that thousands of people can engage with.
<urn:uuid:493af900-cd17-4f57-95e1-568407f07c51>
2013-05-23T18:46:43Z
CC-MAIN-2013-20
[ [ -0.00864460039883852, 0.017104290425777435, 0.017474113032221794, 0.002276719780638814, 0.06471893191337585, -0.015255177393555641, 0.004252958577126265, 0.07766272127628326, -0.006194526795297861, -0.007442677393555641, 0.07248520851135254, 0.03291420266032219, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950896
306
http://www.mediapost.com/publications/article/159151/little-games-big-engagement.html
0.301065
Chromosomes are present in every cell of the body. These chromosomes carry the DNA information that defines many aspects of an individual's life. DNA evidence is used to determine if the individual will develop normally or not. There are a few genetic abnormalities that may be caught at an early stage of pregnancy. The tendency is to suggest that such pregnancies be terminated as they would only lead to the development of children who are born with abnormalities. The karyotype test is used to collect the information needed relating to the health and functioning of the chromosomes. There are several steps that need to be followed in order to perform the karyotype test. The sample is collected from a newborn baby or from the amniotic fluid of a pregnant woman. The entire karyotype test procedure requires one week to be performed. This is because the cells need to be collected and then divided and allowed to grow. When these cells grow in the laboratory, the doctors can identify the necessary genetic information in order to make a diagnosis. The actual process of collecting information from the chromosomes is complicated and requires extremely precise work. There is a specialized type of laboratory used for such testing. This is known as a cytogenetics laboratory. Cytogenetics is a relatively modern field of medicine. For this reason, one may not find a cytogenetics laboratory in every hospital. There are specialty hospitals that deal with issues relating to genetics. One needs to have the karyotype test done in such a location. The chromosome karyotype test is conducted to identify a number of different genetic conditions. One such syndrome is Down's syndrome. One may also discover conditions such as Klinefelter syndrome, Philadelphia syndrome and Turner syndrome. All these conditions involve complications relating to the genetic makeup of cells. In order to understand these conditions further, one may speak with the doctor for clarifications. There is no preparation required for the karyotype test. In fact, as far as the patient is concerned, the karyotype test takes less than a minute to perform. If the test is performed on a pregnant woman, then it will be done when she visits the clinic for a checkup. If the karyotype test is done on a new born baby, then it will be done in the hospital itself. Samples may then be transported to the appropriate laboratory capable of conducting the chromosome karyotype test. You could check with your doctor for the karyotype test cost as these rates would vary accordingly. Also it is of utmost importance that the karyotype test results be shown to your doctor for a proper interpretation.
<urn:uuid:c79fe98f-9e7f-4f22-b036-f8bf02a3c513>
2013-05-23T18:44:06Z
CC-MAIN-2013-20
[ [ -0.021484375, 0.00799560546875, 0.005279541015625, -0.00390625, 0.1279296875, -0.041748046875, -0.0128173828125, 0.1083984375, -0.038818359375, -0.0203857421875, 0.0771484375, -0.007354736328125, -0.06591796875, 0.0026702880859375, 0.02783203125, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950513
525
http://www.medicalhealthtests.com/medical-tests/karyotype-test.html
0.495114
How many times has a Tiger football player rushed for 200 yards in a game? 15 times. The first was Dave Casinelli, with 210 against Houston on November 30, 1963. The most recent was Curtis Steele, with 232 against Tulsa on November 27, 2009. Among these, how many times did DeAngelo Williams achieve the feat? Nine times. His career high — and the U of M record — was 263 at South Florida on November 27, 2004.
<urn:uuid:0dbe2afc-9b17-4e52-b613-ee1a2d095904>
2013-05-23T19:00:05Z
CC-MAIN-2013-20
[ [ 0.011215965263545513, 0.014619430527091026, 0.00498917093500495, -0.005840037018060684, 0.02088490128517151, -0.0625, -0.013381807133555412, 0.09034653753042221, -0.010287747718393803, -0.08539603650569916, 0.060334157198667526, 0.055693067610263824, -0.01222153...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985226
95
http://www.memphisflyer.com/TigerBlue/archives/2011/04/21/ttt-answer
0.484409
Originally Posted by niksonion Let me resume, You think that GS Title,Olympic Gold,GS Final,250 title,and 1 (only one !!!) Masters final,and WTF Semi, is better then: Nole`s 1 GS Title,2 GS Finals,WTF Title,3 Masters titles,and one more 500 title, Fed`s 1 GS Title,WTF Finals,3 Masters titles,Olympic silver, and two more 500 titles !!!??? If You are serious with it, then there is no hope for You... Let me remind You, that Rafa in 6 months of 2012 had: 1 GS Title,1 GS Final,2 Masters titles,and one more 500 title... But,seriously,Well done toAndy, anyway,really great achievments... and by the way send a Christmass greeting to Nole, for that US open final...
<urn:uuid:95edd9b1-a0b7-40eb-b7d0-efa862c51047>
2013-05-23T18:45:21Z
CC-MAIN-2013-20
[ [ 0.040532179176807404, 0.01933787204325199, -0.004196317866444588, 0.01632116362452507, 0.034808170050382614, -0.013768563978374004, -0.03635519742965698, 0.0631188154220581, 0.020266089588403702, -0.0191058162599802, 0.07766088843345642, -0.008663366548717022, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.814733
192
http://www.menstennisforums.com/showpost.php?p=12582767&postcount=52
0.203036
An abdominal aortic aneurysm can develop in anyone, but is most often seen in males over age 60 who have one or more risk factors. The larger the aneurysm, the more likely it is to rupture and break open. Aneurysms develop slowly over many years and often have no symptoms. If an aneurysm expands quickly, tears open (ruptures), or blood leaks along the wall of the vessel (aortic dissection), symptoms may develop suddenly. The symptoms of rupture include: Pain in the abdomen or back -- severe, sudden, persistent, or constant. The pain may spread to the groin, buttocks, or legs Any one of these tests may be done when you're having symptoms. If you have bleeding inside your body from an aortic aneurysm, you will have open abdominal aortic aneurysm repair. If the aneurysm is small and there are no symptoms: Surgery is rarely done if the aneurysm is small. You and your doctor must decide whether the risk of having surgery is smaller than the risk of bleeding if you do not have surgery. Your doctor may recommend checking the size of the aneurysm with ultrasound tests every 6 months to see if it is getting bigger. Surgery is usually recommended for patients who have aneurysms bigger than 2 inches (5.5 cm) across and aneurysms that are growing quickly. The goal is to perform surgery before complications or symptoms develop. There are two approaches to surgery: In a traditional (open) repair, a large cut is made in your abdomen. The abnormal vessel is replaced with a graft made of man-made material, such as Dacron. The other approach is called endovascular stent grafting. This procedure can be done without making a large cut in your abdomen, so you may get well faster. If you have certain other medical problems, this may be a safer approach. Endovascular repair is rarely done for a leaking or bleeding aneurysm. The outcome is usually good if an experienced surgeon repairs the aneurysm before it ruptures. When an abdominal aortic aneurysm begins to tear or ruptures, it is a true medical emergency. Less than 80% of patients survive a ruptured abdominal aneurysm. Calling your health care provider Go to the emergency room or call 911 if you have pain in your belly or back that does not go away or is very bad. To reduce the risk of developing aneurysms: Eat a heart-healthy diet, exercise, stop smoking (if you smoke), and reduce stress to help lower your chances of having a blocked artery again. Your health care provider may give you medicine to help lower your cholesterol. If you were given medicines for blood pressure or diabetes, take them as your doctor has asked you to. People over age 65 who have smoked at any time in their life should have a screening ultrasound performed once. Gloviczki P, Ricotta JJ II. Aneurysmal vascular disease. In: Townsend CM, Beauchamp RD, Evers BM, Mattox KL, eds. Sabiston Textbook of Surgery. 18th ed. Philadelphia, Pa: Saunders Elsevier; 2007:chap 65. Greenhalgh RM, Powell JT. Endovascular repair of abdominal aortic aneurysm. N Engl J Med. 2008;358:494-501. Lederle FA, Kane RL, MacDonald R, Wilt TJ. Systematic review: repair of unruptured abdominal aortic aneurysm. Ann Intern Med. 2007;146:735-741. Braverman AC, Thompson RW, Sanchez LA. Diseases of the aorta. In: Bonow RO, Mann DL, Zipes DP, Libby P, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine. 9th ed. Philadelphia, Pa: Saunders Elsevier; 2011:chap 60. Shabir Bhimji, MD, PhD, Specializing in General Surgery, Cardiothoracic and Vascular Surgery, Midland, TX. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
<urn:uuid:c4993df2-00d9-46ea-83cc-5abb08c8f432>
2013-05-23T18:31:04Z
CC-MAIN-2013-20
[ [ 0.01318359375, 0.005584716796875, 0.01104736328125, -0.007232666015625, 0.09716796875, -0.032470703125, -0.01953125, 0.1533203125, -0.03955078125, -0.03662109375, 0.123046875, 0.03271484375, -0.0927734375, 0.01336669921875, 0.05029296875, 0.006866455...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.904732
929
http://www.mercyclinton.com/body.cfm?id=69&action=detail&AEProductID=Adam2004_5117&AEArticleID=000162&AEArticleType=Disease
0.248448
January 15, 2009 Reporting on Sudan: a master class Me: Hello Mr [senior government figure]. I've heard you've been arrested...Although I suppose the fact that you've just answered your mobile phone suggests that you haven't been arrested... Is that right? Senior government figure: Yes. Posted by aheavens at January 15, 2009 8:59 AM
<urn:uuid:823b15c4-03c6-42da-a9fe-bcbd22854fdc>
2013-05-23T18:30:27Z
CC-MAIN-2013-20
[ [ 0.00010077897604787722, 0.025617731735110283, 0.012354651466012001, 0.015534156933426857, 0.07340116053819656, -0.04178779199719429, -0.012172965332865715, 0.02761627919971943, -0.0074945492669939995, -0.03179505839943886, -0.010492369532585144, 0.03851744160056114,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.977913
79
http://www.meskelsquare.com/archives/2009/01/reporting_on_su.html
0.761595
See mail address, network address. A unique number identifying a node on a network. There are only two types of Addresses; Hardware = OSI Layer 2 & Internet = OSI layer 3. string Simple Street/Mailing address of referenced item - multiple address lines (if needed) are sequenced by "rank". THIS ELEMENT UNDER REVIEW FOR EXTENSION. A location in a computer system, identified by a name, number, or code label. (1) A number, character, or group of characters which identifies a given device or a storage location which may contain a piece of data or a program step. (2) To refer to a device or storage location by an identifying number, character, or group of characters. Physical: A specific location in memory where a unit record, or sector, of data is stored. To return to the same area on the disc, each area is given a unique address consisting of three components: cylinder, sector and head. Memory: A unique memory location. Network interface cards and CPUs often use shared addresses in RAM to move data from each card to the PC's processor. The term can also refer to the unique identifier for a particular node in a network. Otherwise known as a URL, the unique location of a Web page on the Internet. Can also mean your email address. For Bluetooth, each Bluetooth device has built into its hardware a 48-bit device unique address. Computer location where a particular item is stored. A set of characters that identifies an individual network node. IP address is a 32-bit numeric identifier assigned to a node. The address has two parts, one for the network identifier and the other for the node identifier. All nodes on the same network must share the network address and have a unique node address. For networks connected to the Internet, network addresses are assigned by the Internet Activities Board (IAB). Addresses also include IPX addresses, the internal network number and external network number, and the Media Access Control (MAC) address assigned to each network card or device. A computer address is very different to a street address, but has the same function - a name for the place where other computers can find it "living". A unique identity of each network station on a LAN or WAN. A location of a web site or file on the Internet. A unique memory location permitting reading or writing of data to/from that location. Network interface cards and CPUs often use shared addresses in RAM to move data between programs. Words, numbers, symbols that designate a physical or virtual location. For example: street numbers and names, countries, e-mail addresses, URLs. The location of a Web page on the internet, otherwise called a URL. In the online world, the combination of letters, numbers, and/or symbols that will let you send e-mail to a particular person or organization. The identification of a physical or virtual distinct entity in a network. On the Internet, this network address is called a URL (Uniform Resource Locator). For instance: http://www.gsh.org. [It is important to type these accurately. The information in the header of a PDU that identifies the owner of the information in the payload. In connection-oriented protocols the address identified the virtual circuit number, and in connectionless protocols the address identifies the ultimate destination of the information. location in primary memory where data or instructions are held temporarily; identification of a storage location Similar to street addresses, computer addresses identify information's storage location on a computer or identify a node on a network. (1) A number that identifies a particular location in the memory, a register, or other data source or depository. (2) The location of a terminal, peripheral device, node, or any other component in a network. The series of letters or numbers that will take the user to a specific e-mail address or web site. Characters that are used by a device to locate another device in a network. See also group address. A number that specifies the location of a byte in memory. The location of an Internet resource. An e-mail address may take the form of firstname.lastname@example.org. A web address looks similar to http://www.showtheworld.com. In reference to the Internet, the name of a site that users can connect to, such as www.microsoft.com, or the address of an e-mail recipient, such as email@example.com. A typical address starts with a protocol name (such as ftp:// or http://) followed by the name of the organization that maintains the site. The suffix identifies the kind of organization. For example, commercial site addresses often end with .com. the means by which a particular portion of a storage medium is identified absolute address the actual address of a location in the main store relative address the number to be added to the starting address ion order to produce the absolute address Return A unique number or name assigned to all computers that are connected to the Internet. See also domain name and IP address. An address is a unique identifier that determines the originating location of data or the destination of data being transmitted across a communication link. There is a distinction between a station's link address, a station's network address, and an individual process running on a station. Normally refers to one's e-mail address which can be a series of letters and/or numbers, or when referring to a World Wide Web site, it is a URL. Refers to a location in a storage medium. Addresses most frequently refer to a locations in RAM. An Internet machine name or location, for example, www.prolifics.com. A character string that uniquely identifies a memory location in a PLC, computer, or other programmable system. The logical location of a terminal, node, peripheral device, or byte in memory in a network. The abbreviation for address is addr. A name, label, or number identifying a register, location or unit where information is stored. The address is the label given to the places in computer memory. A specific location where data is stored in a memory; a numerical or alphabetical designation of the storage location of data. the url of a Web page, such as http://www.anvil-graphics.com/. The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like http://www.intellisoft.co.uk. Address is the term used to refer to the physical location of any piece of information and the computer on which that information resides, on the Internet. Addresses are also used to define where electronic mail is sent to and from. 911 address-physical location; mailing address-owners location. A unique network location used to identify a network object such as a database service, client, Interchange, or Names Server. TNS addresses have a specific format. Addresses must be unique. See TNS address and well known address. An identifier defined and used by a particular protocol and associated software to distinguish one node from another. A specific location in memory, designated either numerically or by a symbolic name. A system just like a house or street address used for identifying a destination or location of information located on the internet. An example of a web address would be www.webct.com. When used within the context of the Internet, an address refers to one of these pieces of information: Internet email addresses or a Web site address, called a Uniform Resource Locator. Like a postal address, a "network address" is used to locate another user for the purpose of directing mail. On the Internet this is in the form: email@example.com. Francis Street, Perth, Western Australia 6000 A label such as an integer or other set of characters which identifies a register, location of device in which information is stored. either the address of a user of a system, as in an email address (required so that the message sent can be directed to the desired person), or the address of a site on the internet a code or series of letters, numbers and or symbols by which the Internet identifies you or a location where information is stored a data structure understood by a network which uniquely identifies the recipient an identifier which is unique within the particular computing network to identify each device associated with the network a numerical identifier for the topological location of the named entity a numeric label for a specific location in memory a place where a person or organization can be located and communicated with a primary means to identify and locate a unique object a unique number or group of characters that identifies a unique user or location on the Internet a virtual liaison office, not the physical location of AMBAI/Ambai U's faculty and officials see uniform resource locator (URL) The location of a word of memory in RAM. In data communication, the unique code assigned to each device, workstation, user, or multicast group connect to a network. See IP address. A number uniquely identifying each node in a network. A collection of letters and numbers that tell the world whosesite it is - cf URL. The unique code by which the Internet identifies you (also referred to as URL). Most URLs contain three parts: the protocol, the host name, and the folder or filename. (Network Address) Internet site address come in two forms: as a set of numbers such as 22.214.171.124 and alphanumeric such as nasa.gov (both of these represent the same address, and either could be used). An individual e-mail's address at this site, for example, John Glenn's, might look like this: firstname.lastname@example.org. (referring to e-mail or network address) A unique combination of letters and/or numbers which identifies a person or location sought. Also referred to as a URL. The location of an Internet resource. A web address looks something like http://www.stunik.com. An e-mail address may take the form of email@example.com. Unique designation for a device on a network that lets other devices direct messages to it. Identifies the author and supplies the author's mailing address. A hexadecimal number that represents a location in storage or memory. Used to identify communication ports. To communicate with a storage device. A string of characters used in cyberspace that allows users to identify themselves. The unique code assigned to the location of a file in storage, a device in a unique system or network, or any other data source on a network. An address is the name you need to either a) access an Internet site or b) send an email. An Internet site's address is also referred to as a URL and typically appears in the format www.address.com. Email, on the other hand, appears in the form of firstname.lastname@example.org and provides a unique identifier for your inbox so your mail can find you. There are three basic types: Computer address: e.g. www.bournemouth.ac.uk E-Mail address: e.g. email@example.com URL:e.g. http://www.bids.ac.uk Internet addresses help you find people or information on the Internet. People with e-mail addresses can have mail delivered right to their computer. It's a lot like your street address which tells the post office where to deliver letters. E-mail addresses usually look like this: firstname.lastname@example.org or email@example.com. Either a personal/business address for email (i.e. firstname.lastname@example.org) or a Web site address, also called a URL (i.e. www.cincinnati.com) The actual street listing associated with the Remediation Site. With city and zip, constitutes the complete physical address for the site. In the context of the Internet, an address is the information a web browser needs to locate a particular website. The location to which mail items are delivered. It consists of certain elements such as recipient name, street name and house number, city, state, and postal code as required by the type of mail. location of an internet site. a unique set of numbers that identifies a particular location in computer memory. The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http://www.geeksnet.com. A unique name or number identifying a specific computer. Addresses are used in network communications in transmitting messages to a particular machine. You can address a particular person by associating their account with the address of the machine where they have the account. For example, the "john" in firstname.lastname@example.org is the account of an individual on the machine "reliant.c-cwis.siu.edu". This machine address is an IP (Internet Protocol) address. You must always have an IP address to use the Internet. IP addresses can also be expressed numerically, e.g., 126.96.36.199, which represents the same machine. The verbal names are simply easier for people to remember. the number, street, city, and ZIP code on a letter that tell postal workers where to deliver it The string of characters that you must give an electronic mail program to direct a message to a particular person. The term "Internet address" often refers to an assigned number, which identifies a host on this network. A unique network location used to identify a client on a network. TNS addresses have a specific format. Addresses must be unique. See TNS address. The address is the number which identifies a computer on the internet. The location of an Internet resource. An email address may take the form email@example.com. A web address looks something like http://www.metrac.org. The numerical designation of a location in memory. See either IP Address or Email Address. Internet address is just like your home or apartment address, only it is in cyberspace. Once you have an Internet address, you have a place all your own on the Internet. The location of a highway-rail grade crossing. There are three addressing systems that locate a highway-rail grade crossing: The local governmental street address The railroad milepost number The Federal DOT Crossing Number (See DOT Crossing Number and Milepost Number.) a binary pattern used to select a location in memory. In this text, addresses are 16 bits wide. The location of an Internet resource. An email address may be firstname.lastname@example.org, a web address shall look like http://www.funnyjobs.co.au The location of a computer, file or peripheral device on a network. A unique identifier for a communication endpoint. This is a way of identifying a location on a network, and is used for email and Internet locations. Another term for a website address is URL which stands for Uniform Resource Locator. The address identifies the location of a web page on the World Wide Web. This is also referred to as URL or Uniform Resource Locator. a unique identifier used in sending data to a particular person or object. For example, an "IP address", "Mail address" or "Ethernet address". In online terms this commonly refers to a particular machine or computer system connected to the Internet. Machine 'addresses' exist on the Internet for servers for e-mail sending and receiving, web page or web site access, and almost everything functioning on the Internet. Internet users encounter two important types of addresses: Web page addresses (more properly called URLS) and E-mail addresses (for sending e-mail to someone. E-mail addresses almost always contain an @). Used for finding people, URLs, email, newsgroups. The common descriptor that identifies a property. It usually includes a building number and street name. The unique string of text that identifies the location of a web page on the World Wide Web. An address on the Internet is described as a uniform resource locator, which can be used for any type of addressing, such as e-mails (mailto:email@example.com), web pages (http://www.news.com/) and ftp sites (ftp://ftp.netscape.com/pub/communicator). Instead of using domain names, it is also possible to use IP addresses. See also ftp, e-mail, IP, uniform resource locator, web page. Refers to the email address of an individual or group, or the address of a site on the Internet. Site addresses are known as URLs. A number identifying each individual locomotive and accessory decoder on a layout. When a controller is set to a particular address, only the decoder set to the corresponding address can read the instructions from the controller. An address is a word or number that refers to a storage location or port. On the Internet a unique name or number combination which identifies a user or system. Ex: "firstname.lastname@example.org" is the address of a user known as fozz. "xmission.com" is the address of the system called Xmission. The memory location of a data item or procedure. The expression can represent just the offset (in which case the default segment is assumed), or it can be in segment: offset format. The number of a particular memory or peripheral storage location. Like post office boxes, each byte of memory and each disk sector has its own unique address. Programs are compiled into machine language, which references actual addresses in the computer. Code used to locate any person, website and/or file on the Internet. The format for email addresses is username@hostname, where username is your username, login name, or account number, and hostname is the name of the computer or Internet provider you use (e.g. AOL). Websites and files are also identified by a unique address, or URL (Uniform Resource Locator). EGS's URL, for example, is www.ellisgs.com. An email address is composed of the following: email@example.com recipiant(username), @, location, domain Unique identifier of a web page. URL (Uniformed Resource Locator) is more frequently used for this purpose. a unique identifier for a computer or site online, usually a URL for a Web site or marked with an @ for an e-mail address. Literally, it is how one computer finds the location of another computer using the Internet. The physical location of a variable in memory, addresses are stored as hexadecimal numbers and are usually not directly modified by the programmer. in Organization, the mailing address of the organization (or person). Includes street number, name, city, state, zipcode, and count ry. each web page on the Internet is assigned a unique recognizable address. Address is also known as URL (Uniformed Resource Locator). See IP Address or E-Mail Address. An address is the unique identifier you need to either a) access the services of an Internet site or b) send E-Mail. Another word for Internet site addresses is URL. Chances are you're already familiar with E-Mail addresses. They're in the form of firstname.lastname@example.org and provide a unique identifier for your in-box so your mail can find you. [See Also: URL a unique combination of letters, numbers and other characters determining the recipient of an email message or the location of a computer on the Internet (e.g. a Web site). A unique alphanumeric sequence used to identify a computer transmitting or receiving data. Also a location in memory. The location of an Internet resource. An email address may take the form of email@example.com A web address looks something like http://www.slashtime.com A unique name or number identifying a computer user or a computer. They are used in network communication in transmitting messages to a particular machine or person. In Internet Explorer, an address is the location of a Web page. Addresses can be used to identify Web site, FTP site and gopher site on the Internet, as well as files on an intranet. Type the following address in the Address box: http://www.dpsinfo.com/help/words.html http means the URL to open is residing on a Web server www.dpsinfo.com is the domain of the server help is a subdirectory under the dpsinfo.com domain on the server words.html identifies the Web page being opened Internet Explorer gives the user the option of displaying Addresses as simplified addresses ("friendly URLs") or full addresses (URLs as described above). This value is set from the Options menu, on the Appearance tabsheet. When the term address is typically used on the Internet, it means an E-mail address. The term URL is more often used to represent Web page addresses. An Internet address can consist of letters, number and/or symbols. The address allows the Internet to identify a computer. Addresses allow people to transfer files, send email and visit web sites. a web address is the domain name or URL. An e-mail address is in the form firstname.lastname@example.org In communications, the coded representation of the source or destination of a message. ( 188) In data processing character or group of characters that identifies a register, a particular part of storage, or some other data source or destination. ( 188) To assign to a device or item of data a label to identify its location. ( 188) The part of a selection signal that indicates the destination of a call. To refer to a device or data item by its address. Back to the Top Code by which the Internet identifies you. The format is username@hostname, where username is your username, login name, or account number, and hostname is the name of the computer or Internet provider you use. The hostname may be a few words strung together with periods. A numerical identifier for a controller when used in computer communications. Unique identifier or location of a web page. Also called a Web Address or URL (Uniformed Resource Locator) 6940 Villagreen View Rockford, IL 61107 Click here to Email Kiki Glossary - - - - - - - - - - - - - - - - - - - - X- Y - Z A address is a unique name (or number) identifying a computer user or computer. Addresses are used in network communications in transmitting messages to a particular person or machine. numbers and letters which locate a computer The unique identifier you need to either access a Web site: http://www.webguest.com (see URL) or 188.8.131.52 (see IP address) or to send email: email@example.com (see email address). The location where a person or computer expects to find or deliver a particular piece of information, such as: e-mail—"Its_me@workplace," that specifies how electronic mail can be sent to a person or organization. or a Website address (see URL)—"http://www.ownpage.ownsite/beginhere" The location of a web site on the Internet-- also called a "URL." The address of a site can tell you something of the nature of the information that you will find there. An address that has ".gov" at the end of the address will belong to a "government" site. Typing "http://www.nsa.gov" in the location field will bring you to the National Security Agency web site. Another common suffix is ".com." Sites with this suffix are generally commercial sites. See also "Domain Name." a location in memory; each data item is stored at a particular memory address a name, label or number that is used to identify a location in memory; allows each device on a single communications line to respond to its own message A name, group of numbers or bits used to identify a specific device. (e.g. server, router, switch, printer, or computer) on a network. There are two types of addresses in common use within the Internet. They are email and IP or Internet addresses. Typically refers to either a website or email address. A website address appears in the form of a Uniform Resource Locator (URL) and is prefixed with http:// or https://. Either the address of a user (usually a name, followed by '@' and some other bits, separated by dots) ... or the address ('URL') of an Internet site (usually preceded by 'http://...' or 'ftp://...' An identification (number, name, or label) that uniquely identifies a computer register, memory location, or storage device. The code used to designate the location of a specific piece of data within computer storage The location of a site on the Internet, which in its pure form is expressed by a number. An identifier assigned to networks, stations, and other devices so that each device can be separately designated to receive and reply to message. The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like " http://www.q2websolutions.com" Reference to a memory location. In C pointers are used to hold addresses. Data structure or logical convention used to identify a unique entity, such as a particular process or network device. (1.) The telephone number that remote systems use to call the system. (2.) To refer to a device or an item of data by its address. (3.) In word processing, the location, identified by an address code, of a specific section of the recording medium or storage. (4.) In data communication, the unique code assigned to each device or workstation connected to a network. See also network user address. (5.) A numbering system used in network communications to identify a specific network or host with which to communicate. Addresses are often denoted in dotted decimal form. The information in an email message that determines where and how the message must be sent. Addresses are found both on message headers and on message envelopes. The identifying location of a device or an area of storage; for example, a memory register, disk sector, or network node. 2.To identify with an address. See also URL There are three types of addresses in common use within theInternet. They are email address; IP, internet or Internetaddress; and hardware or MAC address. See also: email address, IPaddress, internet address, MAC address. address mask System developed to identify and reach someone or something. About concerning the Internet, there are: a) e-mail addresses, b) IP addresses, c) hardware addresses, e) URLs. a slippery term, depending on context; in e-mail world, the combination of usercode/mailname and domain designation allowing proper routing of messages to an individual (e.g., email@example.com or firstname.lastname@example.org). In a network context, an address is the end of a glorified phone jack (a Network Access Module or NAM), able to be designated to receive packets of data in IP (Internet Protocol) form. All Internet traffic is tracked and routed by IP addressing, whether or not the addressing is manifest to the naked eye: the text address email@example.com silently incorporates the four-digit IP address of the server known as peseta.ucdavis.edu. The number of IP addresses on a given subnet is limited by the number of ports served by the equipment in a given IDF closet. Think of the World Wide Web as a network of electronic files stored on millions of computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate the files. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type a URL into your browser or click on a hypertext link, your browser sends a request to a remote computer, called a web server, to download one or more files. Every URL is unique and identifies one specific file. Identifies the location of an Internet resource. Examples: an e-mail address (firstname.lastname@example.org); a web address (http://www.osu.edu); or an internet address (128.146.999.9). A way to identify an Internet resource. See also URL. The following are examples of different Internet addresses: an electronic mail address - email@example.com, a web server address - www.farmingdale.edu A name, label, or number identifying a location in storage, a device in a system or network, or any other data source. A number that represents a location in the memory. Usually shown in a hexadecimal value for memory or storage. (also called e-mail address) A special code name that is a user's unique name on the Internet. Usually describing both the person and the place where the person works, the address is used to direct e-mail to its intended destination. See Chapter 6. In networking, a unique code that identifies a node to the network. Internet address, usually in dotted decimal notation. Sometimes referred to as a URL. This is the address of the website, web page or resource on the Internet. The identification of a physical or virtual distinct entity in a network. On the Internet, this network address is known as a URL, Uniform Resource Locator, e.g., http://www.gsh.org. An electronic mail location of a user. A number given to a location in memory. The location is accessed by using that number, like accessing a variable by using its name. Your Internet address is like your phone number, it is how you are uniquely identified. Once you are assigned your Internet address, you are connected to all other Internet computers. For example, New Technology Associates Internet address is 184.108.40.206. Number representing the location of a byte in memory. Within CP/M there are two kinds of addresses: logical and physical. A physical address refers to an absolute and unique location within the computer's memory space. A logical address refers to the offset or displacement of a byte in relation to a base location. A standard CP/M program is loaded at address 0100H, the base value; the first instruction of a program has a physical address of 0100H and a relative address or offset of 0H. There are three types of addresses in common use within the Internet. They are email address; IP, internet or Internet address; and hardware or MAC address. See also: email address, IP address, internet address, MAC address. The label or number identifying the memory location where a unit of information is stored. With reference to the Web, an address is a string of letters and punctuation marks that identifies an email mailbox or a web site. firstname.lastname@example.org is a sample email address, and http://www.techsoup.org is a sample web address. A web address is also called a URL. Source: TechSoup.org This could be an email or web address. Web addresses are also sometimes called URLs. Web addressed are always always in this format www.thedomain.com or http://thedomain.com. What about the .au or .uk endings, you ask? That's the country ( Au stralia or nited ingdom, for instance). American sites don't have the two country letters at the end of the address for the same reason that English stamps don't have "England" on them - they invented it. Email addresses are always in this format: email@example.com (or maybe .net, .gov, .org. .edu etc). (1) A coded representation of the destination of data, as well as of its source. Multiple terminals on one communications line, for example, must each have a unique address. (2) A group of digits that makes up a telephone number. Also known as the called number. (3) In software, a location that can be specifically referred to in a program. (4) A name, label, or number that identifies a location in storage, a device in a network, or any other data source. A component of a location that can be assigned a US Postal Service street address. (1) Disks and other storage devices have numbers that identify locations by sector and by byte. Retrieval software searches for the address assigned to the desired information in order to locate it. (2) Used as a verb, it means what a computer can access: "This Mac can address 5 megs of RAM." a unique network identification name which can alternatively be expressed numerically, such as 220.127.116.11 or science3.soe.umich.edu A unique network location used to identify a network object, such as a listener, Oracle Connection Manager, or Oracle Names server. Addresses have a specific format and must be unique. An e-mail address. A way to locate you through your Internet service provider. 1.The precise location in memory or on disk where a piece of information is stored. Every byte in memory and every sector on a disk have their own unique addresses. 2. To reference or manage a storage location. address - A recipient address is a collection of information that identifies a specific message recipient. It must be unique and complete to properly identify an e-mail recipient. There are four types of addresses in common use on the Internet: Email, IP, hardware, and URL. Network addresses are usually of two types:(1) the physical or hardware address of a network interface card; for ETHERNET this 48-bit address might be 0260.8C00.7666. The hardware address is used to forward PACKETS within a physical network. Fortunately, network users do not have to be concerned about hardware addresses since they are automatically handled by the networking software.(2) The logical or INTERNET address is used to facilitate moving data between physical networks. The 32-bit INTERNET address is made up of a network number, a subnetwork number, and a host number. Each host computer on the INTERNET, has a unique address. All INTERNET hosts have a numeric address and an English-style name. For example, the INTERNET address for UCC's CYBER 840 is 18.104.22.168; its INTERNET name is csugreen.UCC.ColoState.EDU. A name, decimal number or bit string used to identify a networked device. A number used by the operating system to identify a storage location. The unique code assigned to each device or workstation connected to a network. A standard Internet address (or IP address) is a 32-bit address field. This field contains two parts. The first part is the network address; the second part is the host number. See also IP address. A unique name (or number) identifying a computer user or computer is called an address. Addresses are used in network communications to transmit messages to a particular person or machine. In IP (Internet Protocol) form, it consists of a series of numbers, separated by dots, which enables a machine in one part of the world to contact another (much like a personal zip code). Also, technical reference to a specific location in a computer's memory. Central Park West at 79th Street, New York, NY 10024 A memory location in a particular machine's RAM; a numeric identifier or symbolic name that specifies the location of a particular machine or device on a network; and a means of identifying a complete network, subnetwork, or a node within a network. There are two separate uses of this term in Internet networking: "electronic mail address" and "Internet address." An electronic mail address is the string of characters that you must give an electronic mail program to direct a message to a particular person. See "Internet address" for its definition. There are three types of addresses in common use on the Internet: email addresses, IP addresses, and Uniform Resource Locators. Examples: email address: firstname.lastname@example.org IP address: 22.214.171.1244 Uniform Resource Locator (URL): http://www.nrtc.net Secret code by which the Internet identifies you so that people can send you mail. It usually looks like username@hostname - where username is your username, or login name, or account number; and hostname is the Internet's name for the computer or Internet provider you use. The host name can be a few words strung together with periods. A specific site (www, ftp, gopher) or "mailbox" (e-mail) on the Internet, often the mailbox of a particular user. If referring to e-mail, an address will usually contain the "at" sign: @. An address is often rendered in lower case. Example: email@example.com. Another name for a unique URL of a Web page. ... A name, set of numbers, or sequence of bits used to identify devices (computer, printer, or server) on a network. The unique identifier for a specific location on a network. There are three types of addresses in common use within the Internet: e-mail addresses; IP or Internet address; and hardware or MAC addresses. WWWebfx Home Page Computers store numbers and instructions in their store. The store is usually divided into locations each of which holds one number or instruction. Each of these locations is given a designation so that it can be referred to, no matter what number or instruction it happens to contain. This designation is often called the 'address' of the location. Number or bit pattern that uniquely identifies a location in library memory. Every location has a distinct address. An Internet address is the name of a site you want to connect to, such as www.aga.org. Also, an Internet address can be the address of someone you want to send e-mail to, such as firstname.lastname@example.org The street address that describes the physical (geographic) location of the front door or main entrance of a facility site. Example: 123 Main Street. A number of reference, which identifies a unique location in a computer's memory. A number which identifies a location in memory where information is stored. The location of an Internet resource. email address may take form email@example.com. A web looks something like http://www.squareonetech.com. A number which is used to identify a location. Each computer on the internet has a unique IP address, which the network uses to direct information to it. memory address is a string of digits which identifies where to read or write data. (URL-uniform resource locator): generally of the form www.something.com; entering this into the address bar of your browser is the most direct way of accessing a site An exact location in memory. A program can store or retrieve data from this address. An address in a unique identifier assigned to a web page. The address is more commonly referred to as the URL (Uniformed Resource Locator). Unique location of a person or computer on the Internet. Communication on the Internet requires an address. An address is the location of a computer or computer resource on the Internet. You can find the address in the Address Box (Explorer) or the Location Box (Netscape) The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like http://www.crn.org. The Uniform Resource Locator of a file contained on a network. This can be the home page of a website or any of its files. It usually appears as http://www.(name).com. There can also be addresses that include a /(filename) after the ".com" reference. An address in memory is a location to which an application or a piece of hardware refers. For example, a word processor will store your document in a particular memory address while you have it open. Problems occur when two things (hardware or software) try to use the same address. A location in the memory where a particular piece of data is stored. Most commonly, an address is a person's email location or a web page's URL. The location of an Internet resource. An email address may take the form of name@.yourdomain.com. A web address looks something like http://www.domain.com. A unique number assigned to a device on a network. For example, a twinax terminal must be assigned a unique address before it is able to access the host system. Internet users encounter two important types of addresses: Web page addresses (more properly called URLs) and e-mail addresses (for sending e-mail to someone). One example of an e-mail address is email@example.com. In telephony, the number dialed by a calling party which identifies the party called. Also known as the telephone number. The number assigned to an individual memory location. Each byte in the Atari has its own unique address, much like a house has a street address. The main use of this book is to provide you a roadmap to each address so you don't get lost. See e-mail address and host address. The unique location of an information site on the Internet, a specific file (for example, a Web page), or an email user. 1151, Punchbowl Street, Honolulu, Hawaii The location of an internet resource. An email address may take the form of firstname.lastname@example.org -- a web address appears as http://www.insurancestop.com A unique sequence of letters or numbers for the location of data or the identity of an intelligent device. A unique identifier assigned to networks and stations that allows each device individually to receive and reply to messages. Three types of addresses are commonly used on networks: e-mail address; IP, internet, or Internet address; and hardware or MAC address. See also Class A/B/C address, IP address, MAC address. A specific site (www, ftp, gopher etc.) on the Internet, often the mailbox of a particular user. If referring to email, an address will usually contain the "at" sign: @. An address is often rendered in lower case. Example: joebloggs@BTopenworld.com (1) A name, numeral, or label that designates a particular location in primary or secondary storage. (2) A location identifier for nodes in a computer network. The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http: //www.supanet.com. Also know as the URL (Uniformed Resource Locator). An address by which the Internet identifies you so that people can send you mail. It usually looks something like firstname.lastname@example.org, where username is your username, login name, or account number, and ispname is the Internet's name for the computer or Internet provider you use. Also See: E-mail The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http://www.aic.net.au. The numerical location of a web site. Example: 126.96.36.199. The first six digits are a country location, the next three are a server computer location, and the last three are a location on the server computer. The numbers can range from 0 to 255. 1. Physical location of a home. 2. Code or path used to locate stored information in a computer. A unique identifier for a computer or site online, usually a URL for a web site or marked with an @ for an e-mail address. Literally, it is how your computer finds a location on the information highway. Another name for a Web URL. A character or group of characters that identify a register, a location or some other data source or destination. A way to identify an Internet resource. The following are examples of different Internet addresses: an electronic mail address firstname.lastname@example.org, a gopher server address - gopher.unm.edu, a web server address - www.unm.edu Number that uniquely identifies the location of a word in memory. An address is a code and abstract concept expressing the fixed location of a home, business or other building on the earth's surface.
<urn:uuid:d0da5b61-d08a-43ec-b151-d0596cbc350f>
2013-05-23T18:38:38Z
CC-MAIN-2013-20
[ [ -0.042724609375, 0.028564453125, -0.0115966796875, -0.036865234375, 0.045654296875, -0.062255859375, 0.01422119140625, 0.125, -0.01171875, -0.032470703125, 0.1513671875, 0.0025482177734375, 0.03515625, 0.0020599365234375, 0.0047607421875, -0.02111816...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.888797
9,458
http://www.metaglossary.com/meanings/582336/
0.172943
Robert Adam replaced Lancelot ("Capability") Brown as architect to the sixth earl of Coventry, whose country seat was Croome Court, near Worcester. With its ornamented wheel molding and garlanded trophies, the ceiling of the Tapestry Room, designed by Adam in 1763, is an example of his vigorous early style.The tapestries on the walls and the seating furniture were woven in the workshop of Jacques Neilson at the royal Gobelins manufactory, Paris. The medallions, after designs by François Boucher, portray scenes from classical myths symbolizing the elements. The borders were designed by Maurice Jacques. Commissioned in 1763, the tapestries were installed in 1771.
<urn:uuid:b2ce5332-383a-4c7d-a856-59474b5045aa>
2013-05-23T19:06:48Z
CC-MAIN-2013-20
[ [ 0.004751462023705244, 0.02357456088066101, -0.011787280440330505, -0.01708698831498623, 0.055190060287714005, -0.019645467400550842, 0.001873172470368445, 0.10160818696022034, -0.028143275529146194, -0.02503654919564724, 0.062134504318237305, 0.01909722201526165, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973935
147
http://www.metmuseum.org/Collections/search-the-collections/120026086?high=on&rpp=15&pg=1&rndkey=20120816&ft=*&where=England%7CUnited+Kingdom&what=Gilt%7CLapis+lazuli%7CPlaster&who=Jacques+Germain+Soufflot%7CLouis+Tessier%7CJoseph+Rose%7CJacques+Neilson%7CFran%C3%A7ois+Boucher%7CJohn+Wildsmith&pos=1
0.186925
you with a positive online shopping experience. and choose "Internet". Click the "Custom Level" button and scroll down to the "Scripting" section. Choose "enable" for all scripting choices. After making the changes, press the "refresh" button on your browser. If you need additional assistance, please click here.
<urn:uuid:dca7ad0e-e39d-4dfd-b1a3-57fdcd7bc407>
2013-05-23T19:06:21Z
CC-MAIN-2013-20
[ [ 0.022795377299189568, -0.003986515570431948, 0.02140410989522934, -0.006447988096624613, 0.059503424912691116, 0.0025149828288704157, -0.016267122700810432, 0.039811644703149796, -0.03702910989522934, -0.024400684982538223, 0.06678082048892975, 0.08261986076831818, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.741885
69
http://www.michaelkors.com/p/Michael-Kors-Michael-Kors-Gia-Embossed-Satchel-Bag-VIEW-ALL-HANDBAGS/prod17560015_cat3003_cat8501_/?index=21&cmCat=cat000000cat8501cat3003&isEditorial=false
0.338898
Smokey Rose Earrings - Rose Gold Elegance® Open Jump Rings, 4mm - Rose Gold Elegance® Round Bead, 3mm (2-pk.) - Rose Gold Elegance® Earring Studs – Flower - Rose Gold Elegance® Eye Pins, 35mm (2-pk.) - Rose Gold Elegance® Link Chain (2-pk.) - Crystazzi® Bicones, 4mm – Smoke - Needle Nose Pliers - Round Nose Pliers - Wire Cutters Cut the lengths of chain as follows: four 1¼", six 1", twelve 7/8", two ¾" and four 2¼". Use 4mm jump rings to connect two 1¼" chains and flower earring studs together. Make the rose gold and smoke crystal links and quantities as follows: four round, bicone and a round; four round two bicones and a round; two round, three bicones and a round. Connect the chain lengths and beaded links together as follows: a 1" chain, single bicone link and 7/8" chain; a 7/8" chain, double bicone link and a 7/8" chain; ¾" chain, triple bicone link and a 1" chain; a 7/8" chain, double bicone link and a 7/8" chain; a 1" chain, single bicone link and 7/8" chain. Thread the chains/links and 3mm rounds onto eye pins and form a loop at the other end of the eye pin. Attach the chains from second step to the eye pins.
<urn:uuid:c9cffe0b-98ec-44cb-bf77-67434dfe4ab3>
2013-05-23T19:00:29Z
CC-MAIN-2013-20
[ [ -0.00754766957834363, 0.020038841292262077, 0.00390625, -0.010637358762323856, 0.076624296605587, 0.03954802080988884, -0.004413841757923365, 0.06638418138027191, -0.027542373165488243, 0.004457980394363403, 0.06179378554224968, 0.004877295345067978, 0.112288132...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.803935
357
http://www.michaels.com/Smokey-Rose-Earrings/27253,default,pd.html?start=51&cgid=projects-beads-earings
0.255272
Your daily news briefing, with the video of the day, top news and quote of the day. News to Know Twitter has ranked U.S. states from happiest to saddest, CNN reports. Researchers at the University of Vermont searched through geotagged tweets for happy words, like LOL, haha, good and nice, and sad or angry words, such as mad, hate, boo and expletives. Hawaii was found to be the happiest state, followed by Maine, Nevada, Utah and Vermont. Louisiana was the saddest, followed by Mississippi, Maryland, Michigan and Delaware. The method was also used to find the country's happiest and saddest cities (Napa, Calif., and Beaumont, Texas, respectively). This method can also be used to predict obese areas based on frequency of food words, researchers reported. Quote of Note "The installation of new advanced centrifuges would be a further escalation and a continuing violation of Iran's (U.N.) obligations. It would mark yet another provocative step." - U.S. State Department spokeswoman Victoria Nuland, when asked about reports that Iran had installed advanced centrifuges at its main uranium enrichment plant. Hot video: Three dead in "rolling gun fight" on Las Vegas Strip GateHouse News Service
<urn:uuid:1c57a4f9-e181-461c-b24e-127a9d421257>
2013-05-23T18:47:33Z
CC-MAIN-2013-20
[ [ -0.014632106758654118, 0.03908862918615341, -0.0039454433135688305, 0.016617892310023308, 0.0739966556429863, -0.01881270855665207, 0.0056960703805089, 0.054347824305295944, -0.014214047230780125, -0.07650502026081085, 0.09197324514389038, 0.03302675485610962, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95043
264
http://www.milfordbeacon.com/article/20130221/NEWS/302219965/0/state_news
0.317562
Former Michigan Supreme Court Chief Justice Clifford Taylor came to The Press Monday to make the case against changing the way Michigan selects justices for the state's highest court. With Taylor was Colleen Pero, a lawyer, consultant and legal analyst who has authored a report on what she calls a "highly coordinated, well-funded campaign" by billionaire hedge fund manager George Soros to institute "merit selection" systems around the country for choosing state supreme court justices. Under merit system, a panel of experts recommends a certain number of candidates for the judiciary to a state's governor. The governor typically has to approve one of those recommended candidates. That system of selecting justices empowers special interests, leads to more judicial activism and reduces the number of judges who rule on the plain meaning of the law and a state's constitution, Taylor and Pero argue. Though billed as a way to keep politics out of judicial elections, merit panels are actually "extremely politicized," Pero writes. The two believe a judicial task force established last year, co-chaired by Michigan Supreme Court Justice Marilyn Kelly, will seek to institute a merit selection system in this state. They say that would tilt the state Supreme Court -- now controlled by a majority of Republican-nominated justices -- toward liberals. Currently Michigan Supreme Court justices are elected state-wide on a nonpartisan ballot after being nominated at political party conventions. Taylor, who was nominated by Republicans, has considerable experience with the sharp edges of judicial elections, so his defense of them is interesting. He lost his bid for re-election in 2008 to current Supreme Court Justice Diane Hathaway in a bruising campaign. The election included an infamous "sleeping judge" ad that claimed Taylor fell asleep on the bench. Taylor says the Democratic ad was simply a lie (see his campaign response here). In this video, Taylor talks about why he believes merit selection is a bad idea -- even though elections aren't always the perfect system, either. I'm asking the questions.
<urn:uuid:f0387213-2b5e-451a-892c-eda0c2afd277>
2013-05-23T18:39:55Z
CC-MAIN-2013-20
[ [ -0.017895299941301346, 0.044871795922517776, 0.00430689100176096, 0.02617521397769451, 0.05048076808452606, -0.037660256028175354, -0.0035056089982390404, 0.12660256028175354, -0.019364316016435623, 0.009815705008804798, 0.046474359929561615, 0.0329861119389534, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965763
402
http://www.mlive.com/politics/index.ssf/2011/08/former_supreme_court_justice_c.html
0.157155
Chael is living proof that pro-life doesn't work, but he's absolutely right about Alves. You'd been winning the fight on your strikes, you had your opponent hurt with strikes, and you drop down for a double with a minute left. So yeah, he's pretty much a boob. "I have noticed even people who claim everything is predestined, and that we can do nothing to change it, look before they cross the road." - Stephen Hawking
<urn:uuid:b3165f0a-79ac-4ebb-8bc8-75ae386b1666>
2013-05-23T18:53:44Z
CC-MAIN-2013-20
[ [ -0.019352063536643982, 0.002365252235904336, 0.037270642817020416, -0.01254300493746996, 0.06307339668273926, -0.06852064281702042, 0.030533256009221077, 0.09805046021938324, 0.00627150246873498, -0.07396788895130157, 0.018922017887234688, 0.04128440469503403, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980114
99
http://www.mmanews.com/forums/noob-jack-city/54829-sonnen-alves-boob-being-submitted.html
0.506335