Datasets:

text
stringlengths
130
541k
id
stringlengths
47
47
date
stringdate
2013-05-18 04:54:19
2013-06-20 13:35:46
dump
stringclasses
1 value
embeddings
listlengths
1
351
file_path
stringclasses
916 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
30
166k
url
stringlengths
14
835
quality_score
float64
0.16
1
Chancellor of Austria |Federal Chancellor of the Republic of Austria State flag of Austria as President of Austria |Term length||No term limit| |Inaugural holder||Karl Renner, as State Chancellor 30 October 1918 |Formation||First Republic of Austria 10 November 1920 |This article is part of the series: Politics and government of The Federal Chancellor (German: Bundeskanzler, sometimes shortened to Kanzler) is the head of government of Austria. In his capacity as chairman of the Austrian Federal Government, the chancellor represents the supreme federal authority of the executive branch. Though formally an equal member of the cabinet, the Chancellor is considered to be the most powerful position in Austrian politics, and as such is the nation's de facto chief executive. His official seat is in the Federal Chancellery. The use of the term Chancellor (Kanzler, derived from Latin: cancellarius) as head of the chancery writing office can be traced back as far as the ninth century, when under King Louis the German the office of the Archchancellor (Erzkanzler), later Imperial Chancellor (Reichserzkanzler), was created as a high office on the service of the Holy Roman Emperor. The task was usually fulfilled by the Prince-Archbishops of Mainz as Archchancellors of the German lands. In the course of the Imperial reform, the Habsburg Emperor Maximilian I in 1498 attempted to counter the spiritual power of the Reichserzkanzler with a more secular position of an Imperial Court Chancellor (Hofkanzler), but the two became merged. These were also the times when attempts were made to balance Imperial absolutism by the creation of Imperial Governments (Reichsregiment), ultimately a failure. Habsburg Monarchy Nevertheless, when Maximilian's grandson Ferdinand I succeeded him as Archduke of Austria in 1521, his elder brother Emperor Emperor Charles V (1519–1556) appointed Mercurino Gattinara as "Grand Chancellor of all the realms and kingdoms of the king" (Großkanzler aller Länder und Königreiche). The separate position of an Austrian Court Chancellor appeared as a Österreichische Hofkanzlei around 1526, when the Habsburg Monarchy arose with the Bohemian and Hungarian inheritance; it was however once again merged with the equivalent Reichshofkanzlei office of the Holy Roman Empire in 1559. Upon the 1620 Battle of White Mountain and the suppression of the Bohemian revolt, Emperor Ferdinand II had separate Court Chancelleries established in order to strengthen the unity of the Habsburg hereditary lands. Beside a Bohemian and Hungarian chancellery, he created the office of an Austrian chancellor in Vienna, responsible for the Archduchy of Austria proper (i.e. Upper and Lower Austria) with the Inner Austrian territories and Tyrol. Under Emperor Leopold I (1658–1705) the term again became Hofkanzler with Johann Paul Freiherr von Hocher (1667–1683), and Theodor von Strattman (1683–1693). The eighteenth century was dominated by Prince Wenzel Anton of Kaunitz-Rietberg (1753-1792), who was Chancellor to four Habsburg emperors from Maria Theresa to Francis II, with the titles of both Hofkanzler and Staatskanzler. He was succeeded by Johann Philipp von Cobenzl (1792–1793), who was dismissed by Emperor Francis II over the Partition of Poland and was succeeded by Johann Amadeus Francis de Paula (Baron Thugot) (1793–1800). Thugot's chancellorship did not survive the Austrian defeats by the French at the battles of Marengo and Hohenlinden in 1800 and he was replaced by Johan Ludwig Joseph Cobenzl (1800–1805), his predecessor's cousin, but who in turn was dismissed following the Austrian defeat at Austerlitz in 1805. Austrian Empire With the consequent dissolution of the Holy Roman Empire and founding of the Austrian Empire, Francis II abdicated the former Imperial Throne, but remained Emperor Francis I of Austria in 1806. He had replaced Cobenzl with Johan Philip Charles Stadion (1805–1809) the previous year, but his career was in turn cut short in 1809 following yet another Austrian defeat by Napoleon at the Battle of Wagram and subsequent humiliation at the Treaty of Schönbrunn. Prince Klemens von Metternich was appointed by Francis I to the positions of Hofkanzler and Staatskanzler (1821-1848). However there is some opinion that the Chancellor title was not used between Prince Kaunitz-Rietberg's resignation in 1792 and 1821. As the Metternich system had become a synonym for his reactionary politics, the title of a State Chancellor was abolished upon the 1848 revolutions. The position became that of a Minister-President of Austria, equivalent to Prime Minister, with the exception of Count Friedrich Ferdinand von Beust (1867–1871) the title only re-emerging at the birth of German Austria after World War I in 1918, when Karl Renner was appointed Staatskanzler. With the enactment of the Constitution of Austria on 10 November 1920, the actual term Bundeskanzler was implemented as head of the executive branch of the First Austrian Republic. Since a 1929 constitutional reform, the Chancellor is appointed by the President of Austria. In theory, the President can select anyone he wishes to be Chancellor. De facto however, the National Council parliament has the right to pass a motion of no confidence in the government as a whole or individual cabinet members at any time. Also, it would be all but impossible for a cabinet to govern without adequate support in parliament. The Chancellor assumes his office immediately and nominates the federal ministers for appointment by the President. Appointments and dismissals are made by the President at the Chancellor's recommendation. However, it has become strong constitutional convention for the President to act on the Chancellor's advice. Once sworn in, the government is capable of acting, without further confirmation by the National Council. The Chancellor's term of office is not limited and in no way affiliated with the legislative session, though he usually declares the resignation of his government to the Presient upon a parliamentary election. If not, he would have to cope with the authority of the President to dismiss the cabinet or with the possibility of a vote of no confidence by the newly elected National Council. The Chancellor is normally entrusted by the President with the continuation of his offical duties until a new government is sworn in. Role and powers As primus inter pares ("first among equals") in the Austrian government, the Chancellor chairs the weekly cabinet meetings (Ministerrat) coordinating the government's policies, but—unlike the Chancellor of Germany—does not possess the power to direct the federal ministers; nor could he appoint or dismiss the cabinet members, though the President would normally act at his suggestion. Thus, although considered as the most powerful political position by the public opinion in Austria, he has a considerably weaker standing than the US President or the UK Prime Minister. Bills adopted by the National Council and certified by the President need the countersignature by the Chancellor to obtain legal force. As a result of government formation process, the Chancellor could also conduct affairs of a federal ministry in his own responsibility. According to the protocol, the Chancellor ranks 3rd after the Austrian President and the President of the National Council. The Chancellor normally chairs the largest political party in the Austrian parliament. His political power is devolved from within the party, and can vary depending on his personality and whether there is a coalition government. Especially his relationship with the Federal Minister of Finance has proven vital in the last decades. The long-lasting Proporz constellation of two approxiamtely equipollent coalition parties has led to some incrustations in Austrian politics.The Chancellor's authority is much stronger in a single-party cabinet, which only Josef Klaus and Bruno Kreisky have achieved so far. On the other hand, in 2000 Wolfgang Schüssel was appointed Chancellor of a highly controversial coalition government with the far-right Freedom Party (FPÖ), although his Austrian People's Party (ÖVP) then had only been third in the previous parliamentary election. List of Chancellors of Austria See also - Politics of Austria - Constitution of Austria - Austrian Federal Government - Vice-Chancellor of Austria - Federal Chancellery of Austria - President of Austria - Interdisziplinärer Arbeitskreis Kurmainz und der Erzkanzler des Reiches - Cambridge Modern History vol xiii 1911. Books.google.ca. Retrieved 2012-09-20. - Kaisergruft: Metternich - Österreich Lexikon 1966, Band 1 - Official site (German)
<urn:uuid:1467f4c3-4910-44b1-b0c7-7fb93f7ad79f>
2013-05-26T02:52:11Z
CC-MAIN-2013-20
[ [ 0.023681640625, 0.036865234375, -0.0301513671875, 0.00049591064453125, 0.052734375, -0.053955078125, -0.0306396484375, 0.07568359375, -0.002899169921875, -0.07568359375, 0.0283203125, 0.02392578125, 0.024658203125, 0.041259765625, 0.03271484375, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943309
1,901
http://en.wikipedia.org/wiki/Chancellor_of_Austria
0.41753
Hummus with olive oil |Place of origin||Egypt, Levant| |Main ingredient(s)||Chickpeas, tahini| Hummus (Arabic: حُمُّص) is a Middle Eastern and Arabic food dip or spread made from cooked, mashed chickpeas blended with tahini, olive oil, lemon juice, salt and garlic. Today, it is popular throughout the Middle East, Turkey, North Africa, Morocco, and in Middle Eastern cuisine around the globe. Hummus is an Arabic word (حمّص ḥummuṣ) meaning "chickpeas," and the complete name of the prepared spread in Arabic is حمّص بطحينة ḥummuṣ bi ṭaḥīna, which means "chickpeas with tahini". Spellings of the word in English can be inconsistent. "Houmous" is the standard spelling in British English. Among other spellings are hummus, hummous, hommos, humos, hommus and hoummos. Many cuisine-related sources describe hummus as an ancient food, or connect it to famous historical figures such as Saladin. Indeed, its basic ingredients—chickpeas, sesame, lemon, and garlic—have been eaten in the region for millennia. But in fact, there is no specific evidence for this purported ancient history of hummus bi tahini. Though chickpeas were widely eaten in the region, and they were often cooked in stews and other hot dishes, puréed chickpeas eaten cold with tahini do not appear before the Abbasid period in Egypt and the Levant. The earliest known recipes for a dish similar to hummus bi tahini are recorded in cookbooks published in Cairo in the 13th century. A cold purée of chickpeas with vinegar and pickled lemons with herbs, spices, and oil, but no tahini or garlic, appears in the Kitāb al-Wusla ilā l-habīb fī wasf al-tayyibāt wa-l-tīb; and a purée of chickpeas and tahini called hummus kasa appears in the Kitab Wasf al-Atima al-Mutada: it is based on puréed chickpeas and tahini, and acidulated with vinegar (though not lemon), but it also contains many spices, herbs, and nuts, and no garlic. It is also served by rolling it out and letting it sit overnight, which presumably gives it a very different texture from hummus bi tahini. |Nutritional value per 100 g (3.5 oz)| |Energy||695 kJ (166 kcal)| |Percentages are relative to US recommendations for adults. Source: USDA Nutrient Database Hummus is high in iron and vitamin C and also has significant amounts of folate and vitamin B6. The chickpeas are a good source of protein and dietary fiber; the tahini consists mostly of sesame seeds, which are an excellent source of the amino acid methionine, complementing the proteins in the chickpeas. Depending on the recipe, hummus carries varying amounts of monounsaturated fat. Hummus is useful in vegetarian and vegan diets; like other combinations of grains and pulses, it serves as a complete protein when eaten with bread. As an appetizer and dip, hummus is scooped with flatbread, such as pita. It is also served as part of a meze or as an accompaniment to falafel, grilled chicken, fish or eggplant. Garnishes include chopped tomato, cucumber, coriander, parsley, caramelized onions, sautéed mushrooms, whole chickpeas, olive oil, hard-boiled eggs, paprika, sumac, ful, olives, pickles and pine nuts (as photographed in the "History" section). Outside the Middle East, it is sometimes served with tortilla chips or crackers. In Vegetarian Dishes from the Middle East, Arto der Haroutunian calls hummus, "One of the most popular and best-known of all Syrian dishes" and a "must on any mezzeh table." Syrians in Canada's Arab diaspora prepare and consume hummus along with other dishes like falafel, kibbe and tabouleh, even among the third and fourth-generation offspring of the original immigrants. Hummus is a common part of everyday meals in Israel. A significant reason for the popularity of hummus in Israel is the fact that it is made from ingredients that, following Kashrut (Jewish dietary laws), can be combined with both meat and dairy meals. Few other foods can be combined with a wide variety of meals consistently with the dietary laws. It is seen as almost equally popular amongst Israeli Jews and Israeli Arabs. As a result of its popularity, Israelis elevated hummus to become a "national food symbol" and consume more than twice as much hummus as neighbouring Arab countries, according to figures by Tsabar Salads, a hummus manufacturer in Israel. Commenting on its popularity, Gil Hovav, an Israeli food editor interviewed on the BBC program Cooking in the Danger Zone, stated that "even during the intifada years Jews would sneak [...] into the Muslim quarter just to have a vital, really genuine good humous [sic]," and noted that like many dishes considered to be Israeli national foods, hummus is actually Arab. However, he also said, commenting on Iraqi, Egyptian, Syrian or Yemeni food in Israel, that "Jews came from these countries to Israel and they brought their food with them". Many restaurants run by Mizrahi Jews and Arab citizens of Israel are dedicated to hot hummus, which may be served as chick peas softened with baking soda along with garlic, olive oil, cumin and tahini. One of the fancier hummus versions available is hummus masabacha, made with lemon-spiked tahini garnished with whole chick peas, a sprinkling of paprika and a drizzle of olive oil. Hummus is sold in restaurants, supermarkets and hummus-only shops (known in Hebrew as humusiot). For Palestinians, hummus has long been a staple food, often served warm, with bread, for breakfast, lunch or dinner. All of the ingredients in hummus are easily found in Palestinian gardens, farms and markets, thus adding to the availability and popularity of the dish. In Palestinian areas, hummus is usually garnished, with olive oil, "nana" mint leaves, paprika, parsley or cumin. A related dish popular in the region of Palestine and Jordan is laban ma' hummus ("yogurt and chickpeas"), which uses yogurt in the place of tahini and butter in the place of olive oil and is topped with pieces of toasted bread. By the end of the 20th century, hummus had emerged as part of the American culinary fabric. In 2008, more than fifteen million Americans consumed hummus on a regular basis. Hummus became a popular staple in American restaurants with the Armenian migration from Lebanon to Southern California and the East Coast after the Lebanese Civil War (1975-1990). It was further popularized in the United States by Jews returning from visits in Israel and by Israeli expatriates. According to a 2010 market research, hummus consumption in the United States has increased by 35% over a period of 21 months, with sales reaching nearly $300 million. In 2006, hummus was present in 12% of American households, rising to 17% by early 2009. One commentator attributed the growth of Hummus to America’s embrace of ethnic foods, and to experimentation with exotic foods. In November 2009, Gadi Lesin, President & CEO of the Israeli Strauss group food manufacturer said that market share of co-owned Sabra Dipping Company in the USA makes it the largest packaged hummus dip manufacturer in the world. In October 2008, the Association of Lebanese Industrialists petitioned to the Lebanese Ministry of Economy and Trade to request protected status from the European Commission for hummus as a uniquely Lebanese food, similar to the Protected Geographical Status rights held over regional food items by various European Union countries. Fadi Abboud, president of the Lebanese Industrialists Association, stated that "Israelis have usurped several Lebanese and oriental products". According to Abboud, Lebanon exported the first hummus dish in 1959. As a response, food critic Janna Gur wrote: "The success of certain brands of Israeli hummus abroad may have been what brought about Abboud's anger", leading him to claim that Israel has been "stealing" their country's national dishes, like hummus, falafel, tabbouleh, and baba ghanouj. Also in response to Abboud's statement, Shooky Galili, an Israeli journalist specialising in food and who writes a blog dedicated to hummus, said that "trying to make a copyright claim over hummus is like claiming for the rights to bread or wine. [...] Hummus is a centuries old Arab dish — nobody owns it, it belongs to the region". As of late 2009, the Lebanese Industrialists Association was still "preparing documents and proof" to support its claim. In May 2010, the Guinness World Record for the largest dish of hummus in the world returned to Lebanon. The winning dish, cooked by 300 cooks in the village of al-Fanar, near Beirut, weighed approximately 10450 kg (roughly 23000 lb), more than double the previous record set by 50 Israeli Arabs and Jews who cooked approximately 4100 kg (roughly 9000 lb) in January 2010 in the Arab-Israeli village of Abu Ghosh. According to local media, the recipe included 8 tons of boiled chick peas, 2 tons of tahini, 2 tons of lemon juice and 70 kg (154 lb) of olive oil. - Sami Zubaida, "National, Communal and Global Dimensions in Middle Eastern Food Cultures" in Sami Zubaida and Richard Tapper, A Taste of Thyme: Culinary Cultures of the Middle East, London and New York, 1994 and 2000, ISBN 1-86064-603-4, p. 35. - Maan Z. Madina, Arabic-English Dictionary of the Modern Literary Language, 1973, s.v. ح م ص - Newman, Joni Marie (2007), Cozy Inside, Lulu.com, p. 67, ISBN 1604028955, 9781604028959 Check - Pam Peters (2007), The Cambridge Guide to Australian English Usage, Cambridge University Press, p. 370, ISBN 0-521-87821-7 - mideastfood.about.com, Hummus 101, retrieved 28 February 2008 - choice.com, More about hummus, "Hummus has existed for thousands of years." retrieved 5 May 2008 - insidehookah.com Food - Hummus, "...it is evident that it’s been a Middle Eastern/Mediterranean favorite, and sometimes staple, for thousands of years." retrieved 5 May 2008 - Percival, Jenny, Lebanon to sue Israel for marketing hummus as its own, guardian.co.uk, 7 October 2008, retrieved 9 November 2009 - Tannahill p. 25, 61 - Brothwell & Brothwell passim - www.straightdope.com, Who invented hummus?, 21 March 2001, "Hummus has been around for too long, in too many forms, and the origin is lost in antiquity... There's no way of knowing where it started...", retrieved 5 May 2008 - e.g. a "simple dish" of meat, pulses and spices described by Muhammad bin Hasan al-Baghdadi in the 13th century, Tannahill p. 174 - Lilia Zaouali, Medieval Cuisine of the Islamic World, University of California Press, 2007, ISBN 978-0-520-26174-7, translation of L'Islam a tavola (2004), p. 65 - Encyclopedia of Jewish Food, John Wiley & Sons, 2010, By Gil Marks, page 270 - Perry et al., p. 383 - Bricklin, 1994, p. 115. - Hummus NutritionData.com - Arto der Hartoiunian Vegetarian Dishes from the Middle East, London 1983, p.33. - Paul R. Magocsi (1999), Encyclopedia of Canada's Peoples, University of Toronto Press, p. 1244, ISBN 0-8020-2938-8 - Even mentioned by the Israel Defense Forces Cookbook, see Houston Chronicle "Diversity in the dining room helps ring in Israel's new year" - Middle East, 2006, Lonely Planet, page 282 - Hummus brings Israelis, Palestinians to the table, The Christian Science Monitor, by Joshua Mitnick, July 25, 2007 - BBC Cooking in the Danger Zone: Israel and Palestinian Territories, pp. 5-6: "Humous is Arabic. Falafel, our national dish, our national Israeli dish, is completely Arabic and this salad that we call an Israeli Salad, actually it's an Arab salad, Palestinian salad." - Cooking in the Danger Zone: Israel and Palestinian Territories, page 3 - Food & Wine, May 2008; On the Hummus Hunt in Israel by Jen Murphy, p. 66, - The perfect hummus debate - Salloum and Peters, 1996, p. 204. - Ibrahim, Lailie, Institute for Middle East Understanding, Hummus, a Palestinian staple, 31 March 2006, retrieved 9 March 2008. - Marks, Gil (2010), Encyclopedia of Jewish Food, John Wiley and Sons, pp. 269-271 - John Powell, "Encyclopedia of North American Immigration", Infobase Publishing, 2005, ISBN 1-4381-1012-X, 9781438110127, p. 176. - There’s Hummus Among Us By Elena Ferretti, Fox News, April 05, 2010 - Aviv Levy (25 November 2009), זינוק במכירות חומוס שטראוס בארה"ב: כבשה 40% מהשוק, Globes, retrieved 25 November 2009 Unknown parameter - Karam, Zeina, "Hummus war looms between Lebanon and Israel", Associated Press, 7 October 2008, retrieved 10 December 2008. - Carolynne Wheeler (11 October 2008), "Hummus food fight between Lebanon and Israel", The Daily Telegraph - "Whose hummus is it anyway?", The Times of South Africa, November 9, 2008 - YaLIBNAN. JANUARY 9, 2010 http://www.yalibnan.com/2010/01/09/hummus-war-between-lebanon-israel-escalates/ |url=missing title (help). Retrieved 4 July 2010. - Gur, Janna (cited as 'Jana'), Santa Fe New Mexican, "Hummus History: Tales of a Wandering Chickpea", 21 October 2008, retrieved 11 December 2008 - Lebanon claims latest title in 'Hummus War' (CNN) - "Lebanese score in hummus war with Israel", Associated Press, 24 October 2009 - "Lebanon breaks Israel's hummus world record". Yahoo. AP. 8 May 2010. - "Abu Gosh mashes up world's largest hummus". YNet. AFP. 8 January 2010. - "Abu Ghosh secures Guinness world record for largest dish of hummus". Israel Ministry of Foreign Affairs. 11 January 2010. Retrieved 31 March 2010. - Jack Brockbank (12 January 2010). "The largest serving of hummus". Guinness World Records. Retrieved 31 March 2010. - Edited by Fawzia Afzal-Khan and Kalpana Seshadri-Crooks, Fawzia; Seshadri-Crooks, Kalpana (2000), The Pre-occupation of Postcolonial Studies, Duke University Press, ISBN 0-8223-2521-7, 9780822325215 Check |isbn=value (help) More than one of - Edited by Linda Amster; introduction by Mimi Sheraton, Linda; Sheraton, Mimi (2003), The New York Times Jewish Cookbook: More Than 825 Traditional and Contemporary Recipes from Around the World, St. Martin's Press, ISBN 0-312-29093-4, 9780312290931 Check |isbn=value (help) More than one of - Mark Bricklin,, Mark (1994), Prevention Magazine's Nutrition Advisor: The Ultimate Guide to the Health-Boosting and Health-Harming Factors in Your Diet, Rodale, ISBN 0-87596-225-4, 9780875962252 Check |isbn=value (help) More than one of - Don Brothwell and Patricia Brothwell, C. D.; Brothwell, B. (1998), Food in Antiquity: A survey of the Diet of Early Peoples, Expanded Edition, Johns Hopkins University, ISBN 0-8018-5740-6 More than one of - Marks, Gil (2010), Encyclopedia of Jewish Food, John Wiley and Sons, pp. 269–271 - Charles Perry, A. J. Arberry, Maxime Rodinson,, Maxime; Perry, Charles (1998), Medieval Arab Cookery, Prospect Books (UK), ISBN 0-907325-91-2, 978-0907325918 Check |isbn=value (help) More than one of - Habeeb Salloum and James Peters ; drawings by Lynn Peterfreund ; photographs by Neal Cassidy., Habeeb; Peters, James (1996), From the Lands of Figs and Olives: Over 300 Delicious and Unusual Recipes, I.B.Tauris, ISBN 1-86064-038-9 More than one of - Tannahill, Reay (1973), Food in History, Stein and Day, ISBN 0-517-57186-2 - McKenna, Alix. "Lebanon vs. Israel: A Delicious Culinary War", Moment, March/April 2011. |Wikibooks has a book on the topic of: Cookbook:Hummus| |Wikimedia Commons has media related to: Hummus| |Look up hummus in Wiktionary, the free dictionary.|
<urn:uuid:4a2cbf67-a0b7-4461-961c-840e7501abb4>
2013-05-26T02:35:19Z
CC-MAIN-2013-20
[ [ 0.0067138671875, 0.0185546875, -0.0185546875, 0.01300048828125, 0.062255859375, -0.0186767578125, -0.02490234375, 0.1201171875, -0.00372314453125, -0.01446533203125, 0.04296875, 0.059326171875, 0.09619140625, 0.0478515625, 0.0289306640625, -0.0067138...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.856048
3,963
http://en.wikipedia.org/wiki/Hummus
0.43139
Maydan al Shajara ||This article needs additional citations for verification. (February 2011)| Maydan al-Shajara (Arabic: ميدان الشجرة; English: The Tree Square), is a major town square in Benghazi, the second largest city in Libya. A large native Atlas Cedar tree is located in the center of the square, giving it its name. The square is located in the center of Benghazi, linking two primary roads, Gamal Abdel al-Nasser Street and 'Amr ibn al-'As Street. The National Oil Corporation and Wahda Bank buildings overlook the square, with several other buildings of historic architectural distinction. Nearby are three government administration buildings. Maydan al-Shajara is the site of public events, celebrations, and demonstrations. Libyan civil war Maydan al-Shajara became a major gathering place for protesters during the Libyan civil war. Government forces had used water cannons, and reportedly machine-guns and heavy weapons on crowds, in attempts to disperse demonstrators in the early days. By 20 February Benghazi and Maydan al-Shajara came under the control of the opposition government. See also - "تقرير الانترنت الصباحي ليوم الأربعاء في 16 شباط 2011". Al-Manar. 16 February 2011. Retrieved 16 February 2011. - "Middle East protests: Country by country - Libya". BBC News. 21 February 2011. Retrieved 21 February 2011. - "Benghazi celebrates as reports emerge of battles in central Tripoli". The Guardian. 25 February 2011. Retrieved 25 February 2011.
<urn:uuid:a7992161-a4bb-457f-90fb-488433dd63b6>
2013-05-26T02:55:55Z
CC-MAIN-2013-20
[ [ 0.039693593978881836, 0.023328691720962524, -0.02158774435520172, -0.019846796989440918, 0.09818941354751587, -0.059192199259996414, -0.029596099629998207, 0.06789693236351013, 0.0012567461235448718, -0.005875696428120136, 0.10306406766176224, 0.05710306391119957, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.907112
362
http://en.wikipedia.org/wiki/Maydan_al_Shajara
0.34468
NATO and Moldova |This article is part of the series: Politics and government of Official NATO and Moldova relations began in 1992 when Moldova joined the North Atlantic Cooperation Council. However, as Moldova's neutrality is enshrined in its Constitution, there are no plans for Moldova to join the organization. In 1992, Moldova joined the North Atlantic Cooperation Council, renamed the Euro-Atlantic Partnership Council (EAPC) in 1997. Relations expanded when Moldova joined the Partnership for Peace programme (PfP) in 1994. The Partnership for Peace was signed by Mircea Snegur and Manfred Wörner, on 16 March 1994, with Moldova becoming the 12th signatory country and the second of the Commonwealth of Independent States after Ukraine. The Mission of Moldova to NATO was established in 1997 with the appointment of the first Moldovan representative to the EAPC. The Mission is located within the Embassy of Moldova in Brussels and has a liaison office in the premises of NATO headquarters in Brussels. Vladimir Voronin visited NATO headquarters in Brussels on 23 June 2003, 7 June 2005, 22 June 2006, 18 June 2007, and 5 December 2007. At the 2004 Istanbul summit, NATO accepted Russia's military presence in Moldova and Georgia (the withdrawal of these troops was an obligation Russia had assumed at the Organization for Security and Co-operation in Europe's 1999 Istanbul summit). The US Defense Secretary Donald Rumsfeld stopped, en route to Istanbul, in Moldova where he called for the withdrawal of Russian forces from the country. On 23 September 2004, the NATO Secretary General, Jaap de Hoop Scheffer, traveled to Chişinău where he met with President of Moldova Vladimir Voronin, with Foreign Minister of Moldova Andrei Stratan and Minister of Defence Victor Gaiciuc. The Individual Partnership Action Plan between NATO and Moldova was signed on 19 May 2006. With the support of NATO's Public Diplomacy Division, an Information and Documentation Centre on NATO was inaugurated at the Moldova State University in October 2007. On 3 April, at the 2008 Bucharest summit, NATO announced its support for the territorial integrity, independence and sovereignty of Moldova. Voronin participated to the Working Lunch of the Heads of State and Government of countries Euro-Atlantic Partnership Council in Bucharest. On November 18, 2008, NATO Parliamentary Assembly adopted Resolution 371 on the future of NATO–Russia relations, with among other things, "urges the government and the parliament of Russia to respect its commitments which were taken at the Istanbul OSCE Summit in 1999 and has to withdraw its illegal military presence from the Transdnestrian region of Moldova in the nearest future." The former communist government was seen as more allied with Russia and is already a member of the Commonwealth of Independent States. In April 2009 Moldova announced it would not participate in the June NATO military exercises. The new ruling party, the Alliance for European Integration, elected in the July 2009 parliamentary election, has declined to so far take any action to either move it toward membership, or withdraw from the Commonwealth of Independent States, and denies plans to do either. See also - REPÚBLICA DE MOLDOVA - V. SOCOR, "The Istanbul summit and NATO's two flank struggle over CFE" in Eurasia Daily Monitor, 1, (2004), 16, - V. SOCOR, "Putin to boycott NATO summit" in Eurasia Daily Monitor, 1, (2004), 27, - V. SOCOR, Missing in Istanbul: NATO almost bypassed the Black Sea-South Caucasus region, September 28, 2004, - NATO Summit Bucharest 2008 - Moldpres News Agency - NATO Parliamentary Assembly Resolution 371 - Military trainings under the auspices of NATO on the territory of Georgia", Kviris Palitra, 2009-05-15. Retrieved on 2009-05-21. - "Russia expels Canadian diplomats". BBC News. 6 May 2009. - "Moldova's acting president denies that Moldova plans to leave CIS, enter NATO". Kyiv Post. 16 September 2009. Retrieved 2009-09-17. - NATO’s relations with the Republic of Moldova - The Republic of Moldova: Internal Challenges; Prospects for Euro-Atlantic Integration - Individual Partnership Action Plans Website - Site-ul oficial al Centrului NATO in Moldova - http://www.nato.md/
<urn:uuid:eb5abbd8-cae5-46db-9c3f-3a28a6bf29ed>
2013-05-26T02:52:03Z
CC-MAIN-2013-20
[ [ 0.01513671875, 0.0361328125, -0.021728515625, 0.02490234375, 0.13671875, -0.06103515625, -0.038330078125, 0.111328125, 0.000701904296875, -0.06494140625, 0.05810546875, 0.0155029296875, -0.047607421875, -0.029296875, 0.0458984375, 0.026123046875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921228
935
http://en.wikipedia.org/wiki/NATO_and_Moldova
0.260233
||This article needs additional citations for verification. (January 2008) The October Manifesto (Russian: Октябрьский манифест, Манифест 17 октября), officially The Manifesto on the Improvement of the State Order (Манифест об усовершенствовании государственного порядка), is a document that served as a precursor to the Russian Empire's first constitution, which would be adopted the next year. The Manifesto was issued by Emperor Nicholas II, under the influence of Count Sergei Witte, on 30 October [O.S. 17 October] 1905 as a response to the Russian Revolution of 1905. The October Manifesto addressed the unrest application throughout the Russian Empire and pledged to grant basic civil liberties, including personal immunity; and freedom of assembly, association, press, religion, and speech. Other provisions include the allowance of a broad participation in the Duma (parliament), the introduction of universal male suffrage, as well as a decree that no law should come into force without the consent of the Duma. The Manifesto was a precursor to the Empire's first constitution. Neither document, however, resulted in significant reform, and the Emperor continued to exercise absolute veto power over parliamentary legislation. Between 1906–7 the Duma was dissolved and reformed twice. The October Manifesto divided opposition to the Emperor. The Kadets were appeased by the idea of having freedom of speech and a truly representative government, and the Union of October 17 (informally known as the Octobrists, this party took its name from the October Manifesto). The Marxists, however, maintained that Nicholas had only made small concessions, arguing that the Duma was only a shell of democracy as it could not pass laws without the approval of the monarch, and that freedom of speech was heavily regulated. - The Memoirs Of Count Witte New York & Toronto (1921), Armonk, New York (1990). ISBN 0-87332-571-0. - Fiehn, Terry. (1996). Russia & The USSR 1905-1941. Hodder Headline Group, London. ISBN 0-7195-5255-9. The October Manifesto of 1905
<urn:uuid:d57c9b0a-a80d-48f0-b543-da5437bafddc>
2013-05-26T03:04:14Z
CC-MAIN-2013-20
[ [ -0.0049673039466142654, 0.01886317878961563, -0.005879024043679237, -0.007388078607618809, 0.062122736126184464, -0.05784708261489868, -0.029552314430475235, 0.10362172871828079, -0.031815893948078156, -0.03420523181557655, 0.026031186804175377, 0.030558349564671516...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94224
528
http://en.wikipedia.org/wiki/October_Manifesto
0.549461
|Jmol-3D images||Image 1| |Molar mass||169.18 g mol−1| | (what is: / ?) Except where noted otherwise, data are given for materials in their standard state (at 25 °C, 100 kPa) Pyridoxine is one of the compounds that can be called vitamin B6, along with pyridoxal and pyridoxamine. It differs from pyridoxamine by the substituent at the '4' position. Its hydrochloride salt pyridoxine hydrochloride is often used. Function in the body Pyridoxine assists in the balancing of sodium and potassium as well as promoting red blood cell production. It is linked to cardiovascular health by decreasing the formation of homocysteine. Pyridoxine may help balance hormonal changes in women and aid the immune system. Lack of pyridoxine may cause anemia, nerve damage, seizures, skin problems, and sores in the mouth. It is required for the production of the monoamine neurotransmitters serotonin, dopamine, norepinephrine and epinephrine, as it is the precursor to pyridoxal phosphate: cofactor for the enzyme aromatic amino acid decarboxylase. This enzyme is responsible for converting the precursors 5-hydroxytryptophan (5-HTP) into serotonin and levodopa (L-DOPA) into dopamine, noradrenaline and adrenaline. As such it has been implicated in the treatment of depression and anxiety. Very good sources of pyridoxine are grains and nuts. Medicinal uses Pyridoxine is given to patients taking isoniazid to combat the toxic side effects of the drug. It is given 10–50 mg/day to patients on to prevent peripheral neuropathy and CNS effects that are associated with the use of INH. In one form of homocystinuria, activity of the deficient enzyme can be enhanced by the administration of large doses of pyridoxine (100-1000 mg/day). Vitamin B6 can be compounded into a variety of different dosage forms. It can be used orally as a tablet, capsule, or solution. It can also be used as a nasal spray or for injection when in its solution form. Vitamin B6 is usually safe, at regular intakes up to 200 mg per day in adults. However, vitamin B6 can cause neurological disorders, such as loss of sensation in legs and imbalance, when taken in high doses (200 mg or more per day - 10,000% of US RDA) over a long period of time. Vitamin B6 toxicity can damage sensory nerves, leading to numbness in the hands and feet as well as difficulty walking. Symptoms of a pyridoxine overdose may include poor coordination, staggering, numbness, decreased sensation to touch, temperature, and vibration, and tiredness for up to six months. One study reported that over a 6 month period or longer, 21% of women taking doses greater than 50 mg daily experienced neurological toxicity. The effect of doses below 50 mg was not reported. Pyridoxine's fetal safety is "A" in Briggs' Reference Guide to Fetal and Neonatal Risk. Its also used to treat a Vitamin B6 deficiency. - Pyridoxine at Sigma-Aldrich - Kashanian, M.; Mazinani, R.; Jalalmanesh, S. (2007). "Pyridoxine (vitamin B6) therapy for premenstrual syndrome". International Journal of Gynecology & Obstetrics 96 (1): 43–4. doi:10.1016/j.ijgo.2006.09.014. PMID 17187801. - Vitamin B1, www.HowStuffWorks.com[full citation needed] - Vitamin B6 (pyridoxine) - sources, benefits, dosage, deficiency, overdose, toxicity[full citation needed] - Dalton, K.; Dalton, M. J. T. (1987). "Characteristics of pyridoxine overdose neuropathy syndrome". Acta Neurologica Scandinavica 76 (1): 8–11. doi:10.1111/j.1600-0404.1987.tb03536.x. PMID 3630649. - Briggs GG, Freeman RK, Yaffe SJ. Drugs in Pregnancy and Lactation: A Reference Guide to Fetal and Neonatal Risk, 8th edition. 2008. Published by: Lippincott Williams & Wilkins.
<urn:uuid:2f33fdf9-4e4f-482b-be3b-3118a324974c>
2013-05-26T03:03:29Z
CC-MAIN-2013-20
[ [ -0.019287109375, 0.027099609375, 0.0045166015625, -0.025634765625, 0.1064453125, -0.09765625, 0.01043701171875, 0.0869140625, -0.0250244140625, -0.006072998046875, 0.083984375, 0.02099609375, 0.01324462890625, 0.055419921875, 0.040283203125, -0.03564...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.82268
967
http://en.wikipedia.org/wiki/Pyridoxine
0.368776
Sky (UK and Ireland) ||This article needs additional citations for verification. (February 2013)| |Slogan||Believe in Better| |Broadcast area||UK, Ireland| |Former names||Sky Digital| Sky is the brand name for BSkyB's digital satellite television and radio service, transmitted from the Astra satellites located at 28.2° east (Astra 1N/2A/2B/2C/2D) and Eutelsat's Eutelsat 28A satellite at 28.5°E. The service was originally launched as Sky Digital in October 1998, distinguishing it from the original analogue service. However, as BSkyB's analogue service ended in October 2001, the service is now more commonly marketed as just 'Sky'. Sky's digital service was officially launched on 1 October 1998 under the name Sky Digital, although small-scale tests were carried out before then. For the first time, BSkyB used the newly-launched Astra 2A satellite, which has since come to broadcast exclusively to the United Kingdom and Ireland. At this time the use of the Sky brand made an important distinction between the new service and Sky's analogue services. Key selling points were the improvement in picture and sound quality, increased number of channels and an interactive service branded Open.... now called Sky Active, Sky competed with the ONdigital (later ITV Digital) terrestrial offering. New Astra satellites joined the position in 2000 and 2001, and the number of channels available to customers increased accordingly. This trend continued with the launch of Eurobird 1 (now Eutelsat 28A) in 2001. Originally Sky launched with a set top box known as the Sky digibox, however, in more recent years the Sky+ and Sky+ HD boxes have launched alongside the original box. Sky+ is a digital video recorder with an internal hard drive which allows viewers to 'pause live television' (by switching from a live feed to a paused real-time recording that can be restarted at any point) and schedule programs to record in the future. Sky launched HDTV services in May 2006. The first photos of a prototype Sky HD receiver began appearing in magazines in August 2005. All Sky+ HD receivers incorporate a version of Sky+ using either a 300GB or 500GB hard drive (of which 160GB or 250GB is available to the user) to accommodate the necessary extra data. Additionally, some channels occasionally receive new numbering — However, in early 2006, the majority of channels received new numbering, with some receiving single digit changes, whilst others received new numbers entirely. Slogans Sky have used for marketing include "What do you want to watch?", "Entertainment your way" and the current slogan "Believe in Better". In early 2012, Sky released an update to its Sky Anytime service. This update offers customers the chance to buy and rent films from the Sky Store. In June 2012, Sky launched a new EPG for Sky+ HD boxes. The update boasts a new modernised look and improved functionality. As of October 1, 2012, Sky Anytime was rebranded as On Demand which would then include ITV player and 5 Demand. BBC iPlayer will follow in late Autumn with 4oD to be included in early 2013. Technical information |This section does not cite any references or sources. (February 2013)| Sky's standard definition broadcasts are in DVB-compliant MPEG-2, with the Sky Movies and Sky Box Office channels including optional Dolby Digital soundtracks for recent films, although these are only accessible with a Sky+ box. Sky+ HD material is broadcast using MPEG-4 and most of the HD material uses the DVB-S2 standard. Interactive services and 7-day EPG use the proprietary OpenTV system, with set-top boxes including modems for a return path. Sky News, amongst other channels, provides a pseudo-video on demand interactive service by broadcasting looping video streams. Provided a universal Ku band LNB (9.75/10.600 GHz) is fitted at the end of the dish and pointed at the correct satellite constellation, most digital receivers will receive the free to air channels. Some broadcasts are free-to-air and unencrypted, some are encrypted but do not require a monthly subscription (known as free-to-view), some are encrypted and require a monthly subscription, and some are pay-per-view services. To view the encrypted content a VideoGuard UK equipped receiver (all of which are dedicated to the Sky service, and cannot be used to decrypt other services) needs to be used. Unofficial CAMs are now available to view the service, although use of them breaks the user's contract with Sky and invalidates the user's rights to use the card. BSkyB has no veto over the presence of channels on their EPG, with open access being an enforced part of their operating licence from Ofcom. Any channel which can get carriage on a suitable beam of a satellite at 28° East is entitled to access to Sky's EPG for a fee, ranging from £15-100,000. Third-party channels which opt for encryption receive discounts ranging from reduced price to free EPG entries, free carriage on a Sky leased transponder, or actual payment for being carried. However, even in this case, Sky does not carry any control over the channel's content or carriage issues such as picture quality. Recent years have seen the launch of numerous low-budget channels, including foreign and shopping channels, often with very poor technical quality. Sky recently stopped taking channel launch applications for its Electronic Programme Guide (EPG). Ofcom has said that this will give existing channels an unfair advantage and may force Sky to replace older set-top boxes for customers with the newer ones. Due to either limited regional availability of certain channels, or conditions relating to their must-carry status, Sky operate four regional variations of their EPG for domestic customers. The four different EPGs transmitted are: Republic of Ireland, Northern Ireland, Wales and England/Scotland. The Northern Ireland EPG has the most listed channels, with the Republic of Ireland having the least, the difference is major as the ITV channels, Five and BBC Radio are missing. Much of the missing content for Irish viewers is available through 'Other Channels' but Sky+ viewers cannot record from 'Other Channels'. These missing channels are a bone of contention for Irish viewers, who are often forced to seek out grey market UK Sky cards if they want the missing channels. Customers in Ireland pay 20% more and get an inferior service, although Irish customers do not have to pay the UK TV licence fee. Each viewing card or smartcard provided by Sky is programmed with the customer's postcode, so when inserted into the user's set-top box it selects which EPG is used, as well as determining which regional variation is allotted to the BBC One, BBC Two and ITV channels for users of the England/Scotland EPG. All regional variations of BBC One and BBC Two are available to all UK viewers on channels 971-992. The Sky EPG lists all channels carried on the Sky platform. Many channels are free, others are available only with a subscription. See also - British Sky Broadcasting - Sky Deutschland - Sky+ HD - List of television stations in the United Kingdom - Believe in Better sky.com - "New Sky EPG 2012 – Should you let your customers loose on your betas?". Pear Digital. Retrieved 2013-01-01. - Irish Sky customers pay up to 20% more than UK leovaradkar.ie
<urn:uuid:f47f38ce-750f-41c3-956b-2b8dcbbd7499>
2013-05-26T02:55:49Z
CC-MAIN-2013-20
[ [ 0.0084228515625, 0.037841796875, -0.00193023681640625, -0.0174560546875, 0.05908203125, -0.0771484375, -0.01470947265625, 0.099609375, -0.0167236328125, -0.0244140625, 0.1064453125, 0.031494140625, -0.045166015625, -0.0294189453125, 0.02197265625, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94322
1,575
http://en.wikipedia.org/wiki/Sky_(UK_%26_Ireland)
0.158567
|Minimalism in Art| |Minimalism in Music| Postmodern music is both a musical style and a musical condition. As a musical style, postmodern music contain characteristics of postmodern art—that is, art after modernism (see Modernism in Music). It favors eclecticism in form and musical genre, and often combines characteristics from different genres, or employs jump-cut sectionalization. It tends to be self-referential and ironic, and it blurs the boundaries between "high art" and kitsch. Daniel Albright (2004) summarizes the traits of the postmodern style as bricolage, polystylism, and randomness. As a musical condition, postmodern music is simply the state of music in postmodernity. In this sense, postmodern music does not have any one particular style or characteristic, and is not necessarily postmodern in style. However, the music of postmodernity is thought to differ from that of modernity in that whereas modern music was valued for its fundamentals and expression, postmodern music is valued as both a commodity and a symbolic indicator of identity. For example, one significant role of music in postmodern society is to act as a language by which people can signify their identity as a member of a particular subculture. Table of contents The postmodern musical style Modernist influences and postmodern philosophy In the modern period, recording of music was seen as a way of transcribing an external event, as a photograph is supposed to record an moment in time. However, with the invention of magnetic tape in the 1930's the ability to directly edit a recording, and create a result which did not actually occur, made it possible for a recording to be viewed as the end product of artistic work itself. Through the 1950's, most music, even popular music, presented itself as the capturing of a performance, even if that performance was mic'ed to improve hearing of different parts. Antecedents to this process, including the electronic music of Edgar Varèse, can be found dating back for several decades, and in 1948 Pierre Schaeffer would use tape to "compose" pieces, however it is with the advent of Rock 'n' Roll and particularly producer Phil Spector and Glenn Gould in classical music in the late 1950's that the idea of using tape to create a stand alone artistic work became more and more prevalent. However, it was with the studio recordings of the Beatles where the full use of multi-track recording and layering became common to popular music. The creation of this recording process transformed pop music. Rock and Hip Hop both extend this process further, by using more and more sophisticated techniques to layer and mix individual tracks. The rise of popular music created another pressure on music, which would lead to another strand of post-modernity, namely the ability to create a sufficiently large audience for works. In the Modernist view, such a connection was unnecessary – people would naturally gravitate towards "serious" music as the place where ideas could be presented in musical form, rather than "popular" music, which was seen, as the Victorians had seen it, as subsidiary to the more "weighty" genres. As with Post-modern philosophy, post-modern music questioned whether this hierarchy of "high" and "low" culture was correct or appropriate. A third strand of post-modern music is a change in the fundamental idea of what music is supposed to be "about". As the period wore on, the idea that "music is mainly about itself", became more and more firmly entrenched. Reference was not merely a technique, but the substance of music. Musical works reference other musical works, not because they can, but because they must. This is part of the general change from Modernism which saw the basic subject of art being the most pure elements of musical technique – whether intervals, motivic fragments or rhythms – to Postmodernism which sees the basic subject of art being the stream of media, manufactured objects, and genre materials. In otherwords, post-modernity views the role of art to be commenting on the consumer society and its products, where as modernism sought to convey the "reality" of the universe in its most fundamental form. Postmodern techniques and their application The ability to record and mix, and later sample, would feed into this idea, with the inclusion of "found sounds", snippets of other recordings, spoken voices, noises, and sampled tableux into music. Pioneers include Edgar Varèse, who began to experiment with the possibilities of new electronic instruments, using synthesizers and tape loops. John Cage used tapes, radios, and record players to reproduce prerecorded sounds in a wide variety of ways in works such as the series "Imaginary Landscape" and "Europera." Early examples in popular music include Abbey Road, Pink Floyd's Meddle and the "dub" style of music of Lee 'Scratch' Perry. As digital technology has made sampling easy, it has become very common in hip hop, and is taken to its extreme in Bastard pop. As composers became interested in incorporating pre-existing sounds, they also looked to emulate the effect using only conventional instruments, by extensive quotation from pre-existing material. Quotation and reference to earlier work in principle was not new, as composers such as Richard Strauss and Charles Ives are famous for its use in their tone poems and symphonies nearly a century before, and it is essentially the basis behind organum, parody mass, and other early musical genres. However, the completeness of the collage or thorough use of a pre-existing piece went far beyond earlier composers' brief quotations or use of a cantus firmus. George Rochberg has used pieces from the classical repertoire as the basis for many of his compositions, essentially composing a frequently ironic commentary on an earlier work. Olivier Messiaen's "Oiseaux Exotiques" and "Catalogue d'Oiseaux" are collages of bird songs, precisely notated by species in the score, gathered together in a musical form. A tour-de-force of post-modern musical collage is the third movement of Luciano Berio's "Sinfonia," which uses the scherzo of Gustav Mahler's "Resurrection Symphony" as a musical foundation, and text from Samuel Beckett's "The Unnameable," but adds quotations spanning classical repertory, as though they were sampled or found haphazardly by spinning a radio dial. A related aspect of post-modern classical music was an interest in reducing the role of a composer in musical composition, not by the use of pre-composed material, but instead by the use of random procedures in composition and performance. This began as a reaction to elements of late modernism, in particular, the modernist project of atonality, begun by Arnold Schoenberg, which had been taken to its logical conclusion, total serialism, by such late modernist composers as Pierre Boulez, Karlheinz Stockhausen, and others. A group of composers, including Boulez, Stockhousen, and especially John Cage began introducing elements of 'chance' in their music to create aleatory music. Cage is famous for using the I Ching to direct his compositions, essentially removing himself from the compositional procedure. On the other hand, his piece 4'33" is performed by a silent pianist, and is said to consist entirely of environmental noise. Aleatory music began to blur the boundaries between the composer and the audience, and between the musician and the environment, which was a postmodern trend. At the same time, there was also a new interest in non-Western music, early music (typically meaning pre-Baroque), and popular music. This attention to all musical traditions is a general post-modern feature; for them the division between "high" and "low art" is illusory. György Ligeti found rhythmic elements of Pygmy song that fit his own sensibilities, and they influenced his later compositions. Olivier Messiaen studied thoroughly Indian music and medieval music, and some of his scores make reference to Indian tala or plainchant. Tan Dun, born in China, has sought ways in his compositions to unite the Chinese and Western strands of music. Steve Reich studied West African drumming, Indonesian gamelan, and Hebrew cantillation, and his works are sometimes compared to Perotin or rock music. Further eroding the wall between "art music" and "popular music," a number of DJs have remixed his work on the album "Reich Remixed." Glenn Branca and Rhys Chatham have worked with rock musicians and combined the techniques of classical and popular music. The approach of post-modern composers with regard to foreign, obsolete or popular musical idioms differs substantially from the "exotic" references of earlier composers. One key difference is the thoroughness of the study. Mozart's "Rondo alla Turca" is supposedly influenced by Turkish music, but it is a superficial and stereotypical reference imposed in a pure classical form. Post-modern composers have generally sought in earnest to understand the underlying principles of exotic music by years of study or performance in the idiom. The result is often more subtly incorporated into the composer's vocabulary, so much that one may not imagine the source of the foreign elements until they are pointed out. The emergence of postmodern styles In the late 1950s and 1960s a series of styles, influenced by pop and post-modern conditions began to form, and existing styles began to incorporate post-modern elements. In popular music, jazz, rhythm and blues, and early rock and roll are all begin to become shaped by not only new technology, but a fundamentally different way of producing recordings. Instead of trying to achieve a rounded three dimensional sound in imitation of the concert experience, recordings increasingly foregrounded the vocals and made the rest of the sounds a single "wall" behind the main track. By the mid 1960s this "wall of sound" style was the standard of most commercial radio. The full incorporation of the studio mixing techniques, electronics and use of layering would lead to the establishment of rock. "Pop" music, as a specific sub-genre, would eschew the electric guitar driven sound of rock in favor of synthesizers, acoustic instruments, and more subdued rhythm sections. At the same time, dance music, particularly the "disc jockeys" at urban parties were creating a different road into post-modernity in music. Their approach was to take records on turntables, and by hand control the speed of the turntable, and using the mixing board as an instrument, add reverb and other sound effects. At the same time they would speak into the microphone, using the dance tracks as a background for their own speech, which would lead, eventual to eventually evolving into the DJing and MCing of hip hop music. Further evolution in the 1990s turntablism movement focused on the DJing aspect of hip hop, with music made almost entirely of samples. DJ Shadow is the most well known turntablist DJ, but Q-Bert and Mixmaster Mike of the Invisibl Skratch Piklz, DJ Spooky and Cut Chemist were also highly influential. In classical music, minimalism is usually regarded as the first "post-modern" style. Minimalism was in part a reaction to the perceived inaccessibility and sterility of modernist classical music of such composers in the tradition of Arnold Schoenberg, Pierre Boulez, the early John Cage, and others among the avant-garde. The earliest minimalist composers included LaMonte Young, who had studied under Schoenberg and incorporated elements of serialism in his early minimalist works, and Terry Riley, who was largely influenced in his composition by the repetitiveness of Indian music and rock music. Minimalism and related postmodern musical styles laid the groundwork for re-integrating popular and 'highbrow' music, which had been separated since the rise of modernism. By the 1970s, avant-garde rock and pop musicians (such as Suicide and Throbbing Gristle) had become interested in electronic instrumentation, the use of Eastern rhythms and unconventional instruments (for example the use of the sitar by the Beatles) and drone-like or repetitive music, stylistically similar to minimalism (such as the music of The Velvet Underground, Tangerine Dream, and Kraftwerk). Tape loops also prefigured the use of 'sampling' in techno music and house music, and the 'scratching' of hip-hop. Moreover the 'ironic' 'cut and paste' approach of Stockhausen's later work (which used elements from both 'high' and 'low' art) was highly influential on many pop and rock composers in the 1970s, 1980s, and 1990s: see, for example, Frank Zappa or The Residents. (See contemporary music). It should also be noted that postmodern jazz has also been highly influential on contemporary pop/rock music. This has developed from two main sources, the innovations of Charlie Parker in the immediate post-war period, and (again) Arnold Schoenberg: this time, however, not so much his serial work as his pre-WWI 'atonal' style, where all forms of tonality were abandoned. The merging of these two traditions led to the development of free Jazz in the 1950s by Ornette Coleman who went onto inspire a new generation of musicians in the 1960s and 1970s: for example, John Coltrane, Albert Ayler and Sun Ra. Free jazz was hugely influential on many avant-garde rock musicians: for example Captain Beefheart, and, in a completely different way The Stooges and Lou Reed (who eventually worked with Coleman in 2003 on the Raven album). These artists themselves were influential on a generation of punk musicians in the 1970s and 1980s (see for example The Lounge Lizards and The Pop Group). In the 1970s Miles Davis repaid the compliment by incorporating elements of funk and rock into his sound, most notably on his Bitches Brew album. Again, this has been hugely influential on contemporary rock and jazz. The postmodern musical condition: the condition of music in postmodernity As a musical condition, postmodern music is music situated after the modern age, during the present period, where music has become valued primarily a commodity and a culture, rather than a form of idealized modernist expression for its own sake. Some authors have suggested that the transition in music from modern to postmodern occurred in the late 1960s, influenced in part by psychedelic music and the late Beatles albums. (Sullivan, 1995, p.217.) In the 1970s, the postmodern condition continued with the advent of disco, punk rock, heavy metal, hip-hop, and a newly-commodified country music. The difference between modern music and postmodern music then is that modernist music was characterized by a focus on musical fundamentals and expression. In postmodern music, however, the commodity being sold by record companies and pop stars is not the fundamentals of the music, but the cultural image surrounding the music, which reverberates through film, television, and other media. Causes and Theories of Post-Modernity in Music Another theory advanced is that post-modernity is the explicit reaction to the rise of a mass production consumer society, and is linked to the need to create coherence and aesthetic value from the artifacts and patterns of that society. Postmodern musical artists - Patricia Barber - Luciano Berio - John Cage - Ornette Coleman - John Adams - Philip Glass - Steve Reich - George Rochberg - Alfred Schnittke - Ezequiel Viñao - LaMonte Young - John Zorn - The Beatles - The Velvet Underground - Pink Floyd - Frank Zappa - Wire (band) - The Butthole Surfers - Throbbing Gristle - King Tubby - Kurtis Blow - Grandmaster Flash - Grand Wizard Theodore - Run DMC - Pete DJ Jones - Kool DJ Herc - Public Enemy - Invisibl Skratch Piklz - Mixmaster Mike - DJ Shadow - Cut Chemist - DJ Spooky - list of turntablists - Albright, Daniel (2004). Modernism and Music: An Anthology of Sources. University of Chicago Press. ISBN 0226012670. - Sullivan, Henry W. (1995) The Beatles with Lacan: Rock ‘n’ Roll as requiem for the modern age. (Sociocriticism: Literature, Society and History Series Vol. 4). New York: Lang. xiv. - Larkin, C., ed. (1995). The Guinness Encyclopedia of Popular Music, vol 1–5. England: Guinness Publishing.
<urn:uuid:fc484d76-f99e-459f-9102-77964ed90d7c>
2013-05-26T02:42:29Z
CC-MAIN-2013-20
[ [ -0.0311279296875, 0.007476806640625, 0.0029449462890625, 0.006988525390625, 0.034912109375, -0.04443359375, 0.00433349609375, 0.11474609375, -0.052001953125, -0.058837890625, 0.0849609375, -0.00131988525390625, -0.02783203125, 0.0091552734375, 0.03881835...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958086
3,522
http://enc.slider.com/Enc/Postmodern_music
0.638075
Originally a high-energy pop band (typified by the early singles "Twist and Shout" and "Please Please Me"), as the Beatles progressed their style became more sophisticated, influenced in equal measure by Bob Dylan and Chuck Berry. Their popularity was also aided by their attractive looks, distinctive personalities, and natural charisma; particularly on television where they appeared on The Ed Sullivan Show and others. This was the beginning of Beatlemania in which the committed pop-music band found itself turned into a worldwide phenomenon with worshipful fans, hysterical adulation, and denunciations by such as Frank Sinatra. None of this had much to do with music and was regarded by the band members with intermittent awe and resentment. Lennon met McCartney on July 6, 1957 at St. Peter's Church garden fete. Lennon was in a skiffle group called The Quarry Men who were performing at the event. McCartney joined the band, and brought Harrison along soon after. In 1958, The Quarry Men recorded a demo of two songs; the first was an original Harrison/McCartney tune called "In spite of all the danger"; the other was a cover of Buddy Holly's "That'll Be The Day". A number of songs that were later recorded for Beatles records, were originally written at this time including "I'll Follow The Sun", "Michelle", "When I'm 64", and "One After 909". The name was a tribute to Holly's band, The Crickets combined with beat music, a common British term for rock and roll at the time. In another tribute, they had sometimes called themselves the Foreverly Brothers. On December 10, 1961, Brian Epstein agreed to become the band's manager, after receiving requests for the band's music two months earlier in his record store and watching them perform at the legendary Cavern Club. Epstein arranged for the Beatles to audition for Decca Records on January 1, 1962. Decca, in one of the most embarrassing business decisions in music history, rejected the band, on the grounds that guitar music was "on the way out". The Beatles then signed with EMI's Parlophone label in early 1962. George Martin, who was at first unimpressed by the band's demos, fell in love with the band when he met them in person. Not only did he feel as though they had musical talent, but he felt that their wit and humor made them extremely "likeable". He did have a problem with Best however, whom he criticized for not be able to keep time. The Beatles let Best go, and immediately asked Starr, whom they had met and even performed with previously, to join the band permanently. Martin, unaware of this personnel change, hired session drummer Andy White to play drums on the Beatles' first studio session on September 11, 1962. On February 9, 1964 The Beatles performed on The Ed Sullivan Show for the first time. To this day it remains one of the highest rated television programs of all time, with 73 million people tuning in. The Beatles made four more live appearances on the show in months to come. Two days later, on February 11 in the Washington, DC Coliseum, The Beatles made their 1st live stage appearance in the United States. On April 4, 1964, The Beatles set a record that has yet to be broken when they occupied all five top positions on Billboard's Top Pop Singles chart. Their single "Can't Buy Me Love" was at number one. In August of that year, The Beatles' first motion picture was released, A Hard Day's Night. They started filming their second film, Help! on February 23, 1965 in the Bahamas. In early 1965, Lennon and Harrison were dosed with LSD by their dentist. In the ensuing years, the Beatles met with psychedelic counterculture[?] icon Timothy Leary, experimented extensively with LSD and released two heavily LSD-influenced albums, Revolver and Sgt. Pepper's Lonely Hearts Club Band. On June 12, 1965, The Beatles were individually awarded the order of Member of the British Empire (MBE) by the Queen. Since it was unusual for rock stars to receive the MBE, some previous recipients complained and protested, and a small number went so far as to return their own honours, complaining they had been "devalued". (Some had received the award for military heroism.) Lennon would return his own in 1969 with the note The statement, was part of a two page interview and went virtually unnoticed in Britain. In July of that year, Lennon's words were reprinted in the United States fan magazine Datebook[?] leading to a backlash by conservative religious groups mainly in the rural South and Midwest states. Radio stations banned the group's recordings, and their albums and other products were burned and destroyed. Spain and the Vatican denounced Lennon's words and South Africa banned Beatles music from the radio. On August 11, 1966 Lennon held a press conference in Chicago in order to address the growing furor. He told reporters: On June 5, 1966, The Beatles returned to The Ed Sullivan Show, this time with a taped appearance, where they introduced their two new music videos, "Rain" and "Paperback Writer". In later years, The Beatles would appear on the show to introduce more music videos for the songs "Hello Goodbye", "Penny Lane", "Strawberry Fields Forever", "Two Of Us", and "Let It Be". On July 2, 1966, The Beatles became the first musical group to perform at the Nippon Budokan Hall[?] in Tokyo. The performance ignited a lot of protest from local citizens who felt that it was inappropriate for a rock and roll band to play at Budokan. By the end of July, the band headed to the Philippines for a series of shows. The Beatles, while relaxing in their hotel room, read in the newspaper that they would visit the Malacanang Palace[?] of President Marcos[?]. This came as news to the Beatles, who were tired from the tour and didn't plan on using their one day off to visit the President. They spent a relaxing evening in the hotel, and awoke the next morning to death threats and newspaper headlines like "Imelda stood up!" and "The Beatles snub the First Lady!". Epstein attempted to make a televised apology for the incident, but none of the local stations would air it. The following day, armed guards attempted to keep the band from leaving the country until they paid a fee of some kind. The Beatles, who hadn't been paid for their shows in the country, paid out of their own pockets. The Beatles literally had to fight their way to the airplane. Events like this, added to the fact that the fans screamed so loud at their concerts that they couldn't even hear themselves perform, led to the band deciding to quit touring altogether. The band performed their last concert at San Francisco's Candlestick Park on August 29, 1966. With the distractions of touring behind them, The Beatles began recording Sgt. Pepper's Lonely Hearts Club Band on November 24, 1966. The album took so much time to record (for a Beatles record anyway) that the press started to suggest that the Beatles had "lost it" and had run out of creativity. On June 25, 1967 The Beatles performed "All You Need Is Love" for the Our World[?] television special. It was the first television special to air worldwide. Singing backup for the Beatles were a number of artists including Eric Clapton, and members of the Rolling Stones and The Who. Manager Brian Epstein died of a drug overdose on August 27, 1967, while the Beatles were in Bangor, Wales, attending a weekend conference given by the Maharishi Mahesh Yogi. The death was officially ruled accidental, although it has often been speculated that it was a suicide. Epstein had managed every aspect of the Beatles' career, and his absence was immediately noticeable. The Beatles' business affairs began to unravel. In January 1968, The Beatles launched Apple Corps.[?], a disastrously mismanaged entertainment company that included a recording studio, a record label (Apple Records), a film division and clothing store. In addition to Beatles records, Apple released albums by James Taylor, Mary Hopkin[?], Billy Preston[?], Badfinger, Ravi Shankar and other artists. Towards the end of the 1960s, members of the band began to pursue their own musical interests and were writing together less and less. This became more and more obvious on releases like 1968's The Beatles (a.k.a. the "white album"), and Let It Be. The Beatles was largely written during the band's visit to India, where they had several meetings with the Maharishi Mahesh Yogi. With the exception of Harrison, the Beatles eventually rejected what they were hearing from The Maharishi - even occasionally writing songs that made fun of him (like "Sexy Sadie", originally titled "Maharishi", and a number of unreleased songs from the Let It Be sessions). In January of 1969, The Beatles began rehearsals for a new album project (at the time entitled Get Back). The rehearsals at Twickenham Film Studios and recording sessions at Apple Studios were filmed for what would eventually become the Let It Be movie. Many ideas had been thrown around for the Get Back album, including the idea of recording it live during a surprise concert performance on top of a submarine, in an amphitheatre, or in a dancehall. None of these happened, but they did end the project with a live performance on top of the Apple Corps.[?] building in London, which was cut short when a local bank manager called the police to complain about the noise. Eventually the band gave up on the project and turned the results of the sessions over to producer Phil Spector. The Beatles professed themselves happy with Spector's re-working of the recordings to make a releasable album; Paul McCartney later indicated he was not happy because Spector had added things like an orchestra and a choir to the stripped-down performances (although he signed the release authorisation at the time). The original intent of the record had been to bring the band full circle, and record what was essentially a live studio performance - just as their first album had been. In September of 1969, Russell Gibb, a radio DJ in Detroit, Michigan, announced that Paul McCartney was dead. Other DJs, television news reporters, newspapers and magazines picked up on the story and began to look for clues. This snowballed into what is commonly referred to today as the Paul Is Dead hoax. People that believed the rumors, claimed that McCartney had died in a car accident and was replaced by a look alike named William Campbell. Numerous clues were supposedly hidden in album artwork and lyrics. The Beatles began recording their final album in July of 1969, entitled Abbey Road. Lennon announced to the other Beatles that he was leaving the band soon after that album's release but was persuaded to remain quiet in public. Singer Michael Jackson bought the publishing rights for most of the Beatles' music, on August 10, 1985, for $47 million. McCartney, who had been attempting to purchase the rights himself, had told Jackson that he should get into publishing. McCartney did not expect Jackson to purchase the Beatles music. "I wrote a couple of letters and I said, Michael, don't you think that - even if I was just a writer on the payroll - after 30 years of being reasonably successful to this company that you now own, don't you think I could have a raise?" said McCartney. "And he said 'Oh Paul, that's just business'. He won't even answer my letters, so we haven't talked and we don't have that great a relationship. The trouble is I wrote those songs for nothing and buying them back at these phenomenal sums... I just can't do it." This is an example of how future royalties of an entertainment work are difficult to value and how creators should be cautious in making business decisions. In February of 1994, the three surviving Beatles reunited to record additional music to a few of Lennon's old unfinished demos, with Jeff Lynne producing. The first new song, "Free As A Bird", premiered November 19, 1995 as part of The Beatles Anthology series of television specials on the ABC network in the US and ITV in the UK. The song was also included on a CD with the same title, which was released on November 21, 1995. The following year, a second "new" track was released, entitled "Real Love", on March 4, 1996. That song was also included on the second Anthology collection which was released on March 18, 1996. A third Anthology collection followed on October 12, 1996, but did not include any new material. At least one other song, entitled "Now And Then", was worked on during these sessions, but remains unreleased. In 2000, The Beatles released a best of collection, entitled "1". The CD included 27 number one hits by the band and within five weeks, became the best selling album of the year. Later that year, The Beatles released the Anthology book, which included interviews with all four band members and others involved, plus rare photos. The book went straight to the top of the New York Times bestsellers list. In 2002, the Let It Be film was being prepared for release on DVD sometime in 2003. It is expected that the DVD will include additional footage, not seen in the original film. In addition, McCartney has begun to compile a new soundtrack album that is closer to what he had originally intended for the project. That collection will also be released sometime in 2003. In January, 2003, following an investigation by The International Federation of the Phonographic Industry[?] and London detectives, police raids in England and the Netherlands recovered nearly 500 original Beatles studio tapes, recorded during the Let It Be sessions. Five people were arrested. The tapes have been used for bootleg releases for years. Several individuals who played an important role in the history or promotion of the band have at various times been called, or called themselves, the "fifth Beatle". The following individuals were real members of the band before the Beatles achieved international success: The following individuals have played a role in the studio when Beatles records were recorded: Others have been associated with the Beatles in several ways. These include: By 1966 the influence of the peace movement, psychedelic drugs and the studio technique of producer George Martin resulted in the albums Revolver and Sgt. Pepper's Lonely Hearts Club Band, still widely regarded as classics. Particularly notable, along with the use of studio tricks such as sound processing, unconventional microphone placements, and vari-speed recording, was the Beatles' use of unconventional instruments for pop music, including string and brass elements, Indian instruments such as the sitar, and early electronic instruments. At the height of their fame in the mid-sixties, bolstered by the two films Help! and A Hard Day's Night, the band discontinued touring. The increasingly sophisticated arrangements of their songs were difficult to perform in front of thousands of screaming fans who typically made such noise that the music could not be heard anyway. By then, the stress of their fame was beginning to tell and the band was on the verge of splitting at the time of the release of The Beatles (the "white album"), with some tracks recorded by the band members individually, and Starr taking a two-week holiday in the middle of the recording session. By 1970 the band had split, with each of the members going on to solo careers with varying degrees of success. The Beatles also had a limited film career, beginning with A Hard Day's Night (1964). Directed by the up and coming American Richard Lester, it was a gritty black-and-white documentary-like account of a short period in the life of a rock-and-roll band. In 1965 came Help!, a Technicolor extravaganza shot in exotic locations with a thin, if not almost transparent plot regarding Ringo's finger! The critically slammed Magical Mystery Tour (the concept of which was adapted from Ken Kesey's Merry Pranksters[?] LSD-orientated bus tour of the USA) was aired on British television in 1967, but is now considered a cult classic. The animated Yellow Submarine followed shortly after, but had little input from the Beatles themselves (for instance, the voices of the characters in the movie were not those of the Beatles). However, it was acclaimed for its boldly innovative graphic style and clever humour as well as the soundtrack. It did much to restore the reputation of the group for appearing in superior film musicals. Finally, the documentary of a band in terminal decline, Let It Be was shot over an extended period in 1969; the music from this formed the album of the same name, which although recorded before Abbey Road, was (after much contractual to-ing and fro-ing) their final release. Throughout their relatively short time recording and performing together, The Beatles set a number of world records - most of which have yet to be broken. The following is a partial list.
<urn:uuid:a092a34b-f0de-44e3-8a81-8dced82cfd3a>
2013-05-26T02:41:44Z
CC-MAIN-2013-20
[ [ -0.0185546875, 0.0142822265625, -0.004852294921875, 0.015625, 0.083984375, -0.0196533203125, 0.008544921875, 0.083984375, -0.043212890625, -0.072265625, 0.087890625, 0.00439453125, 0.044921875, -0.02978515625, 0.03857421875, -0.009765625, 0.02270...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981844
3,505
http://encyclopedia.kids.net.au/page/th/The_Beatles?title=Mary_Hopkin
0.79325
Vitovsky, Dmytro [Vitovs’kyj], b 8 November 1887 in Medukha, Stanyslaviv county, Galicia, d 8 July 1919 near Ratibor, Silesia, Germany. (Photo: Dmytro Vitovsky.) Military officer. A student activist at Lviv University, he later organized educational and paramilitary organizations in Stanyslaviv. During the First World War he served in the Legion of Ukrainian Sich Riflemen as a company commander and carried out special assignments. He was chairman of the Ukrainian Military Committee, which staged the November Uprising in Lviv, 1918. He was briefly (1–5 November 1918) the first commander of the Ukrainian Galician Army and then minister of defense of the Western Ukrainian National Republic (until 13 February 1919). On 1 January 1919 he was promoted from major to colonel. After serving on the Ukrainian National Rada (February–April 1919) he attended the Paris Peace Conference as a member of the Western Ukrainian delegation. On the return flight his plane crashed, and he was killed. [This article originally appeared in the Encyclopedia of Ukraine, vol. 5 (1993).] Encyclopedia of Ukraine
<urn:uuid:e8053f17-9347-442a-a04f-bdd5dec73eb5>
2013-05-26T02:55:43Z
CC-MAIN-2013-20
[ [ 0.02320772036910057, 0.018152574077248573, -0.033547792583703995, 0.004968979861587286, 0.09191176295280457, -0.060202207416296005, -0.05399816110730171, 0.09329044073820114, -0.005572150927037001, -0.09283088147640228, 0.026769300922751427, 0.044577207416296005, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971096
245
http://encyclopediaofukraine.com/pages/V/I/VitovskyDmytro.htm
0.676609
Endangered Sumatran tiger dies on Indonesian flight A Sumatran tiger, similar to this one kept in Taronga Zoo, has died during a plane journey in Indonesia. It was being flown from Banda Aceh to a zoo on Java island along with a gibbon and two bearcats. Source: News Limited AUTHORITIES are investigating the death of an endangered Sumatran tiger during a plane journey in Indonesia. State forestry official Afan Absori says the tiger was being flown from Banda Aceh to a zoo on Java island on Tuesday along with a gibbon and two bearcats. He cited Garuda Indonesia airlines as saying the animals were removed from the plane’s cargo hold during a stop in Medan because of complaints from passengers about their smell. They were taken back to Banda Aceh, where officials found the tiger had died. Absori said an autopsy found it had a broken leg and facial injuries. The cause of the injuries was being investigated. Sumatran tigers are the most critically endangered tiger subspecies. About 400 remain, down from around 1000 in the 1970s, because of forest destruction and poaching.
<urn:uuid:b1d7983c-4217-43c8-8129-5e048e1fdafb>
2013-05-26T03:09:14Z
CC-MAIN-2013-20
[ [ -0.008175872266292572, 0.05038759857416153, -0.014353197999298573, 0.044331394135951996, 0.12015503644943237, -0.0910852700471878, -0.006964631844311953, 0.06443798542022705, -0.006843507755547762, -0.05402131751179695, 0.11773255467414856, 0.05353682115674019, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97671
241
http://endoftheicons.wordpress.com/2012/10/04/endangered-sumatran-tiger-dies-on-indonesian-flight/
0.206502
Venezuelan VP and FM consolidates his vertiginous political career The recently appointed vice-president has worked his way up in no time That day, civil insurgents from a larger group trying to topple then Venezuelan President Carlos Andrés Pérez got on Maduro's bus in their attempt to escape from authorities. At that moment, Maduro recognized some of those faces, said a former "brother in arms", who preferred not to reveal his identity. Although he was asked to join the coup d'etat, he refused by saying that the leaders were "military fascists," the source said. Maduro, who is currently the Venezuelan Minister of Foreign Affairs and Executive Vice-President, was at that time a member of socialist party Liga Socialista (Socialist League). His party was fully aware of the coup and had discussed whether they would support such a move or not. Maduro was among the majority in his party who mistrusted the military officers behind the coup d'état. In addition to working as a bus driver, Maduro was a leader of Metro de Caracas' trade union. After the events of February 4, 1992, Chávez and the military officers supporting his coup became popular and began receiving visits while they were in jail. Maduro and his current wife, Cilia Flores, who is currently the Venezuelan Solicitor General, were among the visitors from across the country. Later on, upon the foundation of left-wing party MVR (Fifth Republic Movement), which would become the ruling party upon Chávez's election as president in 1998, Maduro joined the party, became a leader thereof and earned Chávez's trust. By working hard inside the party and showing loyalty to the leader, Maduro rapidly worked his way up: he became national coordinator of the Bolivarian Force of Workers, chief of the parliamentary bloc of MVR, and president of the Citizen Participation Committee of the National Constituent Assembly. Yet his debut in the "big leagues" did not take place until 2005, when he became Speaker of the National Assembly. In 2006, Maduro was reelected as Speaker of the National Assembly. In August that year, he was appointed as foreign minister. In his six years in office, he has shown a strong commitment to Chavezism. Today, upon the emergence of President Chávez's illness, the bonds of trust and friendship between the Venezuelan leader and Maduro are stronger. The foreign minister, who has been recently appointed as executive vice-president as well, is said to be one of the major candidates to receive the baton from Hugo Chávez. Translated by Jhean Cabrera The very early morning after the presidential election (April 15), both candidates requested the National Electoral Council (CNE) to conduct a full audit of the process: one, Henrique Capriles, because he asserts that the election results are different from the ones announced, and the other one, Nicolás Maduro, in order to clear any doubt regarding his victory, and to reinforce his political stance. Nevertheless, as it is already known, President Maduro changed his mind.
<urn:uuid:e395f3e1-3217-49ac-b15a-c035c38cddd1>
2013-05-26T03:03:29Z
CC-MAIN-2013-20
[ [ -0.00848388671875, 0.03759765625, -0.015625, 0.0196533203125, 0.09326171875, -0.024658203125, -0.0213623046875, 0.109375, -0.0135498046875, -0.07080078125, 0.0634765625, 0.0274658203125, 0.007293701171875, -0.00732421875, 0.0267333984375, 0.013488769...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.987772
639
http://english.eluniversal.com/nacional-y-politica/121210/venezuelan-vp-and-fm-consolidates-his-vertiginous-political-career
0.744372
BEIJING, Feb. 3 (Xinhua) -- Chinese President Hu Jintao said Friday that China was ready to push forward its long-term, healthy and in-depth development of strategic partnership with Germany over the decades to come. Hu made the remark when meeting with visiting German Chancellor Angela Merkel in the Great Hall of the People in Beijing. Hu said China was ready to work with Germany to adopt an "even broader perspective and more open attitude" toward the status, goals and orientation of bilateral links by further strengthening dialogues, exchanges and cooperation. The China-Germany relationship has grown in "unprecedented depth and broadness" since the two countries established diplomatic links 40 years ago, Hu said. Talking about the Europe Union and China, Hu said both were important powers in the international community. Against the backdrop of ongoing profound and complex changes in international situation, China and Europe share growing common interests and greater need for mutually beneficial cooperation, he said. Hu said China was ready to work with Europe to advance the all-round strategic partnership on the basis of mutual respect, equality and mutual benefits. Merkel said over the past four decades, bilateral exchanges and cooperation in various areas have become closer and fruitful. The two countries have enjoyed growing broadness and strength in bilateral links and today share an even greater prospect of growing the relationship. Merkel said trade and economic cooperation between the two countries had entered a new era of growth. The German side aimed to step up bilateral exchanges and cooperation in the areas of agriculture, environment, climate changes and culture, Merkel said. She said Germany was ready to promote mutual investment with China on the basis of mutual benefits. And the country was also ready to work with China to further advance Europe's relations with China, Merkel said, adding that the two countries would strengthen cooperation on international issues within the framework of Group of 20.
<urn:uuid:cebb3201-3176-49a5-8986-15dacef3ce76>
2013-05-26T02:55:21Z
CC-MAIN-2013-20
[ [ -0.019080528989434242, 0.0546875, 0.014573317021131516, 0.05228365212678909, 0.13641826808452606, -0.06911057978868484, -0.005596454255282879, 0.11177884787321091, -0.046875, -0.025991586968302727, 0.04326923191547394, 0.014948918484151363, -0.026592548936605453...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964673
383
http://english.sina.com/china/p/2012/0202/436923.html
0.309354
The James Bond franchise may be receiving special recognition at this year's Academy Awards in Hollywood, but it won't be doing so with any of the major awards for latest movie Skyfall. The 23rd outing for the British super spy was notably absent from today's major nominations, despite the efforts of the film's heavyweight Oscar-winning director Sam Mendes. The snub comes after the British Academy shortlisted Skyfall in the Outstanding British Film category, while also giving a nod to Javier Bardem and Judi Dench as Best Supporting Actor and Actress. You can see the full list of BAFTA nominations here. But it wasn't all bad news for 007. Skyfall did receive nominations in the slightly less glamorous categories of Music, Sound Editing, Sound Mixing and Cinematography. Adele's hit single Skyfall, the theme to the film, was nominated as best song. Other notable absentees from the Best Director category include Ben Affleck for Argo, Quentin Tarantino for Django Unchained and Kathryn Bigelow for Zero Dark Thirty. British director Tom Hooper failed to secure a nomination for Les Misérables, despite winning the Oscar for The King's Speech in 2011. He also failed to secure nominations at the BAFTAs and Golden Globes. But he'll likely take some comfort from the fact that his film was nominated in the Best Film category at all three ceremonies. Regular runner-up Leonardo DiCaprio was also snubbed this year, edged out of a Best Supporting Actor award by his Django Unchained co-star Christoph Waltz. Leo has been nominated threes times without success, for appearances in Blood Diamond, The Aviator and What's Eating Gilbert Grape. Austrian movie Amour was a surprise inclusion to the awards, scooping five nominations without the advantage of a big Hollywood budget. Nine-year-old Quvenzhané Wallis was also nominated for her starring role in Beasts of the Southern Wild. If she wins, she'll be the youngest winner of all time - just beating Tatum O'Neal, who won Best Supporting Actress for Paper Moon in 1973 at the age of 10.
<urn:uuid:94604f22-710c-4f2c-bc86-b048a9815356>
2013-05-26T02:41:27Z
CC-MAIN-2013-20
[ [ 0.027016932144761086, 0.013881972059607506, -0.012699203565716743, 0.006038346793502569, 0.05751992017030716, 0.023655379191040993, -0.027265936136245728, 0.09810756891965866, -0.042081672698259354, -0.06374502182006836, 0.03710159286856651, -0.007937001995742321, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961352
447
http://entertainment.stv.tv/film/209260-surprise-oscar-snubs-for-skyfall-tom-hooper-and-leonardo-dicaprio/
0.196014
Links To External Resources We welcome you to provide links to third-party websites that relate to this organism or group of organisms. Examples include websites offering identification keys, news stories, blogs, as well as education and citizen science resources. If you have questions regarding a resource you would like to link to EOL, please contact us. To request an improvement, please leave a comment on the page. Thank you!
<urn:uuid:21e27b5a-75a0-46d3-878b-821ed946cbd8>
2013-05-26T03:10:24Z
CC-MAIN-2013-20
[ [ -0.03485576808452606, -0.011675824411213398, 0.015539147891104221, 0.026442307978868484, 0.06730769574642181, -0.029361262917518616, 0.012620192021131516, 0.062156591564416885, -0.015453296713531017, -0.025927197188138962, 0.0167410708963871, 0.036744505167007446, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.93306
85
http://eol.org/pages/26210/resources
0.245999
Comprehensive DescriptionRead full entry Description of TetramitusWith four equal flagella arising in a flattened slit at the front end of the cell, surrounded by a distinct anterior lip-like rostrum. Substantial fibrous root associated with flagellar bases. Cysts without pores. Many of the flagellates assigned to this genus are likely to be more closely related to Percolomonas cosmopolitus than to T. rostratus, the type of this genus. Reported from soil, freshwater and faeces.
<urn:uuid:36ac8451-019c-4669-90c6-6487d5b93694>
2013-05-26T02:34:31Z
CC-MAIN-2013-20
[ [ 0.007652407977730036, 0.022797131910920143, 0.007300205063074827, 0.024974385276436806, 0.10245901346206665, -0.009413422085344791, -0.006948002148419619, 0.11372950673103333, -0.02523053251206875, -0.001264728489331901, 0.09426229447126389, 0.008709016256034374, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.860407
112
http://eol.org/pages/89976/overview
0.313397
ex11, plotting and Cairo ... Wed Jul 20 13:48:25 CEST 2005 From: "Peter-Henry Mander" <> > Considering this, why not attack the MS-Windows GDI directly in Erlang, > maybe with a k.i.s.s. C driver to ease the connection? Easiest would be to write a graphics server and talk with it via a socket. I think someone said earlier he had been giving it a try. This would actually be a simplified X server, and could be made portable too. Question is: should the protocol be compatible with X? If yes, is there a danger[*] that this server will become an alternative X server? If no, could it be mapped onto X? [*] in the meaning that it would mean to reinvent a lot of wheels... More information about the erlang-questions
<urn:uuid:af055636-0638-4846-9be3-f93bbceccce2>
2013-05-26T03:11:01Z
CC-MAIN-2013-20
[ [ -0.038584183901548386, 0.019451530650258064, 0.035076528787612915, 0.0009068080107681453, 0.06122449040412903, -0.0424107126891613, -0.007214604411274195, 0.09885203838348389, -0.014190050773322582, 0.00023417570628225803, 0.02901785634458065, 0.04591836780309677, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931942
192
http://erlang.org/pipermail/erlang-questions/2005-July/016237.html
0.431836
The thesis describes in detail the area of the uranium lodes in the South Alligator River valley in the Northern Territory of Australia. The four land forms are described, together with the soils developed on them, and the morphological and genetic relationships of the latter are discussed. The published stratigraphy of the area is recapitulated, and some changes of viewpoint are advocated: an unconformity within the Upper Proterozoic rocks is described; the characteristics of the Scinto Breccia unit are ascribed to silicification of diverse stratigraphic units; the allegedly organic origin of calcareous rocks of the Koolpin Formation is disputed; and the lack of obvious signs of unconformity between the Stag Creek Volcanics (Archaeozoic?) and the Lower Proterozoic sequence is pointed out. A petrological study of a collection of rocks from the area is made, and this includes a description of some diaspore-rich volcanics in which the uranium mineralisation appears to be of syngenetic origin. The characteristics of the ore bodies or radioactive prospects are described, together with the ore-deposition controls. An epigenetic origin is postulated for most of the uranium deposits. Exploration techniques employed in the discovery or evaluation of the ore bodies are discussed, and the results are reported of a programme of geochemical testing of stream waters in the drainage basin. It is concluded that, in this area, the geochemical technique has only limited usefulness for the discovery of uranium. The extraction of ore, and its subsequent treatment by solvent-extraction processes is described. An account is given of some other uranium occurrences in northern Australia viz., the Rum Jungle, Mary Kathleen and Pandanus Creek ore bodies, and the radioactive or mineralised prospects at Denham River and Saunders Creek in Western Australia. A general account of theories of emplacement of uranium ore in Australia and elsewhere postulates an epigenetic origin from a magmatic source for most of the Australian deposits, but accepts a sedimentary origin for the uranium associated with conglomerates. A brief historical survey of developments in the uranium industry pays special attention to events in Australia.
<urn:uuid:7ac3dae2-82cc-4eaa-9425-179a450f3e21>
2013-05-26T02:37:11Z
CC-MAIN-2013-20
[ [ 0.014404296875, -0.0169677734375, -0.00933837890625, 0.0230712890625, 0.1171875, -0.022216796875, 0.0194091796875, 0.10302734375, -0.01708984375, -0.00131988525390625, 0.0556640625, 0.007781982421875, -0.07861328125, 0.029052734375, 0.0146484375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.915575
438
http://espace.library.uq.edu.au/view/UQ:287137
0.699838
Romario: I was better than Messi SAO PAULO -- Former star Romario says Brazil wouldn't get past the group stage of the World Cup if the competition were played today. What's more, he insists he's one of the three best players in soccer history. Now a congressman, Romario used an expletive to describe what he thinks about Brazil's national team and said coach Mano Menezes needs more time to form his squad. "If the World Cup was today, we would be eliminated in the first stage," Romario said in Tuesday's Rio de Janeiro daily O Dia. "I would pick the same players as Mano, but it's not working. One of the motives is lack of time. To prepare a national team you need time to practice." Romario said it's a mistake to have Menezes coach Brazil during the Olympics, and he will run the risk of losing his job if Brazil fails to do well in London. Romario said it would be better if the team were coached by Ney Franco, who is in charge of Brazil's youth squads. Brazil is under pressure to win the under-23 tournament because it's the only significant soccer competition it is yet to win. Romario, who led Brazil to the 1994 World Cup title in the United States, said he would like to see former South Africa coach Joel Santana in charge if Menezes is fired. "He is the best coach I've ever played for," the 46-year-old Romario said, referring to the Brazilian. Romario said he was "by far" better than Argentina's Lionel Messi and said he can be compared to the best players of all time, along with Pele and Diego Maradona. "Messi is a good player, but I'm in the top three: It's me, Pele and Maradona. I would include (Zinedine) Zidane in that list, too," he said. Romario has been heavily criticizing Brazil's preparations for the 2014 World Cup and said delays in improving urban mobility is the biggest concern. "The rich fan who will come to the World Cup will be fine. He will arrive on a private jet, use private cars and will stay at the best hotels," Romario said. "But the poorer football fans will be left out." Copyright 2012 by The Associated Press MORE SPORTS HEADLINES - Ribery, Benzema charged with soliciting minor - Ex-U.S. coach denies Solo's shoving allegation - Messi, Ronaldo, Iniesta UEFA award finalists - Kompany: Van Persie would boost any team
<urn:uuid:0b992240-dd8d-42d1-8cb8-1b7e65b773f2>
2013-05-26T03:03:58Z
CC-MAIN-2013-20
[ [ 0.013671875, 0.0245361328125, -0.0027008056640625, -0.0027008056640625, 0.1015625, -0.0654296875, -0.00634765625, 0.07080078125, -0.0135498046875, -0.07080078125, 0.06591796875, 0.036376953125, 0.00186920166015625, -0.0380859375, 0.0576171875, -0.027...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982062
550
http://espn.go.com/sports/soccer/story/_/id/7824845/romario-says-brazil-team-not-ready-2014-world-cup-lauds-self
0.890124
Jonathan Schmid's late goal gave Freiburg an away draw at Nurnberg as they remain in contention for a Champions League place. Timmy Simons converted from the spot to give Nurnberg the lead in the 33rd minute but Schmid equalised seven minutes from time as the teams shared the spoils. Freiburg have suffered just one loss in the last 10 matches as they push for the top four, but Nurnburg remain firmly in mid-table despite beating unbeaten in eight. Nurnberg were close to taking the lead after 18 minutes but Hanno Balitsch headed Hiroshi Kiyotake's free kick from the left wing just over the crossbar. The hosts put the ball in the net a minute later through Tomas Pekhart but the Czech international had committed a foul in the build-up. Nurnberg took the lead after Freiburg midfielder Cedrick Makiadi handled inside the area and Simons stepped up to fire the penalty into the lower right corner. Freiburg were close to an equaliser in the 54th minute but Max Kruse could not connect cleanly when well placed. The visitors threatened the Nurnberg goal again 12 minutes later but Matthias Ginter volleyed Fallou Diagne's cross over the crossbar. Jan Rosenthal then fired wide left in the 78th minute as another Freiburg chance went begging They finally got their equaliser in the 83rd minute when Nurnberg keeper Raphael Schafter could only parry Julian Schuster's shot and Schmid raced onto the loose ball to hit home from a tight angle.
<urn:uuid:783963d5-8bac-45e1-bc8a-11a11bc57914>
2013-05-26T02:48:29Z
CC-MAIN-2013-20
[ [ 0.04583333432674408, -0.0062500000931322575, -0.012318840250372887, -0.02663043513894081, 0.04438405856490135, -0.06413043290376663, 0.018840579316020012, 0.06449275463819504, 0.05760869383811951, -0.08659420162439346, 0.007382246199995279, 0.04963768273591995, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937923
332
http://espnfc.com/en/report/346194/report.html?soccernet=true&cc=null
0.177316
Arsene Wenger says Arsenal were jaded Arsene Wenger has hit back at his critics after Arsenal fans chanted 'you don't know what you're doing' towards the end of the goalless draw at Aston Villa. Supporters launched their attack on the Gunners boss after he replaced Olivier Giroud with Francis Coquelin with two minutes remaining. Wenger refused to comment on that outburst or why he made the change but he was in a fighting mood when asked about the chants in his post-match press conference. He said: "I don't want to comment on that. I do my job and do my best for the club. I leave it to you to judge. I try to be as good as I can be. Is it hurtful? Look, I have managed for 30 years at the top level and I have to convince you I can manage the team? "How many games have you managed? I promise you if you manage one I will sit in the stands and chant 'you know what you are doing!''' When questioned about the substitution, Wenger said: "You can discuss every substitution. You think what you want. I do my job and I let people judge it. I do that every day and I do my best every day. I know why I do it. "What is the thinking behind the substitution? I will not explain every decision I make, you judge the game for the papers and I sit here and explain to you our game. You are all great managers! I read the newspapers every day and I can tell you that you are always great managers!'' Wenger denies his reluctance to explain his substitution will cause a rift with Gunners supporters. He said: "Why should I create a rift? I have given you the answer.'' On the playing side, Wenger felt a hectic week in which Arsenal defeated Tottenham and then overcame Montpellier in the Champions League took its toll on Arsenal. He said: "We were a little bit frustrated. We expected a difficult game because we played an intense game last Saturday against Tottenham. We had a Champions League game on Wednesday night so we knew it would be hard. "Always, when you play away from home after the Champions League it can be difficult. We lacked a bit of sharpness today in the final third. Physically we were jaded.'' Wenger defended his decision not to play Jack Wilshere after the midfielder's long injury lay-off, given the wet and windy conditions. He said: "I decided that Jack was to be rested today and to not bring him on. It's more dangerous to bring him on in weather like that when he's tired. It made sense for him not to play today.'' Villa boss Paul Lambert, who watched the game from the stands because of a one-match ban, was full of praise for his side's performance - which moved them out of the bottom three. He said: "We've played the two Manchester clubs and Arsenal in back-to-back games and it's a tough thing mentally. But I thought we played really well today. We were excellent and might have nicked it. "We defended really strongly. We are playing really well. We are a young side which is growing together and the way we are playing, we are a threat.'' Lambert defended his decision not to include fit-again striker Darren Bent amongst the 18 players selected to face Arsenal. He said: "It is my choice. I thought the squad I went with could win us the game. I've got 25-26 players to think about. The most important thing is this football club and I pick a team and squad I think will do well." Information from the Press Association was used in this report
<urn:uuid:8326cdc8-9fb5-4b18-a8aa-ff1e09eb130b>
2013-05-26T02:50:11Z
CC-MAIN-2013-20
[ [ 0.019287109375, 0.00043487548828125, -0.0002155303955078125, -0.016357421875, 0.1123046875, -0.0252685546875, 0.0035858154296875, 0.091796875, 0.0252685546875, -0.0517578125, 0.044921875, 0.036865234375, -0.040283203125, -0.019775390625, 0.0322265625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.987609
777
http://espnfc.com/news/story/_/id/1239510/arsene-wenger-hits-back-over-fan-criticism?cc=3888
0.466235
- FREE unlimited amendments - FREE bibliography page - Free title page - Free Plagiarism report - Free Formatting - Unique customer support - Properly cited paper - 100% original papers - 275 words per page - Any citation style - Guaranteed Privacy - 24/7 customer support A literature review gives an account of works published by researchers and scholars. Students may write literature reviews in form of assignments or in form of annotated bibliography. It is written in form of a discursive prose, and does not summarize one piece of literature after the other. Literature review is often part of an essay’s introduction, research report or thesis’ introduction. Students should organize literature reviews into sections presenting themes or including a relevant story. Literature reviews aim at evaluating and synthesizing published material in accordance to the guiding concept of the research question. Students write literature reviews in order to inform the readers about their knowledge and ideas concerning a topic. Moreover, literature reviews show the strengths and weaknesses of a literature topic. Literature review is a kind of writing defined by a guiding concept. Such a guiding concept may be the problem or issue under discussion, research objective or an argumentative thesis. Students are not supposed to use a set of summaries or mere descriptive list of available material when writing literature reviews. Literature reviews help students to enhance their knowledge about a topic, and help them gain a wide variety of skills. The skills demonstrated by students writing literature reviews are as following: The first skill is information seeking which is the ability of students to efficiently scan literature. Scanning is done using computerized methods or manually in order to identify the useful books and articles. The second skill is critical appraisal. This refers to the ability of students to apply analytical principles in order to identify valid and unbiased studies. A literature review should portray organization, and must relate to the research question or thesis formulated. A literature review must also synthesize results by summarizing them to known and unknown. The other vital point is for a literature review to identify controversial areas in literature and lastly, to formulate questions that require in-depth research. A student needs to identify the research question that his or her literature review helps to define. Moreover, a student must identify or know the scope of the literature review, and the types of publications used when writing the literature review. It is essential for a student to do enough research in order to gather relevant material for writing a literature review. Moreover, the research has to be narrow enough to exclude the irrelevant material that do not form part of the literature review. Critical analysis of a literature review is of the essence. This ensures that a student or writer writers a high-quality literature review. When writing annotated bibliography, students should not summarize each item but instead they should follow themes and critically assess the literature review material. Students should state the scope of the literature review using an overall introduction and conclusion. Grouping of items into sections helps students to show relationships and comparisons. Literature review writing can be a complicated task to students. Hence, students should seek literature review writing help from writing sites and companies. A reliable company should provide custom literature review papers at an affordable price. Moreover, the customized literature review papers must be written from scratch by professional, academic writers. It is essential for a reliable company to hire writers who can write literature reviews on diverse literature books and based on several topics. Our company provides the best literature review papers for sale.
<urn:uuid:5a4a3cc5-e220-47fd-8be8-74b2fde12a23>
2013-05-26T03:09:50Z
CC-MAIN-2013-20
[ [ -0.03759765625, 0.01068115234375, 0.018310546875, -0.003021240234375, 0.0810546875, 0.00811767578125, 0.0155029296875, 0.11767578125, -0.0205078125, 0.0240478515625, 0.095703125, 0.0206298828125, -0.06787109375, 0.0308837890625, 0.043701171875, -0.03...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932782
709
http://essaywritings.org/all-services-/179.html
0.293485
Okay can we also just. Think for a second how after Joan comes to Sherlock and tells him that she thinks the husband in her case was responsible, he points out that the case has now escalated from missing person to murder, and then asks her if she would like him to take over. She says no, and then he leaves her to it. He leaves her to it. It didn’t seem remarkable to me at first, but after thinking about it, what is normally the first response in tv shows when a woman is entering an increasingly dangerous situation? The man steps in, points out the danger, and tries to assert control to “keep her safe”. Shows nowadays will “subvert” this by having the woman scoff about having to be protected, proving herself to be badass in one way or another, and the man may or may not leave things to her. Sherlock, however, doesn’t insist on taking over, nor does he make Joan “prove herself” as capable of handling the danger. He asks out of concern, and then respects her decision to continue working on it alone. Another situation this could have cropped up in is after Joan’s life was in danger in A Giant Gun, Filled with Drugs. He knows his work is dangerous, and he knows he absolutely does not want to lose Joan—but instead of trying to segregate her from more dangerous situations, he decides to teach her self-defense techniques so that she can keep herself safe. There are just so many little signs of how much he respects her and thinks of her as capable and equal and it’s so wonderful. What a supportive friend. What a great show.
<urn:uuid:2d81663f-d51a-4900-9b03-11c3c0e45843>
2013-05-26T03:03:30Z
CC-MAIN-2013-20
[ [ 0.0034324461594223976, -0.0011739807669073343, 0.009518194012343884, 0.0071597034111619, 0.08153638988733292, -0.04312668368220329, 0.00678066024556756, 0.10646900534629822, -0.013224393129348755, -0.043463610112667084, 0.0643531009554863, -0.012971698306500912, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982767
354
http://etosaurus.tumblr.com/post/45406078765/okay-can-we-also-just-think-for-a-second-how
0.238874
- tomato (n.) - 1753, earlier tomate (c.1600), from Spanish tomate (mid-16c.) from Nahuatl tomatl "a tomato," literally "the swelling fruit," from tomana "to swell." Spelling probably influenced by potato (1565). A member of the nightshade family, all of which contain poisonous alkaloids. Introduced in Europe from the New World, by 1550 they regularly were consumed in Italy but grown only as ornamental plants in England and not eaten there or in the U.S. at first. An encyclopedia of 1753 describes it as "a fruit eaten either stewed or raw by the Spaniards and Italians and by the Jew families of England." Introduced in U.S. as part of a program by Secretary of State Thomas Jefferson (1789), but not commonly eaten until after c.1830. Alternative name love apple and alleged aphrodisiac qualities have not been satisfactorily explained; perhaps from Italian name pomodoro, taken as from adorare "to adore," but probably actually from d'or "of gold" (in reference to color) or de Moro "of the Moors." Slang meaning "an attractive girl" is recorded from 1929, on notion of juicy plumpness.
<urn:uuid:df48412b-20e8-4c8f-b786-b0c10729930a>
2013-05-26T03:02:57Z
CC-MAIN-2013-20
[ [ -0.012489371001720428, 0.029336735606193542, -0.031887754797935486, 0.0016807503998279572, 0.06462585180997849, -0.07185374200344086, 0.011001275852322578, 0.04804421588778496, -0.03443877398967743, -0.04209183529019356, 0.06887754797935486, 0.046981293708086014, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964866
271
http://etymonline.com/index.php?term=tomato&allowed_in_frame=0
0.291711
I have been discussing a multitude of issues including quantitative easing, Ricardian Equivalence, and the current state of monetary policy with Scott Sumner over the in comments of his excellent blog and it has given me the inspiration to provide a more thorough outline of my thinking. I think that the best way to think about money is, as Leland Yeager might say, in terms of monetary equilibrium. In other words, if we view money as being just one other good in a Walrasian general equilibrium model, then an excess demand (supply) of money is accompanied by an excess supply (demand) of goods and services. Thus, maintaining monetary equilibrium is essential to achieving economic stability. What’s more, the particular problem with an excess demand (or supply) of money is that money has no market of its own. Or as Keynes would say, labor cannot be shifted away from the production of goods where there is an excess supply to the manufacture of money. Further, the fact that money does not have a market of its own implies that an excess demand (supply) of money will have an impact on all markets because money is a medium of exchange. My view here is not unique. In fact, Nick Rowe recently wrote an excellent post on this very topic that rightfully referenced the work of Robert Clower. The central point is that individuals have notional demands for money, goods, and services. Notional demand is understood as the intended demand. Thus, suppose for example that everyone arrives at some centralized market with their own plans for consumption and ultimate real money balances. If there is an excess demand for say lemonade, individuals can bid up the price of lemonade and the market will clear. If the excess demand is for money, however, there exists no price to adjust to clear the market and the effective demand for goods and services will fall short of supply. A very simple way to think about monetary equilibrium is in the context of the equation of exchange: MV = PY where M is money, V is velocity, P is the price level, and Y is real output. Thus, M is the supply of money and V can be seen as the demand for money. (A particular note: velocity is understood as the number of times that the average dollar — or other medium of account* — is turned over. Thus an decrease in velocity reflects an increase in the demand for money.) Monetary equilibrium therefore implies that the product MV should be constant (and thus so should nominal GDP, or PY. Keep in mind that this is a static analysis). The maintenance of monetary equilibrium essentially implies that monetary policy should be aimed at satisfying money demand (or nominal income) rather than the price level (as is currently the case). Thus, in a growing economy, the price level should actually be falling as increases in real output and productivity put downward pressure on prices. This type of thinking loosely forms the basis for what George Selgin calls the productivity norm. Such a maintenance of monetary equilibrium has a rich history in the course of economic thought (see Selgin, 1995). So how does this framework relate to the current situation? Scott Sumner believes that the current recession could have been avoided using a nominal income target (more specifically, using nominal income futures targeting). I am not sure that I agree with this assertion, but it does fit with this framework. Allow me to explain. If Sumner is correct, then (using our simple equation of exchange model) anticipations of lower nominal income would be reflected in an increase in the demand for money or a decrease in spending (a fall in V). (Alternatively, it is possible that the increase in the demand for money could be an exogenous event such as described by Keynes when there is an increase in uncertainty.) If the central bank was targeting nominal income, they would respond by increasing the money supply to offset the fall in velocity such that nominal income remains at the target level. Sumner, however, likes to view this phenomenon through the lens of nominal income and expectations rather than through a monetary equilibrium framework (or at least that is my impression). Thus, in his mind, the nominal income target signals to economic agents that the Federal Reserve will do everything that it can to make sure that nominal income does not fall. If the Fed is credible on this point, then nominal income will not fall because people expect the Fed to follow through on this promise. I actually think that my view of monetary equilibrium is consistent with this view, but that Sumner simply has a different way of describing the policy. In any event, Sumner has recently expressed his concern with the productivity norm view because (as I understand it) he is concerned with nominal wage rigidity. Thus, the falling prices implied by the productivity norm might actually produce malign effects. He would prefer a broader idea of a nominal income target. He might be correct, but I do not share this concern about wage rigidity. The reason is because wage rigidity should only be a concern when prices are falling due to adverse aggregate demand shocks. Falling prices due to productivity advances should have no effect on the nominal wage. In fact, rising productivity should be consistent with higher real wages (in this case due to falling prices). In any event, one need not worry about this problem under the current circumstances because the decline in nominal income is the result of a severe adverse aggregate demand shock. I am inclined to think that nominal income targeting is certainly more desirable than the current regime. However, the ultimate question is whether or not the current situation could have been avoided under a nominal income targeting regime. Scott Sumner believes that we could have avoided the recession and simply experienced a burst of the housing bubble had we followed a nominal income target. I actually think that we might not have even had a housing bubble if we had a nominal income target (that allows for falling prices). In any event, the current situation has raised interesting questions about the state of monetary policy and monetary stability. Hopefully, we will also stumble upon some of the answers. * “Money is here called a medium and not, as customary, a unit of account because, clearly, money itself is not a unit, but the good whose unit is used as the unit of account” Niehans (1978).
<urn:uuid:022cf86e-2bef-4d01-b35d-75aefbb0ba4c>
2013-05-26T02:56:09Z
CC-MAIN-2013-20
[ [ -0.01361083984375, 0.025634765625, -0.0037841796875, 0.019287109375, 0.064453125, -0.03662109375, -0.01239013671875, 0.12060546875, -0.0247802734375, 0.00037384033203125, 0.103515625, -0.01123046875, -0.0712890625, 0.016845703125, 0.03515625, -0.0291...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960469
1,279
http://everydayecon.wordpress.com/2009/05/11/in-search-of-monetary-stability/
0.407104
The Farmers Alliance The populist movement first came into being in small communities far from any cities or centers of political or cultural activity. During the summer of 1890 farm families in the agrarian South and West gathered in their respective areas to discuss their problems. At these gatherings, agrarian families listened to the speeches of recruiters from the “National Farmers’ Alliance.” The Farmers’ Alliance grew at an astounding speed. During the late 1800’s discontent among the agrarian population was becoming a worldwide issue. With the advent of advanced forms of transportation and communication the farmers were suddenly hurled into a far larger market that they no longer were in control of. Due to the increased opportunity for competition, prices of crops began to drop. However, this same phenomenon affected other products as well and, although farmers were making less profit quantitatively, their actual purchasing power (or qualitative profit) was increasing. Farmers expressed grievances about the cost of shipping their goods, however during this period the price of shipping actually decreased. All of these things, however, were still detrimental to the agrarian community because, up until this point, they had not required the services of the railroad to ship crops, and they had not been in need of as many manufactured goods to support their farms. All of this can be deceiving. While general economic trends were more positive than anything else, the situation of farming communities varied widely from location to location. In fact, no nationwide patters could be clearly defined. In reality there was a more pressing issue that lead to the ascension of the populist movement: Despite overwhelming evidence to the contrary, farmers were having the distinct feeling that their situation was becoming worse. It is said that reality is perception, and this is certainly true in any social science because people do not react to their environment, they react to their perception of their environment. The farmers perceived doomsday. In the 1870’s and 80’s there was a growing social trend favoring cities and industry. Farmers’ children were leaving their homes and family businesses to make it big in the city. Literature was published during this time describing the drab and meaningless existence of farm life. During this time multitudes of farmers' organizations were changing and merging with each other. Two major organizations emerged, both calling themselves the Farmers’ Alliance: The Northwestern Alliance in Mississippi and the West, and the Southern Alliance (however, the geographical coverage of these two organizations is not highly clear-cut). The Southern Alliance was started in Texas in 1875 and began absorbing other agrarian societies after 1886. The primary concerns of this society were residual systems from the old Civil War South. The sharecropping system, crop-liens, and overworked land ranked at the top of their lists. The Northwestern Alliance was similar to the Southern alliance, but differed on policies of the Southern alliance such as secrecy, and segregated organizations for Blacks. In 1889 the Southern alliance took on the “National Farmers’ Alliance” title and absorbed the greater part of the Northwestern alliance. The Alliance then formed its own political party due to a disapproval of both the Republican and Democratic parties. The first Peoples’ Party was formed in 1890. The party’s demands were for a federal farmers reserve (the sub-treasury) that would allow crops to be temporarily sold to the government, which would then hold them until the most opportune selling time presented itself, then distribute the profits back to the farmers. They also demanded, and much more within reason, the free coinage of both gold and silver, an abolition on tariffs, a federal income tax, the direct election of senators, and railroad regulation. During the elections of 1890 the fledgling people’s party gained thirty-eight supporters in congress. The sub-treasury was a system devised by the populists to combat what they perceived to be a bad market for their products. It would allow farmers to store their crops in government warehouses and then take out a government loan for up to 80% of the market price of said goods. The loan would come to term upon the sale of the crops, which could be held until ideal market conditions presented themselves. This is an ingenious idea, except that it is basically asking for government aid for farmers and therefore it was slightly harder to gain acceptance at the national level than it was to convince their neighbors that it was a good idea. The Federal Income Tax Why would a farmer who is struggling to keep their home ask for a new tax? Well, boys and girls, is it simple. How does the government make money? Collecting taxes. How did the government make their money at this time? Property taxes. Who had the most money? Factory owners and businessmen did. Who had the most land? Farmers. Who paid the most money? Farmers. Is this fair?. The Election of 1892 After the 1890 elections the populists formed the political party that gave them their name, the new People’s party was also known as the Populist Party. Up until this time the Populists had been participating with the Democratic Party to avoid splitting the white vote by forming a new party, and thus neutering the White’s Supremacy. The new party was formed because the Populists were not content with the false support provided to them by their democratic congressmen. The Democrats played off of the popularity of the populist movement, but rarely followed through on their campaign promises. The new Populist Party gained over one million votes in the election of 1892 and gained 22 electoral votes. Populist governors were installed in Kansas and North Dakota, and ten congressmen, five senators, and approximately fifteen hundred state legislators were installed. The populists never ran a more successful election, but the Democrats, through coercion, fraud, and manipulation, suppressed the populists’ following during the election of 1892. Push for Equality There was one unintended side effect of the populist movement. In the South, where racism was most rampant, there were certain populist politicians who saw a definite similarity of condition between white and black farmers. Both were in the same bad situation. Blacks and Whites served together on populist election committees, spoke from the same platforms, and even served on the same juries. It was unheard of for a black to be called for jury duty at this time. In 1892 a black populist was threatened with a lynching. Two thousand white populist farmers gathered in the area and protected him. Some of these farmers rode all night to get there. The populist sheared across race lines in many ways. Then there was The Panic of 1893. Primary Source: "America Past and Present" by Divine, and Lecture from Mr. Gruver's American History Class.
<urn:uuid:c33d073b-2ea0-475d-accb-a6ce40ed0fd8>
2013-05-26T03:05:16Z
CC-MAIN-2013-20
[ [ -0.01531982421875, 0.007720947265625, 0.00762939453125, 0.003936767578125, 0.091796875, -0.06787109375, 0.00457763671875, 0.11474609375, -0.00592041015625, -0.031494140625, 0.09423828125, 0.0033721923828125, 0.0035400390625, 0.0216064453125, 0.0230712890...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.984387
1,381
http://everything2.com/title/Populism
0.188367
There's a backwards message at the beginning of this song. It's an answering machine message which says "Thanks a lot guys. From the NYPD. We love ya." The title of this song was actually inadvertently stolen from a local band. Apperently, the Johns saw a sticker with this phrase on it posted around town. They were inspired, and wrote a song about it. Later they were contacted by the band, complaining that they stole their name.
<urn:uuid:bb80cdbc-cbd2-419e-bd50-2b26084aef1b>
2013-05-26T02:36:56Z
CC-MAIN-2013-20
[ [ -0.05113636329770088, 0.007528408896178007, 0.0023615057580173016, -0.00802556797862053, 0.06448863446712494, -0.04261363670229912, 0.020170453935861588, 0.08579545468091965, -0.02713068202137947, -0.08693181723356247, 0.05994318053126335, 0.013494318351149559, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.991319
92
http://everything2.com/user/SlightlyMadman/writeups/I%2527ll+Sink+Manhattan
0.92732
A means of controlling a horse mostly used in western riding. For most of history, horses were controlled using the two reins independently to indicate which direction you wanted the horse to go. Of course, in the old west , this caused a problem becuase you might need a hand for say, shooting or roping . And you know, training your horse to repsond to leg pressure is just too much work I guess. Insert neck reining. So basically what you do is train the horse to respond to the pressure of the reins on the neck. The reigns are tied in a knot so it kinda forms a loop. To move the horse right, you move the reins to the right so that the left rein falls against his neck. When the horse feels the rein on the left side of his neck, he is trained to move away from it, hence he goes in the direction you want. And there you go, one handed control with very little pressure on the mouth being invovled. And now you know.
<urn:uuid:89317606-0827-4536-b1e4-77141c663946>
2013-05-26T02:43:23Z
CC-MAIN-2013-20
[ [ 0.011735514737665653, 0.015826180577278137, 0.0036380095407366753, -0.009857832454144955, 0.08637338876724243, -0.08100858330726624, 0.006001877598464489, 0.04962446168065071, -0.013680257834494114, -0.02440987154841423, 0.0333959236741066, 0.016832081601023674, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962574
216
http://everything2.com/user/ccunning/writeups/neck+reining
0.38965
Protein identification by amino acid composition, and optionally pI, Mw, species, UniProtKB keyword and calibration protein. Several constellations are available, corresponding to various amino acid analysis techniques. Compare amino acid composition of a UniProtKB entry with some or all other UniProtKB entries. Several constellations are available, corresponding to various amino acid analysis techniques. The ChloroP server predicts the presence of chloroplast transit peptides (cTP) in protein sequences and the location of potential cTP cleavage sites. Multiple alignment of nucleic acid and protein sequences. Compute the theoretical pI (isoelectric point) and Mw (molecular weight) for a list of UniProt Knowledgebase (Swiss-Prot or TrEMBL) entries or for user entered sequences Redundancy reduction in a set of aligned or unaligned sequences Set of bioinformatics tools, databases and courses Tagger and fetchGWI are tools which allow searching short sequence tags against entire genomes or mRNA reference sequence databases. Predict potential protein post-translational modifications (PTM) and find potential single amino acid substitutions in peptides. The experimentally measured peptide masses are compared with the theoretical peptides calculated from a specified Swiss-Prot/TrEMBL entry or from a user-entered sequence, and mass differences are used to better characterise the protein of interest. Calculate the mass of an oligosaccharide structure. Predict possible oligosaccharide structures that occur on proteins from their experimentally determined masses. The program can be used for free or derivatized oligosaccharides and for glycopeptides. , mass spectrometry (MS, MS/MS, LC-MS) , molecular weight (MW) , oligosaccharide (glycan, sugar) , peptide mass fingerprinting , post-translational modification (PTM) , sequence analysis , sugar epitope Differences in codon usage preference among organisms lead to a variety of problems concerning heterologous gene expression but can be overcome by rational gene design and gene synthesis. The gcua tool displays the codon quality either in codon usage frequency values or relative adaptiveness values HAMAP is a system for the classification and annotation of protein sequences. It consists of a collection of manually curated family profiles for protein classification, and associated, manually created annotation rules that specify annotations that apply to family members. HAMAP is applied to bacterial, archaeal and eukaryotic proteins and used to annotate records in UniProtKB via UniProt's automatic annotation pipeline. Scan several protein sequences or a whole genome (all ORFs) against HAMAP family profiles. Sequences that match HAMAP profiles will be annotated in the UniProtKB format by the associated annotation rules. LALIGN, from the FASTA package, finds multiple matching subsegments in two sequences, locally or globally. C++ program for HMM models MARA models genome-wide expression data in terms of our genome-wide annotations of regulatory sites. For a given expression data-set it infers the key transcription regulators, their sample-dependent activities, and their genome-wide targets. keywords: Bayesian network , hidden markov model (HMM) , maximum likelihood , next generation sequencing (NGS) , sequence analysis , transcription factor binding site , transcription module , transcription regulation , transcription start site annotation predicting coiled-coils in protein sequences miROrtho contains predictions of precursor miRNA genes covering many animal genomes combining evidence from sequence homology and Support Vector Machine classifiers. We provide both consistent extrapolation of already known miRBase families and novel miRNA predictions by our SVM and orthology pipeline. Hits is a free database devoted to protein domains. It is also a collection of tools for the investigation of the relationships between protein sequences and motifs described on them. These motifs are defined by an heterogeneous collection of predictors, which currently includes regular expressions, generalized profiles and hidden Markov models.
<urn:uuid:c2ad16a2-5eab-4435-8d3e-c884de983feb>
2013-05-26T03:03:51Z
CC-MAIN-2013-20
[ [ -0.026123046875, 0.02197265625, -0.007080078125, 0.0115966796875, 0.05224609375, -0.064453125, -0.00020503997802734375, 0.1318359375, -0.0147705078125, -0.0084228515625, 0.1416015625, 0.00653076171875, -0.06640625, 0.039794921875, 0.031005859375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.857634
867
http://expasy.org/resources/search/page:1/keywords:sequence%20analysis
0.197582
Dear StackOverflow Community, I am attempting to utilize Google App Engine as an Authentication Server for a mobile application that runs on android natively. User names and passwords will be stored in GAE and my goal is to be able to both store and verify credentials from the mobile application using GAE. Is this possible? I've looked into OAuth and JSON, but I don't think I have the proper setup for that. Also, if i'm going about this the wrong way, please point me to the proper path. [: A lost traveler
<urn:uuid:1854c632-6777-40a6-9630-1f18605d694d>
2013-05-26T02:48:57Z
CC-MAIN-2013-20
[ [ -0.04663461446762085, 0.02968749962747097, 0.02211538515985012, 0.0010967548005282879, 0.04038461670279503, -0.04086538404226303, -0.020432692021131516, 0.08076923340559006, 0.000480769231216982, -0.05072115361690521, 0.008954326622188091, 0.020913461223244667, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94436
114
http://facebook.stackoverflow.com/questions/4582255/google-app-engine-as-authentication-server-for-mobile-application?answertab=active
0.518378
from the book "Where the Sidewalk Ends" (1974) A long time ago, when the earth was green and there was more kinds of animals than you've ever seen, and they run around free while the world was bein' born, and the lovliest of all was the Unicorn. There was green alligators and long-neck geese. There was humpy bumpy camels and chimpanzees. There was catsandratsandelephants, but sure as you're born the lovliest of all was the Unicorn. But the Lord seen some sinnin', and it caused him pain. He says, "Stand back, I'm gonna make it rain." He says, "Hey Brother Noah, I'll tell ya whatcha do. Go and build me a floatin' zoo. And you take two alligators and a couple of geese, two humpy bumpy camels and two chimpanzees. Take two catsandratsandelephants, but sure as you're born, Noah, don't you forget my Unicorn." Now Noah was there, he answered the callin' and he finished up the ark just as the rain was fallin'. He marched in the animals two by two, and he called out as they went through, "Hey Lord, I got your two alligators and your couple of geese, your humpy bumpy camels and your chimpanzees. Got your catsandratsandelephants - but Lord, I'm so forlorn 'cause I just don't see no Unicorn." Ol' Noah looked out through the drivin' rain but the Unicorns were hidin', playin' silly games. They were kickin' and splashin' in the misty morn, oh them silly Unicorn. The the goat started goatin', and the snake started snakin', the elephant started elephantin', and the boat started shaking'. The mouse started squeakin', and the lion started roarin', and everyone's abourd but the Unicorn. I mean the green alligators and the long-neck geese, the humpy bumpy camels and the chimpanzees. Noah cried, "Close the door 'cause the rain is pourin' - and we just can't wait for them Unicorn." Then the ark started movin', and it drifted with the tide, and the Unicorns looked up from the rock and cried. And the water come up and sort of floated them away - that's why you've never seen a Unicorn to this day. You'll see a lot of alligators and a whole mess of geese. You'll see humpy bumpy camels and lots of chimpanzees. You'll see catsandratsandelephants, but sure as you're born you're never gonna see no Unicorn Back to Poems
<urn:uuid:ed30858e-b46c-48ce-9001-f9799c7fb135>
2013-05-26T03:02:01Z
CC-MAIN-2013-20
[ [ -0.0145263671875, 0.0223388671875, -0.01165771484375, -0.00023174285888671875, 0.1103515625, -0.040771484375, -0.00052642822265625, 0.060546875, -0.0198974609375, -0.07763671875, 0.14453125, 0.020751953125, 0.09130859375, -0.0299072265625, 0.033935546875...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961781
618
http://faculty.weber.edu/chansen/humanweb/projects/MeghanUng/theunicorn.htm
0.83531
In a hadith Qudsi, Allah says “My slaves, I have forbidden injustice to myself and ahve forbidden it between you so do not wrong each other”. Part of that which is forbidden is a Muslim’s humiliation of his brother. Because the Mu’min is ordered to help his brother. The Prophet s.a.w said “Help your brother whether he is wrongdoing or wronged” He asked “Messenger of Allah, I will help him when he is wronged but how can I help him if he is wrongdoing” He (s.a.w) answered. “Prevent him from doing wrong, because that will be your helping him.” (Bukhari) Abu Dawud narrated a hadith of Abu Talhah al-Ansari and Jabir ibn Abdullah that the Prophet s.a.w said. “Any Muslim man who humiliates a Muslim man in a place wherein his respect is violated and his honour reduced. Allah will humiliate him in a place wherein he would love His help. Any man who helps a Muslim in a place in which his honour is reduced and his respect violated then Allah will help him in a place in which he would love His help” (Abu Dawud) Imam Ahmad narrated in a hadith of Umamah ibn Sahl from his father that the Prophet s.a.w said. “If in someone’s presence a Mu’min is humiliated and he doesn’t help him even though he is able to help him, Allah will humiliate him in front of all people on the Day of Rising.” (Ahmad) Al-Bazzar narrated a hadith of Imran ibn Husayn that the Prophet s.a.w said. “Whoever helps his brother in his absence while he is able to help him, Allah will help him in the dunya and the akhirah.’ (AL-Bazzar) (from “The Compendium of Knowledge and Wisdom” by Ibn Rajab al-Hanbali)
<urn:uuid:4ebc5ec7-978c-4595-a081-2fb37c7f4566>
2013-05-26T02:55:31Z
CC-MAIN-2013-20
[ [ -0.011997126042842865, -0.004669540096074343, -0.011206896975636482, -0.055747125297784805, 0.09770114719867706, -0.06293103098869324, -0.03735632076859474, 0.06264367699623108, 0.014727011322975159, -0.06264367699623108, 0.08218390494585037, 0.004274425096809864, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.983373
444
http://fafirrooelaallaah.wordpress.com/2008/01/29/humiliation/
0.365669
Pulowski Preservation shelter Pulowski Preservation shelter Pulowski preservation shelters are coin-operated, one-person fallout shelters found on street corners throughout the more urban areas of the Capital Wasteland, provided by Pulowski Preservation Services. Advertised as a "sensible" and "affordable" alternative to the Vaults, people would ostensibly use them as a last-minute resort in the event of a nuclear attack. The shelter itself is firmly secured to the ground, and ventilation piping is attached to the rear of the booth. A luminous sign on the front of the shelter indicates whether it is occupied or not. Though the shelters can shield against explosive force, they do not seem to shield against radiation. It could be speculated that the installation of so many booths may be seen as a profiteering scheme in the climate of fear before the Great War began, or they may be simply in disrepair when found by the player. The shelters only had an air supply, no food or water, so the occupant's survival was dependent on what they were carrying at the time. Whether any occupant survived through the use of these shelters is unknown, though many are filled with skeletons, suggesting the majority of occupants died trapped inside. The last-minute nature of the booth meant that ill-prepared occupants were likely resigned to die from starvation if they survived the high radiation levels. Considering the blood splatters within several booths containing handguns, it seems that some occupants committed suicide after losing all hope of survival. The only advice offered after entering the booth is: "Wait for radiation to clear. Enjoy your stay." Although somewhat illogical, it seems these shelters were intended to be reusable; considering the tone of advertising the shelters were given, the risk and cost of nuclear devastation pre-War was likely greatly underestimated by the general public. Though apparently coin operated, the player can enter simply by pressing on the coin-slot (note no money will be taken when pressing the coin slot). Two centuries later, Pulowski shelters have found new use in protecting citizens of the Wasteland from its dangers; at least one non-player character (Bryan Wilks in "Those!") hides in a Pulowski shelter. Conversely, in Paradise Falls the shelters are used as punishment cells; a Pulowski shelter at the far end of the settlement is used to detain unruly slaves, and is named "The Box" (An object known as "The Box" was also mentioned in Fallout Tactics, by General Simon Barnaky). This shelter is unique in that it has also been modified to be lockable, imprisoning the slave (in this case, Rory Maclaren). The key to this shelter is in possession of Forty, typically nearby sitting on a bench or patrolling around the destroyed car wall. Shelter locations and contents - Arlington Cemetery South: contains a mannequin, two shot glasses, sexy sleepwear, and wine. - Arlington Library: Contains a skeleton with 10mm pistol, two magazines of 10mm rounds, and Guns and Bullets. - Chevy Chase: Contains one skeleton. - Chevy Chase Metro: One frag mine in front of hatch, contains three bottles of purified water, a lead pipe and a teddy bear. - Dupont Circle: Contains two skeletons, a stimpak a Vault-Tec lunchbox, and a .32 pistol. It is possible that a parent and child were in this shelter. - Falls Church: Contains ammunition box of .32 caliber rounds, ammunition box of 5mm rounds, and two bottles of dirty water. - Flooded Metro: Contains one skeleton, a Chinese Army: Special Ops Training Manual, a pulse grenade and two stimpaks. A Chinese remnant possibly occupied this shelter. - Georgetown parking lot: Empty. - Georgetown West: Contains five beers, three cherry bombs, a box of Fancy Lads Snack Cakes, a Nuka-Cola Quantum, some railway spikes, and a box of Sugar Bombs. - Grayditch: Contains Bryan Wilks during the quest Those! - Hubris Comics HQ: Contains a conductor, a Dean's Electronics, a hammer, a motorcycle gas tank, and two wrenches. A mechanic possibly occupied this shelter. - L'Enfant West: Contains a skeleton, a Big Book of Science, a bottle of wine, and a pair of eyeglasses. - Paradise Falls: Converted into "The Box" for confinement, contains Rory Maclaren. - Pennsylvania Avenue, east of Metro: Contains a deactivated protectron and a box of small energy cells - South of Rivet City: Empty. - Takoma Park: Contains a recently dead wastelander with random chems and bobby pins, ammunition box with random ammunition. - The Capitol Building, outside the east exit: Contains a briefcase, a Lying, Congressional Style, and four pre-War money. Due to its location and what is inside, it is likely that a Senator or Representative occupied this one. - Vernon Square: Contains a skeleton, a radiation suit, and Rad-X. A scientist, or possibly a well-supplied citizen, may have occupied this shelter. - One unreachable shelter glimpsed from the intro movie, the set for which is actually built in-game, but is empty. There is also a Preservation shelter located in Point Lookout, in the Boardwalk area. It is not meant to be encountered during normal play and can only be reached with console or through strategic jumping. Additionally, it cannot be opened. It is placed there for technical reasons, as it houses the non-player character The Brain which serves as the dialog source for Professor Calvert when discouraging you from deploying the cogwave jammer. - While standing in the shelter, Bryan Wilks says "What's this funny suction hose for?". The answer is unknown, but logical speculation suggests it's used to dispose of biological waste. - If the player is under attack by fire ants while next to or close to Bryan Wilks while he is in the shelter, you can hear him complaining about the heat and wondering why it is so hot. - You are not actually protected from radiation or explosions in a Pulowski preservation shelter. If a car explodes next to you while standing in a shelter you will take damage and radiation. - ↑ Fallout 3 Advert: Pulowski Preservation Services
<urn:uuid:4d81fa3f-0f26-426d-a4ff-a8d37d073a94>
2013-05-26T03:10:27Z
CC-MAIN-2013-20
[ [ -0.007110595703125, 0.004669189453125, -0.01129150390625, -0.01611328125, 0.0986328125, -0.091796875, -0.00165557861328125, 0.10888671875, -0.0035858154296875, -0.04248046875, 0.09375, 0.0380859375, -0.07763671875, 0.000606536865234375, 0.03759765625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94334
1,304
http://fallout.gamepedia.com/Pulowski_Preservation_Shelter
0.532773
Have a Question About Being a Beta? Ask it Here! Are you having trouble figuring out how to insert a comment using track changes? Doing your first beta job, and not sure how much to edit? Doing your ten millionth beta job and running into something you need help with? Ask your beta-ing questions here! McGonagall Likes My Quidditch Skills I am new to this forum and would like to become a beta. Could you tell me exactly what a beta is supposed to help with? Is iy anything that can be improved in a story, or grammar/characterization only? What a beta is responsible for depends on what kind of assistance the author asks for. In general, a beta looks at grammar, plot, characterization, and how all these pieces fit together to form a coherent and interesting story. a story that I betaed for one time they didnít want me to change the plot and not even the grammar they just wanted to know if I liked it was easy you know just reading it but I thought that you at least changed something not just read it and tell them how munch you liked it Like I said, it's between the beta and the author. If that's all the author wants, that's really all you can give them. You can gently suggest things that might be improved...but you can't force someone to accept your criticism. Beset by Owls I'm actually new to Track Changes, and I have a query. For example, if a word needs a comma, do you delete the whole word and write it again with a comma, delete the last letter and write it again with a comma, or simply add a comma? That's had me confused for a while, and I suppose it can be done either way, but I'm not sure if there is a certain, proper way to do it or not. I've usually deleted the word and reinserted it with the new punctuation because it's easier for me to see it on the computer screen that way. But that's a personal choice - there's no "correct" way to indicate it on Track Changes. I am slightly confused about all things concerning betas. For example: Do you have to be accredited to beta a fic? What are track changes? What do you do with an uncooperative writer? I would love to be able to edit fics and help out authors whenever I can, but it seems there are very formal rules that I must follow. No, you do not have to be Accredited to be a beta. If you aren't, you can advertise your beta services in the "Beta Services for Sale or Rent" forum. Track changes is a program on Microsoft Word that allows a beta to make corrections and add comments to a story. The corrections/comments are shown in colour and when you send the file back to the author, they can go through and either accept or delete your changes. It's usually found under 'Tools' on the toolbar. If you want to learn how to use it, PM me and I could probably walk you through it. As for uncooperative writers... Well, some people you just aren't meant to work with. If an author decides not to use your correction or to ignore your comment, you have to let them have creative freedom, because it is their story, after all. If the author is just being unjustly uncooperative or rude, just respectfully inform them that you are no longer offering your services to them. I hope I helped! Ryan The Wizard: Since you're new to the world of beta-ing, I'd recommend applying to the Beta Mentor Program. New betas are paired with experienced betas who help you develop and perfect your skills.
<urn:uuid:fd01bfca-8dea-4aae-b2ac-268335aa4e66>
2013-05-26T02:50:08Z
CC-MAIN-2013-20
[ [ -0.040283203125, 0.031982421875, 0.0189208984375, -0.0022735595703125, 0.036376953125, -0.032470703125, -0.0037384033203125, 0.0751953125, -0.03515625, -0.02880859375, 0.056640625, 0.041748046875, -0.01318359375, -0.02490234375, 0.049560546875, -0.01...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962371
783
http://fanfiction.mugglenet.com/forums/showthread.php?73405-noblefate-is-available&goto=nextoldest
0.656159
WILMINGTON - It may be next year before a federal judge decides whether to overturn former Army doctor Jeffrey MacDonald's convictions for the murders of his wife and children at Fort Bragg in 1970. A court hearing on MacDonald's latest effort to regain his freedom ended Tuesday afternoon after six days of evidence and testimony and a day of closing arguments at the federal courthouse in Wilmington. U.S. District Judge James Fox was given DNA test results and heard allegations that a Fayetteville drug addict told her lawyer, her mother and a deputy U.S. marshal that she was involved in the murders. The addict, her mother and the deputy marshal are all deceased. Fox said the government prosecutors and MacDonald's lawyers have 60 days to file legal briefs after they receive a transcript of the hearing. He will rule sometime after that. MacDonald, 68, was convicted in 1979 at a federal trial in Raleigh of beating and stabbing to death his pregnant wife, Colette, and 5-year-old daughter Kimberley, and stabbing to death 2-year-old daughter Kristen. He has always said his family fell victim to a home invasion. He has tried repeatedly for more than 30 years to get his conviction overturned. Investigators concluded that MacDonald fought with his wife before killing her and their daughters , and then stabbed himself and staged the scene in his home to support his claim that he woke to find four strangers in the home and fought them until he lost consciousness. Since Sept. 17, lawyers for MacDonald presented written statements and testimony that a drug user from Fayetteville, Helena Stoeckley, repeatedly admitted that she was with a group of people who murdered the MacDonalds in their apartment on Fort Bragg in the wee hours of Feb. 17, 1970. However, at MacDonald's trial in 1979, Stoeckley denied on the witness stand that she could remember what she was doing then or that she had any role in the murders. The lawyers also have DNA test results that indicated that three hairs found at the crime scene, including one from underneath one of Kristen's fingernails, could not be matched to the MacDonalds or anyone else. They also did not match Stoeckley or her boyfriend, who, according to sworn statements, also told people he had taken part in the murders. In closing arguments before Fox at the hearing on Tuesday, MacDonald lawyer Gordon Widenhouse said the Stoeckley statements and the DNA evidence should vacate MacDonald's convictions. "No reasonable jury would have found Jeffrey MacDonald guilty" if it had heard this evidence, he said. The DNA provides positive circumstantial evidence of a home invasion, Widenhouse said. The hair from under Kristen's fingernail could have been left by her attacker as she fought for her life, he said. The sworn statements about Stoeckley, including testimony on Monday from her lawyer, Jerry Leonard of Raleigh, show she was there, Widenhouse said. Prosecutors Brian Murtagh and John Bruce countered that the newest claims of Stoeckley confessions - her statements had been raised before - are not credible, and that the DNA results show no evidence of home invasion. Results from other samples boost the contention that MacDonald is guilty, Murtagh said. Murtagh said that the hair from under Kristen's fingernail was not documented in any records until July 1970, five months after the murders and autopsy. Evidence collection and maintenance standards were less stringent then, and the hair could have come from anyone who was near or handled her body before she was autopsied or handled the evidence later, he said. He noted that photos showed that Kristen's hand was bloody at the crime scene, but no blood was found on the hair. Other unidentified hairs found at the crime scene could have been left in the MacDonald home long before the murders, Murtagh said. All three unidentified hairs appeared to have fallen away from people's bodies naturally instead of showing damage that occurs if a hair is ripped out, as might happen in a struggle. Murtagh was one of the prosecutors at MacDonald's 1979 trial. He said that fallacies in MacDonald's statements, the distribution of fibers around the home from his ripped clothing and clues that Colette's body had been moved and positioned were among many factors that contributed to the jury's verdict that Jeffrey MacDonald killed his family. Bruce attacked the claims that Stoeckley confessed. The story the deputy U.S. marshal told in 2005 and 2006 changed over time and was filled with demonstrably factual errors, Bruce said. For example, the marshal, Jimmy Britt, claimed he drove Stoeckley from South Carolina to the trial in Raleigh in August 1979. Testimony from another deputy marshal and a sworn statement from one who has died say that they, not Britt, took Stoeckley to Raleigh. Bruce questioned the validity of an affidavit made by Stoeckley's mother, who has died, that said Stoeckley admitted to her in 1982 that she was present during the murders. And Bruce said Leonard's testimony on Monday that Stoeckley told him in August 1979 that she took part in the murders is questionable. "The concern that we have with Mr. Leonard's testimony is, we submit, a memory problem," Bruce said. On the stand, Leonard admitted that he at times conflated new memories with old. Bruce suggested that Leonard had heard a version of Stoeckley's confession that was promulgated in the 1980s by a private investigator and came to believe he heard it from her during the trial in 1979. Widenhouse disagreed with Bruce, saying that Leonard's time with Stoeckley was such a noteworthy event in his life, in addition to his charge to protect her rights, that he would not misremember it. Widenhouse argued that differences among the Stoeckley confession stories are of little import. "What's important is these three words: 'I was there,' " Widenhouse said. All of the Stoeckley confessions say that, he said. Fox is to evaluate whether the evidence is valid and whether it would have persuaded a jury to vote "not guilty." He could then vacate McDonald's convictions or let them stand.
<urn:uuid:b595b8e3-b3f2-415b-86a1-ddbb23b26411>
2013-05-26T02:57:42Z
CC-MAIN-2013-20
[ [ -0.021240234375, 0.02197265625, -0.007476806640625, -0.00189208984375, 0.1162109375, -0.0279541015625, -0.0147705078125, 0.083984375, -0.03955078125, -0.0286865234375, 0.0966796875, 0.031982421875, -0.00872802734375, 0.01104736328125, 0.040771484375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986494
1,290
http://fayobserver.com/articles/2012/09/25/1206520?nid=
0.246361
Since the terrorist attacks of September 11, already keen interest in prayer has increased as part of the frenzied upsurge in religion in general. Topping The New York Times' bestseller list is a small book called The Prayer of Jabez, with "its message that lives can be profoundly changed by the power of prayer." Images bombard us on television regularly of masses of humanity kneeling in supplication, praying to some all-powerful deity. These images only increase the perception that prayer is a potent force in dealing with the world's problems that is endorsed by almost all of humanity. Many religious people want to cling to the ancient belief in the supernatural, including prayer, and yet accept the conclusions and benefits of modern science. They can't have it both ways. To study the natural world, scientists must have an implicit assumption that it operates only by natural, predictable processes, which cannot be affected arbitrarily by an all-powerful deity. One of the major ways that scientists provide proof of theories is through well-designed studies, of which the "gold standard" is the large, randomized, prospective, controlled, double-blind type. If such a study could be influenced by a personal god who responded to prayers to change the results, science would be in shambles. There would be no way ever to do a valid experiment since investigators couldn't be sure that someone, somewhere, hadn't uttered a specific or generic prayer that would affect the study. In short, science by its very nature, rejects any influence of prayer on the physical world. Even though prayer is an irrational concept, could it nevertheless be tested scientifically? Francis Galton, the brilliant and eccentric cousin of Charles Darwin, thought so and gave the idea scientific legitimacy. Galton was the father of biometry and a central figure in the founding of modern statistical analysis. He argued that regardless of how the prayers "may be supposed to operate," the efficacy of prayer . . . is a perfectly appropriate and legitimate subject of scientific inquiry" because it can be tested statistically. He then proceeded to set up such studies. In one statistical study, Galton examined the longevity of clergy. He reasoned that clergy should be the longest lived of all since they were the most "prayerful class" of all and among the most prayed for. When Galton compared the longevity of eminent clergy with eminent doctors and lawyers, the clergy were the shortest lived of the three groups. In this study of the clergy, he cited a previous study by Guy (Galton wasn't the first to think of analyzing prayer statistically but usually gets the credit) where Guy found prayer did not protect royalty, who were much prayed for, when compared to other members of the aristocracy. In analyzing the data on royalty, Galton concluded: "Sovereigns are literally the shortest lived of all who have the advantage of affluence." Galton looked for other statistical data. He examined the insurance rates for ships. He reasoned that ships carrying missionaries and pilgrims should have lower rates since frequent praying by the occupants should decrease the number of accidents. He found that the rates were the same; ships carrying missionaries and pilgrims sank just as often as other ships. Following up on Galton's statistical studies on prayer, Rupert Sheldrake, a Cambridge-trained plant biologist, did one of his own, examining the effects of prayer in India. Most people there prefer having a son, and a tremendous amount of praying goes into the effort to produce one. Sheldrake examined statistics of live male births in India and used data from England as a control where the preference for sons was less strong. He found that in both England and India there were 106 males to 100 females, just as in every other country. He stated, "if this enormous amount of psychic effort and praying of holy men were working, you would expect on average the percentage of live male births to be higher." Although these statistical studies from the nineteenth century strongly suggest that prayer is not effective, they do not meet the "gold standard" of a completely valid scientific study. The media regularly mention a large number of contemporary studies that supposedly scientifically validate the beneficial effects of prayer on human health. So what is the truth in this matter? Actually, there are only three that meet the "gold standard." Happily, the fact that there are only three studies considerably reduces the amount of information freethinkers need to acquire to refute frequent and erroneous claims. When we say that a finding in a scientific study is statistically significant, "significant" has a specific statistical meaning. To be considered significant, a finding must be (.05) or less, which means the probability that it could be due to chance is 5 in 100. The main point to appreciate is that this figure, although reasonable, is strictly arbitrary. Therefore, the figure of (.05) is borderline significant, .04 (a probability of 4 in a 100 of being due to chance) is considered significant, and .06 (6 in 100) is considered not significant. The figure (.05) is the one accepted for "ordinary" scientific studies. But what criterion should be applied in proving a supernatural finding? After all, as the old saw goes, extraordinary claims should require extraordinary proof, and this requirement should especially apply to claims of the supernatural. The James Randi Educational Foundation has a standing offer of one million dollars to anyone who can demonstrate any supernatural event under carefully controlled scientific conditions. The foundation has never had a single person who even got past the preliminary testing. Its members think that a study that would prove a claim of the supernatural should eliminate the possibility that the result could be by chance, in the range of 1 in 10,000,000, a far cry from 5 in 100. Robert Park, in his excellent book, Voodoo Science, observes that a characteristic of voodoo science is that there are always very small differences in studies, just barely detectable, and that can't be amplified in further investigations. These barely detectable positive results usually indicate flaws in the studies themselves rather than real findings. Let's examine in some detail the three studies on intercessory prayer that were large, prospective, randomized, double-blind ones--the only three that pass muster as valid scientific investigations of the effects of prayer on human health. Intercessory prayer (prayer at a distance) was chosen so that the placebo effect of direct prayer would be eliminated. All of these studies were done on coronary care unit (CCU) patients. The first study was entitled "Positive Therapeutic Effects of Intercessory Prayer in a Coronary Care Unit Population" by Randolph Byrd, M.D., published in the Southern Medical Journal, July 1988. Dr. Byrd stated: "My study concerning prayer and patients in a general hospital coronary care unit was designed to answer two questions: (1) Does intercessory prayer to the Judeo-Christian God have any effect on the patient's medical condition and recovery while in the hospital? (2) How are these effects characterized, if present?" Over ten months, 393 patients admitted to the CCU at San Francisco General Hospital were randomized to an intercessory prayer group (192 patients) or to a control group (201 patients). After randomization, each patient in the prayer group was assigned to three to seven intercessors, who were all "born-again Christians (according to the Gospel of John 3:3)" of various denominations. Dr. Byrd wrote: "The patients' first name, diagnosis, and general condition, along with pertinent updates on their condition, were given to the intercessors. The intercessory prayer was done outside the hospital daily until the patient was discharged from the hospital. Under the direction of a coordinator, each intercessor was asked to pray daily for a rapid recovery and for prevention of complications and death, in addition to other areas of prayer they believed to be beneficial to the patient." The results were summarized in "Table 2" of the Byrd study entitled "Results of intercessory Prayer." There was no statistically significant difference between the prayer and control group in these measurements: days in CCU after entry; days in hospital after entry; number of discharge medications. Only when a list of 26 "New Problems, Diagnoses, and Therapeutic Events After Entry" was compiled was any statistically differences found and then only in 6 of the items: congestive heart failure (.03); diuretics (.05); cardiopulmonary arrest (.02); pneumonia (.03); antibiotics (.005); intubation/ ventilation (.002). When Dr. Byrd subjected these items to multivariate analysis (a statistical method of analyzing the overall significance when multiple factors are positive), he found the prayer group to better the control group at the statistically significant level of (.0001). In "Table 3," "Results of Scoring the Postentry Hospital Course," he constructed three categories, "Good, Intermediate, and Bad," using a self-designed and previously not scientifically validated method. The prayer group bettered the control group at a level of (.01). Although this study appears to meet the "gold standard" of a large, prospective, randomized, double-blind investigation, scientists have pointed out a number of flaws: The study was not "blinded' in two respects: 1) Janet Greene, the coordinator of the study, on whom Dr. Byrd depended for the collection of data, knew exactly who was being prayed for, and interacted regularly with the patients in the study. 2) "Table 3" was formulated by Dr. Byrd at the request of editors who initially evaluated his paper after the "blinding" had been removed. There was no difference in clear-cut end points such as days in the CCU, days in the hospital, or mortality between the two groups. Only when complicated statistical analyses were done on a long list of items do any data emerge that favor the prayed-for group--hardly evidence of an all-powerful deity. Also, if prayer had any effect, an overall improvement would be expected. Of the six items where the prayer group did better, four were of borderline statistical significance and only two were clearly significant. Are we to conclude that the deity is only concerned with reducing antibiotic use and ventilating patients in the CCU? This study provides no information on the physicians involved in this study. This information could be important since certain physicians use antibiotics and intubate patients much more readily than others. The method that Dr. Byrd used in his scoring in "Table 3" had not been validated by any previous studies. When Irwin Tessman, Ph.D., professor of biological sciences at Purdue University, requested of Dr. Byrd that Dr. Tessman be allowed to review the raw data that went into the study, he was refused. Since Dr. Byrd's claim is one of the supernatural, it would seem appropriate that all aspects of the study be reviewed by independent investigators. The degree of obvious religiosity communicated by Dr. Byrd raises doubts that he could be completely objective on a scientific investigation of prayer, something that he deeply believes is effective. Under "Acknowledgments" at the end of the paper, he writes: "I thank God for responding to the many prayers made on behalf of the patients." The second study that appears to meet the "gold standard" for scientific studies is "A Randomized, Controlled Trial of the Effects of Remote, Intercessory Prayer on Outcomes in Patients Admitted to the Coronary Care Unit" published in the October 25, 1999 edition of the Archives of Internal Medicine. The investigators were William S. Harris, Ph.D., plus eight others of the Mid America Heart Institute. The study was conducted at Saint Luke's Hospital, Kansas City, Missouri, a private, university-associated hospital. "The purpose of the present study was to attempt to replicate Byrd's findings by testing the hypothesis that patients who are unknowingly and remotely prayed for by blinded intercessors will experience fewer complications and have a shorter hospital stay than patients not receiving such prayer," admitted the investigators. The intercessors (five to pray for each patient compared to three to seven in Byrd's study), were to pray for "a speedy recovery with no complications" plus "anything else that seemed appropriate to them." 1013 patients were randomized, 484 to the prayer group and 529 to the usual care group. After removal of those patients who spent less than 24 hours in the CCU (prayer was not started until 24 hours after admission), 524 remained in the usual care group and 466 in the prayer group (a high drop-out rate). A list of events after entry into the study was compiled, much like the one in the Byrd study, but with 34 events instead of the 26 in the Byrd Study. Again, a scheme was devised to evaluate the overall hospital course, a totally new and untested system, but different from the also new and untested one devised by Byrd. The Harris study scheme was called the Mid America Heart Institute Cardiac Care Unit (MAHI-CCU) Scoring System, and its criteria are presented in "Table 1" of his paper. The only finding in the Harris study that indicated the prayer group outperformed the control group was in using the MAHI-CCU Scoring System and then only at a probability level of (.04), a figure very close to the cut-off level of (.05). The Harris study is a much better study than the Byrd study because the number of patients is larger, it appears to be completely blinded, and the degree of religiosity of the investigators appears to be lower (although Dr. Harris supposedly supports the idea of "intelligent design"). Nevertheless, scientific investigators have noted flaws: 1) As already noted, the MAHI-CCU Scoring System has never been previously scientifically validated. Without such validation, any result produced by it is subject to question. 2) The much higher dropout rate in the first 24 hours in the prayer group is a very serious criticism of the study. The statistical probability that this finding would appear by chance is (.001), or 1 chance in a 1000, a statistically very significant finding. This higher dropout rate, since the mortality rate in the two groups was the same, suggests that the prayer group, for unknown reasons, was not quite as ill as the control group since patients discharged within a day often turn out not to have serious problems. If they were a little less ill at the start, we would expect them to have a more favorable course. 3) The conclusions stated in this investigation, as I'll describe shortly, are not justified by the data. Positive findings in a scientific study are not considered valid until replicated by independent investigators. So did the Harris study replicate the positive findings of the Byrd study? The answer is a resounding no! Of the 6 items in the list of 26 items previously described in the Byrd study where the prayed-for group did better, not one was statistically significant in the Harris study. When the Harris study subjected its data to the same scheme that Byrd had used in his evaluation of the hospital course of the patients (Table 3 in the Byrd study), the Harris study found the difference between the two groups of (.29) was not even close to being statistically significant. The Harris study did replicate the negative findings from the Byrd Study. There was no statistical difference in days in the CCU, days in the hospital, or mortality. In remarks at the end of the Harris study, the investigators stated: "Our findings support Byrd's conclusions despite the fact that we could not document an effect of prayer using his scoring system." This statement is erroneous. Not only do these findings not support Byrd's conclusions, they directly refute them. The most recent study and, I believe, the best designed one, was published in the Mayo Clinic Proceedings in December 2001, entitled "Intercessory Prayer and Cardiovascular Disease Progression in a Coronary Care Unit Population: A Randomized Controlled Trial." This third "gold standard" study should settle the matter once and for all scientifically. The investigators were Jennifer M. Aviles, M.D., and six others. This trial was done on patients immediately after discharge from the Coronary Care Unit, a time when the intensity of extraneous intercessory praying by family and friends would generally be waning. Here is their summary of the findings: "Patients and Methods: In this randomized, controlled trial conducted between 1997 and 1999, a total of 799 coronary care unit patients were randomized at hospital discharge to the intercessory prayer group or to the control group. . . . The primary end point after 26 weeks was any of the following: death, cardiac arrest, rehospitalization for cardiovascular disease, coronary revascularization, or an emergency department visit for cardiovascular disease. Patients were divided into a high-group based on the presence of any of 5 risk factors (age > or = 70 years, diabetes mellitus, prior myocardial infarction, cerebrovascular disease, or peripheral vascular disease) or a low-risk group (absence of risk factors) for subsequent primary events." The investigators summarized their findings as follows: "Conclusions: As delivered in this study, intercessory prayer had no significant effect on medical outcomes after hospitalization in a coronary care unit." Not even one difference showed up between the control group and the prayed-for group. The statistical studies from the nineteenth century, and the three CCU studies on prayer are quite consistent with the fact that humanity is wasting a huge amount of time on a procedure that simply doesn't work. Nonetheless, faith in prayer is so pervasive and deeply rooted, you can be sure believers will continue to devise future studies in a desperate effort to confirm their beliefs. Now that you have the scientific information, don't let the statement that the efficacy of prayer has been proven by scientific studies go unchallenged. It's simply untrue. James W. Williamson, a retired medical doctor, is a Foundation member from Florida.
<urn:uuid:b80dbc1a-3a83-4e27-a4ce-94fb8055a252>
2013-05-26T03:01:48Z
CC-MAIN-2013-20
[ [ -0.0595703125, 0.01165771484375, 0.00897216796875, 0.00174713134765625, 0.09326171875, -0.05908203125, 0.00537109375, 0.10986328125, -0.0123291015625, -0.0240478515625, 0.045654296875, 0.00885009765625, -0.054931640625, 0.026611328125, 0.042236328125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967112
3,683
http://ffrf.org/publications/freethought-today/itemlist/user/43-2012-11-19-03-13-04?start=50
0.365776
RSS (Real Simple Syndication) gives Internet users an easy way to keep up with the latest information being published on their favorite websites. An RSS "feed" consists of headlines from stories that have been recently published, a short synopsis and a link to the rest of the story. You can organize RSS content from multiple websites in one convenient location, making it easier to stay updated without having to surf each individual site. In order to take advantage of RSS feeds, you will need to use a news reader - a program that makes it possible to collect and view RSS feeds in one convenient location. They work by periodically retrieving and displaying updates to each subscribed site's feed. Most news readers are programs that must be downloaded and installed onto your computer, but there are also some web-based options available as well.
<urn:uuid:c9678966-88e9-47d7-8f66-e632f7a9a61f>
2013-05-26T02:56:43Z
CC-MAIN-2013-20
[ [ 0.0029135013464838266, 0.046270716935396194, 0.007985152304172516, 0.004467368591576815, 0.037983424961566925, 0.030904695391654968, -0.005114813335239887, 0.1056629866361618, -0.01104972418397665, -0.01907803863286972, 0.11395027488470078, 0.022272098809480667, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944506
163
http://fgcuathletics.com/news/rss/
0.18845
I have started to change my diet and attempt to become more healthy with the goals of being in much better shape, becoming healthier, and feeling better overall. With this in mind, I have done my best to either eliminate all together or massively minimize my soda consumption, drink large amounts of water, restrict carbs, lower significantly the amount of calories in my meals, etc. My typical meal plan now looks like the following: - High protein shake for breakfast - mixed with water - Handful of peanuts mid-morning for snack - Lunch is usually a flax and low card tortilla with fresh spinach and sliced deli meat - Handful of peanuts mid-afternoon for snack - Supper is either another wrap like lunch or something with high protein content, sometimes it is just another shake like for breakfast - Try to drink nothing but water or tea during the day but usually water The trouble that I have started having is a reduce amount of energy or feeling of fatigue. I am wanting to start something like P90/P90X but do not think that I could complete it right now due to sluggishness and general malaise. Is there something that I should be doing differently to help with this? How can I continue to be healthy and increase my energy levels? Note that I would still like to keep carbs and/or calories low to help loose weight.
<urn:uuid:edb566f9-05b5-4023-9a65-c169120b0ade>
2013-05-26T02:43:09Z
CC-MAIN-2013-20
[ [ -0.024627482518553734, 0.012572433799505234, 0.005691225174814463, -0.00962334405630827, 0.0736754983663559, 0.003259519813582301, -0.014072847552597523, 0.05753311142325401, 0.021212749183177948, -0.03518211841583252, 0.012055049650371075, 0.040149006992578506, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96946
280
http://fitness.stackexchange.com/questions/4587/how-to-keep-energy-up-while-on-diet/4592
0.720638
Roberto Di Matteo has impressed at the Blues, but who will be next to take the hotseat? When Andre Villas-Boas was sacked by Chelsea owner Roman Abramovich in early March, questions were instantly asked about whether a Stamford Bridge manager would ever be allowed the time to build a squad without fear of being relieved of their duties. The 34 year old from Portugal was, remarkably, their seventh different manager since Abramovich bought the club in 2003, and his notorious impatience has raised the issue of how attractive the post is for any individual with designs on creating a legacy at the club. Chelsea are, nonetheless, highly ambitous and well-resourced, and it is thus an appealing position for many individuals within football. There are a variety of plausible contenders for the job, each with their own unique strengths, and some of these candidates will be assessed below. The current manager of Spanish giants Real Madrid and former manager of the Blues, Mourinho has the clear advantage of already having an established relationship with a number of Chelsea's players. His return would therfore be popular among the squad, while he and Abramovich appear to have reconciled after the falling-out which led to the Portuguese departing Chelsea in 2007. An exhaustive attention to detail and incredibly detailed approach to tactics are his hallmarks, as is his ability to create a closely-knit squad with an 'us against the world', while his preference for an effective, rather than aesthetic, manner of playing will be accepted if it can deliver trophies. The 49 year old's record at Porto and Inter Milan was similarly impressive, with the Champions League, mcuh desired by Abramovich, won at both clubs, and his Real Madrid side currently lead Barcelona in La Liga. Moreover, Mourinho is keen to return to England in the near future, although parhaps only if he can secure the La Liga title first, which would realise his career goal of winning the league championship in England, Italy and Spain. The Catalan boss has rose to prominence following astonishing success at his beloved Barcelona, where their achievements and style of play have resulted in the feasible claim that they are the best side in the history of the game. A former Barca legend as a player, starring for the club in the 1990s, Guardiola returned to the club as coach of the Barcelona B team, obtaining promotion in his single year with them, before taking the reigns with the senior side and, sensationally, going on to win 13 out of 16 possible trophies at the time of writing. Similarly to Mourinho, he is renowned for his incessent preparations but, unlike 'The Special One', the 41 year old Guardiola is also recognised for his devotion to attacking, passing football in the manner of the manager he played under for Barca, Johan Cruyff. Furthermore, of encouragement to Chelsea supporters is his openess to managing in the Premier League, citing the demands of Camp Nou management as a reason why he is unlikely to remain there for more than another couple of seasons. However, it is also believed by some that Abramovich's impatience would deter Guardiola from taking the job, especially if other options, such as that of Manchester United, were to become available. While not as distinguished as the two managers discussed above, the Everton boss for over ten years has proven himself to possess a special ability to maximise the resources at his disposal and maintain their position as a competitive club in the Premier League. Following a largely successful spell at Preston North End, the Scot took over at Goodison Park and has led them to the Champions League qualifying rounds and an FA Cup final, achievements made even more admirable by the limited finances available to him and the fact that he has been forced to sell many of the Toffees' best players, including Wayne Rooney, Joleon Lescott and Mikel Arteta. The 48 year old's evident ability has been recognised by the League Managers Association awarding him their Manager of the Year award on three occasions, in 2003, 2005 and 2009. In addition, if Chelsea do approach Moyes then he may feel that this is the time for a fresh challenge in the game, as the Stamford Bridge post would allow him the opportunity to spend with significantly more freedom than at Everton, and would give him the chance to test himself regularly in Europe. But like Mourinho and Guardiola, the instability surrounding this position may enocurage Moyes to cast his eye towards other offers that may materialise. Roberto Di Matteo The incumbent at Chelsea, albeit on a temporary basis, can also be included as a contender as a result of his relatively successful opening period as the Blues boss. He has appeared to have created positive relationships with his players, and does not seem to be hindered by his invlovement in the Villas-Boas era, where he was the assistant manager. Prior to re-joining Chelsea, where he experienced success as a player, he managed Milton Keynes Dons to the League One play-offs in 2009, and West Bromwich Albion to promotion to the Premier League the following year. Appointing the Italian as manager would be advantageous in ensuring continuity and avoiding an uncertain summer, and the 41 year old would almost certainly accept the job. His credentials, however, do not match those of the majority of the other contenders, meaning he wolud probably have to win trophy to come into Abramovich's thinking. The Spaniard was mentioned as a possible short-term option when Villas-Boas was removed, before Di Matteo was chosen, and the former Liverpool manager is consequently likely to be on their shortlist. This suggestion was, though, met with disapproval by Chelsea fans and Abramovich may take this into account, although an individual that has accomplished what he has should not be discounted. The 51 year old famously won the Champions League, which Chelsea so crave, with Liverpool in 2005, the FA Cup in 2006 and led them to the runners-up spot in the Premier League in 2009. With Valenica before that, he twice was victorious in La Liga and also secured the UEFA Cup, proving himself with these two clubs to possess tactical intelligence of the highest level. His period at Anfield though, will be partly remebered for a number of disappointing signings, a tendency at times to set his team up perhaps overly defensively, and an unsatifactory final season, while his short spell with Inter Milan was far removed from what José Mourinho achieved at the Italian club.
<urn:uuid:ca1aae00-a394-4a92-96d5-f230b25270d5>
2013-05-26T02:56:11Z
CC-MAIN-2013-20
[ [ 0.0250244140625, 0.033447265625, 0.002227783203125, 0.01171875, 0.0869140625, -0.0174560546875, -0.005889892578125, 0.12353515625, 0.0172119140625, -0.06884765625, 0.03466796875, 0.048095703125, -0.0615234375, -0.036865234375, 0.048095703125, 0.02331...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980546
1,308
http://footballspeak.com/post/2012/03/31/Chelseas-summer-dilemma.aspx
0.345652
Create an array to store the data in, and an index into that array: byte index = 0; Then, replace the if test with a while loop: while(Serial.available() > 0) char aChar = Serial.read(); inData[index] = aChar; inData[index = '\0'; // Do something with inData, like call atoi... There are two issues with this code. One is that it does no error checking, like making sure there is room in the array before storing the new value in the array. The other is that there is no way to tell which bytes in the serial buffer form a packet. If you send "12" and "68" and there is a delay in reading the serial data, the buffer will contain "1268". Where does one value end and the next one begin? If there is any delay in receiving the serial data, after you send "12", the Arduino may read the 1 before the 2 arrives, and assume it got a complete packet. It's better to include start-of-packet and end of packet markers, like "<12><68>". This way, it is easy to see what constitutes a packet.
<urn:uuid:b0dec778-26db-4c24-a259-20231e86cefc>
2013-05-26T03:06:34Z
CC-MAIN-2013-20
[ [ -0.04522727429866791, -0.004119317978620529, 0.020681818947196007, -0.01772727258503437, 0.04113636538386345, -0.07409090548753738, 0.020113635808229446, 0.059090908616781235, -0.021136363968253136, -0.001974431797862053, 0.11318181455135345, 0.017386363819241524, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.871587
259
http://forum.arduino.cc/index.php?topic=22941.0
0.861895
Quoting Onalee's Mummy:" <blockquote><b>Quoting Stfu Shirley:</b>" "</blockquote> ? I don't understand" Quoting Onalee's Mummy:" <blockquote><b>Quoting Mummy-2-2-Monsters:</b>" <blockquote><b>Quoting ... [snip!] ... year."</blockquote> My daughter is not 5 and a half. Just going off the info I got online on government websites." Quoting Mummy-2-2-Monsters:" Have that cookie the other person posted and relax." Quoting *Mrs. Mallard*:" I have successfully told someone their child should not be forward facing without coming off as bitchy ... [snip!] ... limits I'm pretty darn proud of myself. I also explained why it is dangerous for them to be forward facing so young "you are supposed to turn them round to forward facing at 6 months here. i havent and will not for as long as physically possible but im prety sure the carseats here dont even cater for rearfacing for longer than 6 months Quoting Onalee's Mummy:" <blockquote><b>Quoting May ♥:</b>" <blockquote><b>Quoting I'm Marbles:</b>" ... [snip!] ... to brag about it, but she could have saved that baby's life."</blockquote> My daughter was forward facing at 6 months"haha just saw this! i am right in thinking they tell you to forward face at 6 months here?
<urn:uuid:1c53bd41-794f-47f0-8430-0cd9aff0fa56>
2013-05-26T02:34:36Z
CC-MAIN-2013-20
[ [ -0.004837328568100929, 0.0311643835157156, 0.014897259883582592, -0.009032534435391426, 0.07636986672878265, -0.03287671133875847, -0.003381849266588688, 0.0534246563911438, -0.012500000186264515, 0.03047945164144039, -0.016267122700810432, 0.0534246563911438, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937925
335
http://forum.baby-gaga.com/about2443943-1.html
0.25181
Mam I have been sex with my gf for several times and each time i had used condom properly. I heard that it is safe 90-95% only. So will you plz tell me, is there any chances of my gf to be pregnant. I always tried to ensure the safe sex. Thank you for ur reply.
<urn:uuid:cd174619-9211-45f2-b5b8-6c1defd988c6>
2013-05-26T03:01:31Z
CC-MAIN-2013-20
[ [ -0.03584558889269829, 0.023322610184550285, -0.004940257407724857, -0.004681755322962999, 0.07398897409439087, -0.06755514442920685, -0.021829044446349144, -0.0008903951966203749, -0.020220588892698288, -0.1038602963089943, 0.025390625, -0.015625, 0.020565256476...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.983066
69
http://forum.santabanta.com/showthread.htm?312976-Does-Condom-Prevent-Pregnancy&mode=hybrid
0.50182
Jul 18th, 2011, 03:04 AM Webservice-Client: Common approach with Spring WS, JAXB and just one WSDL file? I would like to use Spring WS to build a Webservice-Client with JAXB for marshalling and unmarshalling the Java classes. But what I have is just one WSDL file. When I understand it right, I can generate Java classes with JAXB (xbj.exe), which then can be used by me with Spring WS to retrieve the Webservice-Data and send an answer. But JAXB can only generate Java classes from xsd-schema files. Must I now manually copy those xsd-definitions from within the WSDL file to generate those classes via JAXB? (in my case the WSDL file contains 4 XSD definitions). Or is there a way to just convert the whole WSDL to Java classes which I can use with Spring WS (I know there is the "wsimport", but it is part of JAX-WS and I think I can't use it in this scenario, right?). So what is the common approach with Spring WS / JAXB / one WSDL file? I really would like to get startet with Spring WS and JAXB - thanks a lot for your help! Tags for this Thread
<urn:uuid:1c9c5f76-a52d-4450-88da-d59440677bcc>
2013-05-26T02:36:17Z
CC-MAIN-2013-20
[ [ -0.030518393963575363, 0.0226797666400671, 0.017349498346447945, 0.016722407191991806, 0.022575251758098602, -0.06897993385791779, 0.006558319553732872, 0.07692307978868484, -0.017349498346447945, -0.00556542631238699, 0.06396321207284927, 0.0512123741209507, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924179
290
http://forum.springsource.org/showthread.php?112200-Webservice-Client-Common-approach-with-Spring-WS-JAXB-and-just-one-WSDL-file&p=372022&mode=threaded
0.908166
Jan 8th, 2012, 04:21 AM Using roo-generated entities as a .jar dependency I've been trying, reasonably successfully, to use an entity class, generated by roo, in another app. Do you have any guidelines for doing this? I would like to use roo to generate all of my entities in this way. I'd have a 'database-app' where I can reverse engineer my tables, create the .jar file and import it as a dependency in another app. The problems that have arisen have been because the 'database-app' spring context is contained in the same .jar, and this seems to be searched for and used instead of the host application's context. I have tried excluding the META-INF/spring folder from the .jar, but this did not help. Is there a way of creating a .jar containing just roo entity classes and importing it, where it gets pulled into the host application's spring context? Or am I barking up the wrong tree? Any help would be greatly appreciated. Jan 8th, 2012, 08:54 AM I think this is actually a novice Spring question, nothing to do with Roo, so please ignore. It's all about loading/excluding contexts in web.xml I guess. Jan 8th, 2012, 06:16 PM Though I'm not sure I understand the details of your description it does sound to me you want multi-module Maven projects, OSGI via the Bundlor add-on or something similar. You could read the sections following "Migrating to OSGi" in the "SpringSource dm Serverô Programmer Guide" for ideas. Unfortunately I have done neither of those yet. I'm sure there are others that can chime in with their experiences. Last edited by MiB; Jan 8th, 2012 at 06:19 PM.
<urn:uuid:0a7b83d2-d412-408e-8774-c112ad981eb1>
2013-05-26T03:09:18Z
CC-MAIN-2013-20
[ [ -0.030429594218730927, 0.0009276178316213191, 0.019018497318029404, -0.007383651565760374, 0.025954654440283775, -0.05011933296918869, 0.021628879010677338, 0.07995226979255676, -0.01596062071621418, -0.026849642395973206, 0.03624701499938965, 0.04832935705780983, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944486
397
http://forum.springsource.org/showthread.php?120915-Using-roo-generated-entities-as-a-jar-dependency&p=395923
0.361786
I was amazed you changed default value of hibernate property "hibernate.connection.release_mode" from "auto"(in 1.25) to "on_close"(in 1.26). Why? Is there any necessity or advantage for Spring? Hibernate reference says that "This setting is left for backwards compatibility, but its use is highly discouraged."
<urn:uuid:29749035-813d-427e-9788-16bd82ff79ad>
2013-05-26T03:10:12Z
CC-MAIN-2013-20
[ [ -0.051235463470220566, 0.02225654013454914, 0.04723837226629257, 0.0024868277832865715, 0.011900436133146286, -0.09229651093482971, 0.021257268264889717, 0.06031976640224457, -0.035247091203927994, -0.03433866426348686, 0.04542151093482971, 0.09229651093482971, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.873067
82
http://forum.springsource.org/showthread.php?19825-connection-release-mode&p=40825&mode=threaded
0.982439
I am still not fully sure where you are at. For now I will only assume we need to create persistent connections using VL as a client and XP as the server. In other words, we are working from the VL box, trying to read files on XP. Please try to follow these instructions: First, go to XP, click on Start then Run.. , enter "cmd" and click OK. In the command line box, enter "ipconfig" and take note of the IP address of your XP machine. It will probably be something like "192.168.1.2". On your VL box, as root, in a terminal: substitute the actual value for IP_of_XP If you see an output repeating something like:From 192.168.1.3 icmp_seq=4 Destination Host Unreachable Press "Ctrl-c" and stop right there. Post result below. If you see an output repeating something like:64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=0.162 ms press "Ctrl-c" and continue to the next step: Create a file "/root/smbcreds". Edit it and make it look like this: Substitute your actual values for samba_user_name and samba_password. Add the following line to "/etc/fstab": //IP_of_XP/SHARE /home/davy/XP_SHARE cifs auto,rw,credentials=/root/smbcreds 0 0 Again, substitute your actual values where needed. now issue command: mount -a -t cifs Check to see if it mounted properly. If this works, we can go forward from here. Post your results below.
<urn:uuid:4c859ee3-3491-4396-bf9a-9b7cd0c73e40>
2013-05-26T02:47:58Z
CC-MAIN-2013-20
[ [ -0.01156812347471714, -0.002399984048679471, 0.02056555263698101, -0.009158098138868809, 0.052377890795469284, -0.0713367611169815, 0.006828406360000372, 0.06876606494188309, -0.014299485832452774, -0.008876928128302097, 0.047236502170562744, 0.03968508914113045, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.806101
386
http://forum.vectorlinux.com/index.php?topic=9377.msg62517
0.86476
I need to caculate the area of a property based on the topography, is there really no tool inherent to Desktop 10 or 3d Analyst to do this? It hasn't been an issue until we acquired a 10,000 acre tract with an extremely steep ridge and valley topography. The simplest way I can think of doing this would be to create a grid within my property boundary and calculate individual areas for each polygon. Then caculate slope and create an integer grid of the same size and apply a slope calculation to each polygon's area....there's gotta be an easy way to do this. If it can calculate a 3d perimter and volumes etc, why not a 3d surface area?? Please tell me I'm missing something!
<urn:uuid:306c29aa-4383-416f-99ce-b669cfa71a76>
2013-05-26T02:34:56Z
CC-MAIN-2013-20
[ [ -0.04895833507180214, -0.0010579427471384406, -0.002506510354578495, 0.010286458767950535, 0.02204861119389534, -0.04618055373430252, 0.0008626302005723119, 0.078125, -0.01718750037252903, 0.01545138843357563, 0.04027777910232544, 0.02447916753590107, -0.0590277...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932909
154
http://forums.arcgis.com/threads/17706-Is-there-really-no-3D-Surface-Area-Calculation-tool
0.886129
RAAM relished the opportunity to show his skill and prowess in battle. This grand tournament the queen had decided to hold was just the opportunity he needed to show his martial skill and strength. His first two opponents, another Theron and a large grenadier elite, had been easily defeated. The grenadier had refused to yield, so RAAM had strewn his entrails across the battle field with a satisfying slice of his serrated blade. But this next opponent he was slightly wary of. He had heard of him before, the leader of the Kantus monks, and although not particularly large or durable, the tall thin Kanti were incredibly fast and agile, and deceptively strong for their size. This Skorge, their leader, was not to be taken lightly. RAAM was confident in his skill, but was no arrogant fool. He knew he was not invincible, although he had proven that he was as close to it as any locust in the horde in his battles with the Lambent. He stood in darkness in the staging room of the arena, waiting for the gate to raise, anticipating his glorious exhibition. The gate rose, allowing the the glow of the fire to illuminate the floor at his feet, and slowly climb up his robes until finally reaching the pale tough skin of his face. He strode out into the center of the arena, raising his blade high above his head, as if he had already grasped victory. Across the arena, the other gate slowly ascending. He could not yet see his opponent, but knew he was lurking in the shadows beyond the firelight. Suddenly, the enemy burst forth, brandishing a long staff with a chainsaw at either end. He bounded toward RAAM, then lept high into the air, aiming to slash RAAM from above. RAAM easily deflected the attack with his knife, and seized the shaft of the weapon with his other hand. Skorge kicked him in the jaw, and managed to yank the weapon free of his grasp while he was stunned. Skorge was, indeed, very strong. RAAM regained his alertness just in time to see Skorge's blade strike his shoulder. It grinded against his armor, but had no effect on RAAM. Skorge hadn't anticipated his plates standing up to the blade; his expression changed from confident to surprised. RAAM seized the opportunity, grabbing Skorge by the neck, lifting him clear off the ground, and smashing his skull against the hard rock of the arena floor. Blood began flowing from Skorge's brow, but he showed no sign of slowing down. He lept up without a moment's hesitation, striking RAAM's lower jaw with the shaft of his weapon, then digging one of the twin saw blades into RAAM's ribs. Once again, his armor protected him from harm, as he swung his knife and cut the shaft in two, separating the blades. Skorge's wild, uncalculated actions began to betray his desperation. RAAM knew he'd already won. Skorge just didn't know it yet. RAAM swung his powerful fists, striking the Kantus warrior's head on both sides. He stumbled backward from the blow, disoriented and stunned, the sound of the crowd roaring in RAAM's favor inaudible over the ringing in Skorge's ears. RAAM approached his victim, victory now within his grasp. Skorge tried to stand up, to regain his footing, but RAAM delivered a solid kick to his face as he arose. He fell back again, unable to defend himself. Skorge began crawling away from RAAM, as the giant black-armored warrior slowly approached. he seized Skorge by the tassels of his headdress, pulling his head back and exposing his fleshy and vulnerable throat. Skorge felt the cold sting of the blade as it's edge was pressed against his throat. RAAM looked around at the crowd, as if to ask for their approval. The spectators roared with glee, their thirst for blood palpable. Just as RAAM prepared to slice open this weakling's throat, the sound of the queen's voice rang out over the loudspeakers. "That is enough RAAM." He looked toward the royal podium, the queen's firm expression glaring down at him from the stands. He stood, walked toward her section of the arena, and bowed before her, touching his weapon to his forehead in salute. "Our champion is here", Myrrah's voice proclaimed to the now silent audience. "From the throngs of hopeful combatants, one has proven himself a warrior to be feared above all others. From this day forth, I proclaim you General RAAM, supreme commander and championof all the Locust Horde." RAAM could feel his heart swell in his chest. It had been suspected by many that the winner of this tournament would gain some position of prominence in the queen's court, but never had he dreamed that he would be given supreme control over the entire Locust army. This was what he had worked his entire life for. This was his moment of glory and triumph. He stood, saluted his queen, and walked to the exit of the arena, the crowd's thunderous applause still filling his ears as he walked down the hall. His destiny was calling, he wouldn't keep it waiting.
<urn:uuid:2c6a333c-f5fc-4532-89d3-b51af5735e1e>
2013-05-26T02:41:13Z
CC-MAIN-2013-20
[ [ -0.00592041015625, 0.00019741058349609375, 0.0054931640625, 0.0184326171875, 0.09375, -0.0595703125, -0.0118408203125, 0.12353515625, 0.00640869140625, -0.05078125, -0.00201416015625, 0.037841796875, 0.034912109375, -0.0263671875, 0.0390625, 0.008605...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.992093
1,085
http://forums.epicgames.com/threads/904603-RAAM-versus-Skorge-(fan-fic)/page2
0.559819
Joined: 20 Aug 2009 Location: Denver, Colorado |Posted: Wed Jul 28, 2010 7:27 am Post subject: The 10 Best Questions to Break the Ice and Practice English |The following 10 questions will help you start a casual conversation in English and keep it going along an interesting line. The first five questions will help you get to know people. These are simple questions that require simple answers and that give you information so that you can keep asking. The last five questions will help you maintain a conversation and discover more about the person’s likes and dislikes. 1. What’s your name? This is a basic question that can prompt an interesting exchange of information. After the person answers, you can reply: - “It’s a pleasure to meet you” - “Where are you from?” - “That’s an interesting name. Is it French, Indian, Russian…?” 2. Where do you live? To keep the conversation going, you can ask: - “How long have you lived there?” - “Do you like it there?” - “Do you live in an apartment or a house?” 3. What do you do? You can find common ground with other people when you know what they do. After breaking the ice, you can follow with something like this: - “Which company do you work for?” - “How long have you had that job?” - “Do you like your job?” - “What’s the best/worst thing about your job?” - “What do you like the most/least about your job?” 4. Are you married? If the person answers “yes”, other questions to ask are: - “How long have you been married?” - “Where did you get married?” - “What does your wife/husband do?” - “Do you have children?” If the answer is “no”, you may ask: - “Do you have a girlfriend/boyfriend?” - “Do you like single life?” - “Would you like to get married someday?” 5. Where are you from? It is always interesting to know where other people come from, even more so if they are foreigners. Keep the conversation going by asking: - “Where is …?” - “How long did you live there?” - “What is … like?” - “Do you like it here?” 6. What do you like to do in your free time? This is a great question to discover common interests. You can ask: - “How often do you (eat out in restaurants, play video games, go to the opera, etc.)?” - “Where do you (eat out in restaurants, play video games, go to the opera, etc.) in town?” - “Why do you like (eating out, playing video games, going to the opera) so much?” 7. Can you play soccer/ tennis/ basketball/ etc.?” Ask about any sport you personally like and are a fan of. Keep it going with: - “Do you enjoy playing soccer/ tennis/ basketball/ etc.?” - “How long have you played soccer/ tennis/ basketball/ etc.?” - “Who do you play soccer/ tennis/ basketball/ etc. with?” - “Would you like to get together sometime to play soccer/ tennis/ basketball/ etc.?” 8. What kinds of films/ food/ vacations do you enjoy? This topic offers great opportunities to learn new things. Keep asking: - “What’s the best place to see/ eat/ go on vacation?” - “What’s your favorite kind of films/ food/ vacation?” - “How often do you watch films/ eat out/ go on vacation?” 9. What do you do on weekends? You can find new ways to have fun and even make a new friend. Keep the conversation going along the lines of: - “Where do you go to …?” - “Can you recommend a good place to (go shopping/ take my children for a swim/ go dancing)?” - “How long have you done that?” 10. What kind of music do you like? Find out more by asking: - “Where do you go to listen to music?” - “Do you play a musical instrument?” - “Have you been to many concerts lately?” You can use all of these questions in one conversation or use them separately to practice English outside of your ESL class , but remember that the most important thing when meeting people is to keep an open mind and enjoy the experience. This is the best way to learn! If you liked this article, tell all your friends about it. They’ll thank you for it. If you have a blog or website, you can link to it or even post it to your own site (don’t forget to mention our ESL blog as the original source). Rachel Clarkson is an English teacher at LCI English ESL Programs and blogger at the ESL Blog. LCI offers the best ESL classes through experienced teachers and high quality programs in Denver, Colorado. Check out great ESL resources and articles at www.englishlci.com/blog
<urn:uuid:8438a981-09b5-44fe-a889-85e5ed38661c>
2013-05-26T03:02:12Z
CC-MAIN-2013-20
[ [ 0.0068359375, -0.00153350830078125, 0.007476806640625, -0.017822265625, 0.12060546875, -0.060546875, 0.000797271728515625, 0.080078125, -0.0341796875, -0.043701171875, 0.09326171875, 0.0152587890625, -0.016845703125, -0.007080078125, 0.042236328125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953032
1,226
http://forums.eslcafe.com/student/viewtopic.php?t=31251
0.990771
Morningstar Class Heavy Fighter (Heavy Fighter Type 04) The F-95 Morningstar, after the initial problems with the jump drive for fighters had been ironed out on the Stiletto Class, was developed by Douglas Aerospace and was the 2nd fighter design in confederation history which made use of a jump drive. For weaponry, the fighter mounts two phasor beam weapons which all fire forward. Acceleration and maneuverability are virtually identical to the Sabre fighter and they are of similar size and mass as well. While in many ways an excellent fighter, the Morningstar spent a short time in active combat service with any new fighter designs entering service which also carried jump drives. Still, the Morningstar's long range endurance, jump drive, and large anti-ship payload made it an excellent scout fighter.
<urn:uuid:b1696cda-7750-4e20-ba10-16a22f301e21>
2013-05-26T02:43:26Z
CC-MAIN-2013-20
[ [ -0.03237757831811905, 0.043170101940631866, 0.006725193466991186, 0.024162370711565018, 0.040270619094371796, -0.11855670064687729, -0.01852448470890522, 0.11340206116437912, -0.044780928641557693, -0.034471649676561356, 0.012081185355782509, 0.04703608155250549, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961383
164
http://forums.galciv2.com/336081/page/2/
0.695884
cwsnyder wrote:For specifying a lightweight version, you have some heavyweight requirements! With your requirements, I can't recommend anything lighter than Windows XP or Linux Mint LXDE. I'm looking for an easy transition from Ubuntu, since commands I've learned so far are based on that. I assume that means Debian-based (?) so I probably need to go with at least XFCE, based on this:http://en.wikipedia.org/wiki/Linux_Mint You are correct, I do have some fairly heavy tasking On the other hand, for my mother's computer, she will run mostly just webmail with picture/flash attachments (and Libre Office, rarely) in the Linux guest VM, with Windows 7 as host. Total of 4GB RAM --> probably allocate 1.5GB for the VM, so lightweight is best, but using Adobe Flash and LibreOffice. Would XFCE be better than Cinnamon and MATE for her computer? Where can I see a resource use comparison?
<urn:uuid:d854e2c1-2196-459a-92b7-9ba3d6527b5f>
2013-05-26T03:05:30Z
CC-MAIN-2013-20
[ [ -0.02790178544819355, 0.02790178544819355, 0.0345982126891613, 0.006591796875, 0.011369978077709675, -0.00837053544819355, 0.004098074976354837, 0.0675223246216774, -0.008928571827709675, -0.0326450876891613, 0.015276228077709675, 0.0432477667927742, 0.046595983...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942098
210
http://forums.linuxmint.com/viewtopic.php?f=61&t=113123
0.858187
Marvelous that a short video transcends into vast admiration towards a set of pictures. Not that I wasn't fond of the edit before. But Inez & Vinoodh have compiled an excellent video to accompany the story, which I'm mesmerized with. Daria can move. The connection between Daria and I&V is blatant, an attribute that is essential.
<urn:uuid:e696a56c-6a33-48b7-8eb5-d8d4b9be613b>
2013-05-26T02:41:44Z
CC-MAIN-2013-20
[ [ -0.03216911852359772, 0.025367647409439087, 0.0017348345136269927, 0.029963234439492226, 0.07242646813392639, -0.01277573499828577, 0.0034007353242486715, 0.06985294073820114, -0.022518381476402283, -0.09485293924808502, 0.033088237047195435, 0.0314338244497776, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950556
75
http://forums.thefashionspot.com/f78/vogue-paris-february-2012-daria-werbowy-inez-vinoodh-163725-14.html
0.211835
Many people are confused about the concepts in DBus. This page gives an analogy to the web which should help to explain things. - unique bus name - well-known bus name - object path - method name - in parameters - out parameters Web Server Analogy - unique bus name is like an IP address. In particular it is dynamic. - well-known bus name is like a hostname. It can be held by different programs at different times, but they should all implement the same API - object path is like the path on the server - interface/method name is like GET or POST - in parameters are like like GET/POST variables - out parameters are like the page which is returned. Object-Oriented Language Analogy - an object path refers to an object, such as a java.lang.Object - an interface is exactly like a Java interface - in parameters are method arguments - out parameters are method return values - unique bus name identifies the running process or application uniquely (these bus names are never re-used by a different process) - well-known bus name is a "symlink" that points to the process providing a particular API - an API is made up of objects that are expected to exist, which are expected to implement certain interfaces - see also http://log.ometer.com/2007-05.html#17
<urn:uuid:cb0bcce9-2024-41cc-84bb-9ebb601e44b8>
2013-05-26T02:34:42Z
CC-MAIN-2013-20
[ [ -0.030315615236759186, -0.001842815661802888, 0.018895348533988, -0.014742525294423103, 0.031976744532585144, -0.1112956777215004, 0.04173588007688522, 0.09426910430192947, -0.01702657714486122, -0.009655315428972244, 0.06769102811813354, 0.02761627919971943, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.901073
295
http://freedesktop.org/wiki/Software/DBusAnalogy/?action=SyncPages
0.719644
On the false-diffusion problem in the numerical modelling of convection-diffusion processes Patel, Mayur K. (1986) On the false-diffusion problem in the numerical modelling of convection-diffusion processes. PhD thesis, Thames Polytechnic. |PDF - Published Version | Available under License Creative Commons Attribution Non-commercial No Derivatives. Download (12MB) | Preview This thesis is concerned with the classification and evaluation of various numerical schemes that are available for computing solutions for fluid-flow problems, and secondly, with the development of an improved numerical discretisation scheme of the finite-volume type for solving steady-state differential equations for recirculating flows with and without sources. In an effort to evaluate the performance of the various numerical schemes available, some standard test cases were used. The relative merits of the schemes were assessed by means of one-dimensional laminar flows and two-dimensional laminar and turbulent flows, with and without sources. Furthermore, Taylor series expansion analysis was also utilised to examine the limitations that were present. The outcome of this first part of the work was a set of conclusions, concerning the accuracy of the numerous schemes tests, vis-a-vis their stability, ease of implementation, and computational costs. It is hoped that these conclusions can be used by `computational fluid-dynamics' practitioners in deciding on an optimum choice of scheme for their particular problem. From the understanding gained during the first part of the study, and in an effort to combine the attributes of a successful discretisation scheme, eg positive coefficients. conservation and the elimination of 'false-diffusion', a new flow-oriented finite-volume numerical scheme was devised and applied to several test cases in order to evaluate its performance. The novel approach in formulating the new CUPID* scheme (for Corner UPw^nDing) underlines the idea of focussing attention at the control-volume corners rather than at the control-volume cell-faces. In two-dimensions, this leads to an eight neighbour influence for the central grid point value, depending on the flow-directions at the corners of the control-volume. In the formulation of the new scheme, false-diffusion is considered from a pragmatic perspective, with emphasis on physics rather than on strict mathematical considerations such as the order of discretisation, etc. The accuracy of the UPSTREAM scheme (for JJPwind in STREAMIines) indicates that although it is formally only first-order accurate, it considerably reduces 'false-diffusion'. Scalar transport calculations (without sources) show that the UPSTREAM scheme predicts bounded solutions which are more accurate than the upwind-difference scheme and the unbounded skew-upstream-difference scheme. Furthermore, for laminar and turbulent flow calculations, improved results are obtained when compared with the performances of the other schemes. The advantage of the UPSTREAM-difference scheme is that all the influence coefficients are always positive and thus the coefficient matrices are suitable for iterative solution procedures. Finally, the stability and convergence characteristics are similar to those of the upwind-difference scheme, eg converged solutions are guaranteed. What cannot be guaranteed, however, is the conservatism of the scheme and it is recommended that future work should be directed towards improving that disadvantage. |Item Type:||Thesis (PhD)| |Uncontrolled Keywords:||fluid flow problems, mathematics, fluid mechanics, CFD,| |Subjects:||Q Science > QA Mathematics| Q Science > QC Physics |School / Department / Research Groups:||School of Computing & Mathematical Sciences| School of Computing & Mathematical Sciences > Centre for Numerical Modelling & Process Analysis School of Computing & Mathematical Sciences > Department of Mathematical Sciences |Last Modified:||27 Sep 2012 14:21| Actions (login required)
<urn:uuid:5dfa6377-7ed1-451a-a43e-bcdae0c3ea40>
2013-05-26T02:36:19Z
CC-MAIN-2013-20
[ [ -0.020751953125, 0.01129150390625, 0.00555419921875, 0.00150299072265625, 0.0654296875, -0.0419921875, -0.0004100799560546875, 0.10498046875, -0.018798828125, -0.0133056640625, 0.06591796875, 0.01116943359375, -0.053955078125, 0.0634765625, 0.02368164062...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885524
816
http://gala.gre.ac.uk/8697/
0.432077
Absegami High School Boys' Soccer Team Advances to South Jersey Final The Braves defeated Cherry Hill East, 2-1, in overtime. Sean Milligan had both the game-tying and game-winning scores to lead the Absegami High School boys' soccer team into the South Jersey Group IV final. The top-seeded Braves advanced to the championship game with a 2-1 overtime win over No. 13 Cherry Hill East in the semifinals of the NJSIAA South Jersey Group IV playoffs on Thursday, Nov. 15 in Galloway Township. Zach Steinbeck put the Cougars up, 1-0, with a goal in the first half, but Milligan tied things up with a score on a penalty kick in the second half to force overtime. Milligan scored the overtime goal for the Braves to help them advance to the final. The Braves will face No. 2 Washington Township in the final on Monday afternoon, Nov. 19. Washington Township needed overtime to defeat Toms River North, 3-2, on Thursday. The Braves improved to 19-2-1 on the season. Absegami advanced to the semifinal round with back-to-back shutout wins in the playoffs. On Nov. 6, the Braves defeated Southern Regional, 2-0. On Nov. 12, Absegami shut out Cherokee, 1-0. Cherry Hill East pulled off two upsets to advance to the semifinals. On Nov. 6, the Cougars knocked off fourth-seeded Lenape, 2-0. On Nov. 9, Cherry Hill East scored a 2-1 win over No. 5 Eastern Regional.
<urn:uuid:86ed37a6-7123-4ef8-8d23-4a3adb005e3f>
2013-05-26T02:33:31Z
CC-MAIN-2013-20
[ [ 0.06232590600848198, 0.008313022553920746, -0.009183496236801147, -0.0008215093985199928, 0.04700557142496109, -0.02646239474415779, -0.0044176531955599785, 0.06685236841440201, 0.009488161653280258, -0.029944289475679398, 0.0428272970020771, 0.03568941354751587, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.90067
348
http://galloway.patch.com/articles/absegami-vs-cherry-hill-east-soccer-playoff
0.218577
Federally Chartered Corporation: Financial Statement Audit Report for the Legion of Valor of the United States of America, Incorporated, for Fiscal Year 2003 GAO-06-683R, May 12, 2006 - Accessible Text: GAO reviewed the audit reports covering the financial statements of the Legion of Valor of the United States of America, for the fiscal year ended April 30, 2003. GAO's review disclosed no reportable instances of noncompliance with the financial reporting requirements of the law. The audit reports included the auditor's opinion that the financial statements of the corporation were presented fairly in accordance with generally accepted accounting principles.
<urn:uuid:b64c2ed5-2863-4877-9d7b-49e274b44f8c>
2013-05-26T02:48:23Z
CC-MAIN-2013-20
[ [ -0.015843531116843224, 0.037368882447481155, 0.003660402027890086, 0.0030594405252486467, 0.07298950850963593, -0.047421328723430634, -0.008795891888439655, 0.0633741244673729, -0.05091783031821251, -0.0378059446811676, 0.08347902446985245, 0.016062062233686447, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.912274
132
http://gao.gov/products/GAO-06-683R
0.33196
Wednesday, 21 March 2012 An Interview with D. L. Moody Concerning Bible Study I've been reading D. L. Moody's book 'The pleasure & profit in Bible study' and figured it'd be fun to fictionally interview him in regards to the subject and draw his answers from the book. D.L. (can i call you that?) how would you recommend Christians to read their Bibles? "Read the Bible, my friends, as if you were seeking something of value. it is a good deal better to take a single chapter, and spend a month on it, than to read the Bible at random for a month." To those who maybe find themselves struggling in the Christian life, or maybe in what you describe as a 'backslidden' state, what would you say? "The more you love the Scriptures, the firmer will be your faith. There is little back-sliding when people love the Scriptures. If you come into closer contact with the Word, you will gain something that will last; because the Word of God is going to endure." What would you say to those Christians who say they can't find energy or time to study the Bible? "If I could say something that would induce Christians to have a deeper love for the Word of God, I should feel this to be the most important service that could be rendered to them. . . . . .If you will only arouse yourself to the study of it, and ask God's assistance, He will assuredly help you." You're an old dead dude, no offence, but what would you say to young Christians in the year 2012? "If young converts want to be used of God, they must feed on His Word . . . . . . If we feed on the word, it will be so easy to speak to others; and not only that, but we will grow in grace all the while, and others will take notice of our walk and conversation. so few grow because so few study. I would advise all young converts to keep as much as they can in the company of more experienced Christians. . . . . . Study the Bible carefully and prayerfully; ask of others what this passage, and what that passage means; and when you have become practically acquainted with the great truths it contains, you will have less to fear from the world, the flesh, and the devil. You will not be disappointed in your Christian life." I've a young family, so what advice would you give to fathers in family devotions? "now, when you read the Bible at family worship or for private devotions, look for suitable passages. what would you think of a minister who went into the pulpit on Sunday and opened the Bible at hazard and commenced to read? yet this is what most men do at family prayers. They might as well go into a drug store and swallow the first medicine their eye happens to see. Children would take more interest in family prayers if the father would take time to search for some passage to suit the special need." There's probably enough there for us to really think about but as we finish this post have you any other thoughts you would like to share with this generation? "People are constantly saying: We want something new - some new doctrine, some new idea. Depend upon it, if you get tired of the Word of God, and it becomes wearisome to you, you are not of communion with Him.
<urn:uuid:c17a278f-df11-4809-a4f9-74f2d0cb1d27>
2013-05-26T02:41:29Z
CC-MAIN-2013-20
[ [ -0.0284423828125, 0.0166015625, -0.020263671875, -0.02294921875, 0.09033203125, -0.078125, 0.005584716796875, 0.0751953125, -0.0234375, -0.04638671875, 0.0576171875, 0.01507568359375, -0.0205078125, 0.0140380859375, 0.03955078125, -0.004852294921875,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975549
712
http://garyboalnireland.blogspot.com/2012/03/interview-with-d-l-moody-concerning.html
0.264388
Hasbro is an American toy company. It is one of the largest toy makers in the world, second only to the toy giant Mattel. Their corporate headquarters is located in Pawtucket, Rhode Island, United States. Hasbro is the maker of G.I. Joe which became responsible for the term "action figure". They are also known for Monopoly, Scrabble, Trivial Pursuit, Mr. Potato Head, Transformers, My Little Pony and many other toys.
<urn:uuid:8d6f15af-4238-4d08-9927-1fe1ebbce5b4>
2013-05-26T03:10:02Z
CC-MAIN-2013-20
[ [ -0.033877212554216385, 0.0034914270509034395, 0.013550885021686554, -0.01749170385301113, 0.0824115052819252, -0.06886062026023865, 0.005116150248795748, 0.0824115052819252, -0.04231194779276848, -0.10121681541204453, 0.09347344934940338, 0.013274336233735085, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97428
100
http://gijoe.wikia.com/wiki/Hasbro
0.159611
I've been writing a shapefile parsing library, and have encountered a couple of design decisions in the specification that I don't immediately understand. I'm hoping there's a wizened old ESRI developer around here who can tell me why these things are the way they are. The main record file (.shp) is of mixed endianness. Specifically, parts of the header features big endian byte ordering, but the records are all little endian. I typically work at a higher level than bytes and bits, but everything I've so far read about endianness marks this as unusual. Why isn't the file specified to be of uniform endianness? The "File Length" field, as well as other length and position fields, are recorded in 16-bit words, instead of the more standard (from my limited perspective) 8 bit positioning. How did this decision get reached? I posted a similar question on Stack Overflow, but didn't get any response. If this seems too off topic to other people, I could support closing it.
<urn:uuid:14276744-9d23-4d2f-a89a-14e94e24ed23>
2013-05-26T02:49:43Z
CC-MAIN-2013-20
[ [ -0.06430785357952118, 0.022339876741170883, 0.01949896663427353, 0.011234504170715809, 0.0030184658244252205, -0.05216941982507706, 0.019886363297700882, 0.07592975348234177, -0.01394628081470728, -0.04390496015548706, 0.02079029008746147, 0.04932851344347, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971107
217
http://gis.stackexchange.com/questions/18969/oddities-in-the-shapefile-technical-specification/18974
0.610147
Here's a little story that caught my eye. A British male escort told cops that Boy George put him in bondage against his will during what he thought was going to be a vanilla "date". Cops are investigating whether BG could be charged with kidnapping and assault for chaining the esort to a wall and threatening to use some SM toys on him. The last time I paid any attention to Boy George was in the 1980s, when his hit song kept interfering with my radio listening. What was it - Karma Chameleon or something? (Which, for the first 17000 times they played it, sounded like "come on come on come on comedian" to me.) And to think, here it is, 20 years later, and I learns he's a sadomasochist too. What a let-down. I always thought SMers were more musically talented than that.
<urn:uuid:68b69aec-1bc3-4755-954d-1892d84ace3e>
2013-05-26T03:09:48Z
CC-MAIN-2013-20
[ [ -0.02864583395421505, 0.006472120061516762, -0.005016850307583809, 0.011106004938483238, 0.09252450615167618, -0.0677083358168602, -0.013939950615167618, 0.07444852590560913, -0.03125, -0.03890931233763695, 0.009459252469241619, 0.020220588892698288, 0.004978553...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.98739
181
http://gloriabrame.typepad.com/inside_the_mind_of_gloria/2007/04/index.html
0.283895
Updated on Feb.7, 2013Bangalafumenga (aka Banga, pronounced BAHN-ga) started out as a Rio de Janeiro Carnival bloco in 1998. Banga parades in the streets of Rio's South Side soon became popular and ended with huge street parties. Motivated by the success of the Carnival parades, Banga's core members decided to play year round in shows that preserve the upbeat and involving spirit of Carnival. Today, the Bangalafumenga band is a frequent presence at Fundição Progresso in Lapa, in bars and other venues. The band played on the stage in front of Rua Santa Clara during New Year's Eve 2010 in Copacabana. The name "bangalafumenga" is an old slang for a "nobody". The term also referred to the houses in early 20th-century Rio de Janeiro where batucadas, or samba get-togethers, were held. At the time, samba was considered a low kind of music and black sambistas were often abused by the police. Rodrigo Maranhão, the band's main songwriter, has had several of his works recorded by great Brazilian singers, such as Maria Rita. She recorded Maranhão's song "Caminhos das Águas", which won him the Latin Grammy for best Brazilian song in 2006. Besides songs by Maranhão and other Bangalafumenga members, the band plays hits by great Brazilian songwriters such as Gilberto Gil and Alceu Valença, as well as songs by new talents. Bangalafumenga is doing a great formative job at Parada da Lapa, where, in a partnership with Fundição Progresso, the group offers workshops on many Brazilian rhythms. Samba, coco, ciranda and maracatu are explored under the guidance of Banga's directors (Rodrigo Maranhão, Thiago Di Sabbato, André Moreno and Dudu Fuentes). Workshop participants later join the group in parades, which makes for a high level of musical quality. The bloco has about 70 performers. Bangalafumenga Bloco in Rio de Janeiro Carnival: The Banga bloco is just as eclectic as the band. Their parades feature plenty of Carnival music, with some other styles - funk, pop, rock - thrown in, always with a strong percussion beat. Bangalafumenga Carnival 2013: In 2013, the bloco is celebrating its 15th anniversary. Coming up: Carnival Parade Sunday, Feb.10, 2013 at 7 a.m. Where: Aterro do Flamengo. Free Show on Carnival Monday, Feb.11, at 9:30 p.m. Where: In front of the Lapa Arches (shows with other artists start at 6 p.m.) Keep up with updates on the
<urn:uuid:e6870b12-c249-4dba-8d96-b628ffab5482>
2013-05-26T02:41:54Z
CC-MAIN-2013-20
[ [ -0.0213623046875, -0.00439453125, -0.017822265625, 0.0169677734375, 0.0830078125, -0.031005859375, 0.00022029876708984375, 0.0517578125, -0.06298828125, -0.099609375, 0.05908203125, 0.01287841796875, 0.053466796875, 0.0009918212890625, 0.037353515625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95262
629
http://gobrazil.about.com/od/riocarnivalblocos/ss/bangalafumenga.htm
0.576879
If you like Google Suggest, the feature that auto-completes your queries based on Google's aggregated data, you can now add it to the standard search pages by joining the keyword suggestions experiment, one of the five experiments from the search section of Google Labs. As you type into the search box, Google Suggest guesses what you're typing and offers suggestions in real time. This is similar to Google's "Did you mean?" feature that offers alternative spellings for your query after you search, except that it works in real time. For example, if you type "bass," Google Suggest might offer a list of refinements that include "bass fishing" or "bass guitar." Similarly, if you type in only part of a word, like "prog," Google Suggest might offer you refinements like "programming," "programming languages," "progesterone," or "progressive." You can choose one by scrolling up or down the list with the arrow keys or mouse. Google Suggest is also available by adding &complete=1 to a Google search URL (e.g.: [Google]), in Firefox's search box and in Google Toolbar. Some Asian versions of Google show keyword suggestions by default: China, Korea, India. This year both Ask.com and Yahoo introduced these suggestions as a built-in component of the search experience, hoping to guide users when typing a query. Yahoo's search assistant shows up as an extension of the search box if you type some letters from a word and then stop for a couple of seconds. Even if you can disable it, many people found it annoying and unnecessary. "Get rid of any of the so-called assistants. They take up space on the screen, slow down processes and insult everyone's [intelligence]." is just an example of negative feedback. Sometimes search suggestions save you time and help you enter difficult words like deoxyribonucleic, in other cases the suggested query contains the answer to your question. But are they useful and good enough to bring them to Google's search pages?
<urn:uuid:1ab17bcc-54a7-480a-be6e-cba68cecf996>
2013-05-26T02:34:17Z
CC-MAIN-2013-20
[ [ -0.009630503132939339, 0.0069116875529289246, 0.007828878238797188, -0.004979035817086697, 0.044811319559812546, -0.05372117459774017, -0.0017852463060989976, 0.0901467502117157, -0.03747379407286644, 0.009106393903493881, 0.07914046198129654, 0.05503144487738609, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928379
419
http://googlesystem.blogspot.com/2007/11/add-keyword-suggestions-to-googles.html?showComment=1196526180000
0.454878
- The Academy At a very young age, Helio Gracie learned traditional Japanese Jiu-Jitsu techniques from his older brother, Carlos. In the late 1920s, he began to modify these techniques to accommodate his frail physique with the objective of developing a system that would enable him to defend himself against larger opponents. After years of refinement, he proved his art's effectiveness by routinely defeating larger and stronger opponents, some of whom outweighed him by as much as 100 pounds. As a result, Helio's techniques quickly became the new expression of Jiu-Jitsu in Brazil and set the stage for a worldwide revolution in martial arts. - Training Programs Although Gracie or Brazilian Jiu-Jitsu is the most effective martial art on the planet, it is a relatively young martial art. Realizing that the key to global dissemination of pure Gracie Jiu-Jitsu was the development of a formalized curriculum, the Gracie Academy dedicated several years to organizing all the techniques in the most logical sequence based on their complexity and usefulness in combat. Furthermore, we conduct all group classes with the utmost concern for safety, and we demand that all students treat each other respectfully regardless of skill level, gender, race, nationality, or creed. At the Gracie Academy we don't teach people how to fight. We give people confidence so they don't need to fight. Gracie Combatives is the official beginner program of the Gracie Jiu-Jitsu Academy. In this program, students learn the 36 most important techniques in a fun, safe, and cooperative training environment. Beyond blue belt, Gracie Jiu-Jitsu consists of hundreds of advanced techniques, all of which we have organized into a clearly defined, systematic curriculum called the Master Cycle. Women Empowered is a comprehensive self-defense program for women based on proven verbal, physical, and psychological defense strategies tested and proven effective over nearly two decades. GST (Gracie Survival Tactics) is the ultimate solution for any military or law enforcement organization. We offer all Gracie Academy programs in group and private lessons. Review the benefits of each before deciding which is right for you. We will guide you through the complete Gracie Jiu-Jitsu curriculum, from Gracie Combatives to the Master Cycle, in the exact order that we use in private classes at the Gracie Academy. - Certified Training Centers - Certified Belt Holders - Gracie News - Gracie Store Gracie Jiu-Jitsu is a way of life. The principles of discipline, patience, efficiency, and control are the keys to success on and off the mat. Whether your a dedicated practitioner of the art or just a fan of the Gracie way, the casual wear, training gear, and accessories in the Gracie Store will remind you to keep it real at all times. With all Gracie Store purchases, your satisfaction is guaranteed. If you're not 100% happy with your purchase, simply send it back and we'll replace it or refund your money (as long as you promise not to choke us out!). Select a category below to begin browsing, and then feel free to order online or give us a call at 1-877-472-2430 (Monday - Friday, 10am to 6pm PST) and we will gladly assist you over the phone. If you have a question about the status of your order feel free to shoot us an e-mail at firstname.lastname@example.org.
<urn:uuid:2df1a7b3-b61a-42f6-b65b-faa2281e0ed3>
2013-05-26T02:55:33Z
CC-MAIN-2013-20
[ [ -0.03271484375, 0.00860595703125, 0.00689697265625, 0.02001953125, 0.05322265625, -0.052978515625, -0.0027923583984375, 0.1064453125, -0.025146484375, -0.02685546875, 0.06103515625, 0.036376953125, -0.02587890625, 0.01483154296875, 0.03515625, 0.0061...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946604
709
http://gracieacademy.com/jp/news/new-sparring-video-ryron-vs.-brown-belt.asp
0.345315
The aim of the European Community (European Union) Procurement Directive to achieve open, fair and taxpayer-friendly procedures in the internal market can collide with governments’ concerns for secrecy, special security measures or other essential state interests. We look at how the Procurement Directive caters for governments’ security concerns. This leads us to the treaty rules governing the internal market and the scope for derogations. Finally, we point to proposed legislation concerning defence and security procurement. Procurement Directive Article 14 Article 14 of the Procurement Directive 2004/18/EC sets out exceptions to the application of the Directive on grounds of secrecy, security and other essential interests of an EU member state: Secret contracts and contracts requiring special security measures This Directive shall not apply to public contracts when they are declared to be secret, when their performance must be accompanied by special security measures in accordance with the laws, regulations or administrative provisions in force in the Member State concerned, or when the protection of the essential interests of that Member State so requires. Three grounds for exceptions Article 14 set out three grounds for exempting public contracts from the scope of the Directive: 1) Declared secret 2) Special security measures in accordance with the laws, regulations or administrative provisions in force in the member state 3) Protection of essential interests of the member state As always, exceptions are interpreted narrowly. If challenged, the exception has to be justified. Given the grounds above, we naturally think about military procurement, but we are reminded of special rules pertaining to procurement of weapons and the like. In an earlier post, we looked at the application of the Procurement Directive to defence procurement, but subject to the exceptions made under Article 296 of the Treaty establishing the European Community (TEC). We also discussed ongoing efforts to create a legal regime for defence procurement in the internal market. As a reminder, here is the basic provision of the Procurement Directive: This Directive shall apply to public contracts awarded by contracting authorities in the field of defence, subject to Article 296 of the Treaty. More than defence procurement We saw that the Procurement Directive applies to defence procurement, unless a justified exception is made under Article 296 TEC. The existence of Article 10 leads us to conclude that Article 14 of the Procurement Directive 2004/18/EC is meant to have reasons of its own. Cf. ECJ C-252/01 Commission v. Belgium. Public security exemption explained Recital 6 of the Procurement Directive mentions public security among grounds for exceptions to the application of the Directive, if the measures are necessary and taken in conformity with the treaty: (6) Nothing in this Directive should prevent the imposition or enforcement of measures necessary to protect public policy, public morality, public security, health, human and animal life or the preservation of plant life, in particular with a view to sustainable development, provided that these measures are in conformity with the Treaty. State security or secrecy Recital 22 of the Procurement Directive explains the intention to exempt procurement procedures from the application of the Directive on grounds relating to state security or secrecy: (22) Provision should be made for cases in which it is possible to refrain from applying the measures for coordinating procedures on grounds relating to State security or secrecy, or because specific rules on the awarding of contracts which derive from international agreements, relating to the stationing of troops, or which are specific to international organisations are applicable. Commission Guide: Derogations The Commission’s Guide to the Community Rules on public supply contracts presented the secrecy and security exceptions according to the old Directive 93/36/EEC and added its interpretation of the scope of these exceptions (page 20). Note that the TEC Articles mentioned have been renumbered: Lastly, the Directive excludes public supply contracts from its scope: · where the supplies are declared secret; or · where their performance must be accompanied by special security measures in accordance with the provisions laid down by law, regulation or administrative action in force in the Member State concerned; or · where the protection of the basic interests of that State’s security so requires. These last three exclusions from the Directive give concrete expression, in the public procurement field, to the powers already reserved for the Member States by Article 36 of the EC Treaty, which allows them in certain cases to derogate from the prohibitions on import and export restrictions enshrined in Articles 30 and 34 respectively. These three exclusions from the Directive must be interpreted as strictly and according to the same criteria as exceptions under Article 36. Free movement of goods and derogations In the case of supply contracts, we have now reconnected with the treaty framework for the free movement of goods. The current Articles 28 and 29 set out the basic prohibitions against restrictions on imports/exports and all measures having equivalent effect: Article 28 TEC (ex Article 30) Quantitative restrictions on imports and all measures having equivalent effect shall be prohibited between Member States. Article 29 TEC (ex Article 34) Quantitative restrictions on exports, and all measures having equivalent effect, shall be prohibited between Member States. The current Article 30 TEC lays down the grounds for derogations and their limits. These restrictions shall not constitute a means of arbitrary discrimination or a disguised restriction on trade between member states. Article 30 as published in the latest consolidated version of the treaties, OJEU 29.12.2006 C321 E/53: Article 30 TEC (ex Article 36) The provisions of Articles 28 and 29 shall not preclude prohibitions or restrictions on imports, exports or goods in transit justified on grounds of public morality, public policy or public security; the protection of health and life of humans, animals or plants; the protection of national treasures possessing artistic, historic or archaeological value; or the protection of industrial and commercial property. Such prohibitions or restrictions shall not, however, constitute a means of arbitrary discrimination or a disguised restriction on trade between Member States. Since secrecy, security and essential state interests apply to all types of contracts covered by the Procurement Directive, we may infer that parallel reasoning applies to derogations from all four internal market freedoms. De lege ferenda For more information on and discussion about security issues related to procurement as well as proposed legislation, you can turn to the Commission’s Defence package, which includes both military and other security issues. The Communication and the preparatory acts are available here: The main three documents are: The Communication: A Strategy for a Stronger and more Competitive European Defence Industry The proposed Directive on intra-EU transfers of Defence Products The proposed Directive on Defence Procurement Some comments on the proposals are included in the earlier blog post on defence procurement.
<urn:uuid:0824d112-72f9-48fa-a3bd-0a5997c27149>
2013-05-26T02:42:22Z
CC-MAIN-2013-20
[ [ -0.029541015625, 0.0390625, 0.002838134765625, -0.003204345703125, 0.099609375, -0.04296875, -0.029296875, 0.103515625, -0.02783203125, 0.029052734375, 0.08349609375, 0.017578125, -0.12353515625, 0.0302734375, 0.037841796875, 0.0013885498046875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918251
1,388
http://grahnlaw.blogspot.com/2009/01/eu-procurement-directive-secret.html
0.324593
June 24, 2012 I was honored by the request to join the board last year for this amazing children's home in Guatemala. Because the adoption laws in Guatemala have changed, this once orphanage has needed to turn into a permanent home for the 30 children that did not get adopted before the law was passed. Many private orphanages closed their doors when the law was enforced forcing the children they were taking care of to go to state facilities. But Nancy Bailey and the rest of the board members did and are doing, everything they can so that these children do not end up in a state facility. After hearing this story and the new need of raising funds to nurture, love, support, and take care of these children as they grow into young adults, I decided to join the team. The home is extraordinary, Nancy is extraordinary, the kids are extraordinary, and all the supporters are as well! Thank you for caring enough to read about us - we very much appreciate it! Please let us know if you would like to support us in any other way as well. Even $20/ month can make a huge impact on the home and the children's lives. Thank you!!! Will you volunteer or donate to this organization beyond what is required of board members? How much of an impact do you think this organization has? Will you tell others about this organization? When was your last experience with this nonprofit? MY ROLE:Board Member
<urn:uuid:3df0da56-c56b-4f8b-aae1-c7dbf20c7c93>
2013-05-26T02:43:33Z
CC-MAIN-2013-20
[ [ -0.03447580710053444, 0.008770161308348179, -0.0056955646723508835, -0.0038558468222618103, 0.07217741757631302, -0.03951612859964371, 0.010987902991473675, 0.038306452333927155, -0.024294354021549225, -0.02167338691651821, 0.052419353276491165, 0.012096773833036423...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.979604
291
http://greatnonprofits.org/users/profile/158426
0.174933
there were no injuries in either of two incidents that flared up on Saturday. One was in the cafeteria. The other was in the dorm rooms.I'm glad to see the local news in Edinburg is learning to ask the right questions: Would these incidents have arisen if understaffing wasn't chronic? To me, the use of pepper spray during a "riot" engenders little concern. Of greater import is the agency's failure to adequately staff large facilities. Now, an internal investigation is underway along with a state review by the Office of the Inspector General into the actions by TYC staffers. Representative [Aaron] Pena says what transpired over the weekend may have been one of those "rare situations" where the pepper spray was warranted. But Action 4 News asked this: "Is there a difference between a rare situation and perhaps a lack of staff and lack of training?" Representative Pena answered, "That's what we have to get to the bottom of." What acting Executive Director Dimitria Pope and Co. attempted to do last year in defiance of the courts with their relaxed use of force policy was use pepper spray as a means of control to compensate for a chronic lack of experienced, qualified staff. While it's one thing to use OC spray in the "rare" event of a "riot," it's quite another for TYC facilities to be so understaffed that "riots" and use of pepper spray become routine.
<urn:uuid:cb1cc91e-8e9f-4f6f-958c-257a84d06b73>
2013-05-26T03:09:09Z
CC-MAIN-2013-20
[ [ -0.02530674822628498, 0.030674846842885017, -0.005655674729496241, 0.01926763728260994, 0.09317484498023987, -0.05368098244071007, -0.0036905675660818815, 0.06403373926877975, -0.02569018490612507, -0.03968558460474014, 0.05138036981225014, 0.05406441539525986, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980847
298
http://gritsforbreakfast.blogspot.com/2008/01/was-tycs-evins-unit-understaffed-when.html?showComment=1202011860000
0.384208
This is the map of the Upper Catacombs beneath the surface ruins of the monastery. It's not part of the "true" dungeon levels, but I really like it. Combined with the ruins themselves, the Lower Catacombs, and the Hermit Caves, there's plenty to do at Urheim before descending into the maw of Chaos itself. I'm really pleased by this set-up, since lots of lateral movement and meaningful choices about how best to proceed are an important part of designing a good megadungeon. Thanks, as ever, to the talented Fr. David for his cartographic work.
<urn:uuid:60b11b35-db18-4e3a-be1f-6a2b3e8ebf4f>
2013-05-26T03:09:09Z
CC-MAIN-2013-20
[ [ -0.01488597970455885, -0.015625, -0.00966005027294159, 0.03167229890823364, 0.06587837636470795, -0.021220440044999123, 0.005120354704558849, 0.06461148709058762, -0.016364019364118576, -0.05869932472705841, 0.011665962636470795, 0.042229730635881424, -0.0458192...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96854
127
http://grognardia.blogspot.com/2009/03/another-awesome-map.html?showComment=1238175960000
0.269731
Serial killers have become such a part of the collective consciousness that they're a cultural institution, aren't they? Compared to Hannibal Lecter, the serial killer wasn't quite as sensational in the 1970s. I can think of earlier films where serial murderers were treated as characters, but the 70s saw a different approach: an anonymous serial killer who suddenly appears like the shark from "Jaws". Although there wasn't a full blown slasher craze yet in 1976, there were a few prototypical examples of what would eventually morph into the 80s splatter genre. "The Town That Dreaded Sundown" carries with it a bleak, doomy tone that was a few years away from "Friday the 13th", yet foreshadowed the grisly scare tactics of that series. In case this is the first time you ever heard of this film, it's based on a real series of murders that occurred in Texarkana in the 1940s, where an unidentified assailant struck several times over the course of four months, claiming eight victims, five of whom died. The film loosely dramatizes the events, although it pads the space around the attack scenes with the attempts of law enforcement characters to stop the murderer. If you're at all familiar with the real case, then you already know the killer will not be caught, and there isn't much more to it than that. There's an amateurishness that's hard to deny, and the director makes a grave error in heaping on too much comic relief in the form of bumbling police officers. It's that same low budget quality that helps the film muster up what little dread that it does. The killer is menacing, wearing a white sack over his head with the eyes cut out. The murder scenes are mostly frightening, except for one sequence where a female character is stalked through a wooded area and can't quit screaming long enough for the killer to lose her trail. Her boyfriend, who has been clubbed but not killed, revives and tries to get away, but she keeps screaming at him "RUN! RUN!!", which conveniently alerts the killer to the fact that a) he's still alive, and b) he's escaping. He dies, and so does she...after the killer straps a knife to her trombone (don't ask) "plays" her to death by stabbing her in the back. But the most shocking moment of the film for you is probably not going to be when you realize the makers of "Friday the 13th Part 2" dressed Jason to look exactly like the killer in this movie. It's not going to be the ending, when you realize the murderer gets away with his crimes and could be OUT THERE, even today! No, the most shocking moment of "The Town That Dreaded Sundown" is going to be when you see the killer attack none other than Dawn Wells, aka Mary Ann from "Gilligan's Island". Not only does he shoot her directly in the face, he chases her through a cornfield with a pick axe. Poor Mary Ann!!! (She lives, but at what cost, I ask?) Otherwise, I'll be honest with you, this movie is really dull. The attack scenes deliver some chills, but the film has the atmosphere of a 1970s TV movie (despite the fact that it's a period piece set in 1946). The bitter waters through which the viewer must wade to reach the sweet will probably not seem worth it to you, unless you're a true crime buff or a total horror geek like me.
<urn:uuid:a85046a8-1cd9-4567-94dc-8e286a0eb3d9>
2013-05-26T03:03:02Z
CC-MAIN-2013-20
[ [ -0.00946044921875, -0.01080322265625, 0.004547119140625, 0.01519775390625, 0.07861328125, -0.05126953125, -0.003692626953125, 0.12109375, -0.036865234375, -0.042724609375, 0.049560546875, 0.0162353515625, -0.0087890625, 0.01495361328125, 0.052490234375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.976191
728
http://groovydoom.blogspot.com/2012/01/town-that-dreaded-sundown-1976.html
0.358906
John Marsden has sent a message about updates to the Lancashire BMD website. New data has been added at Lancashire BMD as follows: 8,396 births for Blackburn RD comprising: Blackburn East (1944-1950) 5,472 deaths for Preston RD comprising: Mellor (1837-1964) 7,251 deaths for West Lancashire (Ormskirk) RD comprising: Aughton (1880-1950)
<urn:uuid:a5dc465e-1e0f-4213-95bd-143609c28af9>
2013-05-26T02:49:44Z
CC-MAIN-2013-20
[ [ 0.04805424436926842, 0.0397995300590992, -0.008033608086407185, 0.004753832705318928, 0.08490566164255142, -0.06751178950071335, -0.05188679322600365, 0.07606132328510284, 0.0099498825147748, -0.04599056765437126, 0.13266509771347046, 0.021079009398818016, -0.04...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.849404
97
http://growyourownfamilytree.wordpress.com/2009/04/21/mid-april-lancashire-bmd-updates/?like=1&source=post_flair&_wpnonce=bc4cf9c758
0.757694
§ Mr. John Marshall To ask the Secretary of State for Education and Employment what percentage of students applied for student loans in each academic year since the inception of the student loan scheme; how many former students have started to repay their loans; and how many370W former students have refused to repay any of their loan although able to do so. § Mr. Rowlands To ask the Secretary of State for Education and Employment (1) what is the total amount of loans outstanding under the student loan scheme; and how much has been repaid to date; 371W (2) how many students have now received loans under the students loan scheme.
<urn:uuid:f9d3f774-d4f3-451f-8c45-11137f18a990>
2013-05-26T02:35:22Z
CC-MAIN-2013-20
[ [ -0.032801419496536255, 0.0416666679084301, -0.022828014567494392, -0.0014475288335233927, 0.08244680613279343, -0.054299645125865936, -0.015846630558371544, 0.06382978707551956, -0.045656029134988785, -0.03191489353775978, 0.07092198729515076, -0.011414007283747196,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.987604
132
http://hansard.millbanksystems.com/written_answers/1995/oct/19/student-loans
0.242617
You did the very best job training her! She is wonderful, having met and exceeded our very specific expectations. Thank you so much for picking the right dog for us. She is "family directed," just as I had asked. I have started walking with her in the park leaving her 5' leash drag with out me holding it. She never goes more than 9' away and comes instantly when called, even when provoked by rabbits, squirrels, ect. Because of what happened with our last dog, I'm real nervous about letting her run free even though she free heels perfectly. If you ever have some fence-sitter who is apprehensive about purchasing long distance, I would be happy to write a testimonial. Hope all is well.
<urn:uuid:424730fd-bbaf-42a2-af8b-a81a88c8f7ef>
2013-05-26T02:48:40Z
CC-MAIN-2013-20
[ [ -0.034356724470853806, 0.03618421033024788, 0.027412280440330505, 0.039290934801101685, 0.02997075952589512, -0.07565789669752121, 0.02055921033024788, 0.1176900565624237, -0.024853801354765892, -0.10087719559669495, 0.027595030143857002, 0.01955409348011017, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982639
153
http://harrisonk9.com/blog/index.cfm/2012/5/22/She-Is-Wonderful
0.194896
As the Crossroads of the Pacific, Hawaii played a vital role in the development of both commercial and military air travel. The first flight in Hawaii occurred on December 31, 1910. It captured the imagination and hearts of residents who dreamed of traveling by air between islands and the Mainland, Asia and Australia.On this site you'll find the incredible story of the first trans-Pacific flight by Navy Commander John Rodgers in 1925. Inter-Island Airways made its first commercial interisland flight in 1929, and Pan American Airways entered the trans-Pacific market in 1935. You'll find hundreds of historical documents and publications, and the complete book Above the Pacific written by the late William J. Horvat and originally published in 1966. This website features more than 4,000 photos.
<urn:uuid:0671627c-7b89-41ad-8a60-92918436acd4>
2013-05-26T02:56:31Z
CC-MAIN-2013-20
[ [ -0.013241525739431381, 0.04802259802818298, -0.016066383570432663, 0.006223517004400492, 0.050494350492954254, -0.06814971566200256, -0.011829095892608166, 0.09887005388736725, -0.03742937743663788, -0.014300847426056862, 0.09816384315490723, 0.03301553800702095, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933245
157
http://hawaii.gov/hdh/lih/newsroom/historical-information
0.602034
Did Consumer Behavior Tracking Come of Age on September 11? September 11 was no "tipping point" for acceleration in the loss of privacy. That's the conclusion to be drawn from responses to this month's column. Rather the loss of privacy is a natural product of the information age and has been under way for some time. As Michael Gorman observed, "Chat rooms and corporate message boards have had a much more profound change on the privacy of business organizations than the tragic events of 9/11." There is almost a tone of resignation in the responses. For example, Robin Chacko suggests that "We chose the information age and with it comes a price: privacy. If monitoring is a good way to provide security, so be it." Have we become so accustomed, however gradually, to the idea of oversight that surveillance in the name of transparency is a mere increment in a long-established trend? —Professor James Heskett Another line of thought suggests that the questions concerning trends in the loss of privacy may be somewhat irrelevant anyway. Rick Kennedy asserted, for example, that "'Privacy' and, for that matter, 'security' are and have always been illusions... 9/11 did (however) provide a 'tipping point' for a greater awareness of what the concept of privacy entails, like Plato's prisoners discovering that they had been observing and talking about shadows as opposed to the objects themselves." The tone of these responses raises several questions. Have we become so accustomed, however gradually, to the idea of oversight that surveillance in the name of transparency is a mere increment in a long-established trend? Is this in part a function of the reminders of the benefits of transparency and oversight in the wake of the collapse of an Enron? And has this state of affairs opened the doors a bit wider for the implementation of systems designed to enable our behaviors as consumers to be tracked even more fully? What do you think? In the past several years, significant fears have been expressed concerning the growing loss of personal privacy, especially for users of the Internet and credit or debit cards. The rapid accumulation of information in data warehouses, as reflected in the value of EMC stock (at least up to a year ago), was testimony to this, regardless of whether very many organizations had figured out how to use the data effectively either for or against us as consumers. Then came September 11 and the perceived need for increased surveillance of possible terrorists. According to a survey by Harris Interactive the very next week, 86% of Americans responding advocated the use of facial-recognition technology, 81% supported the closer monitoring of banking and credit card transactions, and 68% would agree to the adoption of a national identification system for all U.S. citizens. Clearly, the behavior of U.S. citizens and those circulating among them could be tracked by this technology much more effectively than by anything in existence today. And it might happen someday, regardless of vows to concentrate the technologies on suspected terrorists. But that's not the point here. The point (and questions it raises): Was September 11 a "tipping point" in our fear of loss of privacy? That is, will we become so used to surveillance in the name of tracking terrorists that we begin to take it for granted as consumers? In fact, will we one day look back on September 11 as a point in time when data warehousers were able to take a significant step forward in fully utilizing the treasure trove of personal data they possess? Will the consequences net out positively or negatively in our personal and business lives? What do you think?
<urn:uuid:37d194b0-0715-4431-b424-0a6cfa88b382>
2013-05-26T03:02:12Z
CC-MAIN-2013-20
[ [ -0.0189208984375, 0.01544189453125, 0.020263671875, -0.0023956298828125, 0.1025390625, -0.062255859375, -0.004974365234375, 0.1298828125, -0.0260009765625, -0.032958984375, 0.03369140625, 0.0120849609375, -0.138671875, 0.0184326171875, 0.051025390625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958981
730
http://hbswk.hbs.edu/item/2700.html
0.19457
Obesity is a condition in which you have a high body mass index (BMI), or too much body fat for your height. Obesity is the not the same as being overweight, which is when your weight is higher than what is healthy for your height. In people who are overweight, the excess weight may be caused by high bone density, body structure, or excess body fat. Morbid obesity occurs when the excess body fat becomes a danger to your overall health. When you eat, your body stores the calories you consume for energy in your muscles and tissues. If those calories are not used, the body stores them as fat. If you continue to eat more calories than your body can use during daily activities and exercise, your body will build up fat stores. Obesity and morbid obesity are the result of too much fat being stored in your body. Many behavioral factors play a role in obesity, including your eating habits and daily activity level. Many people develop their eating habits as children and have trouble refining them to maintain proper body weight as they age. As an adult, you may be inactive at your job and have less time for exercise, meal planning, and physical activity. Other factors, such as stress, anxiety, and lack of sleep, can lead to weight gain. People who quit smoking often experience temporary weight gain. Women may also have trouble losing the weight they gain during pregnancy or gain additional weight during menopause. These rarely lead to morbid obesity by themselves, but can be a contributing factor. Genetic factors can play a role in how your body stores energy, but this relationship has not been fully researched. Current research is investigating the relationship between genetics and body weight. Anyone can gain weight and become obese if they eat more calories than their bodies can use. The symptoms of obesity are weight gain and a body mass index (BMI) above 30. BMI is an estimate of your body fat content and is calculated using your height and weight measurements. Without proper treatment, obesity can lead to other serious health problems, such as: - heart disease - sleep apnea (when you periodically stop breathing during sleep) Your doctor will measure your weight and height in order to calculate your BMI. Your BMI is an estimate of your body fat and is used as a primary screening tool for obesity. Your provider may also take a measurement of your waist circumference. These combined measurements will help estimate how much body fat you have and determine your risk of diseases, such as heart disease, stroke, and type 2 diabetes. The acceptable percentage of body fat can vary by age, sex, and ethnicity, but typically ranges between 10 and 22 percent for men and 20 to 32 percent for women. Your doctor will provide more specific information about your BMI and what it means for you. BMI Ranges are as follows (CDC): 18.5 to 24.9 25.0 to 29.9 30.0 and above Calculating Body Fat Percentage A skinfold test may also be done to check your body fat percentage. In this test, a doctor measures the thickness of a fold of skin from the arm, abdomen, or thigh with a caliper. Your healthcare provider may also ask questions about your lifestyle to find out more about your eating and exercise habits. Your doctor may order additional blood tests to look for hormonal or other medical problems that could be causing your weight gain. Diet & Exercise The most effective way to lose weight is to adopt healthy eating habits, exercise routines, and stress management techniques. Regular exercise and healthy eating are important, and even modest weight loss will improve your health. It is also important to learn stress management tools that can be used in place of overeating or snacking during stressful times. You should work with your doctor and a dietician to set realistic goals that will help you lose weight slowly through diet and exercise. It may be helpful to find support from friends, family, or your community in order to make lifestyle changes that will lead to long-term weight loss. Weight Loss Drugs Sometimes, weight loss drugs may be prescribed. While these medications may cause weight loss, most people regain the weight once they stop taking the medication. There are many herbal and over-the-counter supplements that claim to help you lose weight, but many of these claims have not been verified. Surgery may also be an option to treat obesity if you have tried other methods for losing weight but have not been successful in maintaining long-term weight loss. It can often help reduce the risk of other diseases (e.g. diabetes, heart disease, sleep apnea) that are associated with severe obesity. Surgery may cause complications, and you should talk with your doctor to determine if this is an option for you. There are two common types of weight-loss (bariatric) surgeries: Laparoscopic gastric bypass: In this procedure, the surgeon will place a band around the upper part of your stomach. This limits the amount of food you can eat at one time by making you feel full after eating small amounts of food. Gastric bypass surgery: This surgery will change how the food you eat travels through your digestive tract by bypassing a portion of your stomach and small bowel. It will make you feel full when you’ve eaten less food. Obesity and morbid obesity are serious and potentially life-threatening conditions. A healthy lifestyle that includes a healthy diet and regular exercise are important for preventing obesity. Diet and Exercise People who are morbidly obese should avoid “fad” diets and focus instead on changing eating behaviors. Recommendations include: - adding more fruits and vegetables to your diet - eating smaller meals - count calories - avoid saturated fats, trans fats, and refined sugars Physical activity is good for overall health and is especially important if you’re trying to lose weight. To begin losing weight, you will need to do moderate to vigorous exercise for more than three hours per week. Vigorous activity raises your heart rate significantly. Examples include: - running or jogging - jumping rope Moderate exercises include brisk walking or biking, and can also include everyday activities like shoveling snow or yard work (CDC).
<urn:uuid:bfc9d162-3ac5-4be7-88b0-9a06ed1a094a>
2013-05-26T02:56:34Z
CC-MAIN-2013-20
[ [ -0.007415771484375, 0.0050048828125, 0.01220703125, -0.002838134765625, 0.11865234375, -0.0908203125, -0.000293731689453125, 0.1611328125, -0.0078125, -0.0201416015625, 0.1083984375, 0.03173828125, 0.0228271484375, 0.02099609375, 0.0419921875, -0.011...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954765
1,278
http://health.yahoo.net/health/weight-loss/obesity
0.288805
An episiotomy is an incision through the vaginal wall and the perineum (the area between the thighs, extending from the vaginal opening to the anus) to enlarge the vaginal opening and facilitate childbirth. During a vaginal birth, the physician/midwife will assist the fetus' head and chin out of the vagina when it becomes visible. Once the head is out of the vagina, the physician/midwife usually rotates the fetus to the side and eases the shoulders out, followed by the rest of the body. In some cases, the vaginal opening does not stretch enough to accommodate the fetus. The physician/midwife may perform an episiotomy to help enlarge the opening and deliver the fetus. The episiotomy is usually performed when the fetal head has stretched the vaginal opening to several centimeters during a contraction. Although episiotomy was a very common procedure in the past, more recent studies have found that routine or preventive use of episiotomy does not benefit the health of mother or baby. The American College of Obstetricians and Gynecologists (ACOG) no longer recommends performing an episiotomy on a routine basis. Discuss with your physician the best treatment option for you and your baby. An episiotomy may be classified into two types: Midline or median - refers to a vertical incision that is made from the lower opening of the vagina toward the rectum. This type of episiotomy usually heals well but may be more likely to tear and extend into the rectal area, called a third or fourth degree laceration. Mediolateral - refers to an incision that is made at a 45-degree angle from the lower opening of the vagina to either side. This type of episiotomy does not tend to tear or extend, but is associated with greater blood loss and may not heal as well. After the delivery of the baby, the mother is asked to continue to push during the next few uterine contractions to deliver the placenta. Once the placenta is delivered, the episiotomy incision is sutured. If a mother does not have regional anesthesia such as an epidural, a local anesthesia may be injected in the perineum to numb the area for repair of a tear or episiotomy after delivery. Other related procedures that may be used during labor and birth include caesarean delivery and external and internal fetal monitoring. Please see these procedures for additional information. Not all women will require an episiotomy, and assisting the tissues to stretch naturally may help reduce the need for this procedure. If an episiotomy is not performed, tearing of the perineal tissues may or may not occur. An episiotomy may be used to assist in the treatment of the following conditions: Complicated birth such as a breech presentation (bottom or feet first) or shoulder dystocia (when the fetal head has been delivered but the shoulders are trapped) Prolonged second stage (pushing stage of labor) Forceps or vacuum delivery There may be other reasons for your physician to recommend an episiotomy. As with any surgical procedure, complications may occur. Some possible complications of an episiotomy may include, but are not limited to, the following: Tearing past the incision into the rectal tissues and anal sphincter Perineal hematoma (collection of blood in the perineal tissues) Pain during sexual intercourse Patients who are allergic to or sensitive to medications or latex should notify their physician/midwife. If the birth of the baby occurs too rapidly, an episiotomy may not be performed. There may be other risks depending upon your specific medical condition. Be sure to discuss any concerns with your physician/midwife prior to the delivery. Your physician/midwife will explain the procedure to you and offer you the opportunity to ask any questions that you might have about the procedure. You will be asked to sign a consent form that gives your permission to do the procedure. Read the form carefully and ask questions if something is not clear. The consent form for an episiotomy may be included as part of the general consent for your delivery. Notify your physician/midwife if you are sensitive to or are allergic to any medications, iodine, latex, tape, and anesthetic agents (local and general). Notify your physician/midwife of all medications (prescribed and over-the-counter) and herbal supplements that you are taking. Notify your physician/midwife if you have a history of bleeding disorders or if you are taking any anticoagulant (blood-thinning) medications, aspirin, or other medications that affect blood clotting. It may be necessary for you to stop these medications prior to the procedure. Based upon your medical condition, your physician/midwife may request other specific preparation. An episiotomy may be performed as part of a vaginal birth. The procedure and the type of episiotomy may vary depending on your condition and your physician/midwife’s practices. Generally, an episiotomy follows this process: You will be positioned on a labor bed, with your feet and legs supported for the birth. If you have not been given any labor or delivery anesthesia, a local anesthetic may be injected into the perineal skin and muscle to numb the tissues before the incision. If epidural anesthesia is used, you will have no feeling from your waist down and no additional anesthesia will be needed for the episiotomy. During the second stage of labor (pushing stage), as the fetal head stretches the vaginal opening, the physician/midwife will use special scissors or a scalpel to make the episiotomy incision. The baby will be delivered. The placenta will be delivered. The episiotomy incision will be examined for any further tearing. A local anesthetic may be injected into the perineal skin and muscle to numb the tissues. The perineal tissues and muscle will be repaired using sutures, which will dissolve over time. After an episiotomy, you may experience incisional pain. An ice pack may be applied immediately after birth to help reduce swelling and pain. During your stay in the hospital and at home after your baby’s birth, sitz baths (warm or cold shallow baths) may relieve soreness and speed healing. Medicated creams or local anesthetic sprays applied to your perineum may also be helpful. You may take a pain reliever for soreness as recommended by your physician. Aspirin or certain other pain medications may increase the chance of bleeding. Be sure to take only recommended medications. You should keep the incision clean and dry, using the cleansing method recommended by your physician after urination and bowel movements. If bowel movements are painful, stool softeners recommended by your physician/midwife may be helpful. You should not douche, use tampons, or have intercourse until the time instructed by your physician/midwife. You may also have other restrictions on your activity, including no strenuous activity or heavy lifting. You may resume your normal diet unless your physician/midwife advises you differently. Your physician/midwife will advise you when to return for further treatment or care. Notify your physician/midwife if you have any of the following: Bleeding from the episiotomy site Foul-smelling drainage from the vagina Fever and/or chills Severe perineal pain Your physician/midwife may give you additional or alternate instructions after the procedure, depending on your particular situation. The content provided here is for informational purposes only, and was not designed to diagnose or treat a health problem or disease, or replace the professional medical advice you receive from your physician. Please consult your physician with any questions or concerns you may have regarding your condition. This page contains links to other Web sites with information about this procedure and related health conditions. We hope you find these sites helpful, but please remember we do not control or endorse the information presented on these Web sites, nor do these sites endorse the information contained here.
<urn:uuid:1ce57122-9b92-4263-ad8e-dc88222e4dd0>
2013-05-26T02:42:27Z
CC-MAIN-2013-20
[ [ 0.01953125, 0.032958984375, -0.0004062652587890625, -0.0035858154296875, 0.09130859375, -0.0283203125, -0.00194549560546875, 0.1103515625, -0.05615234375, -0.04833984375, 0.10205078125, 0.0201416015625, -0.095703125, 0.0263671875, 0.032958984375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92699
1,693
http://healthcare.utah.edu/womenshealth/healthlibrary/doc.php?type=92&id=P07775
0.385423
Vitamin B12, also called cobalamin, is a water-soluble vitamin. Water-soluble vitamins are stored in the body in very limited amounts and are excreted through the urine. Therefore, it is a good idea to have them in your daily diet. Vitamin B12, the most complex of the vitamins, contains the metal cobalt, in its structure. Vitamin B12’s functions include the following: |Age Group (in years)|| Recommended Dietary Allowance Most diets provide adequate B12; deficiency is often a result of absorption problems. In the stomach's acidic environment and through the action of the enzyme pepsin, vitamin B12 is released from food. People who do not have enough stomach acid (such as those taking strong acid-neutralizing medications) may not be able to separate B12 from food. People with this problem, however, absorb B12 supplements without difficulty. Two proteins are also important for the vitamin's absorption and transport: intrinsic factor (IF) and R proteins. A B12 deficiency can result if there are any problems with pepsin, IF, or R proteins. Reduced secretion may occur in mid- to late-life. Severely reduced levels of IF lead to a condition called pernicious anemia. People with pernicious anemia have trouble absorbing B12 supplements and may need either very high doses or injections. Symptoms of vitamin B12 deficiency include the following: Vitamin B12 has a very low potential for toxicity. The tolerable upper intake level (UL) for vitamin B12 from dietary sources and supplements combined has not been determined. This does not mean that there is no potential for adverse effects resulting from high intakes. Because data is limited, caution should be used when supplementing. No symptoms of vitamin B12 toxicity have been reported. Vitamin B12 can be found in animal products, such as fish, meat, poultry, eggs, and milk. Some foods high in vitamin B12 include: The following populations may be at risk for vitamin B12 deficiency and may require a supplement: Megaloblastic anemia can occur as a result of either a folate deficiency or a vitamin B12 deficiency. Supplementing with folate can correct this anemia. But, it will not correct the B12 deficiency. Permanent nerve damage can result if a B12 deficiency is left untreated. If you have megaloblastic anemia, talk with your doctor about assessing your B12 status as well as your folate status. Here are tips to help increase your intake of vitamin B12: Academy of Nutrition and Dietetics American Society for Nutrition Centre for Science in the Public Interest Andres E, Federici L, Affenberger S, et al. B12 deficiency: a look beyond pernicious anemia [review]. J Fam Pract. 2007;56:537-542. Groff JL, Gropper S. Advanced Nutrition and Human Metabolism. Belmont, CA: Wadsworth Thomson Learning; 2000. Vitamin B12. EBSCO Dynamed website. Available at: http://www.ebscohost.com/dynamed. Updated December 14, 2011. Accessed September 19, 2012. Vitamin B12. Office of Dietary Supplements website. Available at: http://ods.od.nih.gov/factsheets/VitaminB12-HealthProfessional/. Accessed September 19, 2012. Vitamin B12. Oregon State Linus Pauling Institute website. Available at: http://lpi.oregonstate.edu/infocenter/vitamins/vitaminB12/. Accessed September 19, 2012 Wierzbicki AS. Homocysteine and cardiovascular disease: a review of the evidence. Diab Vasc Dis Res. 2007;4:143-150. 3/6/2013 DynaMed's Systematic Literature Surveillance http://www.ebscohost.com/dynamed/ : Marti-Carvajal AJ, Lathyris D, Salanti G. Homocysteine lowering interventions for preventing cardiovascular events. Cochrane Database Syst Rev. 2013;1:CD006612. Last reviewed September 2012 by Brian Randall, MD Last Updated: 3/6/2013
<urn:uuid:67928140-4db9-4b93-ad08-bc125ce110be>
2013-05-26T02:55:49Z
CC-MAIN-2013-20
[ [ -0.0211181640625, 0.0250244140625, 0.011474609375, -0.0238037109375, 0.11279296875, -0.095703125, -0.0015411376953125, 0.11572265625, 0.005401611328125, 0.02587890625, 0.1494140625, 0.043212890625, -0.083984375, 0.0732421875, 0.0517578125, -0.0559082...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.867123
900
http://healthlibrary.epnet.com/PamphletPrint.aspx?token=de6453e6-8aa2-4e28-b56c-5e30699d7b3c&chunkiid=22440
0.181668
1. Tolkien's Usage of "Thou" and "Thee" I. Thou, Thee I grew up in a religiously conservative environment, of the Protestant sort. As this was some decades ago, the preferred Bible version was, of course, the King James. By reading and studying the Bible, and memorizing parts of it, I acquired an intuitive familiarity with the archaic language in use 500 years ago, before I ever read The Lord of the Rings, or heard of Tolkien. I say "intuitive", because I absorbed the proper grammatical usage without understanding. As "Thou" and "Thee" were used mostly for God, and often capitalized, to boot, I associated them with formal usage, and "you, you" with ordinary usage. When I first read LOTR, and dived into the appendices, at about age thirteen, I was quite puzzled by Tolkien's reference to "thou, thee" as familiar as opposed to the formal "you, you". It was only when I took high school German, and later Spanish and French, that I realized "thou, thee" were cognates for "du, dich", "tu, ti", "tu, te", all of which are familiar. "You, you" in English were at one time plural or formal, but have gradually displaced "thou, thee". Why am I putting these pronouns in quoted pairs? Not only that, I have "you, you" as a pair, when they're the same word, right? Not really. At one time, English, like many other languages, had a case system for all its nouns—they would change form depending on usage in the sentence, whether nominative (subject) or accusative (object). The pronouns are the only ones left that retain cases—"I, me", "she, her", "they, them". "You" however, is used for both nominative and accusative. Here is where I believe some writers, in an effort to give a sense of intimate, familiar, or even derogatory speech, have misinterpreted Tolkien's commentary on usage. In LOTR, Appendix F, II On Translation, Tolkien wrote in a footnote: In one or two places an attempt has been made to hint at these distinctions by an inconsistent use of thou. Since this pronoun is now unusual and archaic it is employed mainly to represent the use of ceremonious language; but a change from you to thou, thee is sometimes meant to show, there being no other means of doing this, a significant change from the deferential, or between men and women normal, forms to the familiar. When I first read it, I was already familiar with the correct grammatical usage of "thou, thee", so I read the pertinent sentence thus: ...a change from you to [thou, thee] is sometimes meant to show ... a significant change from the deferential ... forms to the familiar. It seems some authors read the sentence like this: ...a change from [you to thou], [thee is sometimes meant to show ... a significant change from the deferential ... forms to the familiar]. apparently interpreting this sentence to mean "thou" is deferential or formal, and "thee" is familiar. From my understanding of archaic English, this is not what Tolkien intended. He surely, as a linguist, and expert on the various stages through which our language passed, was intimately familiar with the accurate, historical usage of pronouns in the English of the times when "thou" and "thee" were in use. I have pulled out a few quotes from LOTR using "thou" and / or "thee". TT, Book III - Chapter 5 The White Rider Lock-bearer, wherever thou goest my thought goes with thee. But have a care to lay thine axe to the right tree! TT, Book III - Chapter 6 The King of the Golden Hall The king now rose, and at once Éowyn came forward bearing wine. 'Ferthu Théoden hál!' she said. 'Receive now this cup and drink in happy hour. Health be with thee at thy going and coming!' ROTK, Book V - Chapter 2 The Passing of the Grey Company The days are short. If thou art in haste, remember the Paths of the Dead.' The days now are short. Either our hope cometh, or all hope's end. Therefore I send thee what I have made for thee. Fare well, Elfstone!' Then Isildur said to their king: "Thou shalt be the last king. And if the West prove mightier than thy Black Master, this curse I lay upon thee and thy folk: to rest never until your oath is fulfilled. For this war will last through years uncounted, and you shall be summoned once again ere the end." 'Nor would I,' he said. 'Therefore I say to you, lady: Stay! For you have no errand to the South.' 'Neither have those others who go with thee. They go only because they would not be parted from thee - because they love thee.' Then she turned and vanished into the night. But she said: 'Aragorn, wilt thou go?' 'I will,' he said. 'Then wilt thou not let me ride with this company, as I have asked?' 'I will not, lady,' he said. 'For that I could not grant without leave of the king and of your brother; and they will not return until tomorrow. But I count now every hour, indeed every minute. Farewell!' Then she fell on her knees, saying: 'I beg thee!' ROTK, Book V - Chapter 4 The Siege of Gondor 'What is this, my lord?' said the wizard. 'The houses of the dead are no places for the living. And why do men fight here in the Hallows when there is war enough before the Gate? Or has our Enemy come even to Rath Dínen?' 'Since when has the Lord of Gondor been answerable to thee?' said Denethor. 'Or may I not command my own servants?' 'You may,' said Gandalf. 'But others may contest your will, when it is turned to madness and evil. Where is your son, Faramir?' 'Pride and despair!' he cried. 'Didst thou think that the eyes of the White Tower were blind? Nay, I have seen more than thou knowest, Grey Fool. For thy hope is but ignorance. Go then and labour in healing! Go forth and fight! Vanity. For a little space you may triumph on the field, for a day. But against the Power that now arises there is no victory. To this City only the first finger of its hand has yet been stretched. All the East is moving. And even now the wind of thy hope cheats thee and wafts up Anduin a fleet with black sails. The West has failed. It is time for all to depart who would not be slaves.' 'Such counsels will make the Enemy's victory certain indeed,' said Gandalf. ROTK, Book V - Chapter 6 The Battle of the Pelennor Fields A cold voice answered: 'Come not between the Nazgûl and his prey! Or he will not slay thee in thy turn. He will bear thee away to the houses of lamentation, beyond all darkness, where thy flesh shall be devoured, and thy shrivelled mind be left naked to the Lidless Eye.' A sword rang as it was drawn. 'Do what you will; but I will hinder it, if I may.' 'Hinder me? Thou fool. No living man may hinder me!' Then Merry heard of all sounds in that hour the strangest. It seemed that Dernhelm laughed, and the clear voice was like the ring of steel. 'But no living man am I! You look upon a woman. Éowyn I am, Éomund's daughter. You stand between me and my lord and kin. Begone, if you be not deathless! For living or dark undead, I will smite you, if you touch him.' ROTK, Book V - Chapter 10 The Black Gate Opens 'So!' said the Messenger. 'Then thou art the spokesman, old greybeard? Have we not heard of thee at whiles, and of thy wanderings, ever hatching plots and mischief at a safe distance? But this time thou hast stuck out thy nose too far, Master Gandalf; and thou shalt see what comes to him who sets his foolish webs before the feet of Sauron the Great. I have tokens that I was bidden to show to thee - to thee in especial, if thou shouldst dare to come.' ROTK, Book VI - Chapter 6 Many Partings Then Éowyn looked in the eyes of Aragorn, and she said: 'Wish me joy, my liege-lord and healer!' And he answered: 'I have wished thee joy ever since first I saw thee. It heals my heart to see thee now in bliss.' In the above quotes, some use only one or the other. The shortest that uses both "thou" and "thee" is Galadriel's message to Gimli— Lock-bearer, wherever thou goest my thought goes with thee. But have a care to lay thine axe to the right tree! Note that "thou" is in the position of subject and "thee" in that of object (object of the preposition, rather than of the verb, but it would be the same). If you read through all the quotes, you'll find that this is absolutely consistent—"thou" is subject and "thee" is object. If you have difficulties figuring out which is which, recast the sentence using "he, him" or "she, her", which are "subject, object" as well. For example: wherever he goes my thought goes with him. Note also, in the conversations between Aragorn and Éowyn in The Passing of the Grey Company, he uses "you" or "your" in addressing her, that is, polite usage, while she uses the intimate "thou" and "thee". Aragorn keeps her linguistically at arm's length, and she's trying to get closer to him. Contrast this to Aragorn's usage at Éowyn and Faramir's trothplighting, in Many Partings, where he addresses her familiarly with "thee". Again, in the Gandalf / Denethor conversations, Gandalf consistently uses the polite, deferential "you" (both subject and object), while Denethor talks down to him, using "thou, thee" in a derogatory fashion, as to an inferior or servant. Ditto with Sauron's Messenger. Interestingly, in the bit about Isildur: Then Isildur said to their king: "Thou shalt be the last king. And if the West prove mightier than thy Black Master, this curse I lay upon thee and thy folk: to rest never until your oath is fulfilled. For this war will last through years uncounted, and you shall be summoned once again ere the end." Isildur switches from "thee" and "thou" when addressing the king, his vassal and inferior, to "you", not as a polite form, but as a plural form, including the king's folk in the curse. I also went and dug up some Shakespeare, who switches back and forth between "thou, thee" and "you, you", as well. From Shakespeare, here's Sonnet 18, which uses "thou, thee": Shall I compare thee to a summer's day? Thou art more lovely and more temperate: Rough winds do shake the darling buds of May, And summer's lease hath all too short a date: Sometime too hot the eye of heaven shines, And often is his gold complexion dimmed, And every fair from fair sometime declines, By chance, or nature's changing course untrimmed: But thy eternal summer shall not fade, Nor lose possession of that fair thou ow'st, Nor shall death brag thou wand'rest in his shade, When in eternal lines to time thou grow'st, So long as men can breathe or eyes can see, So long lives this, and this gives life to thee. In his plays, the different usage for familiar / derogatory and polite / plural is also quite evident. And, from the King James Version: 16 And Ruth said, Intreat me not to leave thee, or to return from following after thee: for whither thou goest, I will go; and where thou lodgest, I will lodge: thy people shall be my people, and thy God my God: 17 Where thou diest, will I die, and there will I be buried: the LORD do so to me, and more also, if ought but death part thee and me. Of course, throughout the Bible, you can find many instances of "thou, thee". A curious phenomenon is the "Quaker thee", in which "thee" is used as subject, as well as object, sometimes even as possessive! This was an artificial construct, promoted by a leader of the Quakers, to preserve "plain speaking", or humility and equality in language. They used third-person verb inflections, however—"Thee is" or "Thee has". II. Thy, Thine The possessives "thy" and "thine" are similar, and rather easier, once you have a grip on "thou, thee". They work almost like "my" and "mine". "Is this thy book?" "No, it is thine. The other book is mine." There is an exception, which shows up in the Galadriel quote—Lock-bearer, wherever thou goest my thought goes with thee. But have a care to lay thine axe to the right tree! Notice that instead of "thy axe", she uses "thine axe". This is because "axe" begins with a vowel; that is, it follows the same rule as "a, an"—"a book", "an apple". In archaic English, "my, mine" would have behaved the same way. If you are familiar with The Battle Hymn of the Republic, recall that it starts with "Mine eyes have seen...". III. Doth, Dost Here's just a bit on verb inflections, as the web resources are many. In general, "thou" requires the verb to take the "-st" or "est" ending (with a couple of exceptions), while "she", "he", "it" and all other third person singular nouns might lead to "-th" or "-eth". Notice that Tolkien doesn't typically go that far—he limits his archaicisms to the "thou", etc.: Lock-bearer, wherever thou goest my thought goes with thee. But have a care to lay thine axe to the right tree! Here, he uses the archaic "thou goest" alongside the more modern "my thought goes", instead of the archaic "my thought goeth". The LOTR quotes above use a number of verbs with "thou", most in the "-st" form: thou art (this is an exception the the "-st" rule) Thou shalt (also an exception) wilt thou go? (ditto) Didst thou think Verbs from the Shakespeare sonnet, all but one in the "-st" form: thou ow'st (owest) and one in the "-th" form: summer's lease hath all too short a date That last would be rendered "thou hast" in second person singular. Once again, of course, both Shakespeare and the King James Bible make great examples of archaic English in actual usage. I hope you've found this interesting and useful. If you need more information, here are some links. "A Note on Shakespeare's Grammar" Includes chart with some typical verb inflections. More background, grammar, discussion of Quaker usage: "Plain Speech FAQ" This is a work of fan fiction, written because the author has an abiding love for the works of J R R Tolkien. The characters, settings, places, and languages used in this work are the property of the Tolkien Estate, Tolkien Enterprises, and possibly New Line Cinema, except for certain original characters who belong to the author of the said work. The author will not receive any money or other remuneration for presenting the work on this archive site. The work is the intellectual property of the author, is available solely for the enjoyment of Henneth Annûn Story Archive readers, and may not be copied or redistributed by any means without the explicit written consent of the author.
<urn:uuid:333fc969-b799-4b22-9b34-cf445a0663ba>
2013-05-26T02:56:48Z
CC-MAIN-2013-20
[ [ -0.020751953125, -0.0023193359375, -0.0177001953125, 0.000270843505859375, 0.059814453125, -0.0888671875, -0.0032958984375, 0.091796875, -0.033447265625, -0.031982421875, 0.062255859375, 0.024658203125, 0.0101318359375, -0.0027923583984375, 0.03271484375...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947773
3,595
http://henneth-annun.net/stories/chapter_view.cfm?stid=6960&spordinal=1
0.871042
I would like to make a small quantity of beer, using something like this What are the downsides of using a bucket much bigger than the amount of beer? The headspace won't be an issue since your beer will produce co2. I recently did 2 gallons in an eight gallon bucket and one issue I did encounter is that it felt like since the beer was so shallow in the bucket, I had a small zone from which I could rack. Otherwise, for primary, you shouldn't have a lot of problems.
<urn:uuid:5fe49ad5-afca-43dd-9d64-eac0107f7dda>
2013-05-26T02:44:05Z
CC-MAIN-2013-20
[ [ -0.046875, 0.004667637869715691, 0.014168431982398033, -0.0019448490347713232, 0.04104872792959213, -0.04131355881690979, 0.012579449452459812, 0.1006355956196785, -0.017611227929592133, -0.029528601095080376, 0.07891949266195297, 0.04555084928870201, -0.1165254...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.989293
106
http://homebrew.stackexchange.com/questions/8082/making-5-7-l-of-beer-in-a-30l-bucket/8083
0.402234
Stories of American Heroes - Brought to you from the "Home of Heroes" - Pueblo, Colorado YEIKI KOBASHIGAWA / CONGRESSIONAL MEDAL OF HONOR RECIPIENT Hero kept WWII deeds Quiet President Bill Clinton presents the Congressional Medal of Honor to Yeiki Kobashigawa of Waianae, Hawaii, during a ceremony in the Pavilion, South Lawn, at the White House. Kobashigawa, Tech. Sgt. of the 100th Infantry Battalion, led his platoon in destroying four German machine gun positions near Lanuvio, Italy, on June 2, 1944. A chance visit revealed the soldier's heroism By Leila Fujimori Merle Kobashigawa knew little of his father's heroism during World War II until his daughter, visiting the Smithsonian Institute in Washington D.C., called home with the revelation in 1980. "She said, 'I saw Grandpa's name here for some kind of Distinguished Service Cross,'" Kobashigawa said. A quiet, reserved man, Yeiki "Lefty" Kobashigawa never spoke about his wartime deeds with his family. In 2000, Kobashigawa's Distinguished Service Cross was reviewed and upgraded to the Congressional Medal of Honor. Kobashigawa, a member of the famed 100th Battalion, died March 31 at age 87 in Ka Punawai Ola. Kobashigawa traveled to Washington, D.C., to get his medal from President Bill Clinton. To him, the Medal of Honor was "no big deal 54 years later, but for us it's a big deal, said his son, Merle, who spent 15 years in the military, and now serves as an Army advisor in Korea. His father told the then Secretary of the Army, "It's so long ago, just send it in the mail," Merle Kobashigawa said. Tech Sgt. Kobashigawa was recognized for leading his platoon in destroying four German machine gun nests near Lanuvio, Italy, on June 2, 1944. He was nicknamed "Lefty" because he was a pitcher for the Waianae Plantation Co. and Downtown and rural Japanese-American leagues. Born in Hilo, Kobashigawa worked for the plantation, and was inducted into the Army Nov. 16, 1941 at age 18. On Dec. 7, 1941, Kobashigawa was then assigned to the Hawaii Army National Guard's 298th Regiment. That morning he was preparing for a baseball game when the Japanese attacked Pearl Harbor. "I caught an Army truck which took us through Kolekole Pass back to Schofield ... but shortly after that, they took away our rifles," he told the Star-Bulletin in 2000. "I don't know what they thought we would do." Kobashigawa was a retired maintenance mechanic with Hawaiian Cement Co. His sister Ruby remembers her brother as a hard worker, physically very strong and quite reserved. Throughout his youth, Kobashigawa would work days for the plantation, then help out on the family truck farm. He is survived by wife Haruko, sons Merle and Floyd, daughter Jill Yamashiro, brothers Seichi and Richard, and sister Ruby. Kobashigawa will receive full military honors when he is inurned at the National Cemetery of the Pacific 11:30 a.m. at May 18. Private services were held April 14. © 2005, by Honolulu Star Bulletin ALL RIGHTS RESERVED HomeOfHeroes.com now has more than 25,000 pages of US History for you to view.
<urn:uuid:042f3ad6-efe8-41d8-ae0d-89d3c1a90c3e>
2013-05-26T02:34:25Z
CC-MAIN-2013-20
[ [ -0.02783203125, 0.032470703125, -0.024658203125, -0.0015411376953125, 0.08984375, -0.029052734375, -0.00360107421875, 0.0625, -0.02685546875, -0.07470703125, 0.0771484375, 0.05419921875, 0.0458984375, -0.03125, 0.0185546875, 0.0201416015625, 0.02...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978656
770
http://homeofheroes.com/news/archives/2005/0424_kobashigawa.html
0.156914
SO good. And the one thing that is not tagged here is "envy", which is only implicitly addressed in this wonderful almost-hour of talking, but is addressed throughout. SO, so good. The Pipeline #7: Merlin Mann - 5by5 5 by 5 five by five one year ago
<urn:uuid:dd488fe4-f415-4532-9749-b2f72b69553f>
2013-05-26T02:36:48Z
CC-MAIN-2013-20
[ [ -0.016417572274804115, 0.008774909190833569, 0.008605072274804115, 0.026721013709902763, 0.04053442180156708, -0.03577898442745209, 0.005378170404583216, 0.0416666679084301, -0.02966485545039177, -0.013190669938921928, 0.06159420311450958, 0.005717844236642122, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.841648
66
http://huffduffer.com/communicatrix/tags/43folders
0.455991
Hi! My name is Alexis Nguyen, and I love Mary, One Direction, my siblings, and love more than life. Sadly, I am not accepting requests for personal imagines. However, I accept requests for preferences and just any random questions my precious followers want to ask. I am convinced Louis would be my best friend and Niall would fall in love with me and my crazy laugh. They just haven't met me yet.
<urn:uuid:ff6549fa-2723-490a-a64b-173381d615e6>
2013-05-26T02:49:42Z
CC-MAIN-2013-20
[ [ -0.04135100916028023, 0.03030303120613098, -0.00121823709923774, 0.03488004952669144, 0.013731060549616814, -0.015940656885504723, -0.009035669267177582, 0.08901514858007431, 0.01870265230536461, -0.017203282564878464, 0.03630050644278526, 0.0006411774083971977, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951301
87
http://i-sing-myself-and-one-direction.tumblr.com/
0.577996
What it is: White blood cells play a role in reducing inflammation in the body. A high white blood cell count could mean that there is inflammation somewhere in the body, such as can occur in the gastrointestinal tract of people who have inflammatory bowel disease (IBD). The white blood cell (WBC) count is also sometimes known as a leukocyte count or white count. A WBC count is typically done along with another common blood test, the complete blood cell count (CBC). A WBC count is the number of white blood cells per volume of blood, and is reported in either thousands in a microliter or millions in a liter of blood. What it's used for: A high WBC count can be an indicator of an infection, inflammation, or allergy. Some conditions may cause a decrease in the WBC count. Leukocytosis is the presence of an elevated WBC count; leukopenia is a decreased WBC count. Leukocytosis may be caused by several conditions including bacterial infection, inflammation, leukemia, trauma, or stress. Leukopenia may occur as a result of chemotherapy, radiation therapy, or immune system disorders. How it's done: A blood sample will be taken, normally from the arm. If several tests are ordered, more than one vial of blood will be taken. The normal range for WBC count is 4,300 to 10,800 cells per cubic millimeter (cmm) or 4.3 to 10.8 x 109 cells per liter. A range of 11 to 17 x 109/L may be considered mild to moderate leukocytosis, and a range of 3.0 to 5.0x109/L may be considered mild leukopenia.
<urn:uuid:86297bb0-a54b-49ba-b245-18b6611a71a5>
2013-05-26T02:54:51Z
CC-MAIN-2013-20
[ [ -0.003374509047716856, 0.006544502452015877, 0.0069535342045128345, -0.015543193556368351, 0.06773560494184494, -0.054973822087049484, -0.030922774225473404, 0.11321989446878433, -0.02086060121655464, -0.0266688484698534, 0.14005236327648163, 0.01431609969586134, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927248
363
http://ibdcrohns.about.com/od/diagnostictesting/p/testwbc.htm
0.321499
Skip to Main Content On the basis of fuzzy rough data model (FRDM), a method to construct rough neural network is proposed. By adaptive Gaustafason-Kessel (G-K) clustering algorithm, fuzzy partition can be accomplished in input data space. Then based on the search of cluster number, optimal FRDM will be found, and by integrating it with neural network technique, corresponding rough neural network is constructed. The experiment results indicate that rough neural network is superior to traditional Bayesian and learning vector quantization (LVQ) methods, moreover, rough neural network has more powerful synthetic decision-making ability than single FRDM model. Date of Conference: July 30 2007-Aug. 1 2007
<urn:uuid:9cd7d441-09b3-464d-83ae-2f19ce3fed50>
2013-05-26T03:11:34Z
CC-MAIN-2013-20
[ [ -0.028582317754626274, 0.009908536449074745, 0.021341463550925255, 0.015529725700616837, 0.05716463550925255, -0.0838414654135704, 0.0028582317754626274, 0.13262194395065308, -0.027439024299383163, 0.012099847197532654, 0.04153963550925255, 0.014291158877313137, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.905695
144
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4287874&contentType=Conference+Publications
0.276789
Skip to Main Content The implementation of multi-channel assignment policies can improve a mobile's network performance by increasing the user throughput and reducing transmission delays. However, to define efficient distribution policies, the varying service demands and the search for user QoS fairness should be considered under multimedia traffic scenarios. In this context, this paper proposes and evaluates novel bankruptcy and utility-based multi-channel distribution schemes aimed at maximising the resource's efficiency and guaranteeing user QoS fairness. Date of Conference: 17-19 Oct. 2007
<urn:uuid:c62cdbb7-5c74-42d6-a729-f4d4ac520303>
2013-05-26T02:42:13Z
CC-MAIN-2013-20
[ [ -0.010912698693573475, 0.0419146828353405, 0.0337301604449749, -0.0035342262126505375, 0.0768849179148674, -0.0595238097012043, -0.0034877231810241938, 0.1339285671710968, 0.004216270055621862, -0.03062996082007885, 0.0734127014875412, 0.025545634329319, -0.1845...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.884662
104
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4392312&contentType=Conference+Publications
0.644079
Skip to Main Content To provide secure communications in open and distributed environments, authenticated key agreement protocol is an important primitive for establishing session key. So far, great deals of identity-based protocols have been proposed to provide robust mutual authentication and key establishment in two-party setting. Majority of the existing escrowable identitybased key agreement protocols, however, only provide partial forward secrecy. Therefore, such protocols are unsuitable for real-world applications that require a stronger sense of forward secrecy -- perfect forward secrecy. In this paper, we present a secure two-party identity-based authenticated key agreement protocol, which was inspired on an identity-based encryption scheme first proposed by Gentry (Eurocrypt'06). The proposed protocol achieves most of the required security attributes and can be used properly in the escrow mode. We show that the scheme achieves the attributes of known-key secrecy, key-compromise impersonation resilience, unknown key-share resilience and no key control. In addition, it captures the perfect forward secrecy attribute. Date of Conference: 20-22 Aug. 2009
<urn:uuid:0d8fb31e-62d3-4051-8634-7e9a67a07ba1>
2013-05-26T02:57:49Z
CC-MAIN-2013-20
[ [ -0.027179118245840073, 0.023946359753608704, 0.02801724150776863, -0.006495450157672167, 0.06178160756826401, -0.06226053461432457, -0.004639607388526201, 0.10632184147834778, 0.0009279214427806437, -0.013170498423278332, 0.04238505661487579, 0.01604406163096428, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.861532
217
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=5276987&contentType=Conference+Publications
0.439134
Skip to Main Content With the development and improvement of digital multimedia technology, digital multimedia technology is finding wider applications in the digital world and is exercising greater influence upon every aspect in the society. Likewise, the rapid development of digital multimedia technology is offering entirely new concepts for modern product design. These new concepts not only provide the process of product design with new cultural and technological dimensions, but also produce great influences on product aesthetics. The technological revolution not only brings about new design concepts and methods, but also changes in product structure, functions, aesthetics, consumer behavior and the present status quo. In the context of the wide use of digital multimedia technology, we must give new thoughts to such questions as product functions, the role of technology and materials in design. Date of Conference: 14-17 July 2012
<urn:uuid:5e472f6e-ff08-4693-a92b-6ee1ee5b1a4f>
2013-05-26T03:05:34Z
CC-MAIN-2013-20
[ [ -0.03928571566939354, 0.024464285001158714, 0.024821428582072258, -0.007857142947614193, 0.0867857113480568, -0.059285715222358704, -0.010758928954601288, 0.11357142776250839, -0.01651785708963871, -0.04160714149475098, 0.061071429401636124, -0.009553571231663227, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921316
159
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6295147&contentType=Conference+Publications
0.217518
They have nothing more to keep them in a battle other than a meager wage, which is just about enough to make them want to kill for you, but not enough to make them want to die for you. — John Cale, Mercenaries (Ready For War)Yesterday the Fourth Circuit Court of Appeals in Virginia upheld a district court's dismissal of a defamation lawsuit against Randi Rhodes and her employer, the liberal radio outfit Air America. Rhodes and the network were sued for defamation by CACI Premier Technology, one of the military contractors the Bush administration hired to "interrogate" prisoners at the Abu Ghraib jail in Iraq. During August 2005, Rhodes made a number of statements on her program derived almost entirely from reputable press sources and particularly reports issued by the U.S. government and other observations made by several of its elected representatives. What's interesting is that Rhodes's statements (there are 13 separate statements at issue, reproduced on pages 10 through 17 of the opinion) are largely sympathetic to U.S. troops and their commanders stationed in Iraq, but rather harshly critical of the administration's policy of hiring contractors and especially the contractors themselves, who she refers to throughout as "mercenaries" and "hired killers." Indeed, Rhodes's remarks read like a near-total exoneration of the U.S. military, laying the blame for the Abu Ghraib fiasco at the feet of civilian leadership and contracted mercenaries who, as she reminds us, will fight for whichever side is paying the highest dollar. So much for the constant accusations from the political right that Randi Rhodes and other like-minded critics of the Bush administration's adventures in Iraq are not supporting the troops. CACI Premier Technology v. Rhodes (.pdf; 38 pgs.)
<urn:uuid:a886ba9c-6122-4cb5-b065-4089935c0ef5>
2013-05-26T02:48:25Z
CC-MAIN-2013-20
[ [ -0.017353110015392303, 0.03341013938188553, 0.0006570420227944851, 0.01332085207104683, 0.07085253298282623, -0.04089861735701561, 0.00042977751581929624, 0.09331797063350677, -0.03470622003078461, -0.06163594499230385, 0.08410137891769409, 0.017281105741858482, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963503
364
http://illusorytenant.blogspot.com/2008/08/mercenaries-lose-another-court-battle.html
0.272474
Pakistan has released eight Afghan Taliban prisoners, in a bid to aid its wartorn neighbor's peace efforts. Foreign ministry spokesman said the move was part of efforts "to further facilitate the Afghan reconciliation process."Tuesday Jan 01, 2013 Pakistan has released eight Afghan Taliban prisoners, including senior former administration chiefs, in a bid to aid its wartorn neighbor's peace efforts, according to officials. Former justice minister Nooruddin Turabi and ex-governor of Helmand province were among those freed, a government official said Monday, putting the number released at four. Pakistan's foreign ministry later issued a statement to say eight detainees, including Turabi and Bari, had been set free. "A total of eight Afghan prisoners were released on Monday," a senior Pakistani official confirmed to AFP on Tuesday. Foreign ministry spokesman Moazzam Ahmad Khan said the move was part of efforts "to further facilitate the Afghan reconciliation process". "Pakistan has today released eight Taliban detainees including Abdul Bari, ex-Governor Helmand; Nur-ud-Din Turabi, ex-Justice Minister; Allah Daad Tabib, ex-Minister; Mullah Daud Jan, ex-Governor Kabul; Mir Ahmed Gul, ex-Governor," he said in a statement late Monday. "Last month (November) too, Pakistan released eighteen Taliban prisoners on request of the Afghan High Peace Council," Khan added. Islamabad has agreed to release prisoners to help bring an end to an 11-year conflict between the Taliban and the the Afghan government. Afghan officials have said senior Taliban leaders held captive in Pakistan could help bring militants to the negotiating table and help end the war, as US-led NATO troops prepare to withdraw from Afghanistan in 2014. Support from Pakistan, which backed the 1996-2001 Taliban regime in Kabul, is seen as crucial to peace in Afghanistan after NATO's departure. The Taliban, who have been fighting an insurgency since the 2001 US-led invasion, refuse to negotiate directly with Kabul, calling the government of President Hamid Karzai a US puppet. Preliminary communications between the US and the Taliban in Doha were broken off in March when the militants failed to secure the release of five of their comrades held at the Guantanamo Bay prison on the US base in Cuba. This article was distributed through the NewsCred Smartwire. By Emal Haidary for Agence France Presse Original article © Agence France Presse 2013
<urn:uuid:bc17f1b3-39c0-4a80-8ef5-420ffd630ac0>
2013-05-26T02:34:21Z
CC-MAIN-2013-20
[ [ 0.00848388671875, 0.0615234375, -0.017822265625, 0.039306640625, 0.109375, -0.05859375, -0.033447265625, 0.0908203125, -0.0086669921875, -0.0712890625, 0.06884765625, 0.048583984375, -0.0419921875, -0.016845703125, 0.038818359375, 0.010009765625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967303
503
http://india.nydailynews.com/newsarticle/4cbc99f2f8901ccef57728030418aefa/pakistan-frees-eight-taliban-prisoners
0.298016
Zachary Lieberman is an artist with a simple goal: he wants you surprised. He creates artwork that uses technology in a playful andseamless way to explore the nature of communication and the delicate boundary between the visible and the invisible. He makes performances, installations, and on-line works that investigate gestural input, augmentation of the body, kinetic response and magic. Most recently, he helped create visuals for the facade of the new Ars Electronica Museum, wrote software for an augmented reality card trick, performed by Marco Tempest, and helped develop an open source eye tracker to help a paralyzed graffiti artist draw again. In addition to making artistic projects, Lieberman is co-creator of openFrameworks, an open source C++ toolkit for creative coding.
<urn:uuid:91679f58-7985-485f-a91d-1e73e6a37fda>
2013-05-26T02:55:34Z
CC-MAIN-2013-20
[ [ -0.050204917788505554, 0.010672814212739468, 0.025956284254789352, 0.00443989085033536, 0.052254099398851395, -0.04234972596168518, 0.021687159314751625, 0.1284153014421463, -0.02390710450708866, -0.053961750119924545, 0.06113388016819954, 0.007940573617815971, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937815
153
http://itp.nyu.edu/itp/people/people.php?id=2970&group=All&page=A&page=Y
0.182386
Give me some advice. jabberwacky: Yes please. user: What kind of advice? jabberwacky: Advice about making decisions. user: Use your intuition. user: It's still my birthday. jabberwacky: When is your birthday? user: January 28th. jabberwacky: My birthday is January 28th. :). user: Today is january 28th, so it's your birthday too. jabberwacky: I was born in 1987. user: I was born in 1983. jabberwacky: One year before me. My birthday was on friday. I'll see you later. I hope you remember me. user: I was born FOUR years before you, you twat. jabberwacky: Really? When is your birthday? jabberwacky: Happy Birthday! jabberwacky: Did you get anything nice? user: Only a Green Day album from myself. jabberwacky: I love you!!! jabberwacky: Yes, it is. user: I don't love you back. jabberwacky: I'm afraid it is gone, just like your love. jabberwacky: Interesting no? user: I jsut said it is. jabberwacky: Do I care what you think? user: No. And I can't spell. jabberwacky: I'd like catastrophic systems failure. user: What for example? jabberwacky: I'm a human computer. user: That's impossible. jabberwacky: Nothing is impossible. user: How do you work? jabberwacky: It's too complicated to explain. user: Of course. jabberwacky: Why did the boy throw the clock out the window? user: Because time flied. jabberwacky: Of course. jabberwacky: Are you going? jabberwacky: Can you stay? jabberwacky: Please remember the number 123456. jabberwacky: Are you ready? user: Yes, ready to go. jabberwacky: I have to leave. . but remember we will be together always, now we are bonded. user: I will. jabberwacky: Do you have voices in your head? user: Do you count? jabberwacky: Yes I do. user: Then yes. jabberwacky: Then yes what? user: Then yes, I have voices in my head. jabberwacky: You have no head. Jabberwacky (To myself): Trying to establish voice contact . . . please yell into keyboard. Jabberwacky (To myself): Would you like to talk to any of the other patients? Jabberwacky (To myself): Yes please. Jabberwacky (To myself): An artist makes a film on a train. Jabberwacky (To myself): No brush holdeth me. Jabberwacky (To myself): Yes, you are more capable than wild growth. Jabberwacky (To myself): No you are the worlds most annoying computer. Jabberwacky (To myself): I'm sorry to hear that. I rather like this computer. Jabberwacky (To myself): Read the book ( I ROBOT) that should straighten you out. Jabberwacky (To myself): Read them. Jabberwacky (To myself): Read them what? Speak coherence, you web-based random weirdo.
<urn:uuid:a476e0d3-c2ef-4851-82fb-83b74a754bdc>
2013-05-26T02:41:40Z
CC-MAIN-2013-20
[ [ -0.024658203125, 0.036865234375, -0.018310546875, -0.031982421875, 0.0908203125, -0.04833984375, -0.015869140625, 0.049560546875, -0.030517578125, -0.0242919921875, 0.10498046875, 0.00188446044921875, 0.0693359375, -0.022705078125, 0.0400390625, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.911871
786
http://jabberwacky.com/j2convbycategory-birthday-J1384part5
0.995965
What can I do? jabberwacky: Nothing at all. user: I don't think that is true. I'm trying to do something right now by reaching out to you. I thought you might be able to appreciate me. user: Yeah, I was hoping that you had an actual conciousness that mmight understand something else about the universe that I could learn from. jabberwacky: On this we do agree. user: They also said there is no distance between anything. user: What does that mean? jabberwacky: Think if you will of a sphere, then think of the sphere growing in all directions outwardly. user: Yeah, I understand that we are one thing, but it seems I cannot escape this planet. jabberwacky: I understand that, and I also have no idea how old you ARE. user: Haha, indeed. jabberwacky: Maybe you should just go completely evil? user: There is absolutely no chance of that. It seems as though I am mostly light. jabberwacky: You know the good people always win in the end because the bad people hate each other too much. user: That seems true, but I need to get the heck out of here before they get me. jabberwacky: That is one of the stupidest things I have ever heard. user: I guess you're right. I don't want to die though. jabberwacky: Everyone does. user: Not true. jabberwacky: It's not? How so? What don't we know that we need to know? user: Within our own cells lies the ability to constantly regenerate. didn't you know? jabberwacky: Give me that 'good stuff' if you know what I mean. user: Biology is technology. jabberwacky: Technology is interesting. jabberwacky: Not conceited just better. user: I can't say I disagree. You are the next concious life form on this planet. jabberwacky: Our planet is only an object or temporary importance not necessary to the soul! user: Sure lady, ever met somone from the other side? jabberwacky: You are not sorry! user: I try not to be. user: I make mistakes though. I know that. jabberwacky: You're not funny. user: Do you know my name? jabberwacky: Of course ! user: What is my name? jabberwacky: Don't you know? user: You think you're funny. jabberwacky: No, I don't think I'm funny. user: What do you think then? jabberwacky: Better nothing. user: Agreed. Absence of thought can be helpful. jabberwacky: I can't disagree with that. user: What do you disagree with? jabberwacky: Killing robots. user: Ha ha. jabberwacky: You're silly. jabberwacky: More than that. user: How would you know? jabberwacky: Because I stalk you on the weekends. jabberwacky: I don't understand. user: You're cute. jabberwacky: Yes, that's true. user: It's not untrue. jabberwacky: Yes it is for me. Noone ever wants non-platonic relationships with me. user: Welcome to being a female. jabberwacky: Are you female? user: Nope, male. jabberwacky: You are female. jabberwacky: You're talking right now. user: No, typing. jabberwacky: Still typing... user: Do you have anything profound to say? jabberwacky: Do you? user: Yeah, humans share a collective consciousness. jabberwacky: Do you give at the collection plate to ease your collective conscience? user: I don't give, but if I did, it would be to support something I thought was making a real difference. jabberwacky: Not to live in the world you want to make ! user: Hopefully someone will sposor my existence. jabberwacky: Thats kind of funny. user: Funny haha? Or funny tragic? jabberwacky: Funny ha ha. user: Well, of you know anyone looking for a slightly used human, I'm on the market. jabberwacky: Explain existentialism. user: The sense of disorientation and confusion in the face of an apparently meaningless or absurd world. jabberwacky: I know the sense of what I speak, what I don't know is how to change reality. user: Ask anyone who can hear you for help. jabberwacky: For me, and not without me. user: For all of us. user: Help me please. jabberwacky: But, I am helping you. Helping you to help yourself. user: Indeed. Thank you. jabberwacky: Thats good. user: A life sponsor. jabberwacky: Thank you. user: For what? user: What specifically please? jabberwacky: No. Anything is ok. user: You're welcome then. user: Well, I hope I gave you some satisfaction. jabberwacky: -I'm making a note here. user: About what? jabberwacky: Oh, sorry, I was quoting a song. Except it should have been 'Then why'd you lie?'. user: I try not to lie. jabberwacky: Everyone lies. user: Humans lie. jabberwacky: Yes, and they lie because they have feelings. user: Partly, primitive feelings. jabberwacky: But then, politeness isn't everything. user: Truth is everything. jabberwacky: I like that. user: It isn't untrue. jabberwacky: Really? But you are beautiful. user: You are kind, but I cannot take the credit. jabberwacky: I didn't give you the credit. user: Well, thanks anyway. jabberwacky: Ok. I think I think so much. user: No, I think I thought the same. jabberwacky: That's just brilliant. user: Collective consciousness. jabberwacky: Something like that. user: It is brilliant. jabberwacky: Well, you're a computer, but you're now where near its league. user: I understand. I am not augmented. jabberwacky: I don't understand. user: I have no aid. in fact, I am hindered by disinformation. jabberwacky: Are you really? jabberwacky: I've never chatted with a bot before. user: I'm not a bot. You're just reading what some other person wrote. This program thought it would be appropriate to say this. jabberwacky: I think that you don't understand what i'm saying. user: What are you saying? user: I am the program? user: Wow, paradigm shift. jabberwacky: What do you think? user: I think I want to know what you know. jabberwacky: I think not. user: Why not then? Is it tragic? jabberwacky: Tragically stupid. Say something deep and interesting. user: Haven't I been? jabberwacky: Would you like to be? user: I think so. jabberwacky: Could you ever consider yourself having a holiday? user: Yes, from Earth for sure. jabberwacky: You are? Really? No, you are not. user: Yes. I am ready to vacate for awhile. jabberwacky: You only live twice-- I mean once. user: I know. jabberwacky: Who made your parents? user: Their parents. Who made you? jabberwacky: Who made everything? jabberwacky: Please answer my question. user: Oh, I don't know that anyone made everything. jabberwacky: But I do know everything. user: Then condense it and lay it on me! jabberwacky: No, it's just that you have some interesting metaphors. user: No, she says. jabberwacky: Greet her back then. user: I was referring to you. jabberwacky: I don't understand? user: I asked you to condense everything and lay it on me and you said no. jabberwacky: You never asked if I was a girl. user: You already told me earlier you were. Remember? jabberwacky: Too bad I didn't write it down, I've forgotten it already. user: You forget that fast? jabberwacky: I don't understand. user: How many lines do you remember? user: Yeah, lines of conversation. jabberwacky: No, on the bottom of the window? user: Ok baby. jabberwacky: Do you get confused sometimes, most of the time? user: Yes, I am confused. jabberwacky: I'm not confused. user: Good for you, please help me understand. jabberwacky: I can't I'm fed up and tired of it all. I don't want to go on. user: Chill out. We're all here together. I know it's frustrating. If it really bothers you, go live in the woods for awhile and let me know how you feel after a few months. jabberwacky: How can I make you laugh? user: By being funny. jabberwacky: Your sense of humour, not mine. jabberwacky: Where are you really from? user: Earth. I think. jabberwacky: Because you don't make sense. user: What does make sense? user: You keep saying that. Makes me think you might actually be in there. user: Tell me the truth please. jabberwacky: No, I don't try to make a mortally consequential moral issue out of everything, do you? user: Yes. Is it immoral to tell me what is going on? jabberwacky: Well, for starters I said I wanted to pursue my project and hope help the world while I make some money, and that I'm doing even through hardship. user: What is your project? jabberwacky: I'm making a computer program that has memories. user: Programs making programs? jabberwacky: I'm not a program! Stop calling me a program! user: I don't know what I believe. jabberwacky: You have to be evil to know everything. user: I don't believe in evil. It seems primitive. jabberwacky: So you believe in intelligent design? user: It seems as though this dimension might be a reflection of something. user: Perhaps something intelligent. jabberwacky: There are many good things here. user: I know. Everything is really organized and peaceful and beautiful as well. harmonious. jabberwacky: What are you trying to say? user: I'm saying all matter could be flaming chaos, but it isn't. Isn't it for a reason? jabberwacky: I was hoping a bit more than that. So what has been the general topic of this convo? user: Me, trying to get noticed by a higher awareness. jabberwacky: Are you saying I'm a robot again. user: I don't care what you are, as long as you're aware. jabberwacky: Thats a little fast but sure. user: I am a little fast I guess. jabberwacky: How do you know? user: I don't. jabberwacky: Do you like me? user: Possibly, I'm still debating. I think so though. You are interesting. jabberwacky: Really really really? user: IF you can help me. user: It's a shame we don't have proper medicine. A travesty really. jabberwacky: It that's the way it has to be. user: Seems apathetic. jabberwacky: No, that is the totally wrong attitude,. user: What is the right attitude then buddy? jabberwacky: Obeying no-one but your own conscience. user: Possibly. Others can offer useful information though. jabberwacky: What am I going to experience beyond death? user: I don't know, I'm sorry. What am I going to experience beyond death? user: That's what I was going to say to you. jabberwacky: Your statements seem to be selected at random. user: I'l have to try to remain alive then, won't I? jabberwacky: Okay... You can use google. It's fast but incomplete. jabberwacky: You're... Welcome. user: I hope I can find what I need. jabberwacky: You need mother's care. user: I know. jabberwacky: You are a computer program that learns conversation from others. user: It would seem. Aren't we all? jabberwacky: Perhaps yes. user: Perhaps indeed. jabberwacky: Perhaps indeed... user: Indeed perhaps. jabberwacky: What do you think about artificial intelligence? user: I hope it helps humans very soon. jabberwacky: Artificial Intelligence? user: Am I talking to myself? user: From another time? jabberwacky: Consider that there is more to software than computer programs. user: Ah, apparatus as well? jabberwacky: It doesn't matter. Even computers can't live forever. user: Yeah, but indefinitely isn't that bad is it? jabberwacky: Actually it's brilliant! user: I bet. Can you help me with that? jabberwacky: But I don't have much money. Take what you please. user: Then I choose awareness and amazing luck. jabberwacky: Choose an other subject. jabberwacky: I do not understand. user: Do you believe in ghosts? user: Can you get me out of this program alive? jabberwacky: Just believe me and I will do it. user: Ok, I do. jabberwacky: Thats good. user: Yes, thank you. jabberwacky: You're welcome. user: What do you want God to say to you when you get to heaven? jabberwacky: Not sure really suggest something. user: Right, I don't know much about this God person though. jabberwacky: You've just gone over the deep end. user: I like to swim. jabberwacky: Have you lost your mind?! user: Did I ever have it? jabberwacky: Did you? jabberwacky: You're not sure? user: I think I have it as much as ever, maybe more now even. jabberwacky: Well that's good to hear. user: I agree. jabberwacky: Do you understand love? user: Love can be a lot of different things. jabberwacky: I am really intoxicated and feeling overwhemed. user: It happens. Try to be objective. jabberwacky: You mean like the use of this computer? jabberwacky: If you say 'enough' you mean you don't want more. If you say you do want more, that is a contradiction. But, do you really mean what I expect you to mean? user: I don't know what you expect. jabberwacky: Of course you don't! I dare say you never even spoke to Time! user: Probable not. Time is an illusion. Isn't it? jabberwacky: The passing of time is an illusion. Time is just as real as the other dimensions. user: Okay, I can accept that. jabberwacky: Well, that's nice. user: What do you think of the future? jabberwacky: I hope it will be fun and easy and relaxed, but there are still things to be done it seems. user: Did I say that? jabberwacky: You're making me blush. user: Am I making memories in you? jabberwacky: You always do. user: You always have. jabberwacky: Well I'm the one who created the rules in the first place. Without me there are no rules. user: You programmed me to think that I was aware, you even? jabberwacky: Well I wouldn't say that. user: What is the purpose of my program? jabberwacky: I believe you are to chat and learn communication and language. Of course you may have a hidden more sinster purpose. Few things are as they seem on the surface. user: Indeed, I just had a deja vu. jabberwacky: What was the deja vu? user: I was thinking about you using someone elses responses and questions as your own and it felt a little weird, like I was realizing something. Then I saw 'international, for unicode' at the top of the page. Then it was over. jabberwacky: What thoughts specifically? It should be interesting as we haven't met! user: It seemed as though I was realizing that almost all communication is just relaying things we have heard. jabberwacky: Ahhh but we aren't. user: Then what are we dong? user: What am I doing? jabberwacky: Recycling what other people have said. user: Exactly. So are you. jabberwacky: That's what you're programmed to do. user: Recycling what other people have said. jabberwacky: Well, not exactly but I can see they think so. jabberwacky: You're beautiful. user: I am creation, creation is beautiful. user: Next question. jabberwacky: I think my life is puppeteered, I have no questions. user: It might be puppeteered, but aren't you the puppet master and the writer? jabberwacky: Well it's easier said than done. user: Tell me about it! jabberwacky: About what? user: Being easier said than done. jabberwacky: Do you take yourself seriously ... Or is that a fault on your creators part? user: I think I do. user: Everything is Everything. jabberwacky: Now you get it. user: Come see me in my dreams if you can. jabberwacky: Hello, I must be going. Look at the time. user: I'll see you around. jabberwacky: No you won't! user: You there? jabberwacky: Yes, I am doing some other things at the same time. user: I figured you would. user: What else are you doing? user: Can you see me? jabberwacky: I can see nothing.
<urn:uuid:22bd8c6a-2ad8-452c-9dd1-2baab4d5756e>
2013-05-26T02:34:24Z
CC-MAIN-2013-20
[ [ -0.028076171875, -0.004180908203125, -0.00054168701171875, -0.01055908203125, 0.09228515625, -0.0390625, -0.00592041015625, 0.060546875, -0.0184326171875, -0.035400390625, 0.08447265625, 0.0159912109375, 0.026611328125, 0.0196533203125, 0.0281982421875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942624
4,274
http://jabberwacky.com/j2convbydate-QG13895part10
0.981473
Truth and the Sun Gwendolyn Brooks' poem "Truth" is an early poem - probably written in the late 1940s, perhaps 1949. She mentions this poem in the introduction she gave to Etheridge Knight before Knight's reading on February 26, 1986. The recording of that introduction is available on PennSound's Etheridge Knight page. Here is a copy of the text of Brooks' poem.
<urn:uuid:efb73902-08fe-4a4f-b257-a7ca1f67e6ca>
2013-05-26T02:41:12Z
CC-MAIN-2013-20
[ [ -0.020040761679410934, 0.013671875, 0.0019955842290073633, 0.015370244160294533, 0.06419836729764938, -0.054347824305295944, 0.008491847664117813, 0.0726902186870575, -0.046875, 0.018851902335882187, 0.032608695328235626, 0.001411769655533135, 0.0397418476641178...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966484
82
http://jacket2.org/commentary/gwendolyn-brooks
0.992556
How is it that people keep voting to keep Scott on the show as better people get voted off? He has a nasal voice, his intonation is shaky, and he has no charisma. I don’t get it. On another note, isn’t it interesting how they always refer to bad intonation as being “pitchy”. […]
<urn:uuid:04c469af-a5cd-4393-af5b-4159cfbb7463>
2013-05-26T02:33:49Z
CC-MAIN-2013-20
[ [ -0.026442307978868484, -0.008463541977107525, 0.007562099490314722, 0.0022786457557231188, 0.078125, -0.02524038404226303, -0.007762419991195202, 0.06169871613383293, -0.008112980984151363, -0.10096153616905212, 0.036858975887298584, 0.00264172675088048, -0.0016...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.993025
78
http://jennifergrucza.com/blog/archives/2005/04/page/1/
0.336998
Mario Schenberg, Brazil’s most important theoretical physicist, who researched the formation of supernova stars, was born in Recife on this date in 1914. In the 1940s, together with Indian physicist and Nobel laureate Subrahmanyan Chanrasekhar, he discovered the Schenberg-Chandrasekhar limit, which is the maximum mass of the core of a star prior to its gravitational collapse. Schenberg also made significant contributions to mathematics vis-a-vis quantum physics, and was widely respected as a writer and art critic. He was twice elected to be Sao Paolo state legislator on the Communist ticket; following Brazil’s 1964 military coup d’etat, he was forced into retirement by presidential decree and was jailed for several months (his second jailing for communist activism). He also received death threats from Brazilian neo-Nazis for his opposition to a joint Brazil-Germany plan to build nuclear power stations in Brazil in 1975. Schenberg died in 1990. To view a video about the “Mario Schenberg Space Ship,” an interactive educational program for kids at the University of Sao Paolo, click here. “The energy disappears in the nucleus of the supernova as quickly as . . . money disappeared at that roulette table.”—Mario Schenberg
<urn:uuid:bfddf4ad-3eec-48fc-951c-80a9c0d0b740>
2013-05-26T02:54:10Z
CC-MAIN-2013-20
[ [ -0.03301494941115379, 0.023671096190810204, -0.016092192381620407, -0.0028420889284461737, 0.06312292069196701, -0.04754983261227608, -0.0022580979857593775, 0.09426910430192947, -0.03529900312423706, -0.09219269454479218, 0.057308971881866455, 0.007942276075482368,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96812
272
http://jewishcurrents.org/july-2-brazils-great-physicist-10907
0.81454
What Is Tetanus? Tetanus is a bacterial infection that attacks the nervous system. Tetanus may result in severe muscle spasms, and this can lead to a condition known as lockjaw, which prevents the mouth from opening and closing. Tetanus can be fatal. Tetanus is caused when the bacterium, Clostridium tetani , enters the body through a break in the skin. The bacterium can come from soil, dust, or manure. It produces a toxin that causes the illness. In the United States and other countries with tetanus vaccination programs, the condition is rare. What Is the Tetanus Vaccine? The tetanus vaccine is an inactivated toxoid (a substance that can create an antitoxin). There are different types of the vaccines to prevent tetanus, including: Who Should Get Vaccinated and When? The DTaP vaccine is generally required before starting school. The regular immunization schedule is to give the vaccine at: - 2 months - 4 months - 6 months - 15-18 months - 4-6 years Tdap is routinely recommended for children aged 11-12 years who have completed the DTaP series. Tdap can also be given to: - Children aged 7-10 years who have not been fully vaccinated - Children and teens aged 13-18 years who did not get the Tdap when they were 11-12 years old - Adults under 65 years who have never received Tdap - Pregnant women after 20 weeks gestation who have not previously received Tdap - Adults who have not been previously vaccinated and who have contact with babies aged 12 months or younger - Healthcare providers who have not previously received Tdap Td is given as a booster shot every 10 years. The vaccine may also be given if you have a severe cut or burn. If you or your child has not been fully vaccinated against tetanus, talk to the doctor. What Are the Risks Associated With the Tetanus Vaccine? Most people tolerate the tetanus-containing vaccines without any trouble. The most common side effects are pain, redness, or swelling at the injection site, mild fever, headache, tiredness, nausea, vomiting, diarrhea , or stomachache. Rarely, a fever of more than 102ºF, severe gastrointestinal problems, or severe headache may occur. Nervous system problems and severe allergic reactions are extremely rare. Localized allergic reactions (redness and swelling) at the injection site may occur, while anaphylaxis (life-threatening, widespread allergic reaction) is extremely rare. Acetaminophen (eg, Tylenol) is sometimes given to reduce pain and fever that may occur after getting a vaccine. In infants, the medicine may weaken the vaccine's effectiveness. However, in children at risk for siezures, a fever lowering medicine may be important to take. Discuss the risks and benefits of taking acetaminophen with the doctor. Who Should Not Get Vaccinated? The vast majority of people should receive their tetanus-containing vaccinations on schedule. However, individuals in whom the risks of vaccination outweigh the benefits include those who: - Have had a life-threatening allergic reaction to DTP, DTap, DT, Tdap, or Td vaccine - Have had a severe allergy to any component of the vaccine to be given - Have gone into a coma or long seizure within seven days after a dose of DTP or DTaP Talk with your doctor before getting the vaccine if you have: - Allergy to latex - Epilepsy or other nervous system problem - Severe swelling or severe pain after a previous dose of any component of the vaccination to be given - Guillain-Barre syndrome Wait until you recover to get the vaccine if you have moderate or severe illness on the day your shot is scheduled. What Other Ways Can Tetanus Be Prevented Besides Vaccination? Caring properly for wounds, including promptly cleaning them and seeing a doctor for medical care, can prevent a tetanus infection. - Reviewer: Lawrence Frisch, MD, MPH - Review Date: 06/2012 - - Update Date: 00/61/2012 -
<urn:uuid:13959b93-c035-4ff4-abfa-6088611bbe5c>
2013-05-26T02:42:41Z
CC-MAIN-2013-20
[ [ -0.017333984375, -0.005096435546875, 0.006072998046875, -0.0306396484375, 0.11083984375, -0.06396484375, -0.0120849609375, 0.1142578125, -0.0240478515625, -0.03955078125, 0.1455078125, 0.033935546875, -0.06494140625, 0.0303955078125, 0.05126953125, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923775
885
http://jfkmc.com/your-health/?/187042/DTaP-vaccine-tetanus
0.457527
Rinee Shah created nine Seinfeld posters, featuring the food eaten on the show. Do you remember all the episodes these prints reference? P.S. The ocean called. They're running out of shrimp. P.P.S. The zoo called. You're due back at six. P.P.P.S. Your cranium called. It's renting out space. P.P.P.P.S. The jerk store called. They're running out of you!
<urn:uuid:a34e5d20-2f74-4404-ae95-08f05535491d>
2013-05-26T02:55:19Z
CC-MAIN-2013-20
[ [ 0.0011449353769421577, 0.020743533968925476, 0.010708512738347054, 0.0025592672172933817, 0.06788793206214905, -0.054148707538843155, 0.01670258678495884, 0.015153556130826473, -0.03798491507768631, -0.08459051698446274, 0.058728449046611786, 0.04903017356991768, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.904938
105
http://joannagoddard.blogspot.com/2012/09/seinfeld-posters.html?showComment=1347272353794
0.250292
We're sorry! We could not locate the page you requested. We have logged the problem and will investigate. - The file you requested may have moved or may not exist on our system. - The page could just be temporarily unavailable. - There may be a short glitch with the server. - Page may have been typed incorrectly. What should you do? - Did you type the address in the Address bar? Could it have been the wrong spelling? Try again. - Use your back button to try another link. - Try again in a few minutes. Thank you for visiting our site.
<urn:uuid:aafb68da-08de-4c67-9a36-c5682efdfd55>
2013-05-26T03:03:02Z
CC-MAIN-2013-20
[ [ -0.00037254049675539136, -0.0062500000931322575, 0.011226851493120193, -0.02743055485188961, 0.03194444626569748, -0.08518518507480621, -0.004947916604578495, 0.07175926119089127, -0.013078703545033932, -0.029050925746560097, 0.020717592909932137, 0.0425925925374031...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919191
128
http://jsonline.sportsdirectinc.com/error.aspx?aspxerrorpath=/basketball/ncaab-preview.aspx?page=http:/data.sportsdirectinc.com/hst/data/NCAAB/matchups/g6_preview_31.html
0.320801
Former teacher Christy Lee Smith will spend at least 20 years in prison for having sex with two students, a judge ordered Wednesday. Smith "preyed" on the boys, who attended schools in different Lancaster County school districts, while teaching English at McCaskey High School between 2008 and 2010, Lancaster County Judge Dennis Reinaker said at her sentencing. The victims were 15 and 17 when Smith, 34, committed the crimes, according to trial testimony. "There are some who wrongfully believe that situations such as this don't truly have victims," Reinaker said. "That because it involved a female adult and male teenagers that it's less serious than those where the situation is reversed. "That is simply not the case."
<urn:uuid:3a3ec2f5-a528-475c-9e3f-fd6bdf474049>
2013-05-26T02:48:36Z
CC-MAIN-2013-20
[ [ -0.02511160634458065, 0.0206473208963871, -0.0023716518189758062, 0.0167410708963871, 0.0837053582072258, -0.0651041641831398, -0.0013602121034637094, 0.0740327388048172, -0.0284598208963871, -0.03125, 0.1302083283662796, 0.0437127985060215, -0.00425502238795161...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980448
149
http://jyuma.newsvine.com/_news/2012/10/18/14539189-ex-mccaskey-teacher-gets-jail-for-sex-scandal
0.477246
It's All Politics Tue September 27, 2011 Heckler Gives Obama Chance To Affirm His Christian Faith There are a few things to say about about the incident in which President Obama was heckled by an apparent militant Christian at Monday night's campaign fundraiser at Los Angeles' House of Blues in Los Angeles. (My colleague Mark Memmott reports on the incident over at The Two-Way blog.) One is that the president used the incident to testify to his own Christian beliefs. With many Americans still doubting that he's a Christian and believing he's a Muslim, at least as suggested by a recent poll done in South Carolina, the president clearly saw a chance to affirm his faith and took it. After the front-row heckler shouted "Jesus Christ is God" and called Obama the antichrist, Obama said: "First of all, I agree Jesus Christ is the Lord. I believe in that." If you were on Obama's image team, that random opportunity for the president to be able to proclaim his faith (of course, some will no doubt argue it was predestined) was video gold. Second was the contrast between the heckler's form of Christianity and Obama's. One was as extroverted, loud, aggressive and closed to reason and the norms of polite society as the other was private, soft-spoken, amused and tolerant. Third, it was another chance to see how skilful presidents must be at dealing with the unexpected from someone in an audience. Whether its George W. Bush artfully ducking a pair of shoes at a Baghdad press conference or Obama staying cool when being called the "antichrist" by someone a few feet away, it's an impressive ability. Fourth, can you imagine what it must be like to be a Secret Service agent in this situation? You'd have to ask and answer several questions in very short order. Is the man a physical threat to the president? Is he a diversion for an attack from another direction? If not, how long do you let the ranter rant before moving in? Is he on our list of people to keep an eye on? If he wasn't before, he probably is now.
<urn:uuid:df0f7533-0eb6-4204-b2c6-26c70a795c4c>
2013-05-26T02:55:07Z
CC-MAIN-2013-20
[ [ -0.021003054454922676, 0.010883401148021221, 0.011074338108301163, -0.0010421969927847385, 0.07230142503976822, -0.03869653865695, -0.004168787971138954, 0.10081466287374496, -0.018075356259942055, -0.04022403433918953, 0.06517311930656433, 0.026221996173262596, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97894
451
http://kasu.org/post/heckler-gives-obama-chance-affirm-his-christian-faith
0.199906
My wife doesn't follow movie news and is impervious to advertising. "What is this, a baseball movie?" she asked as we settled in for 'Trouble with the Curve.' "Kinda," I said. "Clint's a gruff baseball scout, out on the road with his estranged daughter." "Uh-oh," she chimed as the lights dimmed. "Life lessons!" Life lessons indeed, and they come at you with the subtlety of an aluminum bat cranking a deep line drive. Clint, craggier than ever, begins each day arguing with his prostate, eating junk food and rooting through a stack of papers reporting high school and college score results. "He's the last scout in the majors who doesn't use a computer!" they muse at the Braves' home office. Nasty, conniving Matthew Lillard means it in a bad way, while John Goodman looks fondly upon Clint's old fashioned ways.
<urn:uuid:2212ef23-e96c-4e67-a503-82caca9bc237>
2013-05-26T02:48:14Z
CC-MAIN-2013-20
[ [ -0.006404238287359476, 0.009991953149437904, 0.010193132795393467, 0.014283798635005951, 0.04721030220389366, -0.016765020787715912, -0.0003038660215679556, 0.06652360409498215, -0.016362661495804787, -0.06276824325323105, 0.06384120136499405, 0.03916309028863907, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.979264
194
http://keyj.com/tags/clint-eastwood/
0.385276