text stringlengths 130 541k | id stringlengths 47 47 | date stringdate 2013-05-18 04:54:19 2013-06-20 13:35:46 | dump stringclasses 1 value | embeddings listlengths 1 351 | file_path stringclasses 916 values | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 30 166k | url stringlengths 14 835 | quality_score float64 0.16 1 |
|---|---|---|---|---|---|---|---|---|---|---|
MANATEE -- Monday morning's fog could give way to showers and thunderstorms on Monday in Bradenton, according to the National Weather Service.
Areas of dense fog are possible before 1 p.m. Otherwise, skies will be partly sunny, with a high near 82 and southerly winds of 6 to 11 mph increasing to 13 to 18 mph in the afternoon. Gusts could reach 25 mph, according to the Weather Service.
The chance of rain was 30 percent.
The chance of rain extends into the evening, when the expected low was around 69. There could be patchy fog and south-southeasterly winds of 11 to 16 mph, with gusts as high as 22 mph.
Tuesday, the chance of rain grows to 70 percent, according to the Weather Service. | <urn:uuid:ef35c607-a624-4132-b4c7-ded5d8f3de01> | 2013-05-18T07:26:06Z | CC-MAIN-2013-20 | [
[
0.04212707281112671,
0.0009765625,
-0.02693370170891285,
0.00845994520932436,
0.022790055721998215,
-0.08011049777269363,
0.01648825965821743,
0.08977900445461273,
0.006215469446033239,
-0.06733425706624985,
0.06629834324121475,
0.05041436478495598,
-0.045580111... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9552 | 164 | http://www.bradenton.com/2013/02/25/4408518/weather-alert-fog-rain-possible.html | 0.178213 |
Steve Merfeld gives Bradley the unique distinction of two staff members who boast NCAA Tournament victories as a head coach. Now in his third year as an assistant for the Braves, Merfeld boasts 23 years of NCAA Division I basketball coaching experience, including 10 seasons as a head coach: at Hampton from 1997-02 and at Bradley's Missouri Valley Conference rival Evansville from 2002-07.
In his 10 years as a college head coach, Merfeld collected 144 victories, two regular-season conference championships, two conference tournament titles and two NCAA Tournament appearances. That first postseason appearance in 2001 led to one of the signature moments in NCAA Tournament history as the video of his players lifting him up in celebration following No. 15 seed Hampton's upset of No. 2 seed Iowa State in the 2001 tourney remains a popular March Madness clip.
Merfeld led Hampton to a winning record in four of his five years, finishing with a 90-57 (.612) record that was capped by back-to-back sweeps of the Mid-Eastern Athletic Conference regular-season and tournament titles in 2001 and 2002. After Hampton became just the fourth No. 15 seed to win a NCAA Tournament game in 2001, Merfeld's Pirates became the first-ever 15-seed winner to return to the NCAA Tournament the following season. In his final season at Hampton, Merfeld led the 2001-02 Pirates to a school-record 26 wins, although one of the team's seven losses was an 87-84, double-overtime setback to Bradley Dec. 21, 2001 at Carver Arena. Merfeld was rewarded for his efforts in returning Hampton to the Big Dance by being named the 2002 College Hoops Insider Mid-Major Coach of the Year.
Merfeld replaced longtime Evansville head coach Jim Crews in 2002 and directed the Purple Aces to a 54-91 record in five seasons, including a 4-6 mark against Bradley, and his Evansville teams collected 11 victories against postseason squads (7 NCAA, 4 NIT). In addition to four All-Missouri Valley Conference players, he coached two-time Academic All-American Clint Cuffle (2003, 2004) and a trio of 1,000-point scorers on his 2006-07 squad.
Since joining the Bradley coaching staff in 2007, Merfeld has helped the Braves to a pair of 21-win seasons, including seven postseason victories that have helped Bradley claim a pair of tournament runner-up finishes.
A 1984 graduate of Wisconsin-La Crosse, Merfeld was a 10-year assistant for current George Mason head coach Jim Larranaga at Bowling Green prior to joining the Hampton staff as an assistant in 1996. During his time with the Falcons, Merfeld established himself as a highly-regarded recruiter and is credited with signing Antonio Daniels, the fourth pick in the 1997 NBA Draft. He also landed three Mid-American Conference Rookies of the Year in a five-year span, including Daniels and Anthony Stacey, both of whom went on to be named the league's Player of the Year in 1997 and 2000, respectively.
When he joined the Bradley staff in 2007, Merfeld became the first Valley head coach to assume an assistant position within the league since Gary Garner joined the Tulsa staff for the 1988-89 season following a seven-year run as the head coach at Drake from 1981 through 1988. After one season at Tulsa, Garner took over as the head coach at Southeast Missouri State in 1989 and directed the Ohio Valley Conference program for nine years.
Merfeld and his wife, Mary Jo, reside in Peoria with their 10-year-old daughter Lauren and eight-year-old son Andrew. | <urn:uuid:4921981a-d425-4809-9cc4-e049d72a5a54> | 2013-05-18T06:56:42Z | CC-MAIN-2013-20 | [
[
0.0252685546875,
0.03076171875,
-0.01953125,
0.0089111328125,
0.048583984375,
0.043701171875,
0.004058837890625,
0.08349609375,
-0.01385498046875,
-0.0654296875,
0.11474609375,
0.0537109375,
-0.035400390625,
0.041748046875,
0.057861328125,
0.00897216... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97976 | 743 | http://www.bradleybraves.com/ViewArticle.dbml?SPID=1498&DB_OEM_ID=3400&ATCLID=1065099&Q_SEASON=2008 | 0.363107 |
EDIT: I just corrected a few mistakes and edited the requiem prayer at the end to be specific to one man.
"Charge!" screamed the officer.
Thundering forward and building up speed, the Imperial French heavy cavalry went to reinforce their Confederate allies. Trumpets sounding, flags fluttering, and sunlight glinting off the cuirassiers polished armor; it was a charge that would have made Napoleon I or Frederick the Great pleased at the order and appearance of it. The cavalry was formed into neat ranks even when they charged over obstacles such as bushes and fences.
At this same time, Jake led the charge on the chevau de frise and helped tear them out of the ground. Within five minutes, the Confederates were surging forward. Then the actual Mexican soldiers arrived in force. Wearing green coats and metal pith helmets, the Mexican soldiers formed a line of battle.
General Gerardo Rudolphe Stephano, who was in charge of the Mexican forces, peered through his spyglass, "Dile a los hombres al ataque, el capitán. Hacer nuestra línea de cuatro hombres de profundidad, y marchar hacia adelante. ¡Viva México!"
The captain wrote down the orders in a mental notepad. Stephano had said, "Order the men to attack, captain. Make our line four men deep and march forward."
"Sí, señor! Así se hará!" saluted the officer, which meant, "Yes, sir! It shall be done!" The captain raced out on his grey Mexican horse and over to the men, "Hombres, línea de cuatro patas ... adelante! ¡Viva México!"
"¡Viva México!" chanted the army, "¡Viva el general!"
The captain rode over to the Mexican music corps, "Música militar! Tener la banda tocar una marcha!" he said, ordering the band to play a march. He then drew his sword and the buglers sounded the call to attack, "Avance! Adelante!" The troops advanced slowly, building into a sprint. All around, all over the ground, were wounded and dead Mexicans. More were heading in the opposite direction, either carrying wounded comrades or heading to the medical tents themselves. A couple hundred yards ahead were the Confederates.
After getting the enemy into range, the captain ordered, "Primera fila ... voley!" at that, the first rank fired into the Confederates.
"Primera fila de rodillas! Segunda fila ... ¡Fuego!" The first rank kneeled as the second rank took aim and fired. The bullets sprayed into the Confederates who were in the middle of forming their own line of battle.
The enemies' line almost formed, the captain gave the order for his infantry to enter melee, "Los hombres, bayonetas arreglar! Listo... cargo!"
"¡Viva México!" rang out once again. The Mexicans ran at the Americans with their newly attached bayonets pointed forward.
The greencoats smashed into the greycoats and bloody combat and chaos ensued. Jake used his rifle to bash his foes' head in. Then, seeing the Mexican captain have his horse shot out from under him, decided to go after him. He worked his way up to him by killing several Mexican soldiers. Finally, he thrusted his bayonet at the officer. The captain narrowly dodged, suddenly stepped forward, and landed a punch squarely on Jakes jaw. Jake angrily tackled him and they rolled over and over each other on the bloody ground. Jake got on top and started choking the Mexican. The captain managed to push him off. But, then, Jake picked up a large stone and landed it solidly on the captain's forehead. With a loud crunch, the rock ended the captain's life.
The Confederates were much relieved when the cuirassiers reached them. Seeing the odds, the Union and Mexican troops started to give ground.
Vive le Vive l'empereur! Vive la France!" cried the cavalrymen. They continued hacking away at the retreating Mexican troops.
Jake and his men recieved orders from the brass to wait to be reinforced. After twenty minutes, a fresh macabre batch, made up of accomplished soldiers who were no longer needed at other spots on the battlefield, arrived. Riding in front were ten trumpeters, who had blue banners draped on their instruments. In the center of those banners was a picture of a golden Roman-style laurel wreath with a big golden "N" in he center of that.
Jake could not see why they were there until he saw a fat man about 50 riding behind them. The man wore a red kepi and a blue coat.
"Vive le Prince Impérial! Vive le prince Napoléon!" rang out from the French troops loud and clear.
Jake watched the man direct the Allied infantry. What he could not hear was the following conversation:
"Sire, I do not think it wise of you to put yourself in danger," said a French officer.
Prince Napoleon waved his hand angrily, "Nonsense! I'm a prince of the House of Bonaparte; it is my duty to be present."
The officer, a major, really felt like telling the fat, arrogant man, "Oh, go step on a landmine, you gluttonous old Socialist windbag," but he held his temper, "Sire, I don't want you to be hurt; it would severely damage the feelings of the me, the Emperor and all of France!" he lied.
"Poppycock! I am tired of people calling me Crait-Plon! I will finaly show them I'm not "afraid of lead!" he waved his fist in the direction of France, half a world away, "I shall attack, major. They're retreating anyway." Then, he drew his sabre and pointed at the men, 'Men of the Second Empire of France...for God's glory, onward to victory!" It was the prince who lied now. He was, for all practical purposes, an atheist, but knew saying it was for God's glory would inspire his Roman Catholic troops.
The band played the Grognard March and the army followed the Prince Impérial into battle. Soon, Jake and the others joined their allies.
Then the order was given to attack some fleeing Mexicans on top of a hill. Just as they neared the top, "fuego," the Spanish word for "fire" was heard, and guerrilas popped out of the bushes and shrubs. Their rifle bullets slammed into the Allies.
The prince directed the men to go into melee. Jake watched the prince grab a tri-color and charge with his personal cavalry. Suddenly, a lucky shot hit the fat Bonaparte in the chest. Blood pouring out of his wound, the glutton toppled from his horse and hit the ground like a ton of bricks.
Before the news spread, the Allies had already pushed the Mexicans off the hill.
Dashing over to the prince, who was surrounded by officers and medics. The French major and the flag-bearer were the ones closest to the prince.
'"Sire, can you hear me?" asked the major.
The Prince Impérial just made a gurgling noise and nodded. Quite a few seconds passed before he spoke, "Yeeeessss...I-I-I...uh...tell Emperor Napoleon that...That I'm not afraid of...lead...anymore. Vive le France!" He started sputtering at that exclamation and started coughing up blood.
"Sire?! Sire, can you still hear me? Check his pulse!" ordered the captain.
A medic rushed forward, "I'll do it..." he said while grabbing the Prince's wrist and feeling for a pulse. After five seconds, he looked up and said, "Le prince est mort. The prince is dead."
"Requiem æternam dona eis, Domine,
et lux perpetua luceat eis.
Te decet hymnus Deus, in Sion,
et tibi reddetur votum in Ierusalem.
Exaudi orationem meam;
ad te omnis caro veniet.
Requiem æternam dona eis, Domine,
et lux perpetua luceat eis.
"Requiem æternam dona eis, Domine :
et lux perpetua luceat eis.
In memoria æterna erit iustus,
ab auditione mala non timebit.
animas omnium fidelium defunctorum
ab omni vinculo delictorum
et gratia tua illis succurente
mereantur evadere iudicium ultionis,
et lucis æternae beatitudine perfrui.
"Forgive, O Lord,
the souls of all the faithful departed
from all the chains of his sins
and by the aid to him of your grace
may he deserve to avoid the judgment of revenge,
and enjoy the blessedness of everlasting light."
"Amen," said the major after reciting the Catholic funeral prayer.
"Amen," echoed the others as they made the sign of the cross. The major placed a crucifix in the hand of the dead man, which Jake had trouble not laughing about, knowing of the prince's atheism.
LEGO Builder, Writer, Video-Gamer, Greaser, History Professor, Swordsman, and Military Collector. I am the Most Interesting Man in the World. :p | <urn:uuid:6a2c6181-1408-44ef-9920-7e5126f5885d> | 2013-05-18T08:07:14Z | CC-MAIN-2013-20 | [
[
-0.0218505859375,
0.0157470703125,
-0.0230712890625,
0.026611328125,
0.1123046875,
-0.03515625,
-0.0016021728515625,
0.09619140625,
-0.01556396484375,
-0.0294189453125,
0.0029296875,
0.046142578125,
0.0167236328125,
0.01611328125,
0.043212890625,
0.0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957398 | 2,059 | http://www.brickforge.com/forum/viewtopic.php?p=80954 | 0.427993 |
RR Lyrae starArticle Free Pass
RR Lyrae star, any of a group of old giant stars of the class called pulsating variables (see variable star) that pulsate with periods of about 0.2–1 day. They belong to the broad Population II class of stars (see Populations I and II) and are found mainly in the thick disk and halo of the Milky Way Galaxy and often in globular clusters. There are several subclasses—designated RRa, RRb, RRc, and RRd—based on the manner in which the light varies with time. The intrinsic luminosities of RR Lyrae stars are relatively well-determined, which makes them useful as distance indicators.
What made you want to look up "RR Lyrae star"? Please share what surprised you most... | <urn:uuid:ca821097-b750-4e33-85da-b6754420e0dc> | 2013-05-18T07:15:36Z | CC-MAIN-2013-20 | [
[
-0.031088082119822502,
-0.010119819082319736,
-0.010686528868973255,
0.0002580553700681776,
0.030116580426692963,
-0.10297927260398865,
0.004776554182171822,
0.07577720284461975,
-0.014734456315636635,
0.018296632915735245,
0.06509067118167877,
-0.004594397731125355... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947727 | 171 | http://www.britannica.com/EBchecked/topic/511720/RR-Lyrae-star | 0.7979 |
We're sorry, no products were found for your search:
Try your search again using these tips:
- Double check the spelling. Try varying the spelling.
- Limit the search to one or two words.
- Be less specific in your wording. Sometimes a more general term will lead you to the similar products. | <urn:uuid:13e18da2-857e-4ee1-b814-a33fd64fdd2e> | 2013-05-18T06:28:23Z | CC-MAIN-2013-20 | [
[
0.013643568381667137,
0.010473279282450676,
0.013983243145048618,
-0.015398550778627396,
0.06295289844274521,
-0.04030797258019447,
-0.022644927725195885,
0.038269925862550735,
-0.014719203114509583,
-0.009737318381667137,
0.03917572647333145,
0.05978260934352875,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.922386 | 66 | http://www.brownsshoes.com/13/13,default,sc.html?prefn1=siteAssignment-text&prefv1=brown&prefn2=brand&prefv2=DKNY%7CGIANMARCO%20LORENZI&prefn3=size&prefv3=8%C2%BD | 0.993095 |
Transferable knowledge and a range of intellectual abilities drawn from different modes of inquiry across disciplines are essential components of any liberal education. These courses help students develop important academic capacities for use during their undergraduate career and in the rapidly-changing world they will enter after college.
(one writing-intensive W-1 course in the fall of the first year)
Students will develop writing, reading, speaking, listening, and information literacy skills necessary for collegiate-level academic work.
Students will develop capacities for independent academic work and become self-regulated learners.
(one course from the list of designated courses)
Students will develop a unified understanding of scientific theory and practice in modern natural science.
Students will demonstrate an understanding of the development of science as an intellectual pursuit and of the ways in which scientific ideas are formulated, modified, and come to be accepted.
Students will demonstrate skill in the application of scientific techniques and methods, including the collection, analysis, and interpretation of data, and communication of results.
(one course from the list of designated courses; not required for Class of 2014)
Students will study language as a complex multifunctional phenomenon - as a system for communicating thought and information and as an essential element of human thought processes, perceptions, and self-expression - that allows students to understand different peoples and their communities.
Students will examine the world, their own culture, and their own language through the lens of a foreign language and culture.
Integrated Perspectives Course
(one team-taught interdisciplinary course taken during the sophomore year from the list of designated courses; not required for Class of 2014)
Students will recognize, construct, and evaluate connections among different intellectual methods, ways of learning, and bodies of knowledge. | <urn:uuid:ad6de8ff-b389-41d5-a5b6-03d0efd5448c> | 2013-05-18T05:58:24Z | CC-MAIN-2013-20 | [
[
-0.04525316506624222,
0.016455696895718575,
0.01305379718542099,
0.017405062913894653,
0.06962025165557861,
0.006091772112995386,
0.007476266007870436,
0.08544303476810455,
-0.005063291173428297,
0.010443038307130337,
0.0768987312912941,
0.017009492963552475,
-0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931771 | 353 | http://www.bucknell.edu/x56898.xml | 0.405247 |
Masonry walls are generally highly durable. However, when masonry walls in cold climates stay too wet for too long, freeze-thaw damage can occur. This issue has particular relevance for energy efficiency retrofits, because the addition of interior insulation causes the masonry to stay colder and have a lower drying potential.
The following documents present details of BSC’s research and experience regarding the prevention of freeze-thaw damage in retrofit projects. Technical topics such as the critical degree of saturation (Scrit) are discussed, and case studies and recommendations are provided. | <urn:uuid:3352869b-5a1d-4fc3-a8ff-008240614583> | 2013-05-18T06:56:53Z | CC-MAIN-2013-20 | [
[
-0.045242536813020706,
-0.015508395619690418,
0.014458955265581608,
-0.004605876747518778,
0.10634328424930573,
-0.07835821062326431,
0.012243470177054405,
0.10447761416435242,
-0.022971082478761673,
-0.04827425256371498,
0.09701492637395859,
0.018540112301707268,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.935124 | 116 | http://www.buildingscience.com/resources/freeze-thaw-damage/bsc_topic_view?climates=hot-humid | 0.171513 |
A new study by German consulting firm Prognos, commissioned by German think tank the Bertelsmann Foundation, just put a price tag on peripheral countries like Greece, Portugal, Spain, and Italy exiting the euro.
The worst case – all four countries leave, and it costs the world a total of $22 trillion in economic growth.
The study also looks at the ramifications of 1) just a Greek exit, 2) a Greek/Portuguese exit, 3) A Greek/Portuguese/Spanish exit, and 4) an exit by Greece, Portugal, Spain, and Italy.
Here are the results (the table measures losses in euros):
If only Greece were to exit, the study still estimates a total of $881 billion (674 billion euros) in lost growth worldwide.
If Portugal followed Greece, that would raise the damage to $3.2 trillion. If Spain joined, that number would go to a staggering $10.3 trillion.
However, Italy clearly has the biggest impact. If Italy were to follow the other three, the total lost economic growth worldwide would more than double to $22 trillion.
Here is what the study has to say on the effects of the worst case scenario:
The departure of Greece, Italy, Portugal and Spain from the European Monetary Union would provoke a worldwide recession that would translate into a GDP decline amounting to nearly 17.2 trillion euros in the 42 VIEW states in the lead-up to 2020. In terms of absolute figures, the declines would be the greatest in France (2.9 trillion euros), the US (2.8 trillion euros), China (1.9 trillion euros), and Germany (around 1.7 trillion euros). France would be particularly hard hit by Italy’s sovereign default and exit from the euro, on account of the extensive loans French banks have made to Italy.
The cumulative GDP decline would amount to 154 percent of economic output for 2013, with Italy alone registering a cumulative GDP loss of around 75 percent of GDP for 2013. The counterpart figures for Germany, the US and China would be 69, 25 and 49 percent respectively.
For more on the model used to derive these estimates and the requisite assumptions that went into it, check out the full text of the study. It's available on the Bertelsmann Foundation's website > | <urn:uuid:caa6691b-126f-4ef0-ac68-c27e0c9e2298> | 2013-05-18T05:51:42Z | CC-MAIN-2013-20 | [
[
0.021329365670681,
0.0414186492562294,
-0.01798115111887455,
0.02083333395421505,
0.0778769850730896,
-0.0758928582072258,
-0.0087425597012043,
0.147817462682724,
-0.03075396828353405,
-0.0226934514939785,
0.0570436492562294,
-0.0166170634329319,
-0.063988097012... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.949811 | 474 | http://www.businessinsider.com/prognos-euro-exits-cost-world-22-trillion-growth-2012-10 | 0.243254 |
The Threepenny Opera (Die 3groschenoper) [DVD]
Director : G.W. Pabst
Screenplay : Béla Balázs, Léo Lania, & Ladislaus Vajda (based on the play by Bertolt Brecht)
MPAA Rating : NR
Year of Release : 1931
Stars : Rudolf Forster (Mackie Messer), Carola Neher (Polly Peachum), Reinhold Schünzel (Tiger-Brown), Fritz Rasp (Peachum), Valeska Gert (Mrs. Peachum), Lotte Lenya (Jenny), Hermann Thimig (The Vicar), Ernst Busch (The Street Singer), Vladimir Sokoloff (Smith, the Jailer)
The Threepenny Opera (Die 3groschenoper) began its life on stage in Germany in the late 1920s as a rousing opera parody that dared to use the underbelly of society as its canvas. The exact process by which it was written and staged is such a labyrinth of confusion, false credit, and borrowed material that I'll simply note that the play itself is generally credited to radical playwright Bertold Brecht and the songs to composer Kurt Weill. The process by which the immensely popular play was brought to the silver screen is even more confusing, resulting in both Brecht and Weill suing the producers (Brecht lost; Weill won). Suffice it to say here that the great director G.W. Pabst, who had most recently started the cult of Louise Brooks with his magnificent silent epic Pandora's Box (1929), directed a screenplay that substantially changed several things from the play, including the ending, which made it, if anything, more socially cutting.
The story in The Threepenny Opera is actually derived from a much older source: John Gay's 1728 The Beggar's Opera, which was also a parody of traditional opera and took place amid the gutter set. Set in the back alleys of Victorian-era London, the story's primary character is Mackie Messer (aka, Mack the Knife), played by Rudolf Forster. Mackie is a dapper, successful crime lord who falls for Polly Peachum (Carola Neher), who happens to be the daughter of Mr. Peachum (Fritz Rasp), the so-called “beggar king” who has taken it upon himself to control London's beggars by licensing them. Peachum does not take kindly to Mackie seducing his only daughter, so he forces London's chief of police, Tiger-Brown (Reinhold Schünzel), to crack down on Mackie, who is Tiger-Brown's longtime friend. Thus, the story is, in a sense, a love triangle, with Polly caught in the middle between her new husband and her demanding father, and one of its most progressive elements is the iron-fist manner in which Polly steps up and takes over Mackie's gang when needed. She is not a woman who will be pushed around.
In his direction, Pabst seems somewhat torn between staying true to the story's theatrical roots and expanding it out into the purely cinematic. Pabst had made his name in the 1920s directing a series of films praised for their social realism, which stood in stark contrast to the expressionist tendencies that had defined the German cinema in the earlier part of the decade. He brings that textured understanding of the streets to The Threepenny Opera, making carefully constructed sets feel dank and lived in. Much of the story unfolds inside old warehouses, back alleys, and deserted buildings; the most modern and inviting space in the film is, ironically, the prison. Yet, because the film is a musical, there is always an element of inherent fantasy and theatricality, even though only a few songs from the original play are part of the film (these include “Cannon Song” sung by Mackie and Tiger-Brown and “Die Moritat vom Mackie Messer,” which introduces the main character and was made famous in the States when Bobby Darin, among many others, covered it as “Mack the Knife”).
In this sense, The Threepenny Opera is constantly operating in various interstitial spaces--between realism and fantasy, between the theatrical and the cinematic, and, most importantly, between parody and social commentary. Brecht's original play was rife with his alienating effects, including the self-conscious use of direct narration and a patently ridiculous deus ex machina ending that was meant to satirize the need for a “happily ever after.” The film maintains some of these (for example, there is a narrator whose address breaks the film into three parts), but Pabst tones down the more directly confrontational nature of the Brechtian approach and instead focuses on the idea of social commentary, particularly regarding corruption. This is seen most clearly in Tiger-Brown's willingness to turn a blind eye to Mackie's criminal activities, but it is probably sharpest in the film's most amusing scene, which depicts Peachum licensing the beggars and then outfitting them with clothes and feigned maladies that are guaranteed to separate sympathetic people from their money.
Because of its timeless themes and innovative musical-comedy approach to social issues (which is now nothing short of a given in contemporary theater), The Threepenny Opera has aged exceedingly well. Aspects of the film that were criticized when it first came out (for example, the anachronistic quality of the German production's version of what 18th-century London looked like) seem almost beside the point. The humor is still funny, the satire still bites, and the tunes are still infinitely humable. We should be thankful that the Nazis, who decided that its social satire hit a little too close to home in 1933 and tried to have every print of it destroyed, failed in their efforts.
|The Threepenny Opera Criterion Collection Two-Disc DVD Set|
|Audio||German Dolby Digital 1.0 Monaural|
|Distributor||The Criterion Collection|
|Release Date||September 18, 2007|
|VIDEO & AUDIO|
|The Threepenny Opera recently underwent restoration by the Bundesarchiv in Berlin, and Criterion's beautiful new high-definition transfer was taken from a 35mm restoration negative. Like Criterion's reissue of Fritz Lang's M, which was made around the same time, the film is presented in its original 1.19:1 aspect ratio (resulting from early sound processes that took up some of the visual real estate on a 1.33:1 negative), so the image is slightly pillarboxed (thankfully, this means that the image is not also pictureboxed, which Criterion has been doing with all its Academy aspect ratio films in recent years). The image is sharp and clear, especially after having undergone additional digital restoration. There are some inherent signs of age--a few missing frames, here and there, for example--but given the fact that this film is more than 75 years old, the image looks beautiful. The monaural soundtrack, which was transferred at 24-bit from the restored soundtrack negative, sounds excellent for its age. There is some slight ambient hiss, but all significant aural artifacts have been cleaned up.|
|Given The Threepenny Opera's tangled production history as both a stage musical and a film, Criterion has put together an outstanding array of in-depth supplements that help establish the context in which it was made and the fascinating personalities responsible for making it. On the first disc we get an excellent, informative audio commentary by Harvard University professor Eric Rentschler, author of The Films of G.W. Pabst, and Cornell University professor David Bathrick, author of The Dialectic and the Early Brecht. Given the commentators' heady academic qualifications, it's not surprising that the track is a deeply intellectual affair, although it also has a nice flow and interaction because they recorded it together. The second disc opens with L'opera de quat'sous (1931), Pabst's French-language version of the film, which he shot simultaneously with the German version on the same sets using different actors (although most of the extras with nonspeaking roles are the same). Many films in the early sound era were shot in multiple language versions, and Criterion does us a real service by including both versions. The transfer for L'opera de quat'sous is terrible when compared to the transfer of The Threepenny Opera--soft, damaged, and improperly framed in the 1.33:1 aspect ratio--but at least we have it available. After watching both versions, you can then watch an 18-minute multimedia presentation by Charles O'Brien, professor of film studies at Carleton University in Ottawa, Canada, on the differences between the films, which highlights in particular how Pabst altered performances, lighting, and staging to better address his intended audience (Germans liked their films darker and more serious than the French). The real meat of the film's production controversies can be found in Brecht vs. Pabst: The Transformation of The Threepenny Opera, a new 48-minute documentary that traces in detail the story's journey from its roots as an 18th-century operetta, to a hit stage musical in the 1920s, to Pabst's film version, with particular attention paid to the fascinating and confounding personality of Bertolt Brecht. It features new interviews with Brecht scholar and translator Eric Bentley, G.W. Pabst scholar Jan-Christopher Horak, Kurt Weill Foundation director Kim Kowalke, and Pabst's son, Michael Pabst. From the archives we get a short introduction to the film by stars Fritz Rasp and Ernst Busch that was shot for its East German re-release in 1956, as well as an 18-minute interview with Rasp from 1972. There are also some extensive stills galleries of production photos by Hans Casparius and production sketches by art director Andre Andrejew.|
Copyright ©2007 James Kendrick
Thoughts? E-mail James Kendrick
All images copyright © The Criterion Collection | <urn:uuid:4d00311d-884b-441b-b50d-844f6bc4138c> | 2013-05-18T06:19:11Z | CC-MAIN-2013-20 | [
[
0.0157470703125,
0.00927734375,
-0.0147705078125,
0.00750732421875,
0.0556640625,
-0.0233154296875,
-0.00250244140625,
0.09814453125,
-0.0400390625,
-0.0888671875,
0.01165771484375,
0.0057373046875,
0.00188446044921875,
-0.006134033203125,
0.03662109375,... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.955609 | 2,143 | http://www.businesssun.com/index.php/nav/mreview/2229 | 0.268071 |
So, I've decided to just ditch FLTK because it is bloated with features I don't need and GLUT seems to be just so much faster. I was only using FLTK for the cross-platform OpenGL canvas and key handling, but now it seems I have another use for it.
Players of Console++ will want to communicate, in which case I really ought to have an HTML output window (such as that that BYOND uses) and some form of text input. I was thinking on-canvas, but if I'm going to develop an HTML output control onto the window, might as well do the same for text input.
Are there any cross-platform libraries I can use to do this or am I going to have to migrate back to FLTK? Rather, is there a lighter alternative to both GLUT and FLTK, that provide key handling, windowing, and text controls for the windows I create?
I really don't want to have to learn the native APIs of a bunch of operating systems to port a game to their platforms. Do you think that would be better? How are they in comparison with the Win32 window API--easier? harder? more or less convenient?
I prefer C++.
Or perhaps something with simple input controls, perhaps like BYOND's input() procedure, to input a message. I can use a seperate OpenGL context within the same window (hope this is possible) to draw the text in. This should be significantly easier since I can use arguments in the procedure, rather than text parsing, to control colors. Any thoughts on this? | <urn:uuid:e4b3b55b-f5ca-4a2b-bd81-c510c6b71a8c> | 2013-05-18T06:01:35Z | CC-MAIN-2013-20 | [
[
-0.0398825965821743,
0.013121547177433968,
0.03159530460834503,
-0.000013488432159647346,
0.0161429550498724,
-0.046616021543741226,
0.0076830112375319,
0.08390884101390839,
-0.026243094354867935,
-0.027624309062957764,
0.021926796063780785,
0.049723755568265915,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.968962 | 332 | http://www.byond.com/members/CaptFalcon33035?command=view_post&post=183180 | 0.824999 |
Women's status can be measured by a culture's knowledge of and respect for women's history. Women currently comprise 2% of U.S. history books. Alice Paul founded the National Woman's Party and authored the ERA. The NWP's campaign for women's citizenship rights is captured in the film: Iron Jawed Angels. Alice Paul and some of her many NWP activists, our foresisters, are pictured and celebrated here. We should remember the women who fought so very hard for us. | <urn:uuid:a5798c34-69cc-44a7-adef-dec8d8cef3cd> | 2013-05-18T06:45:35Z | CC-MAIN-2013-20 | [
[
-0.04140625149011612,
0.03085937537252903,
0.010286458767950535,
-0.0035156249068677425,
0.09270833432674408,
-0.08906249701976776,
0.0016927083488553762,
0.07395832985639572,
-0.04791666567325592,
-0.02278645895421505,
0.06067708507180214,
0.004687500186264515,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.973883 | 101 | http://www.cafepress.com/tnguerillawomen/751094 | 0.187507 |
Credit: Popular Science
Daraio Awarded Sloan Fellowship
Caltech's Chiara Daraio is among this year's crop of Sloan Research Fellows. Daraio, who this year was promoted from assistant to full professor of aeronautics and applied physics, is one of 118 faculty from across the country to receive the two-year, $50,000 fellowship, given to early-career scientists and scholars in recognition of achievement and the potential to contribute substantially to their fields.
"It's a great honor for me to receive a Sloan Research Fellowship, a very competitive award," says Daraio, whose research focuses on the design and testing of new materials with "unprecedented" mechanical properties. "We design new materials by assembling fundamental building blocks that interact nonlinearly, and we can choose these nonlinear interactions by controlling, for example, the shape and material properties of the building blocks. The materials we design can have several practical applications, from acoustic imaging to shock absorption."
"I am particularly pleased because the fellowship is awarded primarily in the basic sciences—physics, in my case—and this means that our research is being recognized also for its contribution to the basic sciences, beyond its engineering origins," says Daraio. Her group will use the funds to support a new research area related to the study of strongly nonlinear mechanical phenomena at micro- and nanoscales.
Presented annually since 1955 by the Sloan Foundation, the fellowships are awarded in chemistry, computer science, economics, mathematics, evolutionary and computational molecular biology, neuroscience, and physics. Potential fellows must be nominated by their peers and are subsequently selected by an independent panel of senior scholars. Once named, Sloan Research Fellows are free to pursue whatever research most interests them, and they can use their fellowship funds in a wide variety of ways. Thirty-eight Sloan Research Fellows have gone on to win the Nobel Prize in their fields.
Written by Kathy Svitil | <urn:uuid:5131a44c-7393-4617-81af-ca2168d0132e> | 2013-05-18T06:25:40Z | CC-MAIN-2013-20 | [
[
-0.05316390097141266,
0.023340249434113503,
0.0035010373685508966,
-0.013031639158725739,
0.079356849193573,
-0.05031120404601097,
0.01640300825238228,
0.10425311326980591,
-0.029693983495235443,
-0.022562241181731224,
0.06068464741110802,
-0.00927126593887806,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964094 | 400 | http://www.caltech.edu/content/daraio-awarded-sloan-fellowship | 0.322417 |
January 21/06 1:55 am - LA Track Report Day 1 Session 2
Posted by Editor on 01/21/06
Day One - Session Two
The first medals were awarded in the evening of Day 1 at the Los Angeles round of the Track World Cup. Australia led with two wins, followed by Argentina, Belarus, Italy and Spain with one each.
Natallia Tsylinskaya (Blr) began the day suffering from an upset stomach, but gradually improved to take the gold medal in two straight rides over Clara Sanchez (Fra) in the final. Former world junior champion Shuang Guo (Chn) won the bronze after Willy Kanis was relegated in the their third ride for dropping down on Guo after the sprint had commenced.
"Today was very difficult for me, a very hard day." commented Tsylinskaya "I had a little bit of an upset stomach at the start and I only began to feel good by the final. The race was good, I was able to come back (in the semifinal) to the Dutch girl (Kanis) and then I began to be more confident."
The men's Scratch Race was taken by Walter Perez (Arg), one of four riders to take a lap on the field. Perez, the 2004 Madison world champion, rode a tactical race to overcome faster sprinters.
"I'm not so good a sprinter, so my plan was to get away when it was possible. It worked perfectly, so I am happy."
The men's Keirin was probably the most exciting event of the evening, with Shane Kelly (Aus) winning a three-up dash to line in the gold medal final against Jamie Staff (GBr) and world Keirin champion Teun Mulder (Ned). Kelly was sitting in third when the pacer pulled off, and watched Staff and Mulder sweep by him from the back.
"The semifinal was crazy - I almost didn't make it through to the final - so I decided that I wouldn't let that happen again. When Jamie came by he brushed me pretty hard, and I knew that I had to get back by him and take the lead going into the last couple of laps."
Kelly launched a massive counterattack, taking control of the race with a little under two laps to go and holding until the line.
"My plan had been to make a move with a lap and three quarters, a lap and half to go. Once I got the lead I was confident that I could stay in front, or at least in the first three. I was injured back in July, which has put my schedule back a bit (for Commonwealth Games), but is is encouraging."
Sergio Escobar (Spa) left no doubt in the minds of spectators that he was the top rider in the pursuit, recording the fastest splits at every intermediate time check in the gold medal final against Jens Mouris (Ned) and finishing three and a half seconds in front. Jason Allen (NZl) served notice, with his bronze medal, that he will be a contender at the Commonwealth Games.
The women's Points Race also proved to be a highlight of the evening, with the lead changing multiple times. The high speed meant that no one was able to steal a lap (and the resulting 20 points), so riders had to fight for every sprint. Giorgia Bronzini (Ita) was the eventual winner, winning the first and last sprint, and collecting points in two others. At the halfway point the Chinese appeared to be in control, with Yan Li winning two sprints and Jianling Wan another. However, they faded towards the end, and the Italians struck back, with world champion Vera Carrara pacing Bronzini to her second sprint win and a second place result. American Rebecca Quinn, riding for the Spike trade team, gave locals something to cheer about with a consistent ride and a win in the final sprint to take the silver medal.
The final event of the evening was the Kilo, and Australia took its second win of the day from Ben Kersten in a time of 1:02.760. Like Kelly, Kersten has been injured recently, and this World Cup is his first of the season, so he didn't know what to expect.
"I hurt my back in November, so my confidence has been down. I didn't race all year, and my first races back were the Christmas carnivals in Tasmania. The Kilo takes a lot of base prep, which I haven't done, and weight work, which I can't do because of my back. The time was pretty good - this is a slow track - but I have some improving to do. (Chris) Hoy's done a 1:01 this year, so there's still a lot to improve on."
- Gina Grain had a strong Points Race, finishing fifth overall and winning one sprint after a long breakaway with Tina Pic (USA). "That was so fun! It went really well out there; I had decided to just ride my own race, not worry about the Olympic champion, world champion, all that stuff. So I was just looking for opportunities, look for things to go with." Grain's result puts her incontention for a Commonwealth Games spot.
- Matt Barlee finished eighth in the Kilo, a personal best time, and only a second out of fifth, while Travis Smith missed the final for the Keirin after getting boxed in, in the second round. He recovered to take second in the small final (8th overall). | <urn:uuid:e4bc30e9-21e9-4637-b502-5a2d7ffcc041> | 2013-05-18T08:09:45Z | CC-MAIN-2013-20 | [
[
0.0255126953125,
-0.004547119140625,
0.007415771484375,
-0.004669189453125,
0.06982421875,
-0.03369140625,
-0.0296630859375,
0.087890625,
0.0010223388671875,
-0.06298828125,
0.0177001953125,
0.0264892578125,
0.007720947265625,
-0.0302734375,
0.0267333984... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.981442 | 1,144 | http://www.canadiancyclist.com/dailynews.php?id=9983 | 0.371661 |
Reading and Writing Courses
The English department offers many courses to help you improve your reading and writing skills.
For detailed information about individual courses, please click on the individual course links on the right.
In these courses, you will learn to:
- Compose effective, source-based paragraphs and essays that apply a variety of patterns of development
- Analyze and evaluate explicit and implicit meanings of a wide variety of written and visual materials, including both fiction and nonfiction
- Explain the basic principles of argumentation and apply them in paragraphs and essays | <urn:uuid:e816130f-1020-4f23-8fec-bbb9b1631e98> | 2013-05-18T07:21:03Z | CC-MAIN-2013-20 | [
[
-0.03515625,
-0.0048502604477107525,
0.01490885391831398,
0.02460937574505806,
0.07500000298023224,
0.02473958395421505,
0.010937499813735485,
0.13958333432674408,
-0.009960937313735485,
0.04322916641831398,
0.04531250149011612,
0.02174479141831398,
-0.157291665... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.923447 | 113 | http://www.canyons.edu/departments/ENGLISH/reading_writing.asp | 0.945237 |
Heat a room from the floor up
Under-floor radiant heating involves underlaying the floor with a hot element or tubing that transfers heat into the room via infrared radiation and convection, making forced or blowing air unnecessary.
According to the U.S. Department of Energy's Energy Savers website, radiant heating "is more efficient than baseboard heating and usually more efficient than forced-air heating because no energy is lost through ducts." It is also flexible as it can run off electricity, gas, oil, wood, solar and other sources or combinations thereof can feed radiant systems. And radiant heating is a good choice for those with severe allergies as no potentially irritating particles get blown around the room.
Several aspects of radiant heating make it more energy efficient. For starters, the uniform heat distribution over the entire surface of a floor heats the lower half of the room, enveloping inhabitants in warmth at a lower overall temperature — in some cases up to five degrees Fahrenheit cooler — than a conventional heating system. "Radiators and other forms of 'point' heating circulate heat inefficiently and hence need to run for longer periods to obtain comfort levels," reports the Residential Energy Services Network (RESNet). "They draw cold air across the floor and send warm air up to the ceiling, where it then falls, heating the room from the top down, creating drafts and circulating dust and allergens." RESNet adds that radiant systems transmit heat on average some 15 percent more efficiently than conventional radiators.
The efficiency gains can be magnified significantly with good insulation and a well-designed system. While tearing out old heating systems and/or replacing decent existing flooring might be overkill for the sake of moving to radiant heat, you can certainly consider it if you are embarking on new building projects or contemplating major renovations. According to TLC Network's Green Living Guide, there are two main types of radiant heating, electric and hydronic. In the former, heated wires installed in the floor radiate heat upward. This type of radiant heat is most commonly used to retrofit a single room — especially a bathroom or kitchen — in an older house or building. Meanwhile, hydronic radiant heating, whereby heated water is forced through tubes under the floor, is more often designed into a new structure from the get-go and is more energy efficient overall.
TLC points out that while radiant heat is definitely more efficient in smaller, snug homes with lower roofs, it might not always be the best solution in homes with bigger rooms: "In some scenarios it can be less energy efficient than forced-air heating."
Contact a reputable heating contractor to see if radiant heating is a sensible way to go. | <urn:uuid:761b4e88-c733-4d9f-80cc-9ddfb64a8ff0> | 2013-05-18T05:34:10Z | CC-MAIN-2013-20 | [
[
-0.0147705078125,
0.0021209716796875,
-0.005828857421875,
0.0028228759765625,
0.09716796875,
-0.08203125,
0.003662109375,
0.123046875,
-0.03759765625,
-0.034423828125,
0.08203125,
0.04052734375,
0.00836181640625,
0.02880859375,
0.0306396484375,
-0.01... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929592 | 542 | http://www.carolinacountry.com/index.php/country-store/item/uniform-heat-distribution-is-one-advantage-of-under-floor-radiant-heating | 0.299122 |
Cardinal Stephen Sou Hwan Kim, Archbishop emeritus of Seoul (Korea), was born on 8 May 1922 in Tae Gu; ordained a priest on 15 September 1951; named Bishop of Masan on 15 February 1966; received episcopal consecration on 31 May 1966; promoted to Archbishop of Seoul on 9 April 1968; created and proclaimed Cardinal by Paul VI in the consistory of 28 April 1969, with the title of St. Felix of Cantalice at Centocelle; Archbishop emeritus of Seoul (resigned 3 April 1998); apostolic administrator of Pyeong Yang (10 June 1975 until 3 April 1998).
During the Korean War he assisted in various parishes of the then apostolic vicariate of Tae Gu, and was also secretary to the archbishop. He was transferred to Japan, where he earned a degree in philosophy at the Catholic University Jôchi Daigaku of Tokyo, directed by the Jesuits. He returned to Korea and ran the "Catholic Shilbo", the Catholic newspaper of Tae Gu. He was then sent to Europe, where he specialized in social sciences at Münster, Germany from 1956 to 1965.
After returning to Korea, he was appointed Bishop of Masan and two years later became Archbishop of Seoul. In the South Korean capital, he worked toward implementing the spirit of Vatican II in the diocese, and intensified evangelization activity inviting lay participation. One of his priorities was the pursuit of dialogue with non-Christians and the coordination of shared humanitarian and charitable efforts. His statements and initiatives on behalf of human rights in difficult politically internal situations were very courageous.
He was more than once president of the Korean episcopal conference; from 1973 to 1977 he was president of the Federation of the Asian Bishops' Conference (FABC); from 1974 to 1977 he was a member of the Council of the General Secretariate of the Synod of Bishops. President delegate of the Special Assembly for Asia of the Synod of Bishops (1998).
He was also apostolic administrator of Pyeong Yang, Korea (10 June1975- 3 April 1998).
Created and proclaimed Cardinal by Paul VI in the consistory of 28 April 1969, of the Title of San Felice da Cantalice a Centocelle (St. Felix of Cantalice a Centocelle). | <urn:uuid:0be07a58-aead-4265-801d-16fbb4765894> | 2013-05-18T06:26:59Z | CC-MAIN-2013-20 | [
[
-0.030517578125,
-0.00135040283203125,
-0.03173828125,
-0.0025634765625,
0.09130859375,
-0.0162353515625,
-0.0191650390625,
0.08447265625,
-0.00396728515625,
-0.051513671875,
0.0380859375,
-0.0089111328125,
-0.0106201171875,
-0.0286865234375,
0.029663085... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978282 | 479 | http://www.catholicnewsagency.com/resources/deceased-cardinals/deceased-cardinals/kim-sou-hwan-stephen/ | 0.375379 |
Former Chelsea defender Paul Elliott resigned Saturday from leading roles with UEFA and the English Football Association after making offensive comments toward another former player.
Elliot, a high-profile anti-racism campaigner, acknowledged sending a text message to former Charlton defender Richard Rufus in which he used a "term which is widely known as being derogatory to my own community." Both men are black.
The FA said the "discriminatory abusive comments" made Elliott's position untenable.
As well as leaving the FA's judicial panel, Elliot is relinquishing his position on UEFA's football committee, and a key role with English football's anti-racism body, Kick It Out.
"I am saddened by this turn of events and it is with regret that we accept Paul's resignation," FA chairman David Bernstein said. "However, the use of discriminatory language is unacceptable regardless of its context and in effect has made Paul's position untenable."
Elliott said he regretted using the offensive comment in the mobile communication.
"It is inappropriate and not part of my everyday vocabulary," Elliott said in a statement released by Kick It Out. "As an advocate of high-standards of public behaviour, and integrity in public life, I know the use of this word sends out mixed messages and contradicts my position as a Kick It Out trustee.
"I will continue to be active in other projects in what I believe to be a true and just cause."
Earlier this month, Elliott became the first black footballer to receive the Commander of the Order of the British Empire award at Buckingham Palace for services to equality and diversity in football. | <urn:uuid:8571b518-bd42-453b-b0c7-7d2caf1a6eb3> | 2013-05-18T07:26:32Z | CC-MAIN-2013-20 | [
[
-0.023000000044703484,
0.0351666659116745,
0.008541666902601719,
0.002354166703298688,
0.09200000017881393,
-0.04833333194255829,
-0.0012656250037252903,
0.08666666597127914,
0.019333332777023315,
-0.036666665226221085,
0.07333333045244217,
0.04833333194255829,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965548 | 330 | http://www.cbc.ca/sports/soccer/story/2013/02/23/sp-soccer-uefa-paul-elliott-resigns.html | 0.767435 |
Britian's Prime Minister David Cameron says his country cannot tolerate Islamic extremism.
In a speech on terrorism to the annual Munich Security Conference Saturday, Cameron warned that Britian's multiculturalism policy has created segregated communities where Islamic extremism thrives.
"We have even tolerated these segregated communities behaving in ways that run counter to our values," Cameron said. "We have encouraged different cultures to live separate lives, apart from each other and the mainstream."
Britain has become one of Europe's most active bases for terrorist plots.
He said Britain had found that many convicted terrorists had initially been influenced by so-called "nonviolent extremists" - people who aren't involved in encouraging plots, but denounce Western politics and culture - before going on to carry out violence.
Cameron also reached out to the rest of Europe, calling on countries to "wake up." He said that terrorism can't be defeated by simply taking outside actions, but that European countries need to pay attention to what's happening in their own borders.
"If we are to defeat this threat, I believe it's time to turn the page on the failed policies of the past," Cameron said. "Instead of ignoring this extremist ideology, we - as governments and societies - have got to confront it, in all its forms." | <urn:uuid:98fe711e-72dd-4ea7-a42e-5927e58e91b5> | 2013-05-18T06:25:03Z | CC-MAIN-2013-20 | [
[
-0.012479707598686218,
0.0004121854726690799,
0.018060065805912018,
0.027191558852791786,
0.09009740501642227,
-0.10795454680919647,
-0.023234577849507332,
0.10389610379934311,
-0.02800324745476246,
-0.06168831139802933,
0.06737013161182404,
0.006087662186473608,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978222 | 259 | http://www.cbn.com/cbnnews/world/2011/February/UKs-Cameron-Europe-Must-Wake-Up-to-Extremism/ | 0.397183 |
That Swedish Cartoon of Mohammed Was Offensive ...
March 11, 2010
To dogs. Why should our canine friends be demeaned by being conjoined -- even figuratively -- to the head of someone such as Mohammed?
I am referring, of course, to the 2007 cartoon by Swedish artist Lars Vilks, which depicted the Prophet Mohammed with the body of a dog. Vilks has received numerous death threats since the cartoon was first published, and in the last couple of days an arrest was made of a person involved in a new, bizarre plot to kill him. The person arrested was an American, Colleen Renee LaRose, a/k/a Jihad Jane, who allegedly was conspiring with some terrorists in Ireland to assassinate Vilks.
Congrats to the three Swedish newspapers who republished the Vilks cartoon after the latest conspiracy came to light. The papers noted that the threat to Vilks constituted a threat against one of the most fundamental human rights, namely freedom of speech. Bravo. Their actions in supporting Vilks and republishing his cartoons contrast sharply with the craven, apologetic attitude adopted by some after the furor over the 2005 Danish cartoons. Maybe the West has some backbone after all.
My only quibble with the cartoon is that it may be a bit unfair to focus only on Mohammed and, by extension, Islamic fundamentalists. Sure, the Koran is suffused with incitements to violence, and we are all too familiar with contemporary Islamic terrorism. But Judaism and Christianity don't exactly have clean hands. (Hence my three-headed dog.)
There probably never was a Moses, but the actions attributed to him in the Bible portray him as a murderous, genocidal fanatic, willing to slaughter his own people for almost any faux pas in matters religious and positively eager to exterminate anyone who was not a Hebrew. We are often told Moses should be honored as a law-giver and role model in matters of morals. Excuse me? Perhaps his desire to ethnically cleanse the Promised Land made him a role model (ironically) for those Germans who dreamt of Lebensraum , but I fail to see any basis for revering him.
Jesus is a more ambiguous figure. The New Testament does refer frequently to peace and love, but it also attributes to JC the assertion that he came not to bring peace, but a sword. And the book of Revelations does not exactly portray a gentle, forgiving Jesus. What is certain is that Christianity has inspired as much violence and bloodshed as Islam. If we didn't have suicide bombers during the centuries of warfare between Protestants and Christians, it's only because the technology was not available.
So sharp criticism of Islam is appropriate, but let's not forget that almost all religions have been the enemies of religion and the midwives of mindless violence. There are, of course, many believers who are agreeable, responsible, moral, wonderful individuals. But they don't get that way by allowing their lives to be dominated by religious dogma. Slavishly adhering to the supposed teachings of semi-legendary figures who (may have) lived long ago, in conditions starkly different from our own, is not a recipe for an informed, fulfilling, morally laudable life. If you rely solely on religious dogma as your guide to life, you're likely to end up with a dog's breakfast.
#1 gray1 on Thursday March 11, 2010 at 7:23pm
Interesting dogma/dog connect here. Speaking of cartoons and their possible subliminal messages, I felt the dogma thing was at work in Disney’s recent “Up” movie with the usage of the established pack of misled if not altogether evil dogs versus the new, naive and somewhat dopey new hero dog “Doug” who ultimately becomes the alpha dog simply after putting the “cone of shame” on the dobie who was playing the heavy, so to speak.
We might note some not so subliminal religious imagery at work in this movie along with the search for the ever elusive “snipe” that the old school dogmas are all seeking to capture. Ironically the snipe resembles nothing so much as an early Disney animatronic bird you might see in the tiki house complete with glazed over, soulless eyes. Ha! Religion can be so much fun!
#2 Ronald A. Lindsay on Friday March 12, 2010 at 9:11am
gray1, thanks for the observations on “Up” I may be the one person in the U.S. who has not seen the movie, so your explanation and link were helpful.
Disney has been known to pitch religion subtly and/or twist plots to avoid giving offense to religious viewers. The most egregious example may have been transforming the evil priest, Claude Frollo, in “The Hunchback of Notre Dame” into a judge.
I guess everyone hates lawyers.
#3 iskender (Guest) on Sunday March 14, 2010 at 3:55pm
We present our site
Have a look to
#4 oldebabe (Guest) on Tuesday March 16, 2010 at 10:52am
# 2. Nope, you can’t have the credit of being the only person not to have seen `UP’. In fact, I’d not even heard of it… The last Disney-ish film I remember seeing was `Fantasia’, but there was the `demon’ etc. of course, and perhaps a good-over-evil theme to the `A Night on Bald Mountain’ music… I didn’t think about it one way of the other at the time - it was a fantasy… loved the music. Dogs and mice seem a funny way to tout religion, tho…
RAL - Interesting article. I continue to marvel at how/why etc. some Islamists get so (got so) crazed about a cartoon… or cartoons. The anger/outrage is out of proportion, and potential incidents seem to be sought and enhanced - deliberately misunderstood or skewed, their specialness exalted, and shouts of being insulted, followed by threats, violence, etc. tho’ the media can’t get enough of it. It’s bizarre, and what seems a sort of insanity to many, and serves as a total turn-off, IMO. This trend, hopefully, like the plane highjackers of the 60s tho’ more deadly, will be put to an end soon.
#5 Alma Rosa Lujan (Guest) on Wednesday March 17, 2010 at 4:42pm
I would like to receive information regarding Swedish cartoons, especially for kids and youngsters. I am a teacher at the Williams School in Cuernavaca, Mexico.
My students would love to read about a very well-known magazine or film. Thanks a lot, Alma | <urn:uuid:d8341cff-8c3f-4af5-a6d4-3a0845629ac0> | 2013-05-18T05:59:35Z | CC-MAIN-2013-20 | [
[
-0.018798828125,
0.0037689208984375,
-0.0005035400390625,
0.0091552734375,
0.09326171875,
-0.03271484375,
-0.01031494140625,
0.134765625,
-0.01165771484375,
-0.019287109375,
0.040771484375,
0.0238037109375,
-0.03515625,
0.014404296875,
0.025146484375,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.967888 | 1,419 | http://www.centerforinquiry.net/blogs/show/that_swedish_cartoon_of_mohammed_was_offensive_/ | 0.196746 |
Benfica and 'the curse of Bela Guttmann'
Vienna, Austria. 1990. A man weeps by a grave. He lowers his head and murmurs a few quiet words.
He sits awhile, glances intently at the writing on the headstone, he uses the palm of his hand to wipe away the dirt. His eyes glaze over with a look of hopelessness, almost pleading for something to happen. Nothing happens.
The man rises, turns and leaves. That night he gets his answer -- the curse lives on.
When Benfica's players walk out at Barcelona's Camp Nou on Wednesday, more than 22 years since the club's last appearance in a European Cup final, they will face a formidable task.
Not only must they overcome the magical Lionel Messi and his teammates in order to reach the last 16 of this season's competition, but they must also bury the famous curse. Bela Guttmann's curse. A condemnation that even the prayers of his famous protege Eusebio could not lift that day in Vienna.
"Every year when Benfica plays in the Champions League, they try to get rid of the curse," Portuguese journalist Jose Carlos Soares told CNN.
"Any time that Benfica play near Guttmann's grave, somebody will take flowers. It hasn't worked."
Even in death, Guttmann is determined to have his own way -- much to the anguish of a club he left in anger after taking it to the peak of European football in the early 1960s.
A charismatic and sometimes eccentric genius, Guttmann revolutionized football during a coaching career which spanned 25 jobs in 13 different countries before he passed away in 1981, aged 82.
Born into a Jewish family in Budapest in 1899, Guttmann, like his parents, became a trained dance instructor before switching his focus to football.
After becoming part of the MTK Hungaria side which won the league title in 1920 and 1921, Guttmann left for Vienna following the rise of anti-Semitism under Miklos Horthy's regime.
It was here, among the Austrian intelligentsia, that he flourished, taking in the political and literary debates in Vienna's coffee-house society.
There he joined the exclusively Jewish football club Hakoah Wien, where he won the league title in 1925 as well as winning four caps for Hungary.
After traveling on a tour to the U.S. with Hakoah, Guttmann decided to stay put in New York only to lose a considerable amount of money in the Wall Street crash.
That forced the nomadic traveler to move on once again, first back to Vienna where he took on a coaching role with Hakoah before joining Dutch side SC Enschede.
But Guttmann's life, like those of so many other Jews, was turned on its head during the rise of Hitler in Europe and the Holocaust which killed six million people.
"Guttmann was hugely talented," says leading football writer Jonathan Wilson, author of the book "Outsider: A History of the Goalkeeper."
"He was tactically very astute but also very awkward and difficult," Wilson told CNN. "He was very quick to take offense.
"The central theme with Guttmann is the war. We don't know how he survived it, and the fact he skips over it in his book could mean one of two things.
"Did he feel guilty for surviving or did he compromise himself to stay alive?
"Or, perhaps it was that the memories were just too painful to share and that the loss of so many of his loved ones meant he didn't speak about it.
"He was hugely successful but there was something tragic about him, which probably comes from that time."
While family members, including a brother, perished in concentration camps, Guttmann escaped to Switzerland where he was held in internment.
It wasn't until the end of the war in 1945 that he returned to football, this time in Romania.
It was here, in 1946 with club side Ciokanul, that he demanded to be paid in vegetables at a time when famine was a growing problem.
While parsnips and carrots were gratefully received, Guttmann's relationship with the board was never a particularly healthy one. When a club director began to interfere in team selection, Guttmann finally lost patience.
His fiery temper and attitude of "my way or the highway" earned him plenty of attention, especially from the media.
Following spells with Padova and Triestina in Italy, Boca Juniors and Quilmes in Argentina and Apoel Nicosia in Cyprus, Guttmann hit the big time with AC Milan in 1953.
His team led the Serie A table after 19 games in his second season, only for another run-in with the board to curtail his tenure.
"I have been sacked, even though I am neither a criminal nor a homosexual," he told a shocked press conference. "Goodbye."
Years later, on his first day as the manager of Benfica, he fired 20 players before leading the club to the Portuguese title.
"He was an incredible man," Wilson said. "Did he become a parody of himself? Did he do those kind of things because people expected it?
"I don't know. But it was clear that he never wanted to stay in one place for long, he was always moving.
"That could have been because of the war, but also because he was looking for the next pay check."
It was in Portugal, after a successful spell in South America, that Guttmann really secured his legacy, securing back-to-back European Cups with Benfica in 1961 and 1962.
It was the first time that any club other than Real Madrid had won the competition.
During his time in Brazil with Sao Paulo between 1957 and 1958, where he won the league title before moving to Porto, Guttmann introduced the 4-2-4 system which Brazil used at the 1958 World Cup.
It was a system that laid the groundwork for the great Brazil sides to establish themselves as masters of the beautiful game.
Guttmann had taken some inspiration from the great Gustav Sebes, the man who coached the "Magnificent Magyars" in the 1950s.
Under Sebes, also of Jewish descent, Hungary became the first nation to defeat England on its home soil, winning 6-3 in 1953 before reaching the World Cup final the following year.
From 1950 until the Hungarian Revolution in 1956, the national team won 42 games, drew seven and lost just once --- in the World Cup final against West Germany.
Sebes preferred a 3-2-1-4 formation which allowed Ferenc Puskas, the great Hungarian striker, to thrive alongside the precociously talented Nandor Hidekuti.
That slowly changed to the 4-2-4 formation which would inspire Benfica to European and domestic glory.
"I never minded if the opposition scored, because I always thought we could score another," Guttmann once said.
His thirst for innovation and his psychology degree, which he earned in his younger days, helped him become a leading figure in man-management and a master tactician.
At Benfica, it was the arrival of Eusebio which allowed Guttmann to play Mario Coluna in a deeper position and unleash one of the most attacking teams of the era.
Benfica defeated Barcelona 3-2 in Berne in the 1961 European Cup final before coming from behind to beat then five-time winners Real Madrid 5-3 the following year.
But where there was triumph, disaster was never far away.
"From the moment he arrived in Portugal, Bela Guttman's relationship with Benfica was destined to be complex," says Portuguese football expert Ben Shave.
"After the second European Cup victory, Guttman approached the recently-elected president Antonio Carlos Cabral Fezas Vital with what seemed an eminently reasonable request -- a pay rise.
"Vital chose to turn Guttman down, whereupon the Hungarian departed with what has become a well-worn parting shot: a simple declaration that Benfica would not win another European Cup.
"Guttman's curse has proved painfully prophetic -- the Aguias have lost five European Cup finals since, in 1963, 1965, 1968, 1988, 1990."
Remembered for his uncompromising attitude, his innovation on the field and his nomadic existence, Guttmann's story gained further resonance following the emergence of Portuguese coach Jose Mourinho, a European champion with Porto in 2004 and Inter Milan in 2010 after beginning his career with a brief spell at Benfica.
"Guttman's prickly personality and relentless pursuit of success have led to comparisons with Mourinho in some quarters," Shave told CNN.
"What is certainly true is that both left Benfica in unfortunate fashion, and both departures became matters of considerable regret for the club.
"The results of Guttman's 'curse' have been well documented, whilst presidential candidate Manuel Vilarinho's stated wish to replace Mourinho with club legend Toni following the 2000 elections led to 'the Special One' taking his talents elsewhere.
"In a similar scenario to that which led to Guttman's tenure coming to an end, Mourinho approached Vilarinho with a contract extension request shortly after his election (and a 3-0 win over Sporting), which was denied.
"Vilarinho's opponents have dined out on that mistake since."
For Benfica's present players, it is up to them to earn redemption and finally close the book on Guttmann's curse.
Copyright 2012 by CNN NewSource. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:04aea403-810a-4f3c-ac54-8de3f5005376> | 2013-05-18T05:08:01Z | CC-MAIN-2013-20 | [
[
0.0002689361572265625,
0.0201416015625,
-0.01080322265625,
-0.00286865234375,
0.10400390625,
-0.044677734375,
-0.01153564453125,
0.1171875,
0.00133514404296875,
-0.0673828125,
0.034423828125,
0.030029296875,
0.0274658203125,
0.018310546875,
0.0458984375,... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.977497 | 2,047 | http://www.channel3000.com/sports/Benfica-and-the-curse-of-Bela-Guttmann/-/1612/17645700/-/view/print/-/hulaegz/-/index.html | 0.592655 |
Lenoir police say a driver who struck a vehicle head-on Tuesday, resulting in the death of a 92-year-old man, had consumed alcohol prior to the wreck.
Jack Byron White, 56, of Lenoir, was charged with driving while impaired and felony death by vehicle after the collision.
The crash occurred around 2:30 p.m. Tuesday near the intersection of Hickory Boulevard and Ideal Drive.
Police say the preliminary investigation shows that White was traveling northbound on Hickory Boulevard when his 1994 Plymouth van crossed into oncoming traffic and struck a Chevy Blazer driven by Donald Lee Roper.
Roper and a second man in his car, 92-year-old Howard Lee Roper, were both taken to Caldwell Memorial Hospital for treatment. But Howard Roper died from his injuries, police said.
White was also taken to the hospital for minor injuries. It was there that officers learned White had consumed alcohol before the wreck.
He was arrested after being released from the hospital.
Police said the crash remains under investigation and more charges are possible. | <urn:uuid:125930f2-73e6-497b-a450-ee1b525c61d1> | 2013-05-18T06:25:08Z | CC-MAIN-2013-20 | [
[
0.03112296760082245,
0.03302845358848572,
-0.013719512149691582,
0.011623475700616837,
0.1260162591934204,
-0.05411585420370102,
-0.022230690345168114,
0.07012195140123367,
-0.01892784610390663,
-0.029725609347224236,
0.051575202494859695,
0.05665650591254234,
-... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.985196 | 220 | http://www.charlotteobserver.com/2012/11/21/3680099/police-impaired-driving-led-to.html | 0.200301 |
Richard and Sandy Draper were returning to their home from dinner at around 7:30 p.m. when they say they heard someone yelling.
The couple originally thought the yelling was children playing in the backyard, but discovered that the noise was coming from 8-year-old Stephen Hopkins, who was stuck in their chimney.
"I could hear a voice in my chimney and I said, 'Are you in the chimney,'" said Sandy Draper.
A wall had to be ripped out of the home to let Hopkins out.
"Through a noble effort of about and hour of cutting our house up...they were able to retrieve the child and overall everything was successful," said Richard Draper. "He was black, just covered in soot but actually looked pretty well."
West Valley City police say Hopkins had been reported missing by his mother earlier in the day after he left his home and didn't return.
"'That's when they got a call in the other neighborhood that there was a boy stuck in the fireplace named 'Steve'," said Janine Hopkins, Stephen's mother. I said that's my Steve, I know it is."
Hopkins was reportedly looking for food and water when he climbed up the Drapers' apricot tree, went down the chimney and got stuck for between 4 and 6 hours. He'd managed to slide down to the basement of the home, near the flue.
"They asked him why he had gone down the chimney and he said he was looking for food and water so evidently he was wandering the neighborhood," said Richard Draper.
Hopkins only suffered minor injuries. There is no estimate on how much damage was done to the home. | <urn:uuid:7df16f1e-cd30-4a52-9b09-252a844f8989> | 2013-05-18T05:52:29Z | CC-MAIN-2013-20 | [
[
-0.011698298156261444,
0.011698298156261444,
-0.003067735582590103,
-0.0035381217021495104,
0.1073298454284668,
-0.022905759513378143,
0.006217277608811855,
0.06413612514734268,
-0.01382526196539402,
-0.07886125892400742,
0.05431937053799629,
0.06184554845094681,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.993998 | 347 | http://www.chicagotribune.com/topic/ktla-boy-stuck-in-chimney-utah,0,2272273.story | 0.496698 |
How do you get HIV?
HIV can be passed on when infected bodily fluid, such as blood or semen, is passed into an uninfected person. Semen is the liquid which is released from a man's penis during sex which carries sperm. It can be infected with HIV or AIDS when someone is HIV positive or is carrying the AIDS virus. This can happen during unprotected sex. For example when two people have sex without using a condom when one partner is already infected, or between drug users who inject and share needles.
It can't be transmitted by things like coughing, sneezing, kissing, sharing a toilet seat, swimming pools, sweat and tears. | <urn:uuid:a3e140cd-7f25-48c9-a2f0-a7d0b1954e0d> | 2013-05-18T05:13:43Z | CC-MAIN-2013-20 | [
[
-0.016129031777381897,
0.011643145233392715,
0.019052419811487198,
0.01864919438958168,
0.1508064568042755,
-0.08427419513463974,
-0.019758064299821854,
0.12580645084381104,
0.004485887009650469,
-0.0741935446858406,
0.12661290168762207,
0.014314516447484493,
0.... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966757 | 136 | http://www.childline.org.uk/Explore/SexRelationships/Pages/HIVAIDS.aspx | 0.410417 |
Attack and Reteat signals?
Posted 30 July 2004 - 07:30 PM
Posted 30 July 2004 - 07:33 PM
"You can believe in any god, as long as it's our God."
Posted 30 July 2004 - 08:31 PM
"夫君子之行:靜以修身,儉以養德;非淡泊無以明志,非寧靜無以致遠。" - 諸葛亮
One should seek serenity to cultivate the body, thriftiness to cultivate the morals. If you are not simple and frugal, your ambition will not sparkle. If you are not calm and cool, you will not reach far. - Zhugeliang
Posted 30 July 2004 - 09:29 PM
The drums, on the other hand, were often very large, to create a truly awe-inspiring roar. I've heard the Chinese drum beaten as a signal for a charge (in a performance that we took part in when I was training in the Singapore army), and it's really morale-stirring for your own guys and terrifying for the enemy. Much more so than the little Western military drum, which is really more for marching than anything else. Compared to the drums, all that's needed for the bells or gongs is that they be loud and high-pitched enough to be audible above the roar of battle.
An example of large Chinese bronze bells:
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users | <urn:uuid:fa053782-cd3d-459a-9594-f44c49e4337d> | 2013-05-18T05:54:46Z | CC-MAIN-2013-20 | [
[
-0.02164909616112709,
0.034638553857803345,
0.00381212355569005,
0.0014707266818732023,
0.08320783078670502,
-0.05082831159234047,
0.0035062122624367476,
0.0609939768910408,
-0.03125,
-0.02729668654501438,
0.04781626537442207,
0.036709338426589966,
0.08094879239... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959842 | 363 | http://www.chinahistoryforum.com/index.php?/topic/529-attack-and-reteat-signals/ | 0.432848 |
Reality in everyday usage means "everything that exists". The term reality, in its widest sense, includes everything that is, whether it is observable, comprehensible, or self-contradictory by science, philosophy, or any other system of analysis. Reality in this sense may include both being and nothingness, whereas existence is often restricted to being (compare with nature).
In the strict sense of Western philosophy, there are levels or gradation to the nature and conception of reality. These levels include, from the most subjective to the most rigorous: phenomenological reality, truth, fact, and axiom.
Other philosophies, particularly those founded in eastern religions like Hinduism and Buddhism have different explications of reality. Conceptions of reality in Buddhism include: dharma, paramattha dhamma, samsara and maya (illusion in Sanskrit).
== Phenomenological reality = | <urn:uuid:82e46460-9d14-4201-8c57-57d49c0ce555> | 2013-05-18T06:19:59Z | CC-MAIN-2013-20 | [
[
-0.04266826808452606,
-0.015024038031697273,
0.022385817021131516,
0.010141225531697273,
0.009352464228868484,
-0.06820913404226303,
-0.013146033510565758,
0.125,
-0.01870492845773697,
-0.03650841489434242,
0.09615384787321091,
-0.0026479868683964014,
-0.0085261... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929595 | 183 | http://www.chordie.com/song.php/songartist/Reality/index.html?filterbox=show&filter= | 0.55994 |
ANM uses specific ports for its processes. Figure A-1 illustrates a typical ANM server deployment in a network. This illustration identifies the protocols and ports used by the different network devices in a typical deployment.
•Table A-1 lists the ports used for ANM client (browser) or ANM server and ANM high availability communication.
•Table A-2 lists the ports used for communication between ANM and managed devices.
Figure A-1 ANM Server Deployment
Table A-1 Ports Used by ANM in a Network Deployment1
Default port if ANM is configured for access using HTTP (using anm-installer).
Default port if ANM is configured for access using HTTPS (using default install option).
MySQL Database system (ANM HA installation opens this port to communicate with the peer ANM).
TCP (10444) and TCP (10445)
ANM License Manager (ANM HA installation opens these two ports to communicate with the peer ANM).
Port used by ANM server to communicate to Email Gateway through SMTP.
Port used by ANM server to send out trap notification to external NMS application.
1It is highly recommended that you run ANM on a stand-alone device. However, if you run ANM on a shared device, please note that ANM locally opens the following ports for internal communication: | <urn:uuid:5aaa1e56-80e5-4313-ad72-1ec87e308193> | 2013-05-18T05:32:04Z | CC-MAIN-2013-20 | [
[
-0.01315789483487606,
0.0172213613986969,
0.023123065009713173,
-0.029218265786767006,
0.055727552622556686,
-0.09520123898983002,
-0.004740712232887745,
0.06927244365215302,
-0.01770510897040367,
-0.014705882407724857,
0.09636222571134567,
0.027863776311278343,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.84681 | 287 | http://www.cisco.com/en/US/docs/net_mgmt/application_networking_manager/2.0/user/guide/UG_ports.html | 0.247518 |
Monday - Chicken patty, French fries, peas and carrots, pineapple, brownie and milk.
Tuesday - Barbecue, hash brown, corn, celery, dip, Fruit Juicee and milk.
Wednesday - Chicken bites, scalloped potatoes, green beans, fruit salad, bread slice and milk.
Thursday - Chili, cheese, crackers, baby carrots, applesauce, oatmeal square and milk.
Friday - Hot ham and cheese, potato round, baked apples, Sunshine Bar and milk. | <urn:uuid:1813e05e-c434-44b8-9506-d93ac96bf37e> | 2013-05-18T05:51:18Z | CC-MAIN-2013-20 | [
[
-0.02490234375,
0.04150390625,
-0.00004863739013671875,
0.033203125,
0.03857421875,
0.064453125,
0.003509521484375,
0.08740234375,
0.0361328125,
-0.006988525390625,
0.1357421875,
0.0693359375,
0.1796875,
0.02197265625,
0.04150390625,
-0.03564453125,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.756267 | 106 | http://www.cknj.com/news/education?page=197 | 0.455281 |
Medieval engineers knew their stuff. If they couldn't hit what they were aiming at consistantly, they would have been out of a job and quite possibly dead. I'd like to see our modern engineers build something like that while under fire.
Throndor wrote:Depends on the weapon that I'm fighting against. It's an enemy fighting with a or several daggers, then a battleaxe. Longsword, I'd use a flail. Against a longbow, I'd use a longbow. Against a crossbow, I'd use a longbow. Against a flail, I'd use throwing knives. Spear, I'd use a pike and dagger. Pike, I'd use a longbow.
Users browsing this forum: No registered users and 0 guests | <urn:uuid:67968aba-adc4-4d12-9fb3-6cca9f02c309> | 2013-05-18T06:51:01Z | CC-MAIN-2013-20 | [
[
-0.029913101345300674,
0.03375668451189995,
-0.001018340582959354,
-0.016961898654699326,
0.061831552535295486,
-0.10093583166599274,
0.00039428059244528413,
0.09090909361839294,
-0.01662767305970192,
-0.03743315488100052,
0.014956550672650337,
0.06149732694029808,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976642 | 161 | http://www.classic-castle.com/forum/viewtopic.php?p=213269 | 0.981757 |
Thorfinn Eiriksson of Ugleborg
Thorfinn Eiriksson is the ninth Earl of the Ugleborg (ugle=owl), a stronghold in a valley in the south of Garheim. The Ugleborg is located near Ugleheim, a small village located only two miles from the Lenfald village Falkerby, which is protected by the stronghold Falkerborg.
During the last three centuries, relations between the Ugleborgs and the Falkerborgs have been surprisingly good, for reasons which will later be revealed. Therefore, armed conflicts between the Ugleborgs and the Falkerborgs are very rare. Not surprisingly, the Ugleborgs have the worst attendance record for Garheim-expeditions against Lenfald and the Falkerborgs fight Garheim only reluctantly too.
However, when Garheim is under attack or takes up arms against Loreos, the Garheim-rulers can always count on the Earls of the Ugleborgs. Although their contribution to the army is small in numbers, the fearless Ugleborg soldiers has often played a crucial role in battle. Despite his young age (he is just in his thirties) Thorfinn Eiriksson is already well-known for his courage and his skills in sword-fighting. Rumor has that the Ugleborgs are descendants of the disappeared daughter of king Alphundus (who wielded the sword even better than any of her brothers), although the Ugleborgs themselves have never made any reference to this story whatsoever. | <urn:uuid:adc223e8-4fa9-4595-bdd5-6f9ed72ef6df> | 2013-05-18T06:51:32Z | CC-MAIN-2013-20 | [
[
0.01651785708963871,
-0.006116071250289679,
-0.025357142090797424,
0.023035714402794838,
0.08428571373224258,
-0.13500000536441803,
-0.023035714402794838,
0.08571428805589676,
0.018392857164144516,
-0.053928572684526443,
-0.013303571380674839,
0.03642857074737549,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97014 | 325 | http://www.classic-castle.com/forum/viewtopic.php?p=239045 | 0.716651 |
You are here
Zhongshan riot reveals long unresolved tensions in Guangdong
A major riot involving hundreds of migrant workers in the Pearl River Delta city of Zhongshan this Monday and Tuesday has reignited long unresolved tensions between the local and migrant populations in Guangdong.
The cause of the riot was reportedly the beating and detention by local security forces of a 13-year-old boy from Chongqing who had been involved in a fight with a local boy. This trigger was very similar to that of a riot in the Guangzhou suburb of Zengcheng almost exactly a year ago, when security guards physically abused a pregnant street vendor from Sichuan.
In both cases, as news of the incident quickly spread among the migrant populations, more and more people joined the protests, leading to clashes with police and extensive damage to property. In the Zhongshan township of Shaxi, it was reported that several protestors had been killed and more than 100 injured, with more than 100 arrests.
In Shaxi, as in Zengcheng last year, the city was quickly locked down by security forces and it is expected to remain so for several days.
Following the riot in Zengcheng, and a similar migrant worker protest in Chaozhou last year, the Guangdong government promised to take more effective measures to resolve the long-standing problems faced by migrant workers in the province and better integrate them into local society.
The government has taken some steps, including setting up a federation of labour organizations in the province to more effectively tackle workers’ issues, but the tensions between the migrant and local population are decades old and the result of deeply ingrained structural issues, particularly the household registration system, which make migrants second class citizens in their own country.
According to statistics released last year, more than one third of Guangdong’s population are migrants, and in the towns of the Pearl River Delta that figure can rise to as high as 80 percent.
The provincial government claims that it will give 1.8 million migrants residency each year, however, it is highly unlikely that young migrant factory workers will benefit from this policy. Although restrictions on residency have been relaxed slightly in recent years, the provincial and local governments still only select the most eligible candidates, usually those with long-term, well-paid jobs and property or investments in the city. | <urn:uuid:bd554d97-a664-4abb-9d31-fd3d41a97c8d> | 2013-05-18T05:22:46Z | CC-MAIN-2013-20 | [
[
0.0027313232421875,
0.04150390625,
-0.0098876953125,
0.03466796875,
0.1552734375,
-0.07763671875,
-0.0272216796875,
0.1064453125,
0.000545501708984375,
-0.037841796875,
0.0751953125,
0.024169921875,
0.0118408203125,
-0.044921875,
0.0169677734375,
-0.... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970357 | 486 | http://www.clb.org.hk/en/node/110084 | 0.218128 |
As the College of Cardinals prepares to elect a new Pope, Houston's Cardinal Daniel DiNardo celebrated mass Sunday morning in Rome.
Just before Sunday's mass, DiNardo spoke with Local 2's Bill Balleza who is also in Rome covering the papal conclave.
"Hello Bill, how are you? We've been busy, but I think we'll be ready for Tuesday," said DiNardo.
When DiNardo was elevated to cardinal, Pope Benedict gave him the honorary title to a parish church in Rome, where he arrived Sunday morning to celebrate Sunday mass with his parishioners.
"I'm very fortunate, Bill, to have been given a church that is actually a parish church," DiNardo said to Balleza.
DiNardo traveled to Rome ten days ago to begin a series of meetings leading up to the conclave that begins Tuesday.
"I miss Houston already," said DiNardo.
Several Houstonians were among those who attended Sunday's mass, and the cardinal graciously acknowledged their presence, nodding to them as he processed up the aisle to begin the ritual of Catholic mass.
Just before the service began, he addressed them directly from the altar.
"I understand there are a number of people from Houston here today, you'll be inspired," said DiNardo.
DiNardo has one final meeting with the other 114 electors before they are locked away in the Sistine Chapel, until they choose one among them to lead the Roman Catholic church. | <urn:uuid:30e4a122-d63d-48fc-9fd5-bd719c701965> | 2013-05-18T08:05:44Z | CC-MAIN-2013-20 | [
[
-0.014662756584584713,
0.006552419159561396,
-0.014662756584584713,
-0.013379765674471855,
0.08907624334096909,
-0.01805351860821247,
-0.002417063806205988,
0.01457111444324255,
-0.017870234325528145,
-0.059017594903707504,
0.03537390008568764,
0.011317815631628036,... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.983488 | 310 | http://www.click2houston.com/news/Houston-Cardinal-holds-mass-in-Rome-ahead-of-papal-conclave/-/1735978/19258876/-/uv01kt/-/index.html | 0.269274 |
Clint Bowyer won a tense fuel-strategy battle with the top three drivers in the Chase for the Sprint Cup standings and beat them to the finish of Saturday night's Bank of America 500 at Charlotte Motor Speedway.
In the process, Bowyer closed in on the top three -- Brad Keselowski, Jimmie Johnson and Denny Hamlin -- in the run for the championship as the Chase moves into the final five races.
Bowyer outran Hamlin by .41 second to score his third win of the year. Bowyer ran out of fuel after the finish and wasn't able to perform one of the blistering burnouts he has become known for.
Johnson finished third, and Keselowski, who ran out of fuel in the final 100 miles, was 11th, a lap down.
Keselowski retained the points lead, but his margin over Johnson was cut in half, from 14 to seven. Hamlin stayed in third and trails Keselowski by only 15.
Bowyer jumped a position into fourth and is 28 behind Keselowski.
"That was like playing blackjack," Keselowski said of the fuel-strategy game. "Sometimes you're going to get a good deal, but you're not going to win them all."
Hamlin gave up a shot at passing Bowyer for the win to retain the fuel-saving strategy. "It goes against everything we've ever learned as race car drivers," he said. "I knew what I had to do."
Meanwhile, Bowyer and his team, led by crew chief Brian Pattie, had figured their fuel mileage to near-perfection, and Bowyer pitted on sequence to finish the race with his last drops of gas.
"The run before the last one really won the race," Bowyer said. "If we had pitted one lap earlier, we would have run out of gas (at the end of the race)."
Completing the top five were Greg Biffle and Kyle Busch. In the second five were Mark Martin, Carl Edwards, Kasey Kahne, Joey Logano and Martin Truex Jr.
Biffle's finish boosted him three spots in the Chase to sixth, but he is 43 points behind Keselowski entering the Kansas race.
Jeff Gordon finished 18th and fell three positions to ninth, 50 points out.
Although 28 points is a heavy total to make up over five races, Bowyer said he'll roll into his home track -- Kansas Speedway -- next week with the idea of making it work.
"We're a hell of a lot better than we were leaving Talladega and being back in victory lane and having new life and new hope going into Kansas," he said. "There's a lot of racing left. Nobody knows what to expect there. It's a repave. You don't know if somebody is going to stub their toe."
Bowyer was 40 points down entering the race after finishing 23rd at Talladega last week because of the massive last-lap crash.
"After Talladega, we had to be able to get back in the game," Pattie said. "To win this race really set the standard for getting on down the road and putting that behind us."
He said the team will continue its search for victories over the Chase's final five events.
"We're going for trophies," he said. "That's the only way you're going to beat the 2 (Keselowski), the 48 (Johnson) and the 11 (Hamlin). We had to do something special to get back into it."
Outside the Chase group, Regan Smith had a tough night in his spotlighted run as a substitute for Dale Earnhardt Jr., who missed the race because of health issues. Smith started the race 26th and advanced to 10th before being sidelined with engine trouble 61 laps in. He finished 38th but will get another shot in the Hendrick Motorsports No. 88 next week at Kansas.
By sitting out Saturday's race, Earnhardt fell from 11th to 12th in Chase points and probably will finish the year in that spot.
AJ Allmendinger, who made his return to NASCAR Saturday night after being suspended this summer for failing a drug test, finished 24th in the Phoenix Racing Chevrolet.
Kurt Busch, driving the Furniture Row Racing Chevrolet for the first time, finished 21st.
EARNHARDT'S ABSENCE LOOMS OVER RACE
Taking attention from a hotly contested Chase for the Sprint Cup in the middle of NASCAR's version of the playoffs isn't easy. But you have a shot if your name happens to be Earnhardt. | <urn:uuid:cbff4e9f-4d90-421c-a2a6-8715ee9e468f> | 2013-05-18T07:14:25Z | CC-MAIN-2013-20 | [
[
0.0220947265625,
0.004119873046875,
0.006866455078125,
0.007659912109375,
0.06640625,
-0.04541015625,
-0.015625,
0.09716796875,
-0.00830078125,
-0.07373046875,
0.015625,
0.0279541015625,
0.0205078125,
-0.021484375,
0.0478515625,
-0.010986328125,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.981934 | 965 | http://www.click2houston.com/sports/Bowyer-wins-fuel-duel-at-Charlotte/-/1735736/16988674/-/lgu6a4/-/index.html | 0.366568 |
In an effort to pressure the Obama administration to answer a lingering question related to the Benghazi attack, Sen. John McCain, R-Ariz., is reconsidering his pledge not to filibuster the nomination of former Sen. Chuck Hagel to be defense secretary, according to his spokesman Brian Rogers.
McCain wants to know if the president ever personally contacted anyone in the Libyan government during the Benghazi attack to seek assistance for the Americans in the compound. McCain, along with Sen. Lindsey Graham, R-S.C., and Sen. Kelly Ayotte, R-N.H., have been trying to get the answer for months, said Rogers, and they reiterated their request in a letter to the president on Monday.
McCain "is not calling for a filibuster in the sense of stopping the nomination cold," Rogers explained. But the senators are "entitled" to a response and it "should be very easy for the administration to answer," he said.
A decision to filibuster Hagel's nomination, would be an about face for McCain who said recently "I don't think it's appropriate and I would oppose such a move." | <urn:uuid:248b5f28-fa2b-43ec-bcaa-74e593d104c1> | 2013-05-18T06:44:17Z | CC-MAIN-2013-20 | [
[
-0.021616540849208832,
0.037828948348760605,
-0.0021293468307703733,
0.0006791882333345711,
0.05874060094356537,
-0.03430451080203056,
-0.016682330518960953,
0.03970864787697792,
-0.011278195306658745,
-0.05733082816004753,
0.04417293146252632,
0.03712406009435654,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.971642 | 229 | http://www.clickondetroit.com/news/politics/McCain-reconsidering-filibuster-of-Hagel/-/1719386/18531994/-/wwci2j/-/index.html | 0.248319 |
Anelka to leave China and join Juventus?
Nicolas Anelka's ill-fated move to China appears to be over after Italian club Juventus claimed on Saturday that the former France striker is poised to join on a short-term deal.
Anelka moved to Shanghai Shenhua from English side Chelsea on a two-year contract in January 2012 after agreeing a deal reportedly worth more than $300,000 a week, but could now sign for Juve in a cut-price five-month package worth $800,000.
Shenhua struggled to ninth place in the Chinese Super League last year despite also signing Anelka's former Chelsea teammate Didier Drogba on an even higher pay packet.
Anelka took over as team coach for a brief period after Jean Tigana was sacked, with former Argentina World Cup winner Sergio Batista subsequently being appointed.
The 33-year-old will reportedly join Serie A champions Juventus before the end of the January transfer window, as the club's bosses seek to boost their attacking options ahead of the expected July signing of Spain striker Fernando Llorente.
On Saturday Anelka posted an internet picture of himself at an airport, which fellow Twitter users purported to be en route to that of Juve's home city Turin. He has been training with his first senior team, Paris Saint-Germain.
He has been involved in transfers worth a total $140 million, playing for top clubs such as Real Madrid, Liverpool, Manchester City, Arsenal and Fenerbahce.
"This summer we made a significant investment to try and strengthen the group but clearly at this stage we are in an emergency situation," Juventus sporting director Beppe Marotta told the Sky Italia TV channel.
"As a result, it is logical to make this signing. It should be made official in the next few days. We have an agreement with Anelka for five months with the possibility to sign a further deal if agreeable to both parties."
Juve dropped points in Saturday's frustrating 1-1 draw at home to third-bottom Genoa, but still moved six clear at the top.
Striker Fabio Quagliarella scored his seventh league goal in 15 matches in the 54th minute, but Marco Borriello -- who spent the second half of last season on loan at Juve -- leveled with a diving header quarter of an hour later.
Third-placed Lazio could have cut Juve's then five-point lead to two in Saturday's earlier game, but lost 1-0 to midtable Chievo to stay below Napoli on goal difference.
Napoli can now reduce the deficit in Sunday's trip to Parma, while fourth-placed Inter Milan host Torino.
English Premier League leaders Manchester United reached the fifth round of the FA Cup with a 4-1 victory at home to Fulham, as striker Javier Hernandez netted twice after goals from Wayne Rooney and veteran Ryan Giggs, with a penalty.
Arsenal snatched a 3-2 win at second division Brighton as France striker Olivier Giroud scored twice and fellow forward Theo Walcott came off the bench to strike a decisive late goal.
Norwich became the first top-flight team since 1989 to lose to a non-league side in the world's oldest knockout tournament, crashing 1-0 at home to Luton.
The Premier League's bottom team Queens Park Rangers lost 4-2 at third division MK Dons, following Friday's exit by fellow strugglers Aston Villa at the hands of second tier Millwall.
Manchester City, Everton, Reading and Wigan went through.
In Germany, Bayer Leverkusen returned to second place despite being held 0-0 by Freiburg on Saturday.
Leverkusen moved a point above two-time defending champions Borussia Dortmund, who won 3-0 at home to Nuremberg on Friday.
Bayern Munich go into Sunday's trip to Stuttgart with an eight-point lead.
In Spain, Valencia moved up to fifth place after snatching 3-2 win at bottom club Deportivo La Coruna, as Ricardo Costa headed home in time added on before Paulo Assuncao became the second home player to be sent off.
Deportivo had led 2-1 at halftime through a Riki double, but on-loan Portuguese defender Silvio was sent off seven minutes after the break for a second bookable offense.
Levante earlier won 2-1 at home to midtable Valladolid thanks to a 90th-minute own goal from Serbian defender Antonio Rukavina, which put "Los Granotes" behind their Valencian rivals on goal difference.
Copyright 2013 by CNN NewSource. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:8d07ba3a-fd00-4799-a7fa-0ea067f8ca51> | 2013-05-18T06:00:30Z | CC-MAIN-2013-20 | [
[
0.0166015625,
0.03759765625,
-0.00836181640625,
-0.0026397705078125,
0.07275390625,
-0.0233154296875,
-0.001373291015625,
0.09765625,
0.024169921875,
-0.05859375,
0.06005859375,
0.059814453125,
-0.0289306640625,
-0.03955078125,
0.04345703125,
-0.0007... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956527 | 987 | http://www.clickorlando.com/sports/Anelka-to-leave-China-and-join-Juventus/-/1636890/18293276/-/format/rsss_2.0/view/print/-/36irwoz/-/index.html | 0.342441 |
Download source - 8 Kb
This tutorial is based off of the MSDN Article #ID: Q194873. But, for a beginner, following these MSDN articles can be intimidating to say the least. One of the most often asked questions I see as a Visual C++ and Visual Basic programmer is how to call a VB DLL from VC++. Well, I am hoping to show you exactly that today. I am not going to go over the basic details of COM as this would take too long, so I am assuming you have an understanding of VB, VC++ and a little COM knowledge. It's not too hard to learn; just takes a little time. So let's get started.
The first thing you need to do is fire up Visual Basic 6 (VB 5 should work as well). With VB running, create a new "ActiveX DLL" project. Rename the project to "vbTestCOM" and the class to "clsTestClass". You can do this by clicking in the VB Project Explorer Window on the Project1 item (Step 1), then clicking in the Properties window and selecting the name property (Step 2). Do the same for the Class. Click on the class (Step 3), then the name property and enter the name mentioned above (Step 4). Your project so far should look like the folowing right hand side picture:
Ok, now we are ready to add some code to the VB Class. Click on the "Tools" menu, then select the "Add Procedure" menu item. The Add Procedure window will open up. In this window we need to add some information. First (Step 1) make sure the type is set to Function. Second (Step 2) enter a Function name called "CountStringLength". Finally hit the Ok button and VB will generate the new function in the class.
You should have an empty function with which to work. The first thing we will do is specify a return type and an input parameter. Edit your code to look like this:
Public Function CountStringLength(ByVal strValue As String) As Long
What are we doing here? We are taking one parameter, as a String type in this case, then returning the length through the return type, which is a Long. We specify the input parameter as ByVal, meaning VB will make a copy of this variable and use the copy in the function, rather than the default ByRef, which passes the variable by reference. This way we can be sure that we do not modify the string by accident that was passed to us by the calling program. Let's add the code now.
Public Function CountStringLength(ByVal strValue As String) As Long
If strValue = vbNullString Then
CountStringLength = 0
CountStringLength = Len(strValue)
In the first line of code we are checking to see if the calling program passed us an empty, or NULL, string. If so we return 0 as the length. If the user did pass something other than an empty string, then we count it's length and return the length back to the calling program.
Now would be a good time to save your project. Accept the default names and put it in a safe directory. We need to compile this project now. Go to the File menu and select the "Make vbCOMTest.dll..." menu item.
The compiler will produce a file called surprisingly enough: vbCOMTest.dll. The compiler will also do us the favor of entering this new DLL into the system registry. We have finished the VB side of this project, so let's start the VC++ side of it. Fire up a copy of VC++, then select from the menu, "New Project". The New Project window should appear. Select a "Win32 Console Application" (Step 1), then give it a name of "TestVBCOM" (Step 2). Finally, enter a directory you want to build this project in (Step 3 - your directory will vary from what I have entered).
Click on the "OK" button and the "Win32 Console Application - Step 1 of 1" window will appear. Leave everything on this page as the default, and click the "Finish" button. One final window will appear after this titled "New Project Information". Simply click the "Ok" button here. You should now have an empty Win32 Console project. Press the "Ctrl" and hit the "N" key. Another window titled "New" will appear. Select the "C++ Source File" (Step 1), then enter the new name for this file called, "TestVBCOM.cpp" (Step 2 - make sure the Add to Project checkbox is checked and the correct project name is in the drop down combo box), then click the "Ok" button to finish.
Now we are going to get fancy!
You need to go to your Start Menu in Windows and navigate to the "Visual Studio 6" menu and go into the "Microsoft Visual Studio 6.0 Tools" sub-menu. In here you will see an icon with the name "OLE View". Click on it.
The OLE View tool will open up. You will see a window similar to this one:
Collapse all the trees, if they are not already. This will make it easier to navigate to where we want to go. Highlight the "Type Libraries" (Step 1) and expand it. You should see a fairly massive listing. We need to locate our VB DLL. Now, remember what we named the project? Right, we need to look for vbTestCOM. Scroll down until you find this. Once you have found it, double click on it. A new window should appear - the "ITypeLib Viewer" window. We are only interested in the IDL (Interface Definition Language) code on the right side of the window. Select the entire IDL text and hit the "Ctrl" and "C" buttons to copy it to the clipboard.
You can close this window and the OLE View window now as we are done with the tool. We need to add the contents of the IDL file into our VC++ project folder. Go to the folder you told VC++ to create your project in and create a new text file there (If you are in Windows Explorer, you can right click in the directory and select "New" then scroll over following the arrow and select "Text Document"). Rename the text document to "vbCOMTEST.idl". Then double click on the new IDL file (VC++ should open it if you named it correctly with an IDL extension). Now paste the code in the file by pressing the "Ctrl" and "V" keys. The IDL text should be pasted into the file. So far, so good. Now, this IDL file is not going to do us much good until we compile it. That way, VC++ can use the files it generates to talk to the VB DLL. Let's do that now. Open a DOS window and navigate to the directory you created your VC++ project in. Once in that directory, at the prompt you need to type the following to invoke the MIDL compiler:
E:\VCSource\TestVBCOM\TestVBCOM\midl vbTestCOM.idl /h vbTestCOM.h
Hit the "Enter" key and let MIDL do its magic. You should see results similar to the following:
Close the DOS window and head back into VC++. We need to add the newly generated vbTestCOM.h and vbTestCOM_i.c files to the project. You can do this by going to the "Project" menu, then selecting the "Add to Project" item, and scrolling over to the "Files" menu item and clicking on it. A window titled, "Insert Files into Project" will open. Select the two files highlighted in the next picture, then select the "Ok" button.
These two files were generated by MIDL for us, and VC++ needs them in order to talk to the VB DLL (actually VC++ does not need the "vbCOMTest_i.c" file in the project, but it is handy have in the project to review). We are going to add the following code to the "TestVBCOM.cpp" file now, so navigate to that file in VC++ using the "Workspace" window. Open the file by double clicking it and VC++ will display the empty file for editing.
Now add the following code to the "TestVBCOM.cpp" file:
_clsVBTestClass *IVBTestClass = NULL;
hr = CoInitialize(0);
hr = CoCreateInstance( CLSID_clsVBTestClass,
_bstr_t bstrValue("Hello World");
hr = IVBTestClass->CountStringLength(bstrValue,
cout << "The string is: " << ReturnValue << " characters in
length." << endl;
hr = IVBTestClass->Release();
cout << "CoCreateInstance Failed." << endl;
If all the code is entered in correctly, then press the "F7" key to compile this project. Once the project has compiled cleanly, then press the "Ctrl" and the "F5" keys to run it. In the C++ code, we include the MIDL created "vbTestCOM.h" file, the "Comdef.h" file for the _bstr_t class support and the "iostream.h" file for the "cout" support. The rest of the comments should speak for themselves as to what's occurring. This simple tutorial shows how well a person can integrate VB and VC++ apps together using COM. Not too tough actually. | <urn:uuid:a5fbb498-1ce4-4861-9a4d-ac9d31394472> | 2013-05-18T06:48:21Z | CC-MAIN-2013-20 | [
[
-0.03271484375,
0.000095367431640625,
0.0284423828125,
0.00128936767578125,
0.05615234375,
-0.01226806640625,
0.0052490234375,
0.103515625,
-0.02197265625,
0.00921630859375,
0.05517578125,
0.033203125,
-0.022216796875,
0.0023956298828125,
0.0077819824218... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.878738 | 2,064 | http://www.codeproject.com/Articles/21/Beginner-s-Tutorial-Calling-Visual-Basic-ActiveX-D?fid=104&df=90&mpp=10&sort=Position&spc=None&select=1378774&tid=816225&PageFlow=FixedWidth | 0.185587 |
This email was created by [your name] who thought you would be interested in the following Article:
"Introduction to XMLDataSource control in ASP.NET 2.0"
Explains common properties and features of XMLDataSource control in VS.NET 2005.
CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try! | <urn:uuid:0c8ea438-91dc-4cf3-9c16-93c683a4bc86> | 2013-05-18T05:51:52Z | CC-MAIN-2013-20 | [
[
-0.047940339893102646,
0.018465908244252205,
0.037997160106897354,
0.017134232446551323,
0.04829545319080353,
-0.04509943351149559,
0.011052912101149559,
0.08025567978620529,
0.004993785638362169,
-0.0234375,
0.07634942978620529,
0.06285511702299118,
0.017400568... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.939428 | 85 | http://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=10898 | 0.216161 |
I need to put together an architecture for an application and would appreciate any pointers you could give me.
A rich client application A web version (applet) Needs to "look like a Windows application" Ideally also run on non-Windows platforms, e.g. Mac. Displays a vector image Allows the user to interact with the vector image, (left and right) click on it, altering the image generation rules and subsequent re-drawing of the image. Basically I need to capture the click event, know where the cursor was etc.
The rich client application and the web (applet) version should have indentical functionality and be similar in appearance / usability.
1. What is the best rich client API selection to use that would also either support or fit well with an applet version?
2. What is the best method for drawing vector images and then supporting interaction with the image (say, left and right clicking, context menus etc) for rich client and applet?
3. What APIs will give me the closest appearance to Windows, e.g. SWT/JFACE?
I know these are big questions, but any help you could give would be appreciated.
From what I've seen SWT / JFace looks promising in terms of Windows-like appearance, but I have no idea about applets, drawing vector images and interacting with them etc. | <urn:uuid:ef00f605-2d0d-42ef-a706-241b7b0ee0ed> | 2013-05-18T06:21:06Z | CC-MAIN-2013-20 | [
[
-0.028862126171588898,
0.022840531542897224,
0.03758305683732033,
-0.004775747656822205,
0.048380397260189056,
-0.049003321677446365,
0.004645971581339836,
0.09219269454479218,
-0.02761627919971943,
-0.018168604001402855,
0.06063123047351837,
0.05294850468635559,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940942 | 283 | http://www.coderanch.com/t/343832/GUI/java/Application-Architecture-Design | 0.925216 |
1854-89 THREE DOLLARS INDIAN HEAD
In 1853 the United States negotiated the "Gadsden Purchase"settlement of a boundary dispute with Mexico that resulted in the U.S. acquiring what would become the southern portions of Arizona and New Mexico for ten million dollars. The following year Commodore Matthew Perry embarked upon his famed expedition to re-open Japan to the Western world and establish trade. Spreading beyond its borders in many ways, a few years earlier the United States had joined the worldwide move to uniform postage rates and printed stamps when the Congressional Act of March 3, 1845 authorized the first U.S. postage stamps, and set the local prepaid letter rate at five cents. This set the stage for a close connection between postal and coinage history.
Exactly six years later, the postage rate was reduced to three cents when New York Senator Daniel S. Dickinson fathered legislation that simultaneously initiated coinage of the tiny silver three-cent piece as a public convenience. The large cents then in circulation were cumbersome and unpopular, and the new denomination was designed to facilitate the purchase of stamps without using the hated "coppers."
This reasoning was carried a step further when the Mint Act of February 21, 1853 authorized a three-dollar gold coin. Congress and Mint Director Robert Maskell Patterson were convinced that the new coin would speed purchases of three-cent stamps by the sheet and of the silver three-cent coins in roll quantities. Unfortunately, at no time during the 35-year span of this denomination did public demand justify these hopes. Chief Engraver James Barton Longacre chose an "Indian Princess" for his obverse not a Native American profile, but actually a profile modeled after the Greco-Roman Venus Accroupie statue then in a Philadelphia museum. Longacre used this distinctive sharp-nosed profile on his gold dollar of 1849 and would employ it again on the Indian Head cent of 1859. On the three-dollar coin Liberty is wearing a feathered headdress of equal-sized plumes with a band bearing LIBERTY in raised letters. She's surrounded by the inscription UNITED STATES OF AMERICA. Such a headdress dates back to the earliest known drawings of American Indians by French artist Jacques le Moyne du Morgue's sketches of the Florida Timucua tribe who lived near the tragic French colony of Fort Caroline in 1562. It was accepted by engravers and medalists of the day as the design shorthand for "America."
Longacre's reverse depicted a wreath of tobacco, wheat, corn and cotton with a plant at top bearing two conical seed masses. The original wax models of this wreath still exist on brass discs in a Midwestern collection and show how meticulous Longacre was in preparing his design. Encircled by the wreath is the denomination 3 DOLLARS and the date. There are two boldly different reverse types, the small DOLLARS appearing only in 1854 and the large DOLLARS on coins of 1855-89. Many dates show bold "outlining" of letters and devices, resembling a double strike but probably the result of excessive forcing of the design punches into the die steel, causing a hint of their sloping "shoulders" to appear as part of the coin's design. The high points of the obverse design that first show wear are the cheek and hair above the eye; on the reverse, check the bow knot and leaves.
A total of just over 535,000 pieces were issued along with 2058 proofs. The first coins struck were the 15 proofs of 1854. Regular coinage began on May 1, and that first year saw 138,618 pieces struck at Philadelphia (no mintmark), 1,120 at Dahlonega (D), and 24,000 at New Orleans (O). These two branch mints would strike coins only in 1854. San Francisco produced the three-dollar denomination in 1855, 1856, and 1857, again in 1860, and apparently one final piece in 1870. Mintmarks are found below the wreath.
Every U.S. denomination boasts a number of major rarities. The three-dollar gold coinage of 1854-1889 is studded with so many low-mintage dates that the entire series may fairly be called rare. In mint state 1878 is the most common date, followed by the 1879, 1888, 1854 and 1889 issues. Every other date is very rare in high grade, particularly 1858, 1865, 1873 Closed 3 and all the San Francisco issues. Minuscule mintages were the rule in the later years. Proof coins prior to 1859 are extremely rare and more difficult to find than the proof-only issues of 1873 Open 3, 1875 and 1876, but many dates are even rarer in the higher Mint State grades. This is because at least some proofs were saved by well- heeled collectors while few lower-budget collectors showed any interest in higher-grade business strikes of later-date gold. Counterfeits are known for many dates; any suspicious piece should be authenticated.
The rarest date of all is the unique 1870-S, of which only one example was struck for inclusion in the new Mint's cornerstone. Either the coin escaped, or a second was struck as a pocket piece for San Francisco Mint Coiner J.B. Harmstead. In any event, one coin showing traces of jewelry use surfaced in the numismatic market in 1907. It was sold to prominent collector William H. Woodin, and when Thomas L. Elder sold the Woodin collection in 1911, the coin went to Baltimore's Waldo C. Newcomer. Later owned by Virgil Brand, it was next sold by Ted and Carl Brandts of Ohio's Celina Coin Co. and Stack's of New York to Louis C. Eliasberg in 1946 for $11,500. In Bowers and Merena's October 1982 sale of the U.S. Gold Collection, this famous coin sold for a record $687,500.
The three-dollar denomination quietly expired in 1889 along with the gold dollar and nickel three-cent piece. America's coinage was certainly more prosaic without this odd denomination gold piece, but its future popularity with collectors would vastly outstrip the lukewarm public reception it enjoyed during its circulating life. | <urn:uuid:ce5e0d75-e5f8-4ce2-8b94-86d9527d0dd4> | 2013-05-18T06:29:46Z | CC-MAIN-2013-20 | [
[
-0.0159912109375,
0.041748046875,
-0.0106201171875,
0.00860595703125,
0.04150390625,
-0.0277099609375,
-0.003875732421875,
0.09619140625,
-0.0380859375,
0.0130615234375,
0.0888671875,
0.0191650390625,
0.009521484375,
-0.0311279296875,
0.028076171875,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963839 | 1,295 | http://www.coinsite.com/CoinSite-PF/PParticles/$3goldix.asp | 0.237849 |
An elderly woman had three cats that she was very close to. One day, one of the three cats died. She hated to part with any of them so she buried the first one in her back yard. Later on, the second one died. She buired that one near her back steps. A few years later, the third one died. She refused to bury the third one so she put it in a small satchel and carried it around... Read More »
Do you have what it takes to do standup? Of course not, so post your jokes here instead.
× Share with friend
What is uPick?
uPick is a new feature on CollegeHumor where YOU the user upload a story or picture to a category. You then vote up or down these stories as you see fit. | <urn:uuid:e3ead314-03db-4441-bc85-b8a608f279e1> | 2013-05-18T07:17:13Z | CC-MAIN-2013-20 | [
[
-0.011323736049234867,
0.0270365159958601,
0.00487183965742588,
0.020101826637983322,
0.06214887648820877,
-0.03739466145634651,
-0.004674332682043314,
0.055828653275966644,
-0.017643960192799568,
-0.06109550595283508,
0.07198033481836319,
0.013430477119982243,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98268 | 165 | http://www.collegehumor.com/upick/6742362/oh-helen | 0.226016 |
Did you find what you were looking for?
If no, what were you looking for?
Do you find the layout, design, colors and presentation of information attractive and pleasing?
Was the information adequate for your needs?
How did you find out about us?
Would you use this online service again?
What other suggestions or comments do you have (include any government services that you would like to see online)?
To opt in for email notifications about Colorado government services, enter your email address: | <urn:uuid:5d04fdcc-a89c-451e-96af-eded78bed078> | 2013-05-18T05:49:14Z | CC-MAIN-2013-20 | [
[
-0.024575242772698402,
0.00932949036359787,
0.02427184395492077,
0.006067960988730192,
0.07463592290878296,
-0.07038834691047668,
-0.03018810600042343,
0.07433252781629562,
-0.0241201464086771,
-0.02927791327238083,
0.06553398072719574,
0.04126213490962982,
-0.0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.969079 | 103 | http://www.colorado.gov/apps/feedback/feedback.faces | 0.97613 |
A bachelor's degree earned in the United States usually takes a minimum of four years. Degrees are earned by taking a combination of required courses which meet liberal arts distribution requirements (humanities, social sciences, and natural sciences), a required number of courses in the major field of study (called a "major"in the United States), and the balance of courses as electives. Each course taken is assigned a value called "points" (also called "credits" or "units"). To earn a bachelor's degree, one must earn a minimum of 124 points (usually more) and, at the same time, meet the distribution and major requirements. Advisement on course selection is available in each school at the time of registration.
Undergraduate studies are offered in three divisions of the University. Each division offers a distinct program of studies. The divisions that offer the undergraduate (B.A. or B.S.) degree are:
College (CC) - Study of the liberal arts and sciences leading to
the B.A. degree traditionally, but not exclusively, for students just out
of secondary school, usually between the ages of 17 and 22. With an enrollment
of approximately 4,000, Columbia College is the smallest college in the
2. Fu Foundation School of Engineering and Applied Science (SEAS) - Offers the B.S. degree in engineering and applied science fields.
3. School of General Studies (GS) - Offers the B.A. or B.S. degree to students who have had a break of a year or more in their education since high school.
All other divisions of the University are graduate schools and, as such, offer degrees beyond the bachelor's degree, usually master's or doctoral degrees.
Master's degrees take from one to three years to earn depending on the course work and research/writing requirements.
Ph.D. requirements may vary but usually require one to two years of course work beyond the master's degree, comprehensive examinations, a major original contribution to research in the field of study, and oral defense of one's research. The research and writing requirement can take from two to five years beyond the course work. A Ph.D. candidate should plan on a minimum of four and an average of six years of study to complete the degree requirements. It is not unusual for a student to be at Columbia seven or eight years to complete a doctorate.
To be admitted to these schools, the applicant must have completed a degree considered in the United States to be equivalent to a U.S. bachelor's degree with a strong academic record. There are also other admissions requirements. The Columbia schools and programs that offer graduate degrees are:
|College of Physicians and Surgeons||Program in Physical Therapy|
|Fu Foundation School of Engineering and Applied Science||School of Continuing Education|
|Graduate School of Architecture, Planning, and Preservation||College of Dental Medicine|
|Graduate School of Arts and Sciences||School of International and Public Affairs|
|Graduate School of Business||School of Law|
|Graduate School of Journalism||School of Nursing|
|Institute of Human Nutrition||School of Social Work|
|Mailman School of Public Health||School of the Arts|
|Program in Occupational Therapy|
The School of Continuing Education offers, in addition to its masters' degree program, opportunities for non-degree study at Columbia to qualified applicants. Both undergraduate and graduate level courses from the University's arts and sciences course offerings may be taken for credit. This option is particularly appropriate for international students who wish to visit at Columbia for a semester or two.
To qualify for an I-20 to be in F-1 student status in the U.S., students must register for at least 12 points of credit-bearing coursework each semester. This is usually equivalent to four courses each semester.
Of particular interest to international students is the School of Continuing Education's American Language Program. The ALP is one of the oldest English as a Second Language programs in the United States and offers a carefully integrated sequence of courses to students, business and professional people, and international visitors who wish to improve their command of English.
There are two institutions which are affiliated with, located adjacent
to, and bear the name of Columbia University. They are administered separately
and applications for admission must be made directly to these institutions.
Barnard College, Columbia University An undergraduate liberal arts college for women affiliated with Columbia University. For more information, write to Barnard College Admissions, 111 Milbank,3009 Broadway, New York, NY 10027, U.S.A.
Teachers College, Columbia University A graduate school for students interested in education, offering only the master's and doctoral degrees. For more information, write to Teachers College Admissions, 146 Horace Mann, 551 West 120 Street, New York, NY 10027, U.S.A. | <urn:uuid:139cb27b-d4c2-4365-afcf-895d3c1e5636> | 2013-05-18T06:02:52Z | CC-MAIN-2013-20 | [
[
-0.050537109375,
0.026123046875,
-0.0196533203125,
-0.00122833251953125,
0.04248046875,
-0.0218505859375,
0.0029144287109375,
0.06591796875,
-0.021728515625,
0.007781982421875,
0.11328125,
0.0264892578125,
-0.06640625,
0.024169921875,
0.040771484375,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943447 | 1,006 | http://www.columbia.edu/cu/isso/admit/admit_tx.html | 0.186126 |
Warriors missing 3 starters against Cavaliers
Tuesday, January 29, 2013
CLEVELAND (AP) -- The Golden State Warriors are without three starters for their game against the Cleveland Cavaliers.
Guard Stephen Curry, center Andrew Bogut and forward Harrison Barnes are sidelined for the finale of Golden State's four-game road trip.
Curry, who is averaging 21 points, twisted his right ankle in the third quarter of Monday night's win over Toronto and didn't return.
Warriors coach Mark Jackson said he doesn't know how long Curry, who has had surgery on the ankle in each of the past two offseasons, will be out.
Bogut, who returned Monday after missing 38 games with an injury to his left ankle, likely won't play in back-to-back games until after the All-Star break. He scored 12 points and had eight rebounds in 24 minutes against Toronto. Bogut played in four games after having ankle surgery in April, but was shut down in November. He's averaging 7.2 points and 4.6 rebounds.
Barnes, taken with the seventh pick in the 2012 draft, injured his left knee against Toronto and was still experiencing soreness Tuesday. Barnes, who started the first 44 games, is averaging 8.9 points. | <urn:uuid:b9118141-5280-4d89-a28b-8d1966d26ae4> | 2013-05-18T05:22:52Z | CC-MAIN-2013-20 | [
[
0.03266550600528717,
0.01535278744995594,
-0.006832534912973642,
-0.02177700400352478,
0.050087109208106995,
-0.039198607206344604,
0.005634799599647522,
0.06533101201057434,
0.01170513965189457,
-0.09189895540475845,
0.10583623498678207,
0.0840592309832573,
0.0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.980829 | 262 | http://www.columbian.com/news/2013/jan/29/warriors-missing-3-starters-against-cavaliers/ | 0.158521 |
In a move to make use of third-party Web services development efforts, Microsoft will announce a three-year alliance with emerging application developer Softricity.
Microsoft's aim is to use Softricity's SoftGrid platform and ServerGuard component to encapsulate and to priority-redirect small portions of application code without rewriting that code.
The result is designed to improve the speed and management of applications running in the .net environment, said Dewey Forester, business development manager for the platform strategy group.
"A big topic of conversation with users is application deployment and management," Dewey said. "[Softricity] can extend the value of core technologies like Windows Terminal Servers, as well as address versioning issues like allowing different versions of Windows to run on the same server at the same time."
Companies such as Softricity have the potential to be identified with Microsoft's .net initiative by delivering much-needed sophisticated management capabilities to complex corporate environments.
Softricity's SoftGrid platform has the capability of transforming DOS to 32-bit programs running on .net and Windows 98, 2000, and NT. A Windows XP client will be available later this year. Future versions of SoftGrid are also expected to include a detached mode, PocketPC, and other on-demand models.
The company is working to enable all types of applications from 10-year-old homegrown programs to the latest productivity suites, said Stuart Schaefer, chief technology officer of Softricity.
By allowing remote workers to work offline and access applications while provisioning occurs, the technology should help companies strengthen administration of licences and usage, said Dan Kusnetzky, vice-president of system software research at IDC.
"Their ability to encapsulate environments and fix registries so incompatibilities don't stop people, might be seen as a godsend as [customers] face change in [migrating to a Web services/.net] environment," Kusnetzky said.
But given Microsoft's various licensing restrictions, Dwight Davis, senior analyst at Summit Strategies, questioned the complex situation users might face in using a technology such as Softricity's to access portions of applications such as Office. | <urn:uuid:a542e239-ad76-4b16-a690-776242b1155c> | 2013-05-18T06:49:47Z | CC-MAIN-2013-20 | [
[
-0.02103838510811329,
0.03198818862438202,
0.033710628747940063,
-0.006428395863622427,
0.06840550899505615,
-0.03346456587314606,
0.006120816804468632,
0.11368110030889511,
-0.008673720061779022,
-0.020792322233319283,
0.05437992140650749,
0.04527559131383896,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.922797 | 446 | http://www.computerweekly.com/news/2240045885/Microsoft-partners-extend-net-reach | 0.191921 |
Leeda's is one of my favorite accommodations in Greece. It is a tranquil oasis in the the middle of an ancient olive grove. The stone houses are thoughtfully constructed, and the grounds are beautifully designed. There is a clean pool and a small beach nearby, though a car is highly recommended for exploring the islands many beautiful sandy beaches. For the independent traveler, Leeda's is a real gem. | <urn:uuid:020d7faa-ce21-464f-8ccc-3256d3b77d40> | 2013-05-18T07:28:53Z | CC-MAIN-2013-20 | [
[
-0.0045312498696148396,
-0.013515625149011612,
0.0016406249487772584,
0.0030859375838190317,
0.08124999701976776,
-0.07656250149011612,
-0.03328125178813934,
0.08187499642372131,
-0.03687499836087227,
-0.033906251192092896,
0.09437499940395355,
0.03984374925494194,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951815 | 84 | http://www.concierge.com/travelguide/ionianislands/hotels/reviews/10866/537583 | 0.598741 |
Swifte wrote:sounds fun I'm in!
Appears games will have no round limit?
+1, this would help in case of Das Schloss or Hive or something like that!
I don't really like the round limit --if a game is over it is just as easy to drop and go. If a game is close and someone wins because of a round limit that kind of sucks. I think 30 rounds could be ok though--I will look for input on this matter and go with the majority
We are what we repeatedly do. Excellence, therefore, is not an act but a habit. | <urn:uuid:5147668a-cf42-48df-a708-354edc757b5b> | 2013-05-18T06:21:49Z | CC-MAIN-2013-20 | [
[
-0.033617425709962845,
0.009706439450383186,
0.0338541679084301,
-0.00009432705701328814,
0.05681818351149559,
-0.05634469538927078,
0.0013538707280531526,
0.07575757801532745,
-0.006332859862595797,
-0.08049242198467255,
0.03290719538927078,
0.02391098439693451,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970549 | 127 | http://www.conquerclub.com/forum/viewtopic.php?p=3653347 | 0.194043 |
In the American electoral system, a primary election is an election that determines the nominee for each political party, who then competes for the office in the general election. A presidential primary is a state election that picks the delegates committed to nominate particular candidates for president of the United States. A presidential caucus, as in Iowa, requires voters to meet together for several hours in face-to-face meetings that select county delegates, who eventually pick the delegates to the national convention. No other country uses primaries; they choose their candidates in party conventions.
Primaries were introduced in the Progressive Era in the early 20th century to weaken the power of bosses and make the system more democratic. In presidential elections, they became important starting in 1952, when the first-in-the-nation New Hampshire Primary helped give Dwight D. Eisenhower the Republican nomination, and knocked Harry S. Truman out of the Democratic race because of his poor showing. In 1964, Lyndon B. Johnson ended his reelection campaign after doing poorly in New Hampshire.
After 1968, both parties changed their rules to emphasize presidential primaries, although some states still use the caucus system.
In recent decades, New Hampshire holds the first primary a few days after Iowa holds the first caucus. That gives these two states enormous leverage, as the candidates and the media focus there. New Hampshire and Iowa receive about half of all the media attention given all primaries.
The primary allows voters to choose between different candidates of the some political parties, perhaps representing different wings of the party. For example, a Republican primary may choose between a range of candidates from moderate to conservative. Gallup's 2008 polling data indicated a trend in primary elections towards more conservative candidates, despite the more liberal result in the general election.
In recent years the primary seasons has come earlier and earlier, as states move up to earlier dates in the hope it will give them more leverage. For example, Barry Goldwater won the 1964 nomination because he won the last primary in California. The logic is faulty--in highly contested races the later primaries have more leverage. Thus in 2008 California gave up its traditional last-in-the-nation role and joined 20 other states on Super Tuesday. Neither the candidates not the voters paid it much attention. Michigan and Florida moved up their primaries in defiance of national Democratic Party rules and were penalized. The result is the primary season is extended, and is far more expensive, and no state gets an advantage--except for Iowa and New Hampshire, which now have dates in early January.
In late 2009 the two national parties are meeting to find a common solution.
- Duncan, Dayton. Grass roots: one year in the life of the New Hampshire presidential primary (1991) 436 pages; on 1988 campaign
- Johnson, Haynes, and Dan Balz. The Battle for America 2008: The Story of an Extraordinary Election (2009), excellent history of 2008 primaries
- Kamarck, Elaine C. Primary Politics: How Presidential Candidates Have Shaped the Modern Nominating System (2009) excerpt and text search | <urn:uuid:c66cbd20-f2be-4f73-902d-7b0198351323> | 2013-05-18T06:20:16Z | CC-MAIN-2013-20 | [
[
0.01708984375,
0.03125,
-0.000499725341796875,
0.0010833740234375,
0.05078125,
-0.0458984375,
-0.0159912109375,
0.0966796875,
-0.00921630859375,
-0.04248046875,
0.119140625,
0.0050048828125,
-0.05224609375,
0.0341796875,
0.04296875,
-0.007568359375,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951015 | 615 | http://www.conservapedia.com/Primary_election | 0.913496 |
Privilege for a Private Corporation
The Florida Constitution prohibits the legislature from granting a privilege to a private corporation. "There shall be no special law or general law of local application pertaining to ... private incorporation or grant of privilege to a private corporation." Article III, Section 11(a)(12). This has a conceptual similarity to rules in some states against government taking private property from one to give to another.
The Virginia Constitution has a similar prohibition against granting a privilege to a private corporation. | <urn:uuid:6f44c818-b77f-4f81-ba0e-1fa9a1028748> | 2013-05-18T07:14:14Z | CC-MAIN-2013-20 | [
[
-0.08995327353477478,
0.035484813153743744,
0.01854556053876877,
0.00668078288435936,
0.06366822123527527,
-0.09521028399467468,
-0.009163259528577328,
0.08528037369251251,
-0.035338785499334335,
0.03942757099866867,
0.11331775784492493,
0.047313082963228226,
-0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.884205 | 98 | http://www.conservapedia.com/Privilege_for_a_Private_Corporation | 0.858186 |
LONDON -- British chip designer ARM on Tuesday launched its first 64-bit processors to power the next generation of smartphones and tablets and offer low-energy solutions for servers.
The Cambridge-based company, whose technology is in Apple's (AAPL) iPhone 5 and Samsung's Galaxy S3, said its latest blueprints would deliver three times today's processing power using the same amount of energy.
The move to 64-bit architecture, from ARM's current 32-bit designs, will give ARM-based chips increased processing power but retain the energy efficiency central to its technology, the company said.
ARM's processor division marketing VP Noel Hurley said demand for more power came from the proliferation of data driven by smartphones and tablets.
"When we are looking at 'superphones' and tablets, the consumer is having to deal with much more data, particularly if they start to originate material on these devices," he said.
Advanced Micro Devices said on Monday it would start making ARM-based processors
Licensees of ARM's new 64-bit Cortex A-50 series include AMD, Broadcom, Calxeda, HiSilicon, Samsung and STMicroelectronics, the company said, and the first chips are expected to ship in 2014. | <urn:uuid:4d6125ca-2de1-4617-8d8b-a0f56290a766> | 2013-05-18T05:26:49Z | CC-MAIN-2013-20 | [
[
-0.030241934582591057,
0.02150537632405758,
0.025425627827644348,
0.008288530632853508,
0.08691756427288055,
-0.04144265130162239,
-0.004564292263239622,
0.06541218608617783,
-0.031137993559241295,
-0.05488351359963417,
0.06362006813287735,
0.01668906770646572,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.942889 | 254 | http://www.contracostatimes.com/business/ci_21887886/arm-unveils-faster-64-bit-processors-smartphones-servers | 0.384724 |
In a large stockpot over medium-high heat, brown the hamburger until no longer pink, about 4 minutes. Drain most of the grease, reserving a small amount in the pan and reduce the heat to medium. Add 1 teaspoon salt and season with pepper and 1/2 tablespoon chili powder. Move the meat to the edges of the pan leaving the space in the center of the pan and saute the jalapeno, onion, shallot, garlic, and green chiles until translucent, about 5 minutes, stir into the meat and cook about 2 minutes more.
Meanwhile, brown the turkey sausage in a large skillet over medium-high heat, drain and add 1/2 tablespoon crushed red pepper flakes and 1/2 tablespoon chili powder and stir to combine; add to the beef mixture. Add the cumin, onion powder, garlic salt, remaining 1 tablespoon chili powder and remaining 1/2 tablespoon crushed red pepper flakes. Cook until fragrant, about 3 minutes. Stir in the pinto beans, diced tomatoes, tomato sauce, chopped stewed tomatoes and stout beer. Bring to a boil uncovered and then turn heat to medium, cover and simmer for about 30 minutes. Taste, then add salt and pepper as desired.
Cook's Notes: Chili may be thickened by mixing 1/4 cup cornstarch with 1 cup of cold water and whisking into the bubbling chili. The secret ingredient? Beer! The beer gives this hearty bowl of chili a depth of flavor that tastes like it simmered in the pot all day long.
Servings: 12 servings | <urn:uuid:3c72ec81-5400-479b-9d67-97a68d1f07f1> | 2013-05-18T07:27:28Z | CC-MAIN-2013-20 | [
[
-0.021169355139136314,
0.004599294159561396,
-0.019909273833036423,
0.04704301059246063,
0.07526881992816925,
-0.0025201612152159214,
-0.009114583022892475,
0.051747310906648636,
0.02469758130609989,
0.008064515888690948,
0.0729166641831398,
0.05577956885099411,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.873044 | 322 | http://www.cookingchanneltv.com/recipes/panhandle-chili.print.html | 0.208682 |
How to Make the Best Grilled Chicken
From the heat of jerk chicken to the smokiness of classic barbecue chicken, grilled chicken is a summertime classic and a crowd pleaser. But while grilling chicken over a fire might seem straightforward, chicken is prone to drying out and sauces can be cloying. Over the years we’ve come up with the best grilled chicken recipes and all the ingredients, equipment, and techniques you’ll need for perfect grilled chicken.
Here’s how to break down a chicken, set up your grill, and avoid the top grilling mistakes when preparing a grilled chicken recipe.
Types of Fires
The biggest grilling mistake most people make happens before the food even hits the cooking grate: they set up the wrong type of fire. Here are the four grill setups we use in our grilled chicken recipes.
A single-level fire delivers an even level of heat and is often used for small, quick-cooking pieces of chicken, usually boneless kebabs. It is made by arranging the hot coals in an even layer across the bottom of the grill.
A two-level fire creates two cooking zones—a hotter area for searing and a slightly cooler area to cook the food through more gently. This type of fire is often used for bone-in chicken pieces. It is made by arranging two-thirds of the hot coals in an even layer across the bottom of the grill and pouring the remaining coals over just half of the grill.
A half-grill fire, much like a two-level fire, creates two cooking zones, but here the difference in heat level between the two zones is much more dramatic: one side is intensely hot since it has all the coals, and the other side is very cool because it has none. This type of fire if used for two reasons: to make a concentrated, super-hot fire for fast and vigorous searing; and to make the cooler cooking zone more controlled for very lean and easily overcooked chicken pieces. It is made by arranging the hot coals over half of the grill and leaving the other half of the grill empty.
The double-banked fire was created to help avoid flare-ups. We employ the double-banked fire in several grilled chicken recipes. When the coals are banked into two piles on opposite sides of the grill, leaving the center empty, the chicken can be placed in the center of the grill and receive a steady, even level of heat from both sides. As the chicken cooks, its fat renders and drips down into the center of the grill (we usually place a pan there to catch the drips), so we don’t have to worry about the fat hitting hot coals and causing flare-ups that could scorch the skin. This type of fire is made by dividing the hot coals into two steeply baked piles on opposite sides of the grill, leaving the center of the grill empty.
Avoiding the Top Grilling Mistakes
Preparing a grilled chicken recipe, whether on a gas or charcoal grill, takes practice, patience, and attention to detail. Here are some tips to ensure that your outdoor cooking remains rewarding, successful, and safe.
1. STAY AWAY FROM DANGEROUS LOCATIONS
Make sure the grill is located in an out-of-the-way spot several feet from your home (and children and pets, for that matter).
2. DON’T RUN OUT OF FUEL
You don’t want the grill to peter out before the food is cooked, so make sure you have enough fuel on hand. This means at least 6 quarts of charcoal.
3. KEEP YOUR GRILL CLEAN
Check the drip pan on your gas grill; built-up grease can be a fire hazard. On a charcoal grill, dispose of ashes left over from previous grilling before firing it up again. These ashes will affect cooing times and give off-flavors.
4. CLEAN AND OIL THE COOKING GRATE BEFORE COOKING
This will prevent foods from sticking and picking up off-flavors.
5. THINK AHEAD
Gas grills need to preheat for 15 minutes, and charcoal takes about 5 minutes once the coals are hot to achieve the proper temperature. Be sure to factor these times into your plans.
6. AVOID CROSS-CONTAMINATION
Use separate platters for raw foods and cooked foods, clean utensils after handling raw foods, and always dispose of leftover marinades. When basting chicken, pour what you need for cooking into a separate dish and set aside the rest for serving.
7. DON’T JUDGE A BOOK BY ITS COVER
Chicken parts with nice grill marks can still be raw in the middle. An instant-read thermometer is the most effective tool for checking doneness.
8. BIGGER (AND HOTTER) ISN’T ALWAYS BETTER
Gas grills have knobs for a reason, so adjust the heat as necessary to keep things in control. For charcoal grilling, use only the amount of coals specified in the recipe.
9. SAVE THE SAUCE UNTIL THE END
Sauces are affected by intense heat. If the sauce is applied to your chicken too early, the sugars in it may char and become bitter. There are exceptions, but we typically apply sauces 5 minutes before the food is done.
10. WATCH THE WEATHER
If it is cold or windy, you may need to cook foods for a few minutes longer than directed.
Breaking Down a Chicken
It may seem intimidating, but carving a whole grilled chicken isn't difficult. Here are the step-by-step tips you'll need to make this task effortless every time.
Cut where the leg meets the breast, then pull the leg away. Separate the joint by pressing the leg out and pushing up on the join, then cut through the joint.
Cut through the joint that connects the drumstick to the thigh. Repeat on the second side to remove the other leg.
Cut down along one side of the breastbone, pulling the breast meat away from the bone as you cut.
Remove the wing from the breast by cutting through the wing joint. Slice the breast into attractive slices.
An Easy Solution for Dry Chicken Breast Meat
PROBLEM: DRY BREAST MEAT
CAUSE: White meat. Chicken is lean, especially the breast meat, which tends to dry out.
SOLUTION: Brine, then rinse.
To brine 4 pounds of chicken, dissolve 1/2 cup table salt in 2 quarts of cold water in large bowl. Add chicken, cover bowl, and refrigerate for up to 1 hour. The brine also flavors the meat.
After you've brined it, rinse the chicken well to remove excess salt. The salt has already done its job, changing the molecular structure of the meat to help it retain its juices when cooked.
An Easy Solution for Flabby Chicken Skin
PROBLEM: FLABBY SKIN
CAUSE: Anxiety. Sure, indirect heat is safe (no towering infernos), but it won't ever get that crisp skin.
SOLUTION: Render, then sear.
1. START LOW
Arrange the chicken skin-side down on the cooler side of the grill. Cook, covered, until the fat has rendered and the skin is crisp and golden, about 20 minutes.
2. GO HIGH
Move the chicken to the hot side of the grill, and continue to cook, turning occasionally, until both sides are well browned and the white meat registers 160 degrees (175 for dark meat).
An Easy Solution for Sticking Skin
PROBLEM: STICKING SKIN
CAUSE: Moisture. Wet skin sticks to the grill. And if the grates are dirty, forget about saving the skin.
SOLUTION: Dry skin, oil grate.
1. BLOT DRY
Shrink-wrapped packaging makes chicken skin very wet. Brining and rinsing make matters worse. Blot the chicken dry with paper towels before cooking it.
2. CLEAN GRATE
Brush the hot grill grate clean. Next, dip a wad of paper towels in vegetable oil and use a pair of long-handled tongs to grease the clean grate.
An Easy Solution for Charred Chicken Skin
PROBLEM: CHARRED SKIN
CAUSE: Twofold. The fat drips down and causes big flare-ups, or sweet sauces burn.
SOLUTION: Grill, then glaze.
1. TAKE TEMP
Only when the chicken is nearly done (150 degrees for white meat, 165 for dark) it is ready to glaze.
2. GLAZE LAST
Apply the sauce, flip the chicken skin-side down, and grill it until it's completely done (160 degrees for white meat; 175 for dark meat) and the skin is crisp, 2 to 3 minutes more.
Our Favorite Grilled Chicken Recipes
A basting brush needs to have a handle long enough to reach the chicken without endangering the cook. We determined that 8 inches is the minimum length needed to comfortably brush all the chicken on a grill, even the piece the farthest away. We were surprised, however, to discover that a handle can also be too long.
There are two types of instant-ready thermometers: dial face and digital. Both models are accurate, but we found the digital models to be quicker to register and easier to read. Our winner is affordable and has saved more grilled chicken breasts than we care to remember.
A good grill spatula must perform many tasks well. It needs to help you easily flip grilled chicken parts (and transfer them from the grill), and it needs to have a handle that is long enough to allow you to move chicken pieces around in case of a grill flare up. Our winner does all that and even has built-in bottle opener in the handle.
Tongs come in handy in many steps of grilled chicken recipes. From arranging a chimney full of hot coals to flipping chicken breasts over on the grill, tongs get the job done—but they need to be long enough to keep us a comfortable distance from the fire. Our winner was able to do that, and measured a usable 16 inches.
Anyone who has ever grilled sticky, glazed chicken breasts knows that removing the left-behind burned-on mess is a chore. Traditional wire bristle brushes only last for a few uses, and plastic-handled brushes tend to melt and lose their bristles. We’ve found that brushes with strong, stiff wire bristles and sturdy handles are best.
Many of our charcoal-grilled chicken recipes call for heating the coals using a chimney starter, then arranging the briquettes into a two-level fire. Because of this, we prefer chimney starters that have safety features like a handle that remains cool and a second handle that provides leverage when maneuvering the chimney starter or banking the coals for a two-level fire.
Key Ingredients for Grilled Chicken
Picking out a quality chicken at the supermarket is a guessing game. We wanted to know what terms guaranteed a flavorful bird. We found that genetic and environmental factors mattered very little when it came to flavor or texture. The biggest factor in flavor turned out to be none other than salt.
We prefer homemade barbecue sauce, but there’s something to be said for the convenience of bottled, which can be slathered on a grilled chicken breast to make a recipe even quicker. Sugar proved the determining factor in our testing—but not all sugars are created equal. Our top picks had molasses listed high in their ingredient lists. When this sweetener’s robust, distinct flavor was in short supply, the sauces fell flat.
Our Favorite Grilled Chicken Recipes
Invented in the 1940s by a Cornell University professor, this tangy, crisp-skinned grilled chicken has been a star attraction at the New York State Fair ever since. The original grilled chicken recipe and method remain unchanged at the fair, where half chickens are basted with a tangy sauce while they cook over a custom-made grill that elevates the birds exactly 26 inches about the coals. We wanted to adapt this grilled chicken recipe for the backyard grill.
While you might think barbecue grilled chicken means a sticky red sauce requiring lots of napkins, they do it a little different in northern Alabama. They eschew tomato altogether and slather a mayonnaise-based sauce on hickory-smoked grilled chicken.
A classic of the barbecue circuit, grilled beer-can chicken involves resting a whole chicken upright on a can of beer and grill-roasting it. The odd technique for making grilled chicken accomplishes two things at once: As the beer turns to steam, it flavors the interior of the chicken and keeps it moist, while smoke bathes the exterior and turns the skin crisp.
Perhaps Jamaica’s greatest export, jerk seasoning is a spicy blend of chiles, herbs, and spices applied to a wide variety of grilled meats; chicken, perhaps, being the most popular. Many grilled jerk chicken recipes we have tried have been too fiery to taste, or conversely, bland as can be. And some recipes require a long list of ingredients and diligent blending. We wanted a simple spicy jerk seasoning we could whip up in minutes for grilled chicken.
Despite their straightforward appearance, grilled chicken kebabs are difficult to prepare. The chicken is all too prone to drying out and the vegetables rarely cook through. We wanted to find a method for grilling kebabs that yielded tender, juicy grilled chicken and well-cooked vegetables.
In the traditional recipe for Huli Huli Chicken, grilled chicken is continually basted with a sticky-sweet sauce and “huli”-ed, which means turned, in Hawaiian. We wanted to find a way to add this to our backyard grilled chicken repertoire.
Smoky grilled chicken smothered in a thick barbecue sauce is one of America’s favorite summer meals. But despite its popularity, this grilled chicken recipe can cause plenty of headaches; one of the most common problems is grilled chicken that is nearly blackened on the outside yet bloody near the bone. We set out to change all that.
The advantages of butterflying a chicken are many—it creates a flat surface that makes for easy grilling; you can easily rub seasonings directly under the skin to flavor the meat; and the skin becomes especially crisp. But many recipes we tried for grilled butterflied chicken resulted in scorched skin and leathery meat. Still others put the chicken through a routine of flips and rotations on the grill that seemed to prolong the cooking time.
Stuffing chicken breasts and grilling them over a smoky fire sounds like a great way to dress up this mild cut, but only if the meat stays juicy and the filling packs a flavorful punch. A 30-minute soak in oil, lemon juice, and garlic gave the chicken the protection it needed against drying out on the grill, plus an extra boost of flavor to complement the stuffing.
While a sauce can achieve a nice, attractive glaze for grilled chicken, it can’t penetrate to deeply flavor the chicken like a dry rub can. We wanted to create a dry rub that would perform double duty: flavor our grilled chicken and also develop a beautiful glaze. | <urn:uuid:6e860bfb-3fef-40d2-8d30-374f4ea61b3e> | 2013-05-18T06:21:02Z | CC-MAIN-2013-20 | [
[
0.00115966796875,
0.01385498046875,
-0.0235595703125,
0.0211181640625,
0.09423828125,
-0.09228515625,
-0.00897216796875,
0.10888671875,
-0.0269775390625,
-0.0052490234375,
0.058349609375,
0.043701171875,
0.020263671875,
0.0255126953125,
0.039794921875,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.927385 | 3,218 | http://www.cookscountry.com/how-to/grilled-chicken/&Extcode=N1NSPHA00 | 0.26968 |
GARY ALLAN MARRIED
The rumor is that Garry Allan is now married. Record label reps confirm the reports, but are not releasing details.
Maybe it's déjà vu, but didn't the same thing happen when Tracy Lawrence married his wife, Becca? In fact, her name is just about all we know about Mr. Lawrence's wife, other than that she is pregnant with a baby girl due in August.
Why so secretive?
"Having a relationship [when you're in the public eye] is difficult enough," says Tracy, "and I didn't want my relationship to have to compete with the pressures of my career."
Tracy also says that he and Becca discussed the situation at length before deciding to issue a press release confirming that they had indeed married, but at the same time guarding the couple's privacy.
It's understandable that Gary feels the same way. Congrats! | <urn:uuid:e6cd30fa-6e04-4c61-b6ef-146b006b54b8> | 2013-05-18T06:26:19Z | CC-MAIN-2013-20 | [
[
-0.013888888992369175,
0.022192029282450676,
0.023399759083986282,
0.01577596552670002,
0.07185990363359451,
0.0007076539914123714,
-0.000504793191794306,
0.0748792290687561,
-0.02732487954199314,
-0.04528985545039177,
0.03864734247326851,
0.03698671609163284,
-... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979832 | 189 | http://www.countryweekly.com/news/gary-allan-married | 0.169268 |
Randy de Puniet led a CRT one-two during Friday afternoon practice for the MotoGP
season finale at a drying Valencia.
Following a wet morning, a dry line began to emerge early in the afternoon session. But the circuit never fully dried and only a handful of riders - led by de Puniet - made the switch to slicks.
de Puniet took his Aspar ART to a best lap of 1m 36.965s on his eighth of nine laps, but later parked his machine due to a technical problem. Next quickest was Gresini CRT rider Michele Pirro, 0.119s behind the Frenchman.
Ducati riders Nicky Hayden
- quickest in the wet this morning - Karel Abraham and Valentino Rossi
were the only manufacturer competitors to fit slicks on their way to third, fourth and fifth.
Five riders - including the top four in the world championship; Jorge Lorenzo, Dani Pedrosa, Casey Stoner
and Andrea Dovizioso
- decided against recording a lap time in the mixed conditions.
Behind Rossi, Danilo Petrucci (Ioda), Ivan Silva (Avintia), Roberto Rolfo (Speed Master), James Ellison
(PBM) and Hiroshi Aoyama (Avintia) completed the afternoon top ten.
The Valencia circuit has been resurfaced prior to this year's event.Friday practice (2):
1. Randy De Puniet
2. Michele Pirro
3. Nicky Hayden
4. Karel Abraham
5. Valentino Rossi
6. Danilo Petrucci
7. Ivan Silva
8. Roberto Rolfo
9. James Ellison
10. Hiroshi Aoyama
11. Claudio Corti
12. Cal Crutchlow
13. Alvaro Bautista
14. Katsuyuki Nakasuga
15. Aleix Espargaro
16. Hector Barbera
17. Colin Edwards | <urn:uuid:c093cffa-2659-44b2-862f-2c856f7e37b8> | 2013-05-18T05:30:51Z | CC-MAIN-2013-20 | [
[
0.03370418772101402,
0.0017179319402202964,
0.004969731904566288,
-0.008426046930253506,
0.0710078552365303,
-0.038776177912950516,
-0.027159685268998146,
0.0981675386428833,
0.0039471532218158245,
-0.04646596685051918,
-0.006299083586782217,
0.02585078589618206,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.81488 | 408 | http://www.crash.net/motogp/news/185922/1/de_puniet_sets_damp_afternoon_pace_at_valencia.html | 0.22455 |
BRUSSELS (AP) -- The European Union's economic affairs commissioner says the eurozone is seriously considering forcing Greece to set up a separate fiscal account that would be dedicated to repay its debts as part of a new bailout.
Such an account, which could take in the new bailout money or even part of Greece's general government revenue, would be an unprecedented intrusion into the fiscal affairs of a sovereign state.
It was proposed by Germany and France earlier this week.
Under that proposal, revenues would go first to servicing Greece's debt before paying for government services.
Olli Rehn said Thursday such a separate account, which was proposed by Germany and France earlier this week, was "one relevant possibility of reinforcing surveillance and ensuring effective implementation of the (bailout) program." | <urn:uuid:6687fa23-42d4-400c-8e62-c94ef1229a1e> | 2013-05-18T06:31:20Z | CC-MAIN-2013-20 | [
[
0.0038418611511588097,
0.09065934270620346,
-0.010001717135310173,
0.03932005539536476,
0.08447802066802979,
-0.07760988920927048,
-0.01966002769768238,
0.1449175775051117,
-0.03897664695978165,
-0.024381868541240692,
0.05940933898091316,
0.0245535708963871,
-0.... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.972714 | 157 | http://www.crescent-news.com/ap%20international/2012/02/09/eurozone-pushes-for-separate-greek-debt-account | 0.710611 |
Originally Posted by benchmark00
Labor = ran by unions.
Unions = retards.
Enjoy your eight hour day?
Paid sick leave?
WWCC - Loyaulte Mi Lie
"People make me happy.. not places.. people"
"When a man is tired of London, he is tired of life." - Samuel Johnson
"Oh my God, there's a castle! A castle!" | <urn:uuid:120f349d-9ff8-4458-946c-f4cfb01efed6> | 2013-05-18T05:26:47Z | CC-MAIN-2013-20 | [
[
-0.01316713448613882,
0.027212077751755714,
0.0002537416585255414,
0.011938202194869518,
0.0768960639834404,
-0.05477528274059296,
-0.0057935393415391445,
0.055126406252384186,
0.006890800781548023,
-0.01623946614563465,
0.04353932663798332,
0.040203653275966644,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.892826 | 87 | http://www.cricketweb.net/forum/2684716-post9662.html | 0.1948 |
The requested page was not found
The web page you requested does not exist in the given location or is temporarily unavailable.
For user guides, release notes, and other detailed information, see one of the following pages:
For general information on CRSP products, see:
To contact CRSP regarding product support, training, or other matters, see: | <urn:uuid:5672b0ee-6ac7-4398-b448-247188cc26e3> | 2013-05-18T08:09:22Z | CC-MAIN-2013-20 | [
[
-0.06330128014087677,
0.01482371799647808,
0.02263621799647808,
0.0007699819980189204,
0.062099359929561615,
-0.09254807978868484,
0.02504006400704384,
0.053285256028175354,
-0.026241987943649292,
0.011969150975346565,
0.07451923191547394,
0.06330128014087677,
-... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.832377 | 72 | http://www.crsp.com/crsp/crsp/about/crsp/about/documentation/footer/documentation/kb/crsp/documentation/kb/documentation/programming/footer/documentation/programming/footer/crsp/policies/contact/crsp/faq.htm | 0.858932 |
Perhaps I'm a lone voice on the topic of covert themes, but today's puzzle is a good example of what is wrong with them and how to fix them.
Without a clue to indicate that a theme exists, it is likely that many will miss the cleverness of the work. As I have said here awhile back, what fun is sitting in the closet if no one knows you're playing hide and seek?
Today's baseball theme was probably overlooked by many solvers, and that's too bad --- and unnecessary. Take 54 Across: "Thick carpet" is the clue for SHAG. To make this theme overt, the clue for SHAG could be "To catch flyballs, and a clue to the six long answers across." | <urn:uuid:24bb34f3-79be-464b-ad90-f5418803c69a> | 2013-05-18T07:20:53Z | CC-MAIN-2013-20 | [
[
-0.03176511079072952,
0.0016311813378706574,
0.004485748708248138,
0.014423076994717121,
0.04532967135310173,
-0.03949175775051117,
0.004442822653800249,
0.08859889954328537,
-0.01983173005282879,
-0.025755494832992554,
0.05288461595773697,
0.03262362629175186,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979444 | 152 | http://www.cruciverb.com/index.php?topic=246.0;prev_next=prev | 0.474944 |
CTComms sends on average 2 million emails monthly on behalf of over 125 different charities and not for profits.
Take the complexity of technology and stir in the complexity of the legal system and what do you get? Software licenses! If you've ever attempted to read one you know how true this is, but you have to know a little about software licensing even if you can't parse all of the fine print.
By: Chris Peters
March 10, 2009
A software license is an agreement between you and the owner of a program which lets you perform certain activities which would otherwise constitute an infringement under copyright law. The software license usually answers questions such as:
The price of the software and the licensing fees, if any, are sometimes discussed in the licensing agreement, but usually it's described elsewhere.
If you read the definitions below and you're still scratching your head, check out Categories of Free and Non-Free Software which includes a helpful diagram.
Free vs Proprietary:
When you hear the phrase "free software" or "free software license," "free" is referring to your rights and permissions ("free as in freedom" or "free as in free speech"). In other words, a free software license gives you more rights than a proprietary license. You can usually copy, modify, and redistribute free software without paying a fee or obtaining permission from the developers and distributors. In most cases "free software" won't cost you anything, but that's not always the case – in this instance the word free is making no assertion whatsoever about the price of the software. Proprietary software puts more restrictions and limits on your legal permission to copy, modify, and distribute the program.
Free, Open-Source or FOSS?
In everyday conversation, there's not much difference between "free software," "open source software," and "FOSS (Free and Open-Source Software)." In other words, you'll hear these terms used interchangeably, and the proponents of free software and the supporters of open-source software agree with one another on most issues. However, the official definition of free software differs somewhat from the official definition of open-source software, and the philosophies underlying those definitions differ as well. For a short description of the difference, read Live and Let License. For a longer discussion from the "free software" side, read Why Open Source Misses the Point of Free Software. For the "open-source" perspective, read Why Free Software is Too Ambiguous.
Public domain and copyleft.
These terms refer to different categories of free, unrestricted licensing. A copyleft license allows you all the freedoms of a free software license, but adds one restriction. Under a copyleft license, you have to release any modifications under the same terms as the original software. In effect, this blocks companies and developers who want to alter free software and then make their altered version proprietary. In practice, almost all free and open-source software is also copylefted. However, technically you can release "free software" that isn't copylefted. For example, if you developed software and released it under a "public domain" license, it would qualify as free software, but it isn't copyleft. In effect, when you release something into the public domain, you give up all copyrights and rights of ownership.
Shareware and freeware.
These terms don't really refer to licensing, and they're confusing in light of the discussion of free software above. Freeware refers to software (usually small utilities at sites such as Tucows.com) that you can download and install without paying. However, you don't have the right to view the source code, and you may not have the right to copy and redistribute the software. In other words, freeware is proprietary software. Shareware is even more restrictive. In effect, shareware is trial software. You can use it for a limited amount of time (usually 30 or 60 days) and then you're expected to pay to continue using it.
End User Licensing Agreement (EULA).
When you acquire software yourself, directly from a vendor or retailer, or directly from the vendor's Web site, you usually have to indicate by clicking a box that you accept the licensing terms. This "click-through" agreement that no one ever reads is commonly known as a EULA. If you negotiate a large purchase of software with a company, and you sign a contract to seal the agreement, that contract usually replaces or supersedes the EULA.
Most major vendors of proprietary software offer some type of bulk purchasing and volume licensing mechanism. The terms vary widely, but if you order enough software to qualify, the benefits in terms of cost and convenience are significant. Also, not-for-profits sometimes qualify for it with very small initial purchases.
Some of the benefits of volume licensing include:
Lower cost. As with most products, software costs less when you buy more of it.
Ease of installation. Without volume licenses, you usually have to enter a separate activation code (also known as a product key or license key) for each installed copy of the program. On the other hand, volume licenses provide you with a single, organisation-wide activation code, which makes it much easier to find when you need to reinstall the software.
Easier tracking of licenses. Keeping track of how many licenses you own, and how many copies you've actually installed, is a tedious, difficult task. Many volume licensing programs provide an online account which is automatically updated when you obtain or activate a copy of that company's software. These accounts can also coordinate licensing across multiple offices within your organisation.
To learn more about volume licensing from a particular vendor, check out some of the resources below:
Qualified not-for-profits and libraries can receive donated volume licenses for Microsoft products through TechSoup. For more information, check out our introduction to the Microsoft Software Donation Program, and the Microsoft Software Donation Program FAQ. For general information about the volume licensing of Microsoft software, see Volume Licensing Overview.
If you get Microsoft software from TechSoup or other software distributors who work with not-for-profits, you may need to go to the eOpen Web site to locate your Volume license keys. For more information, check out the TechSoup Donation Recipient's Guide to the Microsoft eOpen Web Site.
Always check TechSoup Stock first to see if there's a volume licensing donation program for the software you're interested in. If TechSoup doesn't offer that product or if you need more copies than you can find at TechSoup, search for "volume licensing not-for-profits software" or just "not-for-profits software." For example, when we have an inventory of Adobe products, qualifying and eligible not-for-profits can obtain four individual products or one copy of Creative Suite 4 through TechSoup. If we're out of stock, or you've used up your annual Adobe donation, you can also check TechSoup's special Adobe donation program and also Adobe Solutions for Nonprofits for other discounts available to not-for-profits. For more software-hunting tips, see A Quick Guide to Discounted Software Programs.
Pay close attention to the options and licensing requirements when you acquire server-based software. You might need two different types of license – one for the server software itself, and a set of licenses for all the "clients" accessing the software. Depending on the vendor and the licensing scenario, "client" can refer either to the end users themselves (for example, employees, contractors, clients, and anyone else who uses the software in question) or their computing devices (for example, laptops, desktop computers, smartphones, PDAs, etc.). We'll focus on Microsoft server products, but similar issues can arise with other server applications.
Over the years, Microsoft has released hundreds of server-based applications, and the licensing terms are slightly different for each one. Fortunately, there are common license types and licensing structures across different products. In other words, while a User CAL (Client Access License) for Windows Server is distinct from a User CAL for SharePoint Server, the underlying terms and rights are very similar. The TechSoup product pages for Microsoft software do a good job of describing the differences between products, so we'll focus on the common threads in this article.
Moreover, Microsoft often lets you license a single server application in more than one way, depending on the needs of your organisation. This allows you the flexibility to choose the licenses that best reflect your organisation's usage patterns and thereby cost you the least amount of money. For example, for Windows Server and other products you can acquire licenses on a per-user basis (for example, User CALs) or per-device basis (for example, Device CALs).
The license required to install and run most server applications usually comes bundled with the software itself. So you can install and run most applications "out of the box," as long as you have the right number of client licenses (see the section below for more on that). However, when you're running certain server products on a computer with multiple processors, you may need to get additional licenses. For example, if you run Windows Server 2008 DataCenter edition on a server with two processors, you need a separate license for each processor. SQL Server 2008 works the same way. This type of license is referred to as a processor license. Generally you don't need client licenses for any application that's licensed this way.
Client Licenses for Internal Users
Many Microsoft products, including Windows Server 2003 and Windows Server 2008, require client access licenses for all authenticated internal users (for example, employees, contractors, volunteers, etc.). On the other hand, SQL Server 2008 and other products don't require any client licenses. Read the product description at CTXchange if you're looking for the details about licensing a particular application.
User CALs: User CALs allow each user access to all the instances of a particular server product in an organisation, no matter which device they use to gain access. In other words, if you run five copies of Windows Server 2008 on five separate servers, you only need one User CAL for each person in your organisation who access those servers (or any software installed on those servers), whether they access a single server, all five servers, or some number in between. Each user with a single CAL assigned to them can access the server software from as many devices as they want (for example, desktop computers, laptops, smartphones, etc.). User CALs are a popular licensing option.
Device CALs: Device CALs allow access to all instances of a particular server application from a single device (for example, a desktop computer, a laptop, etc.) in your organisation. Device CALs only make sense when multiple employees use the same computer. For example, in 24-hour call centres different employees on different shifts often use the same machine, so Device CALs make sense in this situation.
Choosing a licensing mode for your Windows Server CALs: With Windows Server 2003 and Windows Server 2008, you use a CAL (either a User CAL or a Device CAL) in one of two licensing modes: per seat or per server. You make this decision when you're installing your Windows Server products, not when you acquire the CALs. The CALs themselves don't have any mode designation, so you can use either a User CAL or a Device CAL in either mode. Per seat mode is the default mode, and the one used most frequently. The description of User CALs and Device CALs above describes the typical per seat mode. In "per server" mode, Windows treats each license as a "simultaneous connection." In other words, if you have 40 CALs, Windows will let 40 authenticated users have access. The 41st user will be denied access. However, in per server mode, each CAL is tied to a particular instance of Windows Server, and you have to acquire a new set of licenses for each new server you build that runs Windows. Therefore, per server mode works for some small organisations with one or two servers and limited access requirements.
You don't "install" client licenses the way you install software. There are ways to automate the tracking of software licenses indirectly, but the server software can't refuse access to a user or device on licensing grounds. The licenses don't leave any "digital footprint" that the server software can read. An exception to this occurs when you license Windows Server in per server mode. In this case, if you have 50 licenses, the 51st authenticated user will be denied access (though anonymous users can still access services).
Some key points to remember about client licensing:
The licensing scenarios described in this section arise less frequently, and are too complex to cover completely in this article, so they're described briefly below along with more comprehensive resources.
You don't need client licenses for anonymous, unauthenticated external users. In other words, if someone accesses your Web site, and that site runs on Internet Information Server (IIS), Microsoft's Web serving software, you don't need a client license for any of those anonymous users.
If you have any authenticated external users who access services on your Windows-based servers, you can obtain CALs to cover their licensing requirements. However, the External Connector License (ECL) is a second option in this scenario. The ECL covers all use by authenticated external users, but it's a lot more expensive than a CAL, so only get one if you'll have a lot of external users. For example, even if you get your licenses through the CTXchange donation program, an ECL for Windows Server 2008 has an £76 administrative fee, while a User CAL for Windows Server 2008 carries a £1 admin fee. If only a handful of external users access your Windows servers, you're better off acquiring User CALs. Also, an ECL only applies to external users and devices. In other words, if you have an ECL, you still have to get a CAL for all employees and contractors.
Even though Terminal Services (TS) is built into Windows Server 2003 and 2008, you need to get a separate TS CAL for each client (i.e. each user or each device) that will access Terminal Services in your organisation. This TS license is in addition to your Windows Server CALs.
Microsoft's System Centre products (a line of enterprise-level administrative software packages) use a special type of license known as a management license (ML). Applications that use this type of licensing include System Center Configuration Manager 2007 and System Center Operations Manager 2007. Any desktop or workstation managed by one of these applications needs a client management license. Any server managed by one of these applications requires a server management license, and there are two types of server management licenses – standard and enterprise. You need one or the other but not both. There are also special licensing requirements if you're managing virtual instances of Windows operating systems. For more information, see TechSoup's Guide to System Center Products and Licensing and Microsoft's white paper on Systems Center licensing.
Some Microsoft server products have two client licensing modes, standard and enterprise. As you might imagine, an Enterprise CAL grants access to more advanced features of a product. Furthermore, with some products, such as Microsoft Exchange, the licenses are additive. In other words, a user needs both a Standard CAL AND an Enterprise CAL in order to access the advanced features. See Exchange Server 2007 Editions and Client Access Licenses for more information.
With virtualisation technologies, multiple operating systems can run simultaneously on a single physical server. Every time you install a Microsoft application, whether on a physical hardware system or a virtual hardware system, you create an "instance" of that application. The number of "instances" of particular application that you can run using a single license varies from product to product. For more information see the Volume Licensing Briefs, Microsoft Licensing for Virtualization and the Windows Server Virtualization Calculator. For TechSoup Stock products, see the product description for more information.
There are a lot of nuances to Microsoft licensing, and also a lot of excellent resources to help you understand different scenarios.
About the Author:
Chris is a former technology writer and technology analyst for TechSoup for Libraries, which aims to provide IT management guidance to libraries. His previous experience includes working at Washington State Library as a technology consultant and technology trainer, and at the Bill and Melinda Gates Foundation as a technology trainer and tech support analyst. He received his M.L.S. from the University of Michigan in 1997.
Originally posted here.
Copyright © 2009 CompuMentor. This work is published under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License.
The latest version of Microsoft Office Professional Plus is an integrated collection of programs, servers, and services designed to work together to enable optimised information work. | <urn:uuid:c337bcd8-6aa1-4f2d-8c48-b916442ebbee> | 2013-05-18T05:58:42Z | CC-MAIN-2013-20 | [
[
-0.0341796875,
0.025146484375,
0.0211181640625,
-0.0233154296875,
0.043212890625,
-0.06298828125,
0.00994873046875,
0.1162109375,
-0.033935546875,
-0.0267333984375,
0.08203125,
0.031494140625,
-0.0576171875,
0.018310546875,
0.03173828125,
-0.01586914... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.910602 | 3,479 | http://www.ctt.org/resource_centre/getting_started/learning/understanding_licenses | 0.537953 |
New York, NY (Sports Network) - Major League Baseball has suspended San Diego Padres catcher Yasmani Grandal for 50 games, without pay, for a violation of the league's rules regarding performance-enhancing substances.
"We were disappointed to learn of the suspension of Yasmani Grandal for violating Major League Baseball's Joint Drug Prevention & Treatment Program," said the Padres in a statement issued on Wednesday afternoon. "We fully support Major League Baseball's policy and its efforts to eliminate performance enhancing drugs from our game. Per the protocol outlined by Major League Baseball's collective bargaining agreement, we will not comment further on this matter."
Grandal was penalized after testing positive for Testosterone.
The 23-year-old Cuban participated in 60 games during his rookie season of 2012, hitting .297 with eight home runs and 36 RBI. | <urn:uuid:8224b9f3-81e4-4bb5-a4b2-f0d75b210d58> | 2013-05-18T05:58:44Z | CC-MAIN-2013-20 | [
[
-0.03400735184550285,
0.025735294446349144,
0.003944546449929476,
-0.017080269753932953,
0.05116421729326248,
-0.07383578270673752,
0.011565563268959522,
0.05147058889269829,
0.0027190563268959522,
-0.047181371599435806,
0.13235294818878174,
0.06556372344493866,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958568 | 171 | http://www.cw30.com/sports/mlb/San%20Diego%20Padres/story/Padres-C-Grandal-suspended-50-games/6yHTvn3QfU-wvCGOZ3SbAQ.cspx | 0.236002 |
Though I spend a lot of time on the Internet, there is still a lot I haven't seen. I read recently about "Is Anyone Up?" (which recently decided to shutdown), a website that allowed users to submit nude photographs of others, many of which were referred to as "pornographic souvenirs from relationships gone sour." Most posts also began with a screenshot of the person's Facebook profile.
Certainly this should be an illegal act, and the publication is something the victim should be able to stop, but is it too late? Are people so used to the idea of the Internet being open to nearly any activity that such a statute would change the nature of the Internet? | <urn:uuid:2f9f5bd7-9652-48f2-adcd-39c9a492d518> | 2013-05-18T05:58:56Z | CC-MAIN-2013-20 | [
[
-0.03864020109176636,
0.01097972970455885,
0.013513513840734959,
0.016575168818235397,
0.05996621772646904,
-0.06714527308940887,
0.001398859778419137,
0.08234797418117523,
-0.017630912363529205,
-0.009923986159265041,
0.024387668818235397,
0.04835303872823715,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978307 | 137 | http://www.cybercrimereview.com/2012/05/should-it-be-illegal-to-put-nude-photo.html | 0.192673 |
If you do not have an account for Warka, please
register now !
It is all quick and easy. Only a pen name and a valid email is required if you wish to remain anonymous.
Registration will give you access to many interactive features such as :
- posting messages in Ethiopic/English on Warka Forums
- live chating in Ethiopic/English with other members
- private messaging in Ethiopic/English with other members
- editing for your own posts on Warka Forums
- better navigation and viewing of Warka Forums,
- protecting your pen name
- many more ... | <urn:uuid:a54535f3-b401-4c69-9001-3871fb6686c8> | 2013-05-18T06:50:36Z | CC-MAIN-2013-20 | [
[
0.011036706157028675,
0.0319940485060215,
0.021329365670681,
0.0282738097012043,
0.0972222238779068,
-0.065476194024086,
-0.0261656753718853,
0.1175595223903656,
-0.0207093246281147,
0.00437127985060215,
0.0744047611951828,
0.0293898805975914,
-0.035714287310838... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.911439 | 129 | http://www.cyberethiopia.com/warka4/login.php?redirect=privmsg.php&folder=inbox&mode=post&u=34752 | 0.342604 |
On Nov. 6, I intend to vote not as a Republican or Democrat, but rather as a father.
As a father, one of my greatest concerns is with the safety of my children. I intend to vote for the candidate who has a clear understanding of this nation's enemies and allies.
I want to ensure that my children will have greater opportunities to be successful than I had, and I am voting for the candidate who understands the importance of creating wealth not destroying or redistributing it.
With my children, I try to instill a strong moral foundation so that it may serve as a guiding light in their lives. I want a president who understands that our nation's founding beliefs and documents have served as that guiding light to this country.
Make no mistake, our great nation is at a crossroads and our vote this November will help guide the direction of this nation. Our vote will determine what sort of future our children will inherit. We must decide which candidate will better serve our children. We must choose between the candidate who believes in American exceptionalism, or the current president who has spent the last four years "fundamentally transforming" this country away from the ideas that made this nation the most prosperous in history.
On Nov. 6, I will vote because, as a father, I know how important this election is for my | <urn:uuid:441cc43b-6359-4d2a-b7da-9e38480d5cd3> | 2013-05-18T05:25:34Z | CC-MAIN-2013-20 | [
[
-0.029436860233545303,
0.003599616000428796,
0.005466083530336618,
0.0006432647351175547,
0.08361774682998657,
-0.0610068254172802,
-0.017704777419567108,
0.06058020517230034,
-0.042022183537483215,
-0.03818259388208389,
0.05226109176874161,
0.016211604699492455,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956691 | 273 | http://www.dailybulletin.com/ci_21751545/father-first?source=rss | 0.512273 |
Mauro Finetto and Enrico Peruffo of the
Verdellese Dielle-Telmec team figured
prominently in the recent Italian Nationals - Mauro won 2 silver medals, one on
the time trial and one on the road - quite a feat considering the different
disciplines. Enrico placed 4th on the time trial at only few seconds from the
3rd spot. He missed a turn during the race and lost at least 10 seconds there,
but then went on to console himself by winning the Italian Nationals Junior Road
Enrico Peruffo wins the road race. [click for larger image]
Hello Enrico and Mauro, congratulations on your victories at the
Championships. Three medals - two silver and one gold - is a great
accomplishment for you, your coaches and your team Verdellese Dielle-Telmec.
First, let me ask how did you get started in your cycling careers and at what
age did you start to race?
Mauro Finetto: I started to race at 13, but my passion for cycling
started when I was a little kid, when with my small bike I rode around the
Enrico Peruffo: I started when I was 8 to race for a team named S.C.
Rostese. None of my family was racing, so I pushed and convinced them to buy me
a bike and bring me every Sunday to race. That was the start of my career.
[Enrico's family are now all cyclists! His mom and dad are competing in
amateur racing. His dad is a great climber. His younger brother (13 years old)
is winning every other Sunday in his category. He is a real promise in this
sport. And his younger sister (11 years old) is racing every Sunday with the
same age boys...and is winning too!]
What professional riders today do you admire today, and is there rider
from the past that is a favorite? If you could choose one that you would be
like, who would it be?
Mauro: I do not have a preferred "idol." I am fan of all the
professionals. I prefer riders of the North Classic Races and of course,
Armstrong for the Tour.
Enrico: My favourite is Johan Museeuw and to be similar to him, even
just a little bit, would be a great satisfaction.
What are your favorite type of courses and races?
Mauro: I like the time trials. For the road races I prefer hard races
with up and down where, having more strength, you can make the difference.
Enrico: My preferred races are the mixed ones with climbs too, but not
too long. Here I can use my strength. Longer climbs give me problems due to my
weight (76 kg for 188 cm). I am quite good on the endurance too - I have been
since I was in the lower categories.
You both did well in the TT, Mauro, you with Silver and Enrico, you had a
bit of difficulty with the course, missed a turn I understand, and still did
well, finishing fourth. Do you both like the challenge of racing against the
Mauro: As I said, it is my favourite race even if at the Italian
Championship the course was not suitable for my characteristics. It was too flat
with a long part in "pavè." I weigh only 62kg and my wheel was jumping all the
time. With a harder race, I could have had more chances to win.
Enrico: Yes, I like TT and I am doing reasonably well in it.
The Road Race was exciting - it was great teamwork and great riding for SC
Verdellese Dielle-Telmec. Did you plan this before the race or did you both see
an opportunity and take it? Enrico, you started your attack at 1300 meters -
hmm, this reminds me of Cipollini to start such a long sprint, did you plan this
or just go for it?
Mauro, you at the same time guarded the gruppo from coming too fast to
overtake your teammate - marvelous work and you outsprinted all the others for
your second silver medal. What was this like - those last moments of the
race and at the moment of victory for your teammate and team?
Mauro: We just took the opportunity. I did not expect that Enrico was
sprinting at that time, but then I thought my job was to protect him from the
opponents. When I saw him sprinting, I thought that he could make it and that I
could have a great chance to win the sprint for the second place. When we
crossed the line I realized that we did something special that day, but I also
thought that I would also like to have won that jersey.
Enrico: We did not plan that. But the feeling with Mauro was very good
and all that is necessary is just a click of eyes to understand each other.
Since the start I was thinking to sprint in the last Km and I was just waiting
for the chance for that.
Every young or old rider has people who support them to achieve their
goals. Is there anyone you would like to acknowledge for helping you?
Mauro: A person that I have to thank because he helped me to become a
rider at high level is Armando Zambaldo who is following me in all my trainings.
And also my Tech.director Lucio Cavalleri. They both helped me to get these
results. [Armando Zambaldo is his trainer. Armando is not a cyclist, but he
placed 4th in the road 20km march at the Olympics in Montreal in 1976.]
Enrico: Yes, for sure I have to thank my parents for supporting me for
all these years.
What music are you and your teammates listening to as you train or in your
leisure? And what other sports and activities do you enjoy doing when not
concentrating on your cycling, such as your favorite subjects in school?
Mauro: I do not practice any other sport besides cycling, but in
winter time for training I do alpine skiing, gym and jogging. I listen all kind
of music, but my preferred is an Italian singer
Ligabue. Unfortunately, I do not have any
favourite subject in school, as school is not my favourite at all.
Enrico: I love volleyball and basketball. I do not have a
favourite music. My favourite subjects in school are biology and micro-biology.
Now your preparation starts for the Worlds Championships. I hope to see
you there and in the best form to win. How does it feel to know you will go to
race against the world's best young riders?
Mauro: I hope to be in the National team for both TT and RR. Racing
against the strongest athletes in the world is creating some pressure, but I
just did an international race with the Italian National Team in Austria and I
did quite well before retiring for a fall. I was there competing with the best
and doing great. I hope it will be the same in Canada.
Enrico: It will be an honour to be in the National team and at the
same time I have to confess that I am scared of it.
A dedicated-looking silver medalist, Mauro Finetto
Enrico - Vittoria!
For more on the Italian Nationals:
Fabios report on the Italian National Time Trials
Report on the Italian National Jr. Road Race:
Fabio's report on the boys (courtesy of Gaetano Dall’Ora with photos):
Many thanks to Gaetano Dall'Ora for helping to interview these two
promising lads, for the photos and for the translations. | <urn:uuid:a83a4628-082e-4d77-8f5e-25ed4433245f> | 2013-05-18T05:06:27Z | CC-MAIN-2013-20 | [
[
-0.006011962890625,
0.0003204345703125,
0.0038909912109375,
-0.0037689208984375,
0.078125,
-0.01251220703125,
-0.01025390625,
0.0849609375,
-0.0142822265625,
-0.0458984375,
0.029296875,
0.0291748046875,
0.0244140625,
-0.0011749267578125,
0.041259765625,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.968521 | 1,696 | http://www.dailypeloton.com/displayarticle.asp?pk=4366 | 0.629283 |
Lake Criminal Court Judge Thomas Stefaniak ordered the arrest of a black woman who didn't come to court to explain why she hadn't filled out a jury questionnaire, but she showed up before she could be arrested.
Gary is predominantly black, but the county is mostly white. Stefaniak acknowledges there's doubt Isom can get fair trial.
Stefaniak says he'll do everything in his power to have a fair trial.
Information from: The Times, http://www.thetimesonline.com | <urn:uuid:5d239e79-673e-4b37-b3c7-3873db0b03cf> | 2013-05-18T08:09:30Z | CC-MAIN-2013-20 | [
[
-0.043971240520477295,
0.03152654692530632,
0.014518804848194122,
0.014449668116867542,
0.08351770043373108,
-0.022815264761447906,
-0.007847068831324577,
0.09347344934940338,
-0.011476770043373108,
-0.030143804848194122,
0.039546459913253784,
0.016800330951809883,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965965 | 105 | http://www.dailypress.com/news/wsbt-judge-goes-above-and-beyond-to-ensure-fair-trial-20110807,0,2955785.story | 0.611041 |
JOE HART IS RATTLED BY FAN
JOE Hart was once asked to sign a fanís baby.
Joe Hart, 23, told ManC magazine: ďIt just goes to show that there are strange people in this world.[>
ďI couldnít believe anyone would ever ask me to do something like that. I wasnít having any of it.Ē[> | <urn:uuid:73fc8cee-1592-49c2-940d-d4c00a058e52> | 2013-05-18T08:10:08Z | CC-MAIN-2013-20 | [
[
-0.02642746828496456,
0.0035927854478359222,
0.00009456681436859071,
0.00465374207124114,
0.0798611119389534,
-0.05979938432574272,
-0.006751543376594782,
0.021508486941456795,
0.003375771688297391,
-0.02044753171503544,
0.08294752985239029,
0.04976851865649223,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970373 | 86 | http://www.dailystar.co.uk/news/view/185839/Joe-Hart-is-rattled-by-fan/ | 0.209389 |
In a press release Blizzard Entertainment, Inc. announced today that the subscribership for World of Warcraft has exceeded 11 million players worldwide. This milestone was reached as Wrath of the Lich King, World of Warcraft's second expansion, nears its worldwide launch date of November 13.
Mike Morhaime, CEO and cofounder of Blizzard Entertainment commented on World of Warcraft reaching the milestone stating, "It's been very rewarding to see gamers around the world continue to show such strong support for World of Warcraft.” He also said, “We remain fully committed to responding to that enthusiasm with a high-quality, constantly evolving game experience.”
World of Warcraft debuted in North America on November 23, 2004, and has become the most popular MMORPG around the world. According to the press release World of Warcraft was the bestselling PC game of 2005 and 2006 worldwide, and finished behind only World of Warcraft: The Burning Crusade, the first expansion pack for the game, in 2007. In addition to being the bestselling PC game of 2007 in both North America and Europe, The Burning Crusade holds the record for fastest-selling PC game of all time, with nearly 2.4 million copies sold in its first 24 hours of availability and approximately 3.5 million in its first month.
World of Warcraft was recently launched in Russia and Latin America, and is currently available in eight languages. In addition to North America and Europe, the game is played in mainland China, Korea, Australia, New Zealand, Singapore, Thailand, Malaysia, Chile, Argentina, and the regions of Taiwan, Hong Kong, and Macau. | <urn:uuid:827a8b57-625c-4b07-b927-e2124c74dc14> | 2013-05-18T07:21:08Z | CC-MAIN-2013-20 | [
[
-0.008483379147946835,
0.018784625455737114,
0.001612274907529354,
-0.004955851938575506,
0.07721606642007828,
-0.045013848692178726,
-0.014716066420078278,
0.07444598525762558,
-0.03704985976219177,
-0.03237534686923027,
0.05436288192868233,
0.020169667899608612,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959972 | 324 | http://www.dailytech.com/article.aspx?newsid=13317&commentid=361558&threshhold=1&red=4129 | 0.181727 |
Android operating system has been tremendously successful. It's become
the top selling phone platform in the world and its app store is stocked with
close to 200,000 apps. But for all that success, a perpetual criticism is
a perception that Android's environment is too heterogeneous across various handsets --
part of this is due to carriers/hardware partners failing to roll out the
latest versions, but part of it is due to customizations such as Motorola's
Motoblur and HTC's Sense UI.
I. Bye Bye Open Source -- For Now
Perhaps that's part of why Google has decided why not to release the source
code for Android 3.0 "Honeycomb", yet.
The company states that the code isn't ready yet for external modification,
despite the fact that products are being sold with it installed, today.
Aside from preventing unwanted third-party user interfaces, the chief goal of
the delay is ostensibly from preventing Honeycomb (Android 3.0) from being put
on smartphones. Google is pressuring smartphone makers to instead use Android 2.3 "Gingerbread". Google
is also less-than-enthusiastic about Honeycomb entering other devices, like
set-top boxes and automobiles, without further modification.
Andy Rubin, vice-president for engineering at Google and head of its Android
group essentially admits that the move is being made to prevent the platform
from heading, in its current state, to places Google didn't intend. In a BusinessWeek interview,
he states, "To make our schedule to ship the tablet, we made some
design tradeoffs. We didn't want to think about what it would take for the same
software to run on phones. It would have required a lot of additional resources
and extended our schedule beyond what we thought was reasonable. So we took a
He adds, "Android is an open-source project. We have not changed our
Then he makes an even more surprising statement -- he says that if his company
released Android's source, it couldn't prevent phone makers from putting it in
a phone form-factor "and creating a really bad user experience. We have no
idea if it will even work on phones."
That statement is intriguing because it sounds a lot like arguments against open
source operating systems that one of Android's top competitors, Apple, made in
recent years. And while the delay doesn't mean Google has closed its
project off from the public, it does indicate that the company is increasingly
seeing eye to eye with Apple on this issue.
Dave Rosenberg, a longtime executive in the open-source software world,
complains about the decision, but admits, "Everyone expects this level of
complete trust from a company that's worth $185 billion. To me, that is
ridiculous. You have to be realistic and see that Google will do what is in
[its] best interests at all times.
II. What Will the Impact of Google's Newfound Selectiveness Be?
Ultimately this issue will supposedly be washed away with Android 3.5 "Ice
Cream Sandwich", which will unify the smartphone (Gingerbread) and tablet
(Honeycomb) trees into a single operating system.
In the meantime, it's possible Google could make stop-gap modifications to
improve the Honeycomb experience on smart phones, and release a minor update.
Mr. Rubin states, "The team is hard at work looking at what it takes
to get this running on other devices."
It's hard to say how the move will affect sales.
Sales of the Samsung Galaxy Tab were quite good, despite the interface (Android 2.2
Froyo)feeling clunky on a tablet. By contrast the
Motorola Xoom offers a vastly superior UI in Honeycomb, yet has struggled in sales.
Part of this may be due to price -- the Tab debuted at $399 USD on at least one network,
while the Xoom debuted at $799 USD.
The true test of whether the decision to close off the platform should be soon
at hand, though. The Xoom has dropped in price, with a Wi-Fi version launch on Sunday at $599 USD. And Samsung
will soon air a second generation Galaxy Tab 8.9-inch tablet
for $469 USD and a a 10.1-inch variant for $499 USD, rumored to launch on June
8. Dell also looks to soon air updated versions of its "Streak"
Android tablets, at competitive prices.
Despite that the decision to temporarily close the source may benefit Google
and its customers experience, not everyone is happy with it.
Eben Moglen, a professor of Law at Columbia Law School and the founding
director of the Software Freedom Law Center, argues that Google is repeating
the mistakes of industry giants like Apple. He states, "[Closing
your source is] usually a mistake. Long experience teaches people that exposing
the code to the community helps more than it hurts you." | <urn:uuid:83e60154-731d-4135-883b-b3b54166a223> | 2013-05-18T06:26:26Z | CC-MAIN-2013-20 | [
[
-0.03955078125,
0.035888671875,
0.033447265625,
-0.0033111572265625,
0.06103515625,
-0.0634765625,
0.00433349609375,
0.130859375,
-0.02587890625,
-0.0537109375,
0.003082275390625,
0.037109375,
-0.04052734375,
0.0242919921875,
0.0247802734375,
-0.0219... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.942091 | 1,043 | http://www.dailytech.com/article.aspx?newsid=21222&commentid=666620&threshhold=1&red=5313 | 0.175885 |
Sources: Guardian, YouTube
quote: 'm not intending this to in any way defend or justify what the software does; however, it is using mining publicly available data. In other words, there is nothing preventing any other person, government, corporation or other organization from analyzing the exact same data and drawing the same trending conclusions. So, if you're uncomfortable with the information being analyzed and the conclusions that can be drawn from it, it would be best to limit the information you make publicly available in the first place.I'm not aware of any way in which U.S. law could be reasonably expected to prevent a foreign entity from doing this, so in my mind the issue isn't limited to the U.S. government and the perception of it becoming a "police state." The implications of what can be done with all of the data we throw out there goes far beyond just that.
quote: Agreed. As I said, I'm not defending this in any way. I'm not comfortable with it myself. The point I was trying to make is that so long as the data is out there, anyone with sufficient time, resources, and motivation could do the same thing; e.g. foreign entities over which we (the U.S.) have no control.
quote: I think you're missing his point Jason. He's not even talking about foreign governments specifically. You or I could gather this information also which he mentions. It's freely available. Raytheon and any other US entity could collect and use this info and sell it to whoever. You could collect and sell it. I do wonder how the NSA can purchase this info (if they really are) legally as it violates the spirit of a certain law that prohibits them from doing so without a warrant. Although there is a time delay before they have to stop collecting. Loophole perhaps?
quote: I wasn't sure quite what his central focus was, but he did talk quite a bit about foreign governments, so I figured that was the main point.
quote: Because foreign governments are NOT going to be terribly interested in tracking low-level U.S. citizens.
quote: By mining exif data publicly available posts (or alternatively creating Facebook softbots to friend users and lure them into RIOT's circle of friendship),...now again, if you're extremely cautious you can avoid that, but there is substantial risk
quote: using FB is wrong
quote: I'm 100% Facebook free and I love it! You can't be tracked if there is no account to begin with . | <urn:uuid:7eeb4574-61cb-4779-89c0-7952a547c70f> | 2013-05-18T05:24:13Z | CC-MAIN-2013-20 | [
[
-0.048095703125,
0.02197265625,
0.018798828125,
-0.004302978515625,
0.04833984375,
-0.06298828125,
-0.00064849853515625,
0.0986328125,
-0.02197265625,
-0.034423828125,
0.0673828125,
0.037353515625,
-0.078125,
0.0206298828125,
0.04150390625,
-0.025634... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96477 | 523 | http://www.dailytech.com/article.aspx?newsid=29875&commentid=838519&threshhold=1&red=3845 | 0.326874 |
InformationWeek was quick to get a quote on the story: "AMD fully complies with all United States export control laws, and all
authorized distributors of AMD products have contractually committed to
AMD that they will do the same with respect to their sales and
shipments of AMD products ... Any shipment of AMD
products to Iran by any authorized distributor of AMD would be a breach
of the specific provisions of their contracts with AMD." | <urn:uuid:e3241b28-d74a-46f4-ac03-ffabf646444b> | 2013-05-18T08:08:13Z | CC-MAIN-2013-20 | [
[
-0.06948138028383255,
0.0187001321464777,
0.01529255323112011,
-0.0018180684419348836,
0.11369680613279343,
-0.03806515783071518,
-0.009516289457678795,
0.07047872245311737,
-0.035904254764318466,
-0.00984873715788126,
0.017037898302078247,
0.019448138773441315,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963788 | 88 | http://www.dailytech.com/article.aspx?newsid=9997&commentid=224971&threshhold=1&red=4558 | 0.413435 |
In digital imaging, there are 256 levels, or tonal values, ranging from black to white. Black is level 0. White is level 255. Of course, not all images (e.g. extreme foggy, misty, atmospheric shots) contain the full tonal range from black to white, but most do.
The histogram (Levels) is a graphical representation of the tonal values in an image. Ideally, it should range from 0 to 255, with a good spread of tonal values throughout.
If the histogram is bunched up towards the left, it indicates the image is under-exposed. Note the crushed shadow detail.
If bunched up towards the right, it's over exposed. Note the blown-out highlights.
If the black and white points are set incorrectly, the image will have a dull, flat, washed-out appearance. Here they're wrongly set to 20/230.
Unless under instructions from a repro bureau or printer, you should not set the black/white points to anything other than 0/255. The printer may well adjust them later for technical reasons to do with repro, but don't try to guess what's required. It's true that some leeway is acceptable (e.g. up to 5% is usually OK), but your images will lack visual impact if the black/white points are incorrect, so don't do this as a matter of course.
In the vast majority of cases, it's best to set them to 0/255. | <urn:uuid:52488de0-c8c9-4c17-af7d-5a2c271456dc> | 2013-05-18T06:43:57Z | CC-MAIN-2013-20 | [
[
-0.04092920199036598,
-0.006314528174698353,
-0.0005300516495481133,
-0.018805310130119324,
0.02636430598795414,
-0.06858406960964203,
0.0027078723069280386,
0.08259586989879608,
-0.022492624819278717,
0.005070059094578028,
0.10176990926265717,
0.019542772322893143,... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931286 | 313 | http://www.davepattison.com/digital-imaging/exposure.html | 0.645336 |
I'm interested in this product from Cobra. A .45 DOA pistol for CCW. It essentially is a .45 caliber Kel-Tec (I so wish they would make a "thin" .45 for CCW purposes). I have read mixed reviews online, from horrible to quite well. Anybody here have any reviews/information regarding this handgun? I know it is not rated for +P ammo and designed essentially for only hardball, any info would be nice. | <urn:uuid:4d955896-56b0-4612-af81-50a4043d9a5b> | 2013-05-18T06:56:09Z | CC-MAIN-2013-20 | [
[
-0.07122747600078583,
0.025337837636470795,
0.00841075461357832,
0.03913288190960884,
0.04194819927215576,
-0.05884008854627609,
-0.004891610238701105,
0.09797297418117523,
-0.03293918818235397,
-0.05039414390921593,
-0.0010381474858149886,
0.051238738000392914,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.961559 | 97 | http://www.defensivecarry.com/forum/defensive-carry-guns/124727-cobra-patriot-45-a.html | 0.441203 |
A friend of mine just bought a Kimber 1911 with a full size grip and the extended beveled magazine well. I thought it would be really cool if he had a bobtail installed. Is it possible to have a bobtail and the extended beveled mag well. If this is possible could someone please post a picture so that I can show him.
Also does anyone know of any gunsmiths in the North Carolina area that could do this. | <urn:uuid:0f311a83-c9a3-41b5-ba00-222c4fb82828> | 2013-05-18T08:14:43Z | CC-MAIN-2013-20 | [
[
-0.06733247637748718,
0.02142396941781044,
0.015625,
0.02206829935312271,
0.07023195922374725,
-0.011920102871954441,
-0.009664948098361492,
0.09536082297563553,
-0.05895618721842766,
-0.0401095375418663,
0.016672035679221153,
0.04107603058218956,
0.056378867477... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976667 | 92 | http://www.defensivecarry.com/forum/defensive-carry-guns/4827-curious-extended-magwell-bobtail-1911-a.html | 0.22043 |
I may be selling a gun: what do you think I could get?
My first hd gun was a Remington 870 Youth 20 GA bought for $275 in 2006. When I turned 21, that was replaced by a Model 10 .38 snubnose. Part of the reason was that i just like revolvers. Secondly, the recoil of gun cause of the short stock just beat me up. I wasn't real confident in it as a dedicated hd gun cause of that.
Its like new, with less than a hundred shells through it. Does anybody have an educated guess as to how much I could sell it for? | <urn:uuid:8a383b50-9d38-4c6c-8aae-8d73680b63a4> | 2013-05-18T05:34:14Z | CC-MAIN-2013-20 | [
[
-0.07664233446121216,
0.028170621022582054,
0.01140510942786932,
0.022582117468118668,
0.020757298916578293,
-0.07481751590967178,
-0.004276915919035673,
0.07892335951328278,
-0.058394160121679306,
-0.05269160494208336,
0.041286494582891464,
0.05155109614133835,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.991756 | 131 | http://www.defensivecarry.com/forum/defensive-rifles-shotgun-discussion/45171-i-may-selling-gun-what-do-you-think-i-could-get-print.html | 0.18616 |
Why should we emphasize that God loves, forgives, and saves for his own glory?
Two reasons (among others).
1) Because the Bible does.
I, I am he who blots out your transgressions for my own sake, and I will not remember your sins. (Isaiah 43:25)
For your name's sake, O Lord, pardon my guilt, for it is great. (Psalm 25:11)
Help us, O God of our salvation, for the glory of your name; deliver us, and atone for our sins, for your name's sake! (Psalm 79:9)
Though our iniquities testify against us, act, O Lord, for your name's sake; for our backslidings are many; we have sinned against you. (Jeremiah 14:7)
We acknowledge our wickedness, O Lord, and the iniquity of our fathers, for we have sinned against you. Do not spurn us, for your name's sake; do not dishonor your glorious throne. (Jeremiah 14:20-21)
God put [Christ] forward as a propitiation by his blood, to be received by faith. This was to show God's righteousness, because in his divine forbearance he had passed over former sins. It was to show his righteousness at the present time, so that he might be just and the justifier of the one who has faith in Jesus. (Romans 3:25-26)
Your sins are forgiven for his name’s sake. (1 John 2:12)
2) Because it makes clear that God loves us with the greatest love.
Father, I desire that they also, whom you have given me, may be with me where I am, to see my glory. (John 17:24)
God loves us not in a way that makes us supreme, but makes himself supreme. Heaven will not be a hall of mirrors but an increasing vision of infinite greatness. Getting to heaven and finding that we are supreme would be the ultimate let down.
The greatest love makes sure that God does everything in such a way as to uphold and magnify his own supremacy so that when we get there we have something to increase our joy forever—God’s glory.
The greatest love is God’s giving himself to us for our eternal enjoyment for ever, at the cost of his Son’s life (Romans 8:32). | <urn:uuid:b9723d59-5fca-43f9-83d2-1dae08da135b> | 2013-05-18T07:21:06Z | CC-MAIN-2013-20 | [
[
-0.01544189453125,
-0.003936767578125,
-0.02197265625,
0.0025482177734375,
0.1259765625,
-0.07080078125,
-0.0146484375,
0.11962890625,
-0.01324462890625,
-0.032958984375,
0.060302734375,
-0.02001953125,
-0.0264892578125,
0.002593994140625,
0.03955078125,... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965912 | 515 | http://www.desiringgod.org/blog/posts/why-it-matters-that-god-does-everything-for-his-own-glory?turn_off_admin_bar=true | 0.382543 |
Jechbi wrote:Could you expand on that?
appicchato wrote:...whether this sutta is a forgery or not is unimportant to me, and where would the benefit be knowing (which doesn't seem possible, definitively, one way or another) if it is, or isn't?...it's helped me tackle my monkey mind... [/i]
Jechbi wrote:I sometimes come away with a better understanding that actually strengthens practice. I hope that occurs here.
my personal theory is that the satipatthana suttas of MN & DN may of been a combination of smaller suttas as a training aid for new monks who may not of been able to remember the whole collection so langer discourses were made using short discourses and verses from other longer texts to enable the students to practice properly without needing to carry around or memorise vast amounts of teachings.
Dmytro wrote:There are two main valid methods for establishing the relative dating of a sutta:
- comparison with Chinese counterparts;
- linguistic analysis of the words and grammatical forms used.
Anything else is at best a hypothesis, and at worst an empty speculation.
Since the Chinese versions of this sutta are pretty much similar to Pali sutta, all this pathologic anatomy doesn't matter.
This is identical to the second link in the OP, thanks. I'm only skimmed it, though.retrofuturist wrote:Have you read this?
'A History of Mindfulness: How Insight Worsted Tranquillity in the Satipatthana Sutta' by Ajahn Sujato
Jechbi wrote:Having re-read the responses to this thread, I wanted to say thanks for all the insightful comments here. I think the term "forgery" probably is too harsh, simply because in common usage it implies "completely fake." But even Ajahn Sujato appears to agree that the contents of the sutta reflect important elements of Dhamma teaching as they were passed down in this particular tradition. I believe he's using the term "forgery" in a narrower sense and with regards to precise origin.
Best wishes for your practice ... | <urn:uuid:4bd11b53-8963-4198-a3cf-dc0908d39b6d> | 2013-05-18T07:02:22Z | CC-MAIN-2013-20 | [
[
-0.030487805604934692,
0.005494156386703253,
0.009336890652775764,
0.003207571106031537,
0.05335365980863571,
-0.05030487850308418,
-0.0024294969625771046,
0.09044715762138367,
-0.015497967600822449,
-0.03328252211213112,
0.010543699376285076,
0.026803862303495407,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954454 | 461 | http://www.dhammawheel.com/viewtopic.php?p=31292 | 0.157288 |
If you ask me (I don't know why would you do that, though
): while the approach is nearly the opposite in the Zen and the Theravada tradition, the goal is the same. Theravadins tell you almost nothing about the posture to convince you not to fixate over it, and just put the body down. Zen tells you almost everything about the posture to convince you not to fixate over it, and just put the body down.
The first strategy based on the premise that the lack of instruction is what you need to not being concerned, while the second strategy based on the premise that clear instruction is what you need to not being concerned.
Every of the two can backfire: In the first case one can spend his/her whole meditation wondering how he/she should sit, while in the second case one can spend his/her whole meditation worrying about keeping a precise posture. Both problems effectively prevent the stilling of the body, which otherwise happens naturally.
But this is just pure intuition... although it is quite true that in many case the only real difference between the traditions is just the approach, and the essence is the same.
"Just as in the great ocean there is but one taste — the taste of salt — so in this Doctrine and Discipline there is but one taste — the taste of freedom" | <urn:uuid:a490967d-d1ac-4765-af5f-cccf9c2ad84e> | 2013-05-18T06:03:57Z | CC-MAIN-2013-20 | [
[
-0.03375435620546341,
0.013556184247136116,
0.005743684712797403,
-0.005852569825947285,
0.08231707662343979,
-0.056184668093919754,
-0.0008914960781112313,
0.07099302858114243,
-0.02765679359436035,
-0.01731271855533123,
0.04986933618783951,
-0.00317127606831491,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953589 | 273 | http://www.dhammawheel.com/viewtopic.php?p=48933 | 0.603872 |
What do these appearances that are disjoint, appear in (or are made of)? When "you" notice an appearance, what is the act of noticing?
Also, I agree they are disjoint (or "just happen" like a movie), but would argue that they do happen (or exist).
You should start by reading the sites of the links (especially the blog where the articles came from) I posted. I think they're good places to start. From one the artcles I posted:
Just for the sake of clarification, I would like to make it clear that I never said that "these luminous self-perceiving phenomena which are craving-free and nondual are the Ultimate", if there could still be any ambiguity about that.
On the contrary, I said that what I used to take for an eternal, empty, uncreated, nondual, primordial awareness, source and substance of all things, turned out to be nothing more than the luminous nature of phenomena, themselves empty and ungraspable, somehow crystallized in a very subtle witnessing position. The whole topic of this thread is the deconstruction of this Primordial Awareness, One Mind, Cognizing Emptiness, Self, Atman, Luminous Mind, Tathagatgabha, or whatever we may call it,
As shocking as it may seem, the Buddha was very clear to say that this pure impersonal objectless nondual awareness (that Vedantists called Atma in Sanskrit, Atta in Pali) is still the aggregate of consciousness and that consciousness, as pure and luminous as it can be, does not stand beyond the aggregates.
"Any kind of consciousness whatever, whether past, future or presently arisen, whether gross or subtle, whether in oneself or external, whether inferior or superior, whether far or near must, with right understanding how it is, be regarded thus: 'This is not mine, this is not I, this is not my self.'" (Anatta-lakkhana Sutta).
What I realized also is that authoritative self-realized students of direct students of both Ramana Maharishi and Nisargadatta Maharaj called me a 'Jnani', inviting me to give satsangs and write books, while I had not yet understood the simplest core principles of Buddhism. I realized also that the vast majority of Buddhist teachers, East and West, never went beyond the same initial insights (that Adhyashanti calls "an abiding awakening"), confusing the Atma with the ego, assuming that transcending the ego or self-center (ahamkara in Sanskrit) was identical to what the Buddha had called Anatta (Non-Atma).
It would seem therefore that the Buddha had realized the Self at a certain stage of his acetic years (it is not that difficult after all) and was not yet satisfied. As paradoxical as it may seem, his "divide and conquer strategy" aimed at a systematic deconstruction of the Self (Atma, Atta), reduced to -and divided into- what he then called the five aggregates of clinging and the six sense-spheres, does lead to further and deeper insights into the nature of reality. As far as I can tell, this makes me a Buddhist, not because I find Buddhism cool and trendy, but because I am unable to find other teachings and traditions that provide a complete set of tools and strategies aimed at unlocking these ultimate mysteries, even if mystics from various traditions did stumble on the same stages and insights often unknowingly.
Thanks, sure. I especially like the "In lhatong—in terms of the Four Naljors—one is not naming what arises; one is not separate from what arises. One becomes completely identified with that which arises".
This is how the practice these days. There is seeing, hearing, thinking, sensing, tasting and smelling, but obviously no seer, hearer, senser, etc. out there trying to dis-embed from the seen, the heard... If it seem that someone or something is investigating, seeing, practicing, it soon appears that this sense of a doer, an observer or even this abstract and impersonal sense of being is just thinking, feeling, sensing.
As a matter of far, I am not familiar with noting vipassana. What I do is to hold on the 'sense of being' or 'sense of presence'.
This presence that first felt like "I am presence-awareness" now turns into the direct apprehension of the beingness, presence or actuality of seeing, hearing, sensing, etc. in the absence of a subject, knower, self or non-dual awareness-super-Self.
The sense of being (or feeling of existence) is not anymore the sense of my being as a sentient being or even as pure non-dual awareness, but is simply experienced as the beingness of 'what is' manifesting its presence. | <urn:uuid:eb630683-b266-4892-9077-248557d3dfd3> | 2013-05-18T07:26:53Z | CC-MAIN-2013-20 | [
[
-0.042236328125,
-0.008056640625,
0.0118408203125,
-0.0023345947265625,
0.0556640625,
-0.07666015625,
-0.0169677734375,
0.11181640625,
-0.0108642578125,
-0.036376953125,
0.072265625,
0.008544921875,
-0.00634765625,
0.0341796875,
0.01416015625,
-0.010... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958979 | 1,025 | http://www.dharmawheel.net/viewtopic.php?f=66&t=9709&hilit=tathagata&start=100 | 0.163943 |
viniketa wrote:Signing the petition to Karzai doesn't hurt, but I doubt it will help.
And the Blessed One addressed the bhikkhus, saying: "Behold now, bhikkhus, I exhort you: All compounded things are subject to vanish. Strive with earnestness!"
This was the last word of the Tathagata.
And when the Blessed One had passed away, simultaneously with his Parinibbana, Brahma Sahampati spoke this stanza:
All must depart — all beings that have life
Must shed their compound forms. Yea, even one,
A Master such as he, a peerless being,
Powerful in wisdom, the Enlightened One, has passed away.
And when the Blessed One had passed away, simultaneously with his Parinibbana, Sakka, king of the gods, spoke this stanza:
Transient are all compounded things,
Subject to arise and vanish;
Having come into existence they pass away;
Good is the peace when they forever cease.
so we should just give up
If you bothered reading the article or watching the video you would have learnt that it is a Chinese mining colossus which is going to destroy the Budddhist archaeological site so they can dig up a huge hunk of copper, not the Afghans.lobster wrote:Send a thank you to the Afghans for this wonderful teaching on impermanence
gregkavarnos wrote:If you bothered reading the article or watching the video you would have learnt that it is a Chinese mining colossus which is going to destroy the Budddhist archaeological site so they can dig up a huge hunk of copper, not the Afghans.lobster wrote:Send a thank you to the Afghans for this wonderful teaching on impermanence
Good morning everyone! I have GREAT news to report.
We are now 80% funded!!! VERY EXCITING!
Thank you for all the wonderful support!
As I am preparing to head out to Mes Aynak next month, I am hearing that the Thai government, Smithsonian and US State Dept. (with help and video from this campaign) has been making inroads with the Afghan government to protect Mes Aynak.
So let's keep it up!
Now is the time to RAMP UP international support for Mes Aynak. We really need an international organization like UNESCO to get involved to preserve Mes Aynak for future generations.
But the odds are still against us due to $100 billion dollars of copper directly under the Buddhist city, the volatile Taliban presence in Logar, and the 2014 US troop pullout that could leave Afghanistan in chaos.
So we still have a lot of work to do!
Please continue to help spread the word and support the Kickstarter campaign.
We are $6,000 away from our goal of $30,000!
http://www.kickstarter.com/projects/472 ... -mes-aynak
Since the campaign has been SO SUCCESSFUL, we are looking at potential STRETCH GOALS.
If we reach $40,000, we want to include a Thai section of the documentary that interviews ALL the key supporters in Thailand that have fought so hard for Mes Aynak.
So let's try to keep the campaign going above and beyond the Kickstarter goal!
Again, thanks for reading and for all the AMAZING support!
JohnRammy wrote:Which is even worse. The Chinese government (which controls the mining operation) hates Buddhism.
Zen Dude wrote:Good news - They have postponed demolishing the site for another 6 months, to enable further archaeological excavation. With more media coverage and exposure, perhaps it is not impossible for it to be saved.
Users browsing this forum: No registered users and 0 guests | <urn:uuid:5b3ffd3b-7f12-429e-8ff9-4bea2a3c1797> | 2013-05-18T05:32:31Z | CC-MAIN-2013-20 | [
[
-0.040771484375,
0.0020904541015625,
-0.00927734375,
-0.0024871826171875,
0.12060546875,
-0.07763671875,
-0.00921630859375,
0.07958984375,
0.0001220703125,
-0.05224609375,
-0.0078125,
-0.00112152099609375,
-0.011474609375,
0.034423828125,
0.0228271484375... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944815 | 793 | http://www.dharmawheel.net/viewtopic.php?p=147549 | 0.205027 |
deepbluehum wrote:I agree that testability would great, but their are limits to what one can gather in terms of data. For example, there is no test that can falsify rebirth. The best we can hope for are two things: 1) anecdotal evidence and 2) one must enter the path up to the fourth jhana and aver one's mind toward past lives and see what happens. The second would only be one's own subjective experience. The same applies to karma. We can look at examples like Ghaddhafi and apply the lives by the gun dies by the gun adage. Then, we can "test" in our own experience whether what the Buddha said is true, that good deeds result in pleasant condition and bad deeds result in painful condition. As to compassi-o-bots, you are missing a crucial element, the dharmakaya. This also has absolutely nothing to do with science, and cannot be tested, because it is simply awareness's own subjective experience, and by definition, is immeasurable.
I feel this is really underestimating the power of Buddhist phenomenology. What might be Buddhism's most appealing factor to the Western intellectual mindset is that its primary system of inquiry is a very advanced form of phenomenology, so advanced that it overtakes anything similar ever produced in the West by millenia. It is also independently verifiable in a way that other beliefs are not - a highly intelligent person stranded on an island with no access to human knowledge may, in theory, arrive at the conventional meaning of dependent origination, even karma and rebirth and so on, by logic alone. You can't really make this claim of other systems. Truth, being absolute, must be able to be universally realised and derived, assuming necessary mental capacity, or it can never be trusted as truth. I think the Buddha realised and taught this - who, we remember, didn't have any of the anecdotal evidence we have now. Would he really try to encourage us solely by appealing to future experience? I don't think he did.
If we rely on anecdotal evidence, we are only reinforcing our previous beliefs - that's why it isn't accepted generally as scientific, even though its based in scientific thinking. If we attribute truth value to claims of NDE's, or yogic recollection (even our own) it is only ever because we assign the source credibility that we don't assign to other, competing anecdotes. That credibility is based on other assumptions, which sooner or later are found to be unfounded in any rigourous way. This is why it is a flimsy argument, the same every belief system uses, and not necessary
. Right view mean nothing without right understanding.
We cannot yet falsify rebirth completely, so it is disingenuous to call it an empirical hypothesis. However, fortunately and possibly more importantly we can falsify nonrebirth and nonkarma. That is, it is impossible, for example, for energy to do anything other than continue. The conservation of energy is a "law" in physics. So literal non-causation and non-rebirth, at least of physical things, is impossible. We haven't quite proved the progression of a mental continuum, of course, but this is much more powerful an argument than one that appeals to anecdotal evidence, which science doesn't consider valid, and appeal to future experience, which philosophy considers a fallacy.
It is bizarre to me that so many Buddhists are critical of "Western science". I have no idea why. Everything we see in modern science is exactly what we would expect if the core tenets of Buddhism are correct. Empiricism and materalism/"New Atheism"/physicalism etc. are not mutally exclusive.
Sorry for the wall of text, needed a vent.
As a strict skeptic you are in danger of remaining a thought-o-bot.
True, and this is the biggest problem for this approach, the risk of becoming an armchair-Buddhist. The best philosophers are scientists, meaning skepticism is the proper attitude for experiment. But we should remember there is nothing to fear from skepticism or science, either way. They are on our side. The good thing about truth is that its invincible. Hooray! | <urn:uuid:c9f32dca-7512-4448-b4b8-573f24aa98b9> | 2013-05-18T06:32:16Z | CC-MAIN-2013-20 | [
[
-0.040283203125,
-0.00994873046875,
0.027587890625,
0.010986328125,
0.06640625,
-0.048828125,
-0.0177001953125,
0.130859375,
-0.005645751953125,
-0.0133056640625,
0.036865234375,
0.011474609375,
-0.05419921875,
0.031982421875,
0.0242919921875,
-0.022... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96076 | 869 | http://www.dharmawheel.net/viewtopic.php?p=63069 | 0.166523 |
Re: Getting past the biting?
It will sound counterproductive, but when she bites, pull her in snugly against your breast. This will be uncomfy for her, and in order to breathe better, will automatically let go of your nipple. If you consistently take this approach, she'll get the picture that biting mom isn't funny and the consequences aren't very comfy. I would say "NO" in a loud mom-means-business voice and this also helped us. However, if she thinks it's funny when you yelp, this might not work for you.
HTH. Not saying this is a sure fire thing, but it worked for us! | <urn:uuid:99a4e7cf-7110-4f1c-975d-4633fd6c26d1> | 2013-05-18T05:26:05Z | CC-MAIN-2013-20 | [
[
-0.01121144462376833,
0.029423700645565987,
0.029423700645565987,
0.012175324372947216,
0.05884740129113197,
-0.060876622796058655,
0.003754058387130499,
0.08603896200656891,
-0.0334821417927742,
-0.09050324559211731,
0.05560065060853958,
0.02130681835114956,
-0... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979261 | 139 | http://www.diaperswappers.com/forum/showpost.php?p=111893&postcount=2 | 0.582945 |
12 people were killed and 58 were injured when a gunman opened fire at a midnight screening of The Dark Knight Rises in Aurora, Colorado on July 20.
Bale, who starred as Bruce Wayne/Batman in The Dark Knight Rises, recently visited some of the victims recovering from their injuries in a local hospital without encouragement from Warner Bros and media.
Speaking on The View, Lambert said: "As an entertainer myself, I feel like it makes me want to go do something nice.
"It wasn't in the press. It was just out of the kindness of his heart. It's really cool he didn't do it for attention."
Hans Zimmer, composer of The Dark Knight Rises , previously wrote and recorded a new composition titled 'Aurora' with all proceeds going to the Aurora Victim Relief organisation.
Watch the music video of Miranda Lambert's 'Over You' below: | <urn:uuid:1c759c74-fd6e-4486-96c7-14f15910ca3a> | 2013-05-18T07:22:28Z | CC-MAIN-2013-20 | [
[
-0.007774014957249165,
-0.0014816810144111514,
-0.016086822375655174,
-0.0017991841305047274,
0.09852216392755508,
-0.02663177251815796,
0.0048491377383470535,
0.05788177251815796,
-0.029864532873034477,
-0.06988916546106339,
0.05049261078238487,
0.02909482829272747... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.972343 | 184 | http://www.digitalspy.co.uk/ustv/news/a396027/christian-bales-visit-to-aurora-victims-inspired-miranda-lambert.html | 0.168261 |
What you will learn
In this Maya tutorial we'll learn how to begin Maya's powerful Ocean features. Using Maya Oceans, we'll be able to achieve quality results within a matter of minutes. We'll begin this project by learning the basics of creating a Maya Ocean and what it is actually made of. We'll then learn about attributes we need to set early in the project. Then we'll learn how to control the noisiness of waves and their length. After that, we'll create line graphs to change each wave's height, turbulence and peak. We'll finish the tutorial by adding foam and editing the color information of the shader. | <urn:uuid:ad8f3e02-5642-4b38-8de0-b8623965e056> | 2013-05-18T06:50:28Z | CC-MAIN-2013-20 | [
[
-0.04289215803146362,
0.009497549384832382,
0.026960784569382668,
-0.003523284336552024,
0.04493464156985283,
-0.03553921729326248,
0.013582516461610794,
0.05841503292322159,
-0.018586602061986923,
0.014808006584644318,
0.03737745061516762,
0.016339870169758797,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947473 | 130 | http://www.digitaltutors.com/11/training.php?pid=200&autoplay=1 | 0.674006 |
Malls, grocery stores and other indoor venues are being mapped to help shoppers find not only store locations but products and promotions. Point Inside is helping mall developers, retailers and their customers with indoor positioning solutions. Brian Wilson, vice president of marketing, gives us the details on positioning accuracy, how each venue is mapped and how they can find products at the “shelf-level.” The company recently launched a service with Meijer Stores in the Midwest and has already mapped many malls.
Malls, grocery stores and other indoor venues are being mapped and indoor positioning systems will help shoppers find not only store locations but products and promotions. Point Inside is helping mall developers, retailers and their customers with indoor positioning solutions. Brian Wilson, vice president of marketing, gives us the details on positioning accuracy, how each venue is mapped and how they can find products at the "shelf-level." The company recently launched a service with Meijer Stores in the Midwest and has already mapped many malls. This interview with Brian Wilson, Point Inside's vice president of marketing, gives more details.
Directions Magazine (DM): Let's start with the basics. What methods are you employing to support indoor positioning for shoppers at grocery stores or malls? What level of positioning accuracy are you able to provide once a search is initiated?
Brian Wilson (BW): When we're privy to the locations of Wi-Fi access points in a venue we'll map those and provide the locations to Skyhook, Google and Apple for inclusion in their databases. Once propagated through their systems, users' locations reported by the handset should reflect the greater accuracy provided by the additional nodes. We expect accuracy to generally be in the 5-30 meter range. And when we say generally, we're really looking at 68% (i.e. 1-sigma) of the time.
DM: You've mapped quite a few malls and store locations. Can you provide some background information on how you created these maps?
BW: Our internal team creates each map. We've created a proprietary software tool that allows us, after gathering point of interest (POI) and other data about the space, to rapidly produce a geospatially accurate map of the defined geography. Also note the mapping tool does not limit us to indoor venues; we could just as easily map a theme park or college campus, et cetera. The proprietary processes we've established and tool we use are trade secrets, with patents pending, so I'm not able to say more than that. Suffice to say that with a very small team we are creating maps at a very rapid pace.
DM: Were mall developers willing to provide their engineering or CAD drawings in order for you to have very accurate drawings of the buildings? Do you intend to create 3D models and BIMs from any drawings you obtain?
BW: We're working with some mall developers who are providing their maps (in some cases CAD drawings, in others, just plain block diagram maps or lease maps). However, our system does not necessarily require that we have precise, detailed floor plan maps as a starting point for creating our maps. In some cases we start with nothing. As for 3D models or 3D BIMs, we're adding OGC compliant modeling to our tool set and expect to publish our first GML formatted venue shortly.
DM: Generally, grocery stores follow very similar layouts from store to store. Have you been able to simply replicate a store floor map throughout a given retailer's chain? What modifications, if any, do you have to make between stores?
BW: Although there are often many similarities in the basic floor plans for a given retailer, so far we've found there are generally enough subtleties between locations to warrant individual mapping efforts. Department layouts are often driven by a store-specific planogram system, and because it's important that we create an accurate representation of the space, we make the extra effort to make each map unique.
DM: Inside the store, planograms have become a science unto themselves. How do you incorporate planograms into your app or are you simply mapping the 2D location of any particular SKU?
BW: Planogram systems do have an accounting of the shelf or peg location where a product may reside, but user testing shows that mapping to that fidelity doesn't add enough value to warrant the additional POI overhead. An average large format retailer contains three to five thousand POIs. Adding the shelf or peg resolution increased that number to hundreds of thousands. We're currently working on an elegant solution to describe the Z axis in more detail and will add it to our offering if user testing proves there's a benefit.
DM: Are you able to map every SKU for each store?
BW: Since we're taking the data directly from the retailer's system, we're dependent to a great extent upon the quality of the data we receive (though we also have a process for "cleaning" and normalizing them). The short answer is: we're able to map every SKU that's made available to us. Note that our system can also deal with different granularities of information. For example, if a precise shelf location is not provided, but the item is categorized appropriately, we can still place it in the correct department on the map. This typically happens in clothing and shoe departments where several racks have rollers and are frequently moved to accommodate seasonal inventory fluctuations.
DM: Will you be, or are you now, using the phone's camera to support bar chart recognition in order to retrieve pricing information or number of units in stock?
BW: This capability was not included in the 1.0 Meijer Find-it launch, but it's a feature we've added to the roadmap, and we expect a partner to request it in the future. We'll be working with our partners to prioritize features on the product roadmap.
DM: How do you intend to integrate location-based advertising from mall or store merchants, and will they offer electronic couponing as part of their Point Inside app?
BW: We currently have a Web-based "portal" for our retail and mall partners that allows them to create, schedule and publish mobile promotions and event information to the Point Inside application for malls and airports. This same infrastructure is being leveraged to publish weekly sale specials in the Meijer Find-it app. So, we're already offering this capability, though it's still early, and we haven't focused significant sales efforts in that area to-date.
DM: Can you tell us more about your business model? Do merchants pay you to map the store? Will you be involved in placing electronic ads, and is that a service you will offer?
BW: Our business model can be summarized below. Note that depending on the specific situation there might be any combination of up-front fees, per-use fees, revenue sharing, et cetera involved in the relationship. I'm not able to go into specific details regarding any particular arrangement at this time.
- Content Licensing - We make our map and POI (i.e. "destination") content available via an API to third-party developers for incorporation into their apps. For example, you could imagine how an airline might want to enhance its app by making detailed airport maps available to its customers.
- Platform Licensing - The Meijer app is an example of this. We create the specific venue maps, house the data and operate the system powering the app. In the Meijer case this includes product search and the serving of ads and promotions.
- Map Creation & Maintenance - We're working with some destination owners to create and maintain their digital maps.
- Advertising - As previously mentioned, we do offer retailers and malls the opportunity to publish promotions and event information (whether that be in-store events for retailers, or events managed by the mall to drive mall traffic) to the Point Inside application.
DM: Feel free to explain any additional aspects of the app that we have not covered.
BW: Rather than focus on a specific app, whether it be Meijer's Find-it or our own Point Inside for Airports and Malls, I think it's important to understand we're not "an app company." Our key strength is our ability to catalog and index data for geographically defined areas, marry those data to precise location information, and make them available to digital devices. What we're really selling is the capabilities of our Mobile Destination Content Platform. Our management team has very deep experience in LBS and positioning technologies; we've been a part of the industry from the beginning. We believe that by building this capability to associate the "what" to "where" in the untapped "gray space" of outdoor maps we'll be able to enable a variety of mobile services valuable to businesses and consumers alike. We're still very early in the evolution of these types of services, and we'll continue to evolve our platform's capabilities and work with other ecosystem players to facilitate even better consumer experiences. In other words, the Meijer Find-it app is just the beginning. | <urn:uuid:22ee783c-5207-4773-902b-7ba3ce89f47c> | 2013-05-18T05:58:56Z | CC-MAIN-2013-20 | [
[
-0.0224609375,
0.00872802734375,
0.00738525390625,
0.002288818359375,
0.07421875,
-0.03759765625,
0.006988525390625,
0.091796875,
-0.02001953125,
-0.050048828125,
0.07080078125,
0.024169921875,
-0.0419921875,
0.017333984375,
0.049072265625,
-0.017089... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951607 | 1,864 | http://www.directionsmag.com/articles/location-enabling-your-grocery-store-indoor-positioning-locates-your-f/132579 | 0.220525 |
Whether you are looking for the newest designer couture or the best place to eat fish tacos while soaking in the SoCal sun. Los Angeles is a city of endless entertainment. Start Exploring
There were no results matching the given search criteria. Please update your selected filters and try again. | <urn:uuid:b09bb4af-9fe6-4e3a-8c69-da0bdfd33e23> | 2013-05-18T06:47:17Z | CC-MAIN-2013-20 | [
[
-0.04034515097737312,
0.017840484157204628,
0.018190298229455948,
-0.032182835042476654,
0.059468284249305725,
-0.041744403541088104,
-0.01772388070821762,
0.01923973858356476,
-0.04757462814450264,
-0.016441231593489647,
0.08395522087812424,
0.03451492637395859,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.913357 | 58 | http://www.discoverlosangeles.com/tourism/media-room/multimedia?keywords=autry%20national%20center&category[0]=1 | 0.162508 |
Graphic designers required to design promotional materials for an events business. The successful candidate will be required to design Posters/logo(s) on an adhoc basis but with the possibility of becoming regular work. This is not a full time/ part-time job - only as and when required, therefore it could be suitable for graphic design students or professionals with a spare time to undertake additional work. Candidates will be required to show a portfolio of previous designs. No large portfolio is required so long as the candidate can demonstrate competence in graphic design. Pay basis market rates - also depending on experience (negotiable when meet/ over the phone) No formal applications, just reply to the Ad's email leaving your name, phone number and a portfoio of artwork. If of interest we will contact you to discuss this position further. Keywords: Creative, Media, Design
In this project you compete with other providers. The best outcome is chosen by the buyer and its provider is rewarded. For more information see the FAQ.
Use the "Project Type" filter on the left to filter all contest projects.In this project you place a bid to offer the price you wish to receive for performing it. The buyer chooses the provider by price and impression. For more information see the FAQ.
Use the "Project Type" filter on the left to filter all bidding projects. | <urn:uuid:1b769ff4-bde2-4fec-8db8-be22177efc96> | 2013-05-18T05:50:53Z | CC-MAIN-2013-20 | [
[
-0.0374579131603241,
0.035353533923625946,
0.017466329038143158,
-0.006997053977102041,
0.05639730766415596,
0.01409932691603899,
-0.011153198778629303,
0.017255892977118492,
-0.005155724007636309,
0.0003353850916028023,
0.09006734192371368,
0.017676766961812973,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.936164 | 279 | http://www.donanza.com/jobs/p5884416-graphic_designers_required | 0.213239 |
What Type of Doodle(s) do you have? What are their names? Tell us about your doodle(s) or any other pets you have!
I have an F1b labradoodle named Sarge
Where did you get your doodle(s)?
Why did you choose a doodle rather than another breed or mix?
because a labradoodle is a mix between two of the smartest breeds.
What are Your Favorite Things to Do With Your Doodles?
play and snuggle.
Does your doodle(s) shed?
A little bit but nothing major
Who grooms your doodle(s)?
Favorite Doodle Products?
Would you be willing to Dog Sit on occasion for other DoodleKisses members? (You are NOT committing to anything by saying yes - you are just saying you might be willing to do this if you were acquainted with the other member and the circumstances were right.)
Hi Caitlin ~ I love all the photos of your beautiful family, including that sweety pie Sarge. He looks like a little lamb! When you get a chance be sure to check out the groups section on the main page and join as many as you like. Welcome to DK
Welcome Caitlin and Sarge! Sarge is precious and I love his name! We live in Raleigh,not far away. We have several doodle party's at our house each year. Would love or you to
join us sometime! Did you get Sarge in NC? | <urn:uuid:bd9a06b2-59d1-4a2e-a36b-a4fd1897befa> | 2013-05-18T06:55:38Z | CC-MAIN-2013-20 | [
[
-0.02865384705364704,
0.03423076868057251,
0.004350961651653051,
0.012067307718098164,
0.06769230961799622,
-0.02788461558520794,
-0.006009615492075682,
0.016826923936605453,
-0.03500000014901161,
-0.03346153721213341,
0.03423076868057251,
0.016634615138173103,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.955478 | 315 | http://www.doodlekisses.com/profile/CaitlinBeiermann | 0.346472 |
These Discussion Forums are dedicated to the discussion of the DotNetNuke Web Application Framework.
For the benefit of the community and to protect the integrity of the project, please observe the following posting guidelines:
1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DotNetNuke.
2. Discussion or promotion of DotNetNuke product releases under a different brand name are strictly prohibited.
3. No Flaming or Trolling.
4. No Profanity, Racism, or Prejudice.
5. Site Moderators have the final word on approving/removing a thread or post or comment.
6. English language posting only, please. | <urn:uuid:0da98d58-f339-4d37-9767-be4f4669c5cd> | 2013-05-18T08:11:00Z | CC-MAIN-2013-20 | [
[
-0.026740772649645805,
0.01184983178973198,
0.037961408495903015,
0.008389261551201344,
0.05788590759038925,
-0.0562080554664135,
-0.01971476525068283,
0.09270134568214417,
0.014681207947432995,
0.024433724582195282,
0.10276845842599869,
0.04404362291097641,
-0.... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.862251 | 149 | http://www.dotnetnuke.com/Resources/Forums/forumid/118/threadid/455887/scope/posts.aspx | 0.396707 |
Adria LNG, initially a joint venture between E.ON Ruhrgas (31.15%), Total (25.58%), OMV (25.58%), RWE (16.69%) and Geoplin (1%), was formed in October 2007 to study the development of an LNG regasification terminal in Croatia.
Proposed for the island of Krk on the Croatian coast, the Aria LNG terminal will receive and vaporize LNG from a number of suppliers. It will distribute the natural gas to the European market through a new pipeline system.
Construction plans for the terminal include an LNG unloading dock, storage tanks, pumps, vaporizing equipment, temporary storage and a pipeline system linking the natural gas to existing pipelines. Construction is expected to take three years.
With an LNG capacity of 10 billion cubic meters per year, the terminal will accept approximately 100 LNG tankers a year. Additionally, the facility is being built with the option of increasing capacity to 15 billion cubic meters per year.
The total project cost estimates are approximately $1.5 billion; investment for the terminal alone ranges from $890 million to $1.2 billion. According to an October 20, 2009, Dow Jones Newswires article, RWE decided to withdraw from the project and offer its shares to the remaining partners. The final decision on whether to move forward with the Adria LNG terminal is expected sometime in 2010, according to the report. The terminal is expected to be operational by late 2014. | <urn:uuid:a02df503-cbd2-497e-8530-252998273e76> | 2013-05-18T06:50:41Z | CC-MAIN-2013-20 | [
[
0.005444335751235485,
0.02167968824505806,
-0.02363281324505806,
0.00927734375,
0.09882812201976776,
-0.04746093600988388,
-0.0042480467818677425,
0.06992187350988388,
-0.01650390587747097,
-0.021484375,
0.07695312798023224,
0.0341796875,
0.0126953125,
0.014... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934995 | 312 | http://www.downstreamtoday.com/(S(odxey145is31rqro4x3nccr0))/Projects/Project.aspx?project_id=70&AspxAutoDetectCookieSupport=1 | 0.365828 |
It was alarming to read in the recent article The Rise and Fall of Languages in 2012 by Dr. Dobb's editor, Andrew Binstock, that Perl was "continuing its long decline" and was in"an irretrievable tailspin," based on statistics from Google searches. Nothing in the article discussed what was lacking feature-wise in the language that might be behind this decline. While I am not an authority on programming languages, I thought it was only appropriate to reflect on the strengths of Perl that I've relied on during my 14-year affair with the language.
My History with Perl
I stumbled upon Perl back in 1999. I was an FPGA Logic Designer at Lucent Technologies proficient and programming in C, C++, and VHDL. Web Programming seemed like an exciting world and Perl was advertised as the "duct tape" that glued the World Wide Web together. After a one-day workshop at Lucent, I quickly realized that Perl was a godsend to hardware developers. It combined the power of C and AWK making it a great language for developing hardware automation tools. As a logic designer, Perl augmented my abilities by providing me with a powerful language that was easier to create tools with. I created tools for "stitching modules" for chip design and testing, and designing two-pass assembly languages customized for test benching VHDL/Verilog chip design.
The Power of Perl: 10 Good Reasons
Over the years, my fondness of Perl has only grown stronger. I write anywhere between 5,000 to 15,000 lines of NCL Perl code a year, from throwaway scripts to large-scale and robust factory test applications. The following list of the reasons I particularly choose Perl for my work might help other developers determine whether Perl is the right choice for their needs.
Regular expressions are the most compelling attraction of Perl. It is no secret that Perl regular expressions are the envy of other languages. As data continues to have an ever-growing importance in today's world, regular expressions provide us with the power to slice and dice data so that we can measure, learn, and make intelligent decisions. Good regular expressions, such as those in Perl, will therefore become increasingly important.
Hashes or content-associative arrays provide us with a quick way of creating lookup tables. And in the world of data and automation, lookup tables are indispensable for creating tools. Listing all the great ways of using hashes is beyond the scope of this article. The vast majority of my applications would not be possible without the power of Perl hashes.
A programmer's productivity is greatly enhanced by not having to manage memory allocation and deallocation. Arrays and lookup tables can grow and shrink as need dictates. Complex structures can add and remove fields on the fly.
References and Complex Structures
Serious programming requires the ability to create complex structures. Perl supports references/pointers, which is key to being able to create complex structures. Again, there is no need to pre-declare fields. Keys can be added and removed on the fly.
Large-scale programming is not possible without support for modules. While Perl can be used for pure scripting, it does enable modular programming using packages. Many of my applications consist of 20 or more modules, with each module housing a single subroutine call. Packages are also used for doing OO programming in Perl. | <urn:uuid:5d4c4474-edf4-459e-a125-1e10f1f1e6f1> | 2013-05-18T05:31:51Z | CC-MAIN-2013-20 | [
[
-0.0546875,
0.0135498046875,
0.0260009765625,
0.00262451171875,
0.052490234375,
-0.0211181640625,
0.00762939453125,
0.1220703125,
-0.032470703125,
0.007415771484375,
0.058349609375,
0.041015625,
-0.051025390625,
0.048828125,
0.032470703125,
-0.027465... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934086 | 695 | http://www.drdobbs.com/open-source/why-i-use-perland-will-continue-to-do-so/240148364?cid=SBX_ddj_related_video_default_jvm&itc=SBX_ddj_related_video_default_jvm | 0.178951 |
Patients under therapy with MAO inhibitors may experience a severe hypertensive crisis if given a sympathomimetic drug. Use in children, especially infants, may result in CNS depression leading to coma and marked reduction in body temperature.
Use with caution in the presence of hypertension, cardiovascular abnormalities, hyperglycemia (diabetes), hyperthyroidism, infection or injury.
Patients should be advised to discontinue the drug and consult a physician if relief is not obtained within 48 hours of therapy, if irritation, blurring or redness persists or increases, or if symptoms of systemic absorption occur, i.e., dizziness, headache, nausea, decrease in body temperature, or drowsiness.
To prevent contaminating the dropper tip and solution, do not touch the eyelids or the surrounding area with the dropper tip of the bottle. If solution changes color or becomes cloudy, do not use.
Concurrent use of maprotiline or tricyclic antidepressants and naphazoline may potentiate the pressor effect of naphazoline. Patients under therapy with MAO inhibitors may experience a severe hypertensive crisis if given a sympathomimetic drug. (See WARNINGS.)
Pregnancy Category C: Animal reproduction studies have not been
conducted with naphazoline. It is also not known whether naphazoline can cause fetal harm when administered to a pregnant woman or can affect reproduction capacity. Naphazoline should be given to a pregnant woman only if clearly needed.
It is not known whether naphazoline is excreted in human milk. Because many drugs are excreted in human milk, caution should be exercised when naphazoline is administered to a nursing woman.
Safety and effectiveness in pediatric patients have not been established. See “ WARNINGS. ” and “ CONTRAINDICATIONS. ” | <urn:uuid:fdd8a220-7d34-46d7-a6d3-66bb8ba109f6> | 2013-05-18T04:55:50Z | CC-MAIN-2013-20 | [
[
-0.019953051581978798,
0.015331572853028774,
0.023180751129984856,
-0.019806338474154472,
0.1238262876868248,
-0.10211267322301865,
-0.00390625,
0.11795774847269058,
-0.017605634406208992,
0.00905956607311964,
0.11326291412115097,
0.035504695028066635,
-0.025381... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.841765 | 386 | http://www.druglib.com/druginfo/albalon/warnings_precautions/ | 0.211421 |
Generic Name: Zafirlukast
Class: Leukotriene Modifiers
ATC Class: R03DC01
VA Class: RE109
Chemical Name: [3-[[2-Methoxy-4-[[[(2-methylphenyl)-sulfonyl]amino]carbonyl]phenyl]methyl]-1H-indol-5-yl-carbamic acid cyclopentyl ester
Molecular Formula: C31H33N3O6S
CAS Number: 107753-78-6
Uses for Accolate
In patients with mild persistent asthma, low-dose orally inhaled corticosteroids considered first-line agents for long-term control.43 74 Alternative agents, including certain leukotriene modifiers (i.e., zafirlukast, montelukast), may be used but are less effective than inhaled corticosteroids and are not preferred as initial therapy.43 74 76
In patients with moderate persistent asthma, low-dose inhaled corticosteroids with a long-acting inhaled β2-agonist bronchodilator (e.g., salmeterol, formoterol) or monotherapy with medium-dose inhaled corticosteroids preferred.43 74 However, the National Asthma Education and Prevention Program (NAEPP) recommends that beneficial effects of long-acting inhaled β2-agonists be weighed carefully against increased risk of severe asthma exacerbations and asthma-related deaths associated with daily use of such agents.74
Alternative agents, including certain leukotriene modifiers (i.e., zafirlukast, montelukast), can be added to a low dosage of inhaled corticosteroid for treatment of moderate persistent asthma, but these options are less effective.43 74 Considerations favoring combination with orally inhaled corticosteroids include intolerance to long-acting β2-adrenergic agonists, marked preference for oral therapy, and demonstration of superior responsiveness to these leukotriene modifiers.74
In adults and children ≥5 years of age with severe persistent asthma, NAEPP and the Global Initiative for Asthma (GINA) state that maintenance therapy with inhaled corticosteroids at medium to high dosages and adjunctive therapy with a long-acting inhaled β2-agonist is preferred.43 74 Alternatives to a long-acting inhaled β2-agonist in such patients receiving medium-dose inhaled corticosteroids include certain leukotriene modifiers (i.e., zafirlukast, montelukast), but these agents are generally not preferred.43 74
Accolate Dosage and Administration
Children 5–11 years of age: 10 mg twice daily.1
Clearance may be decreased.1 Dosage reduction may be necessary;53 however, the manufacturer currently makes no specific recommendations for dosage adjustment.1 45 Not evaluated in patients with hepatitis or in long-term studies in patients with cirrhosis.1 45 (See Special Populations under Absorption and under Elimination in Pharmacokinetics and see Hepatic Impairment.)
Cautions for Accolate
Known hypersensitivity to zafirlukast or any ingredient in the formulation.1
Hepatic dysfunction, including increases in liver enzyme concentrations, hepatitis, and/or hyperbilirubinemia, reported.1 52 Zafirlukast-induced hepatotoxicity usually is reversible following discontinuance of the drug.1 52
Monitor closely for signs and symptoms of hepatic impairment; consider performing liver function tests (e.g., serum AST and ALT) periodically.1 Advise patients to immediately contact their clinician if they notice signs and symptoms of liver dysfunction.1
Discontinue therapy if signs and/or symptoms suggestive of liver dysfunction occur; immediately perform liver function tests (i.e., serum ALT) and manage patient accordingly.52
Do not reinitiate therapy if results of liver function tests are consistent with hepatic dysfunction or if zafirlukast was discontinued because of hepatic dysfunction when no other attributable cause could be identified.1
Do not use for relief of acute bronchospasm (including status asthmaticus); zafirlukast can be continued during acute exacerbations of asthma, but it will not provide immediate symptomatic relief.1 45 52 Patients who experience exacerbations of asthma should continue their usual regimen of inhaled β2–adrenergic agonists for prophylaxis and have a short-acting orally inhaled β2-adrenergic agonist available for rescue.1 11 45 52
Eosinophilia and Churg-Strauss Syndrome
Systemic eosinophilia, eosinophilic pneumonia, or clinical features of vasculitis consistent with Churg-Strauss syndrome reported rarely in patients receiving leukotriene modifiers; these events usually associated with reduction (tapered dosage) or withdrawal of oral or high-dose inhaled corticosteroid therapy.1 57 58 59 60 61 62 63 64
Concomitant Corticosteroid Therapy
Do not abruptly substitute zafirlukast for oral or inhaled corticosteroids. Orally inhaled corticosteroid requirements may be reduced during zafirlukast therapy; undertake only gradual (e.g., at 2-week intervals) reduction of corticosteroid dosage.1 45 52 53
Neuropsychiatric events reported with zafirlukast during postmarketing experience.75 80 81 Data from placebo-controlled trials with leukotriene modifiers indicate that suicidal ideation occurred in 0.01% of 9929 patients treated with montelukast and in none of those receiving other leukotriene modifiers; no completed suicide occurred during therapy with any leukotriene modifier.80 FDA concluded that some neuropsychiatric events reported with zafirlukast (e.g., depression, insomnia) appear consistent with a drug-induced effect.1 81
Be alert to the potential for neuropsychiatric events in patients receiving the drug.1 81 Instruct patients to contact their clinician if behavior or mood changes occur.1 81 Carefully evaluate the risks and benefits of continuing zafirlukast therapy in patients who develop neuropsychiatric symptoms.1 81
ACOG generally recommends use of leukotriene receptor antagonists (i.e., zafirlukast, montelukast) as alternatives to a long-acting β2-agonist in pregnant women with moderate persistent asthma who are inadequately controlled with low to medium dosages of an inhaled corticosteroid.66 (See Asthma under Uses.)
Safety demonstrated in children 5–11 years of age; efficacy extrapolated from demonstrated efficacy in adults with asthma and the likelihood that the disease course, pathophysiology, and drug’s effect are similar between the two populations.1
Safety and efficacy not established in children <5 years of age.1
Increased systemic exposure and AUC, reflecting decreased clearance in children relative to adults.1
Effect on growth in pediatric patients not evaluated in clinical studies to date.1
Common Adverse Effects
Interactions for Accolate
Metabolized by CYP2C9.1
Inhibits CYP3A4 and CYP2C9.1
Drugs Metabolized by Hepatic Microsomal Enzymes
CYP2C9 and CYP3A4 substrates: Potential pharmacokinetic interaction (increased plasma substrate concentrations).1
Anticonvulsants (e.g., carbamazepine, phenytoin)
Possible increased plasma anticonvulsant concentrationsa
Monitor for adverse effects1
Monitor for alterations in clinical response and/or adverse effects1
Astemizole (no longer commercially available in the US)
Calcium-channel blocking agents, dihydropyridine (nicardipine, nifedipine)
Cisapride (commercially available in US only under limited-access protocol)
Contraceptives, oral (fixed dose estrogen-progestin combination)
Monitor for alterations in clinical response and/or adverse effects1
Terfenadine (no longer commercially available in US)
No alteration in terfenadine pharmacokinetics; no effect on QTc interval45
Monitor for alterations in clinical response and/or adverse effects1
Possible increased plasma tolbutamide concentrationsa
Monitor for adverse effects1
Steady-state plasma concentrations are proportional to dose.a
Children 5–11 years of age: Increased peak plasma concentrations, AUC, and systemic exposure.1
Plasma Protein Binding
Clearance is reduced in children 5–11 years of age and adults >65 years of age.1
Clearance is reduced in patients with hepatic impairment.1
Pharmacokinetics not affected by gender, race, or renal function.1
20–25°C; protect from light and moisture.1
Binds selectively and with high affinity to a group of cysteinyl leukotriene receptors (CysLT1) in airway smooth muscle and competitively inhibits the action of LTD4 and LTE4 (cysteinyl leukotrienes) at these receptors. 1 2 3 4 5 6 11 12 13 18 19 20 21 23 24 45 53
Modification of leukotriene activity may be used to reduce symptoms of asthma since cysteinyl leukotrienes are especially important in the pathogenesis of asthma, causing increased mucous secretion and vascular permeability, airway edema, bronchoconstriction, and altered cellular activity associated with the inflammatory process.1 5 6 7 9 12 13 20 21 22 23 24 26 28 45 53
Inhibits bronchoconstriction induced by exposure to known precipitating factors (e.g., allergens, environmental pollutants, cold and/or dry air, exercise);1 2 6 7 9 12 13 20 22 23 44 45 48 49 50 51 53 55 inhibits both the acute bronchoconstrictor response and the delayed inflammatory response to inhaled antigens.1 2 6 7 10 12 21 22 44 45 55
Advice to Patients
Risk of hepatotoxicity; importance of patients immediately informing their clinicians if right upper quadrant pain, nausea, fatigue, lethargy, pruritus, jaundice, flu-like symptoms, or anorexia occurs.1
Importance of taking zafirlukast at regular intervals, when asymptomatic as well as during periods of worsening asthma.1
Importance of contacting clinician if asthma is not well controlled; seek medical attention if short-acting, inhaled β2-adrenergic bronchodilators are needed more often than usual or if more than the maximum number of inhalations for a 24-hour period are needed.1
Importance of not using zafirlukast for the relief of acute bronchospasm.1 Patients should be provided with and instructed in the use of a short-acting, inhaled β2-adrenergic bronchodilator as supplemental therapy for acute asthma symptoms.1
If patient experiences exacerbations of asthma after exercise, necessity of continuing the usual regimen of inhaled β2-adrenergic agonist for prophylaxis and of having a short-acting, orally inhaled β2-adrenergic agonist available for rescue.1
Importance of informing clinicians of existing or concomitant therapy, including prescription and OTC drugs and dietary or herbal supplements, as well as any concomitant illnesses.1
Importance of women informing clinicians if they are or plan to become pregnant or plan to breast-feed.1
Importance of informing patients of other important precautionary information. (See Cautions.)
Excipients in commercially available drug preparations may have clinically important effects in some individuals; consult specific product labeling for details.
This pricing information is subject to change at the sole discretion of DS Pharmacy. This pricing information was updated 02/2013. Actual costs to patients will vary depending on the use of specific retail or mail-order locations and health insurance copays.
Accolate 10MG Tablets (ASTRAZENECA): 60/$120.99 or 180/$340.96
Accolate 20MG Tablets (ASTRAZENECA): 60/$129.99 or 180/$375.96
Zafirlukast 10MG Tablets (PAR): 60/$89.99 or 180/$249.97
Zafirlukast 20MG Tablets (PAR): 60/$89.99 or 180/$249.97
This report on medications is for your information only, and is not considered individual patient advice. Because of the changing nature of drug information, please consult your physician or pharmacist about specific clinical use.
The American Society of Health-System Pharmacists, Inc. and Drugs.com represent that the information provided hereunder was formulated with a reasonable standard of care, and in conformity with professional standards in the field. The American Society of Health-System Pharmacists, Inc. and Drugs.com make no representations or warranties, express or implied, including, but not limited to, any implied warranty of merchantability and/or fitness for a particular purpose, with respect to such information and specifically disclaims all such warranties. Users are advised that decisions regarding drug therapy are complex medical decisions requiring the independent, informed decision of an appropriate health care professional, and the information is provided for informational purposes only. The entire monograph for a drug should be reviewed for a thorough understanding of the drug's actions, uses and side effects. The American Society of Health-System Pharmacists, Inc. and Drugs.com do not endorse or recommend the use of any drug. The information is not a substitute for medical care.
AHFS Drug Information. © Copyright, 1959-2013, Selected Revisions April 24, 2012. American Society of Health-System Pharmacists, Inc., 7272 Wisconsin Avenue, Bethesda, Maryland 20814.
1. AstraZeneca Pharmaceuticals. Accolate (zafirlukast) tablets prescribing information. Wilmington, DE; 2009 Aug.
2. Anon. Accolate. Drugs Future. 1994; 19:217-20.
3. Krell RD, Aharony D, Buckner CK et al. The preclinical pharmacology of ICI 204,219: a peptide leukotriene antagonist. Am Rev Respir Dis. 1990; 141:978-87. [PubMed 2158259]
4. Smith LJ, Geller S, Ebright L et al. Inhibition of leukotriene D4-induced bronchoconstriction in normal subjects by the oral LTD4 receptor antagonist ICI 204,219. Am Rev Respir Dis. 1990; 141:988-92. [IDIS 303231] [PubMed 2158260]
5. Smith LJ, Glass M, Minkwitz MC. Inhibition of leukotriene D4-induced bronchoconstriction in subjects with asthma: a concentration-effect study of ICI 204,219. Clin Pharmacol Ther. 1993; 54:430-6. [IDIS 321789] [PubMed 8222486]
6. Larsen JS, Acosta EP. Leukotriene-receptor antagonists and 5-lipoxygenase inhibitors in asthma. Ann Pharmacother. 1993; 27:898-903. [IDIS 318504] [PubMed 8364276]
7. Spector SL. Leukotriene inhibitors and antagonists in asthma. Ann Allergy Asthma Immunol. 1995; 75:463-70, 473. [IDIS 357677] [PubMed 8603274]
8. Campbell WB, Halushka PV. Lipid-derived autacoids: eicosanoids and platelet-activating factor. In: Hardman JG, Limbird LE, Molinoff PB et al, eds. Goodman and Gilman’s the pharmacological basis of therapeutics. 9th ed. New York: McGraw-Hill; 1995:601-16.
9. Chanarin N, Johnston SL. Leukotrienes as a target in asthma therapy. Drugs. 1994; 47:12-24. [PubMed 7510618]
10. Fleeger CA, ed. USAN 1997: USP Dictionary of USAN and International Drug Names. Rockville, MD: The United States Pharmacopeial Convention, Inc; 1997:772.
11. National Asthma Education Program. Expert Panel Report II: guidelines for the diagnosis and management of asthma. 1997 Feb.
12. Busse WW. The role of leukotrienes in asthma and allergic rhinitis. Clin and Exp Allergy. 1996: 26:868-79.
13. Chung KF. Leukotriene receptor antagonists and biosynthesis inhibitors: potential breakthrough in asthma therapy. Eur Respir J. 1995; 8:1203-13. [PubMed 7589406]
14. Nathan RA, Glass M, Snader L. Effects of 13 weeks of treatment with ICI 204,219 (Accolate) or cromolyn sodium (Intal) in patients with mild to moderate asthma. J Allergy Clin Immunol. 1995; 95:388.
15. Lockey RF, Lavins BJ, Snader L. Effects of 13 weeks of treatment with ICI 204,219 (Accolate) in patients with mild to moderate asthma. J Allergy Clin Immunol. 1995; 95:350.
16. Spector SL, Smith LJ, Glass M and the Accolate Asthma Trialists Group. Effects of 6 weeks of therapy with oral doses of ICI 204,219, a leukotriene D4 receptor antagonist, in subjects with bronchial asthma. Am J Respir Crit Care Med. 1994; 150:618-23. [IDIS 336168] [PubMed 8087328]
17. Kemp JP, Glass M, Minkwitz MC. Onset of action of the leukotriene-receptor antagonist, zafirlukast (Accolate), in patients with asthma. J Allergy Clin Immunol. 1995; 95:351.
18. Lewis MA, Mong S, Vessella RL et al. Identification and characterization of leukotriene D4 receptors in adult and fetal human lung. Biochem Pharmacol. 1985; 34:4311-7. [PubMed 3000383]
19. Halushka PV, Mais DE, Mayeux PR et al. Thromboxane, prostaglandin and leukotriene receptors. Ann Rev Pharmacol Toxicol. 1989; 10:213-39.
20. Smith LJ. Leukotrienes in asthma: the potential therapeutic role of antileukotriene agents. Arch Intern Med. 1996; 156:2181-9. [IDIS 374494] [PubMed 8885816]
21. Suissa S, Dennis R, Ernst P et al. Effectiveness of the leukotriene receptor antagonist zafirlukast for mild-to-moderate asthma: a randomized, double-blind, placebo-controlled trial. Ann Intern Med. 1997; 126:177-83. [IDIS 380612] [PubMed 9027267]
22. Spector SL. Management of asthma with zafirlukast: clinical experience and tolerability profile. Drugs. 1996; 52(Suppl 6):36-46. [PubMed 8941502]
23. Baldinger SL, Shore ET. Focus on zafirlukast: a leukotriene receptor antagonist for the prophylaxis and chronic treatment of asthma. Formulary. 1996; 31:1029-30, 1038, 1043-4, 1051-2.
24. Larsen JS, Jackson SK. Antileukotriene therapy for asthma. Am J Health-Syst Pharm. 1996; 53:2821-30. [IDIS 377124] [PubMed 8957342]
25. Anon. Zafirlukast for asthma. Med Lett Drugs Ther. 1996; 38:111-2. [PubMed 8988153]
26. Drazen JM. Pharmacology of leukotriene receptor antagonists and 5-lipoxygenase inhibitors in the management of asthma. Pharmacotherapy. 1997; 17(Suppl):22-30S. [IDIS 380602] [PubMed 9017763]
27. Hui KP, Barnes NC. Lung function improvement in asthma with a cysteinyl-leukotriene receptor antagonist. Lancet. 1991; 337:1062-3. [IDIS 280510] [PubMed 1673495]
28. Holgate ST, Bradding P, Sampson AP. Leukotriene antagonists and synthesis inhibitors: new directions in asthma therapy. J Allergy Clin Immunol. 1996; 98:1-13. [IDIS 371811] [PubMed 8765812]
29. Arm JP, O’Hickey SP, Hawksworth RJ et al. Asthmatic airways have a disproportionate hyperresponsiveness to LTE4, as compared with normal airways, but not to LTC4, LTD4, methacholine, and histamine. Am Rev Respir Dis. 1990; 142:1112-8. [IDIS 273831] [PubMed 2173457]
30. Davidson AB, Lee TH, Scanlon PD et al. Bronchoconstrictor effects of leukotriene E4 in normal and asthmatic subjects. Am Rev Respir Dis. 1987; 135:333-7. [IDIS 226570] [PubMed 3028218]
31. Bisgaard H, Groth S, Madsen F. Bronchial hyperreactivity to leukotriene D4 and histamine in exogenous asthma. Br Med J. 1985; 290:1468-71.
32. Smith LJ, Greenberger PA, Patterson R et al. The effect of inhaled leukotriene D4 in humans. Am Rev Respir Dis. 1985; 131:368-72. [IDIS 197261] [PubMed 3883862]
33. Smith LJ, Glass M, Minkwitz MC. Inhibition of leukotriene D4-induced bronchoconstriction in subjects with asthma: a concentration-effect study of ICI 204,219. Clin Pharmacol Ther. 1993; 54:430-6. [IDIS 321789] [PubMed 8222486]
34. Holgate ST, Anderson KD, Rodgers EM. Comparison of “Accolate” (zafirlukast) with sodium cromoglycate in mild to moderate asthmatic patients. Allergy. 1995; 50:319-20.
35. Kumlin M, Dahlén B, Björck T et al. Urinary excretion of leukotriene E4 and 11-dehydro-thromboxane B2 in response to bronchial provocations with allergen, aspirin, leukotriene D4, and histamine in asthmatics. Am Rev Respir Dis. 1992; 146:96-103. [IDIS 299173] [PubMed 1320824]
36. Smith CM, Christie PE, Hawksworth RJ et al. Urinary leukotriene E4 levels after allergen and exercise challenge in bronchial asthma. Am Rev Respir Dis. 1991; 144:1411- 3. [PubMed 1660231]
37. Taylor GW, Black P, Turner N et al. Urinary leukotriene E4 after antigen challenge and in acute asthma and allergic rhinitis. Lancet. 1989; 1:584-8. [PubMed 2564113]
38. Picado C, Ramis I, Rosellò J et al. Release of peptide leukotriene into nasal secretions after local instillation of aspirin in aspirin-sensitive asthmatic patients. Am Rev Respir Dis. 1992; 145:65-9. [IDIS 289917] [PubMed 1309968]
39. Drazen JM, O’Brien J, Sparrow D et al. Recovery of leukotriene E4 from the urine of patients with airway obstruction. Am Rev Respir Dis. 1992; 146:104-8. [PubMed 1320817]
40. Zeneca Pharmaceuticals, Wilmington, DE: Personal communication.
41. Bateman ED, Holgate ST, Anderson KD et al. A multicenter study to assess the steroid-sparing potential of Accolate™ (zafirlukast; 20 mg bd). Allergy. 1995; 50:320.
42. Laitinen LA, Zetterstrom O, Holgate ST et al. Effects of Accolate™ (zafirlukast; 20 mg bd) in permitting reduced therapy with inhaled steroids: a multicenter trial in patients with doses of inhaled steroid optimized between 800 and 2000 mcg per day. Allergy. 1995; 50:320.
43. National Institutes of Health, National Heart, Lung, and Blood Institute. Global initiative for asthma: global strategy for asthma management and prevention. Bethesda, MD: National Institutes of Health. 2009 Dec. Available from: . Accessed 2010 Sep 23.
44. Zeneca Pharmaceuticals. Product information form for American hospital formulary service: Accolate (zafirlukast). Wilmington, DE; undated.
45. Zeneca Pharmaceuticals. Product monograph on Accolate (zafirlukast) tablets. Wilmington, DE; 1996 Oct.
46. Buckner CK, Fedyna JS, Robertson JL et al. An examination of the influence of the epithelium on contractile responses to peptidoleukotrienes and blockade by ICI 204,219 in isolated guinea pig trachea and human intralobar airways. J Pharmacol Exper Ther. 1990; 252:77-85.
47. Henderson WR. Eicosanoids and platelet-activating factor in allergic respiratory diseases. Am Rev Respir Dis. 1991; 143:S86-90.
48. Donnelly AL, Glass M, Minkwitz MC et al. The leukotriene D4-receptor antagonist, ICI 204,219, relieves symptoms of acute seasonal allergic rhinitis. Am J Respir Crit Care Med. 1995; 151:1734-9. [IDIS 349001] [PubMed 7767514]
49. Makker HK, Lau LC, Thomson HW et al. The protective effect of inhaled leukotriene D4 receptor antagonist ICI 204,219 against exercise-induced asthma. Am Rev Respir Dis. 1993; 147:1413-8. [IDIS 315795] [PubMed 8389103]
50. Finnerty JP, Wood-Baker R, Thomson H et al. Role of leukotrienes in exercise-induced asthma: inhibitory effect of ICI 204219, a potent D4 receptor antagonist. Am Rev Respir Dis. 1992; 145:746-9. [IDIS 303516] [PubMed 1554195]
51. O’Shaughnessy KM, Taylor IK, O’Connor B et al. Potent leukotriene D4 receptor antagonist ICI 204,219 given by the inhaled route inhibits the early but not the late phase of allergen-induced bronchoconstriction. Am Rev Respir Dis. 1993; 147:1431-5. [IDIS 315797] [PubMed 8389105]
52. Zeneca Pharmaceuticals, Wilmington, DE: Personal communication.
53. Reviewers’ comments (personal observations).
54. Taylor IK, O’shaughnessy KM, Fuller RW et al. Effect of cysteinyl-leukotriene receptor antagonist ICI 204,219 on allergen-induced bronchoconstriction and airway hyperreactivity in atopic subjects. Lancet. 1991; 337:690-4. [IDIS 279551] [PubMed 1672176]
55. Dahlen B, Zetterstrom O, Bjorck T et al. The leukotriene-antagonist ICI-204,219 inhibits the early airway reaction to cumulative bronchial challenge with allergen in atopic asthmatics. Eur Respir J. 1994; 7:324-31. [PubMed 8162986]
56. Ansell JE, Buttaro ML, Voltis Thomas O et al. Consensus guidelines for coordinated outpatient oral anticoagulation therapy management. Ann Pharmacother. 1997; 31:604-15. [IDIS 384308] [PubMed 9161658]
57. Josefson D. Asthma drug linked with Churg-Strauss syndrome. Br Med J. 1997; 315:330.
58. Wechsler ME, Garpestad E, Flier SR et al. Pulmonary infiltrates, eosinophilia, and cardiomyopathy following corticosteroid withdrawal in patients with asthma receiving zafirlukast. JAMA. 1998; 279:455-7. [IDIS 399474] [PubMed 9466639]
59. Katz RS, Papernik M. Zafirlukast and Churg-Strauss syndrome. JAMA. 1998; 279:1949. [IDIS 406332] [PubMed 9643848]
60. Honsinger RW. Zafirlukast and Churg-Strauss syndrome. JAMA. 1998; 279:1949. [IDIS 406333] [PubMed 9643849]
61. Churg J, Churg A. Zafirlukast and Churg-Strauss syndrome. JAMA. 1998; 279:1949-50. [IDIS 406334] [PubMed 9643850]
62. Wechsler ME, Drazen JM. Zafirlukast and Churg-Strauss syndrome. JAMA. 1998; 279:1950. [IDIS 406335] [PubMed 9643851]
63. Churg A, Churg J. Steroids and Churg-Strauss syndrome. Lancet. 1998; 352:32-4. [IDIS 409080] [PubMed 9800746]
64. Knoell DL, Lucas J, Allen JN. Churg-Strauss syndrome associated with zafirlukast. Chest. 1998; 114:332-4. [IDIS 407997] [PubMed 9674492]
65. Katial RK, Stelzle RC, Bonner MW et al. A drug interaction between zafirlukast and theophylline. Arch Intern Med. 1998; 158:1713-5. [IDIS 413901] [PubMed 9701106]
66. American College of Obstetricians and Gynecologists (ACOG).. Practice bulletin No. 90. Asthma in pregnancy. Obstet Gynecol. 2008; 111:457-64. [PubMed 18238988]
74. National Asthma Education and Prevention Program. Expert panel report III: guidelines for the diagnosis and management of asthma. 2007 Jul. Bethesda, MD: U.S. Department of Health and Human Services; National Institutes of Health; National Heart, Lung, and Blood Institute. Available from NIH website. Accessed Jul 27, 2008.
75. Food and Drug Administration, Center for Drug Evaluation and Research. Early communication about an ongoing safety review of montelukast (Singular). 2008 Mar 27. Available from FDA website. Accessed 2008 Oct 7.
76. British Thoracic Society/Scottish Intercollegiate Guidelines Network. Guidelines on the management of asthma: a national clinical guideline. London, Eng; British Thoracic Society. 2008 May. Available from BTS website. Accessed Dec 5, 2008.
80. Food and Drug Administration. Update of safety review. Follow-up to the March 27, 2008 communication about the ongoing safety review of montelukast (Singulair). 2009 Jan 13. Available from FDA website. Accessed 2009 Oct 13.
81. Food and Drug Administration. Updated information on leukotriene inhibitors: montelukast (marketed as Singulair), zafirlukast (marketed as Accolate), and zileuton (marketed as Zyflo and Zyflo CR). 2009 Aug 28. Available from FDA website. Accessed 2009 Oct 13.
a. AstraZeneca Pharmaceuticals. Accolate (zafirlukast) tablets prescribing information. Wilmington, DE; 2004 July.
b. AHFS drug information 2006. McEvoy GK, ed. Montelukast. Bethesda, MD: American Society of Health-System Pharmacists; 2006:2698-704.
More Accolate resources
- Accolate Prescribing Information (FDA)
- Accolate MedFacts Consumer Leaflet (Wolters Kluwer)
- Accolate Concise Consumer Information (Cerner Multum)
- Accolate Advanced Consumer (Micromedex) - Includes Dosage Information
- Zafirlukast Prescribing Information (FDA)
- Zafirlukast Professional Patient Advice (Wolters Kluwer) | <urn:uuid:c3da469a-a57c-453b-b00b-a53c5466f92c> | 2013-05-18T07:15:08Z | CC-MAIN-2013-20 | [
[
0.00004100799560546875,
0.0242919921875,
-0.0022430419921875,
-0.0230712890625,
0.1103515625,
-0.10009765625,
-0.00933837890625,
0.10107421875,
-0.033935546875,
-0.0147705078125,
0.08349609375,
0.040771484375,
-0.09228515625,
0.05224609375,
0.06884765625... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.755342 | 7,095 | http://www.drugs.com/monograph/accolate.html | 0.685517 |
How to Check Your Dog’s Pulse
6 of 7 in Series: The Essentials of Dog Care for a Healthy Pet
To check your dog’s pulse, you need to locate the femoral artery, which lies just below the skin on the inside of the back legs, between two large muscles where the leg joins the body.
With your dog standing, reach around in front of the rear leg where it joins his body, and slide your fingers into the groin area. You can feel the femoral artery pumping each time the heart beats.
When you have found the artery with your dog standing, try it with your dog lying on his side. Count how many pulses you feel in 15 seconds and multiply by 4 to get the number of beats per minute. Dogs normally have a pulse between 70 and 120 beats per minute. In puppies, the pulse ranges from 120 to 160 beats per minute.
Become familiar with your dog’s pulse rate and how his pulse feels when he is relaxed as well as after exercise.
If you have reason to believe your dog is suffering from an emergency, a dramatic change in pulse (such as, a slowed pulse indicating shock) can be one sign and symptom. | <urn:uuid:c5b7ff1c-c303-4447-bd3a-5dc50802f12c> | 2013-05-18T07:16:12Z | CC-MAIN-2013-20 | [
[
0.000983537989668548,
0.02779017947614193,
0.009765625,
0.00513392873108387,
0.10357142984867096,
-0.07633928209543228,
-0.0067801340483129025,
0.06205357238650322,
-0.01099330373108387,
-0.04754464328289032,
0.10401785373687744,
0.03325892984867096,
0.018303571... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953371 | 248 | http://www.dummies.com/how-to/content/how-to-check-your-dogs-pulse.seriesId-111403.html | 0.359147 |
Two years ago, Ireland almost had to declare bankruptcy. Having implemented strict austerity measures and reforms, it now looks set to rebound - as a role model for others?
Three years ago, Ireland sought refuge under the EU's financial rescue scheme. There, it was granted 85 billion euros ($112 billion) by the euro group and the International Monetary Fund (IMF). Under the deal, the Irish government was obliged to take over all liabilities of the country's banks to avert an economic collapse. At that time, the banking sector had accumulated masses of bad property loans, together with huge speculation losses. The 2010 budget deficit reached a staggering 32 percent of GDP.
"A lost decade"
Since that time, there has been a change of government, and five austerity packages have been passed. During the process, domestic demand for goods and services collapsed and unemployment rose to 15 percent. Thousands of people emigrated, seeking their luck in Australia, the US or the UK. These days Ireland's Taoiseach (prime minister) Enda Kenny, of the center-right Fine Gael party, is rigorously implementing the austerity measures and reforms agreed on with the EU and IMF.
"We never said it would be easy. We never said it would happen overnight," Kenny said at a recent EU summit with regard to the results of the past two years. "We are in a very difficult situation. I want to stress that in the face of all these difficulties, whole parts of the Irish society are experiencing that we have to make tough decisions - in the interest of the people and the country. We try to do this as fair as possible."
By now the Irish restructuring program is showing signs of success, according to Philip Lane, head of the faculty of economics at Trinity College in Dublin. Over the past months, the Irish economy has registered ever-so-slight growth, he said, a trend that should continue in 2013.
"To reach the GDP levels from before the crisis, I believe it's going to take us another five years. The 2009 recession was a very deep one," Lane told DW. "We're still a far cry from where we used to be. What we need is continuous economic growth until 2017. So, in a way, we can speak of a lost decade here."
The tiger is ready to come roaring back
The "Celtic tiger" - that's what Ireland was called during its economic boom 12 years ago. Once one of the poorest EU member states, it had fought its way up to having one of the Union's highest per-capita GDPs. But the property and financial crisis that followed turned the roaring tiger into a tiger rug. Now Kenny believes these days are over: "Investment into Ireland is very strong again."
"I would like to remind you that prior to the change of government three years ago, we had lost 250,000 jobs. During the past year, 20,000 new jobs have been created," Kenny recently said in front of reporters. "There are signs of improvement: Banks can once again take on loans without the help of the government, and some government agencies can issue their own bonds again. These are signs of confidence." But not all is rosy: The 2012 budget deficit still reached 8.5 percent of GDP; and for 2013, the Irish national debt is estimated to peak at 121 percent of GDP.
Export business is the key
Irish banks in particular are still in the process of adapting: many employees were let go, and the state had intervened by buying the banks' bad credits and placing them in a "bad bank" financed by European aid money. So while the - still - nationalized banks and the construction sector are still weak, other areas are improving continuously, especially the service and technology sectors.
"There is a very functional export industry," said Holger Erdmann of the German-Irish chamber of commerce in Dublin. "Due to the small domestic market in Ireland, almost all manufacturers are exporting, too - so businesses and employees that are active in this field are doing rather well."
Lane believes that Irish policy makers have managed rather well to distribute austerity measures evenly. Besides, he said, income levels in Ireland had been rather high anyways, compared to the European average. "Most of the cuts had affected those with higher salaries, while those on the lower end remained somewhat protected - something that maybe didn't go so well in Greece or in Spain," Lane told DW.
Erdmann agrees that there has been neither impoverishment of large segments of the population nor a large number of protests. "On weekends, actually starting from Thursday, it's hard to even set a foot into bars or restaurants here in Dublin. Sometimes one really wonders: where is this economic crisis," he said in an interview with DW. But "of course there are groups in society that are marked by unemployment. Some households had purchased property at the peak of the housing boom and later lost 50 percent of its value. They are now unable to pay their mortgages."
Quarrel over old debts
The Irish leader is set to use the Irish EU presidency during the first half of 2013 to extend his strict measures for economic consolidation to other crisis-stricken countries, such as Spain, Cyprus and Greece.
He also intends to push ahead with a European banking union, something that would serve Ireland interests: The eurozone's permanent rescue fund (ESM) should take over old accumulated debts from Irish banks and thereby relieve the Irish budget, Kenny said. But the course of action regarding such "legacy assets" is highly disputed among the eurozone's finance ministers.
Sources within the German government suggest Finance Minister Wolfgang Schäuble strongly favors a solution in which each country has to manage its own legacy assets. Ireland meanwhile is threatening to withhold interest payments to the rescue fund until a common solution for dealing with these assets has been found.
Kenny's official stance is one that suggests optimism: By the end of 2013 Ireland wants to return to the international market, once again issuing government bonds without the help of any rescue fund.
Whether this will work depends heavily on the global economy, Lane said, as Ireland is tied to the success of its export business. German companies in the area of thermal insulation, biofuels and nanotechnology are once again interested in doing business with Ireland, Erdman said.
But what really matters, he said, are Irish business ties across the Atlantic: "Almost half of all foreign investments are coming from the US. Over the past years, Americans have invested more in Ireland than in all the BRIC states - Brazil, Russia, India and China - combined," Erdmann said. This shows how important the US is for Ireland, he said, "Americans simply like to use Ireland as a stepping stone into Europe, not least because Ireland is the only English-speaking country in the eurozone."
Germany's parliament has begun lengthy debate on draft legislation to find the safest possible underground site to stash waste from nuclear power stations for eons. Legislative details have already sparked ructions.
Western democracies, like the US, are seen as safe havens for press freedom. Yet, the ongoing AP scandal suggests that surveillance of journalists is no taboo. What is the situation in Germany?
Glitzy and kitsch acts ranging from euro-pop, to a song inspired by the Greek debt crisis and a gay marriage anthem featuring a lesbian kiss are set to tussle it out for Saturday's Eurovision Song Contest crown. | <urn:uuid:4e61fcc1-7d23-412d-8b45-0f6690bf0833> | 2013-05-18T06:26:29Z | CC-MAIN-2013-20 | [
[
-0.0002079010009765625,
0.0296630859375,
-0.01434326171875,
0.0257568359375,
0.09423828125,
-0.07568359375,
-0.0242919921875,
0.11376953125,
-0.0211181640625,
-0.0654296875,
0.06396484375,
0.00885009765625,
-0.033203125,
-0.007293701171875,
0.04272460937... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9721 | 1,520 | http://www.dw.de/comeback-for-the-celtic-tiger/a-16475825 | 0.19013 |
Focus on Economic Data: Consumer Price Index and Inflation, October 19, 2011
Glossary terms from:
One of many choices or courses of action that might be taken in a given situation.
Any activity or organization that produces or exchanges goods or services for a profit.
Consumer Price Index (CPI)
A price index that measures the cost of a fixed basket of consumer goods and services and compares the cost of this basket in one time period with its cost in some base period. Changes in the CPI are used to measure inflation.
People who use goods and services to satisfy their personal needs and not for resale or in the production of other goods and services.
Spending by households on goods and services. The process of buying and using goods and services.
A sustained decrease in the average price level of all the goods and services produced in the economy.
A severe, prolonged economic contraction.
The central bank of the United States. Its main function is controlling the money supply through monetary policy. The Federal Reserve System divides the country into 12 districts, each with its own Federal Reserve bank. Each district bank is directed by its nine-person board of directors. The Board of Governors, which is made up of seven members appointed by the President and confirmed by the Senate to 14-year terms, directs the nation's monetary policy and the overall activities of the Federal Reserve. The Federal Open Market Committee is the official policy-making body; it is made up of the members of the Board of Governors and five of the district bank presidents.
Something a person or organization plans to achieve in the future; an aim or desired result.
Tangible objects that satisfy economic wants.
Spending by all levels of government on goods and services; includes categories like military, schools and roads.
Individuals and family units that buy goods and services (as consumers) and sell or rent productive resources (as resource owners).
Payments earned by households for selling or renting their productive resources. May include salaries, wages, interest and dividends.
A rise in the general or average price level of all the goods and services produced in an economy. Can be caused by pressure from the demand side of the market (demand-pull inflation) or pressure from the supply side of the market (cost-push inflation).
Money paid regularly, at a particular rate, for the use of borrowed money.
The quantity and quality of human effort available to produce goods and services.
The amount of money that people pay when they buy a good or service; the amount they receive when they sell a good or service.
The weighted average of the prices of all goods and services in an economy; used to calculate inflation.
People and firms that use resources to make goods and services.
A good or service that can be used to satisfy a want.
A process of manufacturing, growing, designing, or otherwise using productive resources to create goods or services used to to satisfy a want.
Goods, often supplied by the government, for which use by one person does not reduce the quantity of the good available for others to use, and for which consumption cannot be limited to those who pay for the good.
The amount of goods and services that a monetary unit of income can buy.
A decline in the rate of national economic activity, usually measured by a decline in real GDP for at least two consecutive quarters (i.e., six months).
Money set aside for a future use that is held in easily-accessed accounts, such as savings accounts and certificates of deposit (CDs).
Activities performed by people, firms or government agencies to satisfy economic wants.
Use money now to buy goods and services.
Standard of Living
The level of subsistence of a nation, social class or individual with reference to the adequacy of necessities and comforts of daily life.
Compulsory payments to governments by households and businesses.
An abstract measure of the satisfaction consumers derive from consuming goods and services.
Payments for labor services that are directly tied to time worked, or to the number of units of output produced.
People employed to do work, producing goods and services. | <urn:uuid:793a70c3-d2e7-44e1-88a7-34319f254cb8> | 2013-05-18T05:01:50Z | CC-MAIN-2013-20 | [
[
-0.00701904296875,
0.043701171875,
-0.0255126953125,
0.00933837890625,
0.08203125,
-0.044677734375,
-0.01177978515625,
0.11962890625,
-0.032958984375,
-0.033935546875,
0.138671875,
0.00653076171875,
-0.021240234375,
0.000885009765625,
0.05322265625,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945948 | 849 | http://www.econedlink.org/lessons/EconEdLink-print-glossary.php?lid=1051 | 0.503207 |
Cyclopædia of Political Science, Political Economy, and the Political History of the United States
SUMNER, Charles, was born at Boston, Mass., Jan. 6, 1811, and died at Washington, D. C., March 11, 1874. He was graduated at Harvard in 1830, studied law with Story, whose decisions he afterward reported, was admitted to the bar in 1834, and was for the next three years to lecturer in the Harvard law school. In 1837-40 he was absent in Europe and on his return resumed practice. He had always been an anti-slavery whig, but in 1848 became a free soiler; and a coalition of democrats and free-soilers, in 1851, sent him to the United States senate, where he remained until his death. (See
—From this time he was an outspoken antagonist of the administration, his finest speeches being made in February, 1872, on the government's sale of arms during the Franco-German war, and in May, 1872, or the president's abuse of the appointing power. In December, 1874, he introduced a resolution to remove from the army register and flags the names of battles with fellow-citizens. For this his state legislature censured him by resolution, but the resolution was rescinded before his death. (See
—See Lester's Life of Sumner; Harsha's Life of Sumner; Pierce's Memorial and Letters of Sumner; and Sumner's Orations and Speeches(1850), Speeches and Addresses(1856), and complete Works(1875), the first four volumes including the years 1845-60, and the last eight the years 1860-68; The most celebrated of his anti-slavery speeches are, "The Crime against Kansas" (4:127), and "The Barbarism of Slavery," (5:1).
Return to top | <urn:uuid:35cead07-8e29-4368-9cef-65a367429b29> | 2013-05-18T08:01:37Z | CC-MAIN-2013-20 | [
[
-0.004804871045053005,
0.0159184280782938,
-0.024501172825694084,
-0.008252641186118126,
0.0845070406794548,
-0.06602112948894501,
-0.0021273475140333176,
0.09389671683311462,
-0.04019952937960625,
-0.06455399096012115,
0.09448356926441193,
0.018705986440181732,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979181 | 400 | http://www.econlib.org/library/YPDBooks/Lalor/llCy1002.html | 0.813942 |
China’s military rise
The dragon’s new teeth
A rare look inside the world’s biggest military expansion
AT A meeting of South-East Asian nations in 2010, China's foreign minister Yang Jiechi, facing a barrage of complaints about his country's behaviour in the region, blurted out the sort of thing polite leaders usually prefer to leave unsaid. “China is a big country,” he pointed out, “and other countries are small countries and that is just a fact.” Indeed it is, and China is big not merely in terms of territory and population, but also military might. Its Communist Party is presiding over the world's largest military build-up. And that is just a fact, too—one which the rest of the world is having to come to terms with.
That China is rapidly modernising its armed forces is not in doubt, though there is disagreement about what the true spending figure is. China's defence budget has almost certainly experienced double digit growth for two decades. According to SIPRI, a research institute, annual defence spending rose from over $30 billion in 2000 to almost $120 billion in 2010. SIPRI usually adds about 50% to the official figure that China gives for its defence spending, because even basic military items such as research and development are kept off budget. Including those items would imply total military spending in 2012, based on the latest announcement from Beijing, will be around $160 billion. America still spends four-and-a-half times as much on defence, but on present trends China's defence spending could overtake America's after 2035 (see chart).
All that money is changing what the People's Liberation Army (PLA) can do. Twenty years ago, China's military might lay primarily in the enormous numbers of people under arms; their main task was to fight an enemy face-to-face or occupy territory. The PLA is still the largest army in the world, with an active force of 2.3m. But China's real military strength increasingly lies elsewhere. The Pentagon's planners think China is intent on acquiring what is called in the jargon A2/AD, or “anti-access/area denial” capabilities. The idea is to use pinpoint ground attack and anti-ship missiles, a growing fleet of modern submarines and cyber and anti-satellite weapons to destroy or disable another nation's military assets from afar.
In the western Pacific, that would mean targeting or putting in jeopardy America's aircraft-carrier groups and its air-force bases in Okinawa, South Korea and even Guam. The aim would be to render American power projection in Asia riskier and more costly, so that America's allies would no longer be able to rely on it to deter aggression or to combat subtler forms of coercion. It would also enable China to carry out its repeated threat to take over Taiwan if the island were ever to declare formal independence.
China's military build-up is ringing alarm bells in Asia and has already caused a pivot in America's defence policy. The new “strategic guidance” issued in January by Barack Obama and his defence secretary, Leon Panetta, confirmed what everyone in Washington already knew: that a switch in priorities towards Asia was overdue and under way. The document says that “While the US military will continue to contribute to security globally, we will of necessity rebalance towards the Asia-Pacific region.” America is planning roughly $500 billion of cuts in planned defence spending over the next ten years. But, says the document, “to credibly deter potential adversaries and to prevent them from achieving their objectives, the United States must maintain its ability to project power in areas in which our access and freedom to operate are challenged.”
It is pretty obvious what that means. Distracted by campaigns in Iraq and Afghanistan, America has neglected the most economically dynamic region of the world. In particular, it has responded inadequately to China's growing military power and political assertiveness. According to senior American diplomats, China has the ambition—and increasingly the power—to become a regional hegemon; it is engaged in a determined effort to lock America out of a region that has been declared a vital security interest by every administration since Teddy Roosevelt's; and it is pulling countries in South-East Asia into its orbit of influence “by default”. America has to respond. As an early sign of that response, Mr Obama announced in November 2011 that 2,500 US Marines would soon be stationed in Australia. Talks about an increased American military presence in the Philippines began in February this year.
The uncertainty principle
China worries the rest of the world not only because of the scale of its military build-up, but also because of the lack of information about how it might use its new forces and even who is really in charge of them. The American strategic-guidance document spells out the concern. “The growth of China's military power”, it says, “must be accompanied by greater clarity of its strategic intentions in order to avoid causing friction in the region.”
Officially, China is committed to what it called, in the words of an old slogan, a “peaceful rise”. Its foreign-policy experts stress their commitment to a rules-based multipolar world. They shake their heads in disbelief at suggestions that China sees itself as a “near peer” military competitor with America.
In the South and East China Seas, though, things look different. In the past 18 months, there have been clashes between Chinese vessels and ships from Japan, Vietnam, South Korea and the Philippines over territorial rights in the resource-rich waters. A pugnacious editorial in the state-run Global Times last October gave warning: “If these countries don't want to change their ways with China, they will need to prepare for the sounds of cannons. We need to be ready for that, as it may be the only way for the disputes in the sea to be resolved.” This was not a government pronouncement, but it seems the censors permit plenty of press freedom when it comes to blowing off nationalistic steam.
Smooth-talking foreign-ministry officials may cringe with embarrassment at Global Times—China's equivalent of Fox News—but its views are not so far removed from the gung-ho leadership of the rapidly expanding navy. Moreover, in a statement of doctrine published in 2005, the PLA's Science of Military Strategy did not mince its words. Although “active defence is the essential feature of China's military strategy,” it said, if “an enemy offends our national interests it means that the enemy has already fired the first shot,” in which case the PLA's mission is “to do all we can to dominate the enemy by striking first”.
Making things more alarming is a lack of transparency over who really controls the guns and ships. China is unique among great powers in that the PLA is not formally part of the state. It is responsible to the Communist Party, and is run by the party's Central Military Commission, not the ministry of defence. Although party and government are obviously very close in China, the party is even more opaque, which complicates outsiders' understanding of where the PLA's loyalties and priorities lie. A better military-to-military relationship between America and China would cast some light into this dark corner. But the PLA often suspends “mil-mil” relations as a “punishment” whenever tension rises with America over Taiwan. The PLA is also paranoid about what America might gain if the relationship between the two countries' armed forces went deeper.
The upshot of these various uncertainties is that even if outsiders believe that China's intentions are largely benign—and it is clear that some of them do not—they can hardly make plans based on that assumption alone. As the influential American think-tank, the Centre for Strategic and Budgetary Assessments (CSBA) points out, the intentions of an authoritarian regime can change very quickly. The nature and size of the capabilities that China has built up also count.
The build-up has gone in fits and starts. It began in the early 1950s when the Soviet Union was China's most important ally and arms supplier, but abruptly ceased when Mao Zedong launched his decade-long Cultural Revolution in the mid-1960s. The two countries came close to war over their disputed border and China carried out its first nuclear test. The second phase of modernisation began in the 1980s, under Deng Xiaoping. Deng was seeking to reform the whole country and the army was no exception. But he told the PLA that his priority was the economy; the generals must be patient and live within a budget of less than 1.5% of GDP.
A third phase began in the early 1990s. Shaken by the destructive impact of the West's high-tech weaponry on the Iraqi army, the PLA realised that its huge ground forces were militarily obsolete. PLA scholars at the Academy of Military Science in Beijing began learning all they could from American think-tanks about the so-called “revolution in military affairs” (RMA), a change in strategy and weaponry made possible by exponentially greater computer-processing power. In a meeting with The Economist at the Academy, General Chen Zhou, the main author of the four most recent defence white papers, said: “We studied RMA exhaustively. Our great hero was Andy Marshall in the Pentagon [the powerful head of the Office of Net Assessment who was known as the Pentagon's futurist-in-chief]. We translated every word he wrote.”
In 1993 the general-secretary of the Communist Party, Jiang Zemin, put RMA at the heart of China's military strategy. Now, the PLA had to turn itself into a force capable of winning what the strategy called “local wars under high-tech conditions”. Campaigns would be short, decisive and limited in geographic scope and political goals. The big investments would henceforth go to the air force, the navy and the Second Artillery Force, which operates China's nuclear and conventionally armed missiles.
Further shifts came in 2002 and 2004. High-tech weapons on their own were not enough; what mattered was the ability to knit everything together on the battlefield through what the Chinese called “informatisation” and what is known in the West as “unified C4ISR”. (The four Cs are command, control, communications, and computers; ISR stands for intelligence, surveillance and reconnaissance; the Pentagon loves its abbreviations).
General Chen describes the period up to 2010 as “laying the foundations of modernised forces”. The next decade should see the roll-out of what is called mechanisation (the deployment of advanced military platforms) and informatisation (bringing them together as a network). The two processes should be completed in terms of equipment, integration and training by 2020. But General Chen reckons China will not achieve full informatisation until well after that. “A major difficulty”, he says, “is that we are still only partially mechanised. We do not always know how to make our investments when technology is both overlapping and leapfrogging.” Whereas the West was able to accomplish its military transformation by taking the two processes in sequence, China is trying to do both together. Still, that has not slowed down big investments which are designed to defeat even technologically advanced foes by making “the best use of our strong points to attack the enemy's weak points”. In 2010 the CSBA identified the essential military components that China, on current trends, will be able to deploy within ten years. Among them: satellites and reconnaissance drones; thousands of surface-to-surface and anti-ship missiles; more than 60 stealthy conventional submarines and at least six nuclear attack submarines; stealthy manned and unmanned combat aircraft; and space and cyber warfare capabilities. In addition, the navy has to decide whether to make the (extremely expensive) transition to a force dominated by aircraft-carriers, like America. Aircraft-carriers would be an unmistakable declaration of an ambition eventually to project power far from home. Deploying them would also match the expected actions of Japan and India in the near future. China may well have three small carriers within five to ten years, though military analysts think it would take much longer for the Chinese to learn how to use them well.
A new gunboat diplomacy
This promises to be a formidable array of assets. They are, for the most part, “asymmetric”, that is, designed not to match American military power in the western Pacific directly but rather to exploit its vulnerabilities. So, how might they be used?
Taiwan is the main spur for China's military modernisation. In 1996 America reacted to Chinese ballistic-missile tests carried out near Taiwanese ports by sending two aircraft-carrier groups into the Taiwan Strait. Since 2002 China's strategy has been largely built around the possibility of a cross-Strait armed conflict in which China's forces would not only have to overcome opposition from Taiwan but also to deter, delay or defeat an American attempt to intervene. According to recent reports by CSBA and RAND, another American think-tank, China is well on its way to having the means, by 2020, to deter American aircraft-carriers and aircraft from operating within what is known as the “first island chain”—a perimeter running from the Aleutians in the north to Taiwan, the Philippines and Borneo (see map).
In 2005 China passed the Taiwan Anti-Secession Law, which commits it to a military response should Taiwan ever declare independence or even if the government in Beijing thinks all possibility of peaceful unification has been lost. Jia Xiudong of the China Institute of International Studies (the foreign ministry's main think-tank) says: “The first priority is Taiwan. The mainland is patient, but independence is not the future for Taiwan. China's military forces should be ready to repel any force of intervention. The US likes to maintain what it calls ‘strategic ambiguity' over what it would do in the event of a conflict arising from secession. We don't have any ambiguity. We will use whatever means we have to prevent it happening.”
If Taiwan policy has been the immediate focus of China's military planning, the sheer breadth of capabilities the country is acquiring gives it other options—and temptations. In 2004 Hu Jintao, China's president, said the PLA should be able to undertake “new historic missions”. Some of these involve UN peacekeeping. In recent years China has been the biggest contributor of peacekeeping troops among the permanent five members of the Security Council. But the responsibility for most of these new missions has fallen on the navy. In addition to its primary job of denying China's enemies access to sea lanes, it is increasingly being asked to project power in the neighbourhood and farther afield.
The navy appears to see itself as the guardian of China's ever-expanding economic interests. These range from supporting the country's sovereignty claims (for example, its insistence on seeing most of the South China Sea as an exclusive economic zone) to protecting the huge weight of Chinese shipping, preserving the country's access to energy and raw materials supplies, and safeguarding the soaring numbers of Chinese citizens who work abroad (about 5m today, but expected to rise to 100m by 2020). The navy's growing fleet of powerful destroyers, stealthy frigates and guided-missile-carrying catamarans enables it to carry out extended “green water” operations (ie, regional, not just coastal tasks). It is also developing longer-range “blue water” capabilities. In early 2009 the navy began anti-piracy patrols off the Gulf of Aden with three ships. Last year, one of those vessels was sent to the Mediterranean to assist in evacuating 35,000 Chinese workers from Libya—an impressive logistical exercise carried out with the Chinese air force.
Power grows out of the barrel of a gun
It is hardly surprising that China's neighbours and the West in general should worry about these developments. The range of forces marshalled against Taiwan plus China's “A2/AD” potential to push the forces of other countries over the horizon have already eroded the confidence of America's Asian allies that the guarantor of their security will always be there for them. Mr Obama's rebalancing towards Asia may go some way towards easing those doubts. America's allies are also going to have to do more for themselves, including developing their own A2/AD capabilities. But the longer-term trends in defence spending are in China's favour. China can focus entirely on Asia, whereas America will continue to have global responsibilities. Asian concerns about the dragon will not disappear.
That said, the threat from China should not be exaggerated. There are three limiting factors. First, unlike the former Soviet Union, China has a vital national interest in the stability of the global economic system. Its military leaders constantly stress that the development of what is still only a middle-income country with a lot of very poor people takes precedence over military ambition. The increase in military spending reflects the growth of the economy, rather than an expanding share of national income. For many years China has spent the same proportion of GDP on defence (a bit over 2%, whereas America spends about 4.7%). The real test of China's willingness to keep military spending constant will come when China's headlong economic growth starts to slow further. But on past form, China's leaders will continue to worry more about internal threats to their control than external ones. Last year spending on internal security outstripped military spending for the first time. With a rapidly ageing population, it is also a good bet that meeting the demand for better health care will become a higher priority than maintaining military spending. Like all the other great powers, China faces a choice of guns or walking sticks.
Second, as some pragmatic American policymakers concede, it is not a matter for surprise or shock that a country of China's importance and history should have a sense of its place in the world and want armed forces which reflect that. Indeed, the West is occasionally contradictory about Chinese power, both fretting about it and asking China to accept greater responsibility for global order. As General Yao Yunzhu of the Academy of Military Science says: “We are criticised if we do more and criticised if we do less. The West should decide what it wants. The international military order is US-led—NATO and Asian bilateral alliances—there is nothing like the WTO for China to get into.”
Third, the PLA may not be quite as formidable as it seems on paper. China's military technology has suffered from the Western arms embargo imposed after the Tiananmen Square protests of 1989. It struggles to produce high-performance jet engines, for example. Western defence firms believe that is why they are often on the receiving end of cyber-attacks that appear to come from China. China's defence industry may be improving but it remains scattered, inefficient and over-dependent on high-tech imports from Russia, which is happy to sell the same stuff to China's local rivals, India and Vietnam. The PLA also has little recent combat experience. The last time it fought a real enemy was in the war against Vietnam in 1979, when it got a bloody nose. In contrast, a decade of conflict has honed American forces to a new pitch of professionalism. There must be some doubt that the PLA could put into practice the complex joint operations it is being increasingly called upon to perform.
General Yao says the gap between American and Chinese forces is “at least 30, maybe 50, years”. “China”, she says, “has no need to be a military peer of the US. But perhaps by the time we do become a peer competitor the leadership of both countries will have the wisdom to deal with the problem.” The global security of the next few decades will depend on her hope being realised.
Correction: The following definitions have been changed in the main table of this article: "Main battle tanks" to "Modern main battle tanks”; "Armoured infantry vehicles" to “Armoured infantry fighting vehicles”; "Intercontinental ballistic missiles" to "Intercontinental ballistic missile launchers"; “Transport helicopters” to "Heavy/medium transport helicopters"; “Transport aircraft” to "Heavy/medium transport aircraft"; “Tanker and multi-role aircraft” to “Tanker aircraft”. Additionally, the data are from 2011 not 2010 as originally reported. These changes were made on 6th April 2012. | <urn:uuid:4cae7b8f-528d-46c2-b2f0-b35a045f5fdd> | 2013-05-18T05:25:47Z | CC-MAIN-2013-20 | [
[
-0.0230712890625,
0.054931640625,
0.00182342529296875,
0.048583984375,
0.095703125,
-0.03271484375,
-0.0169677734375,
0.1357421875,
-0.0291748046875,
-0.04296875,
0.09033203125,
0.0120849609375,
-0.0615234375,
0.00982666015625,
0.052978515625,
0.0047... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965037 | 4,280 | http://www.economist.com/node/21552193 | 0.173029 |
Nutrition has a big impact on health, including major diseases such as heart disease, osteoporosis, and cancer. Our work is designed to help people keep track of the nutrional content of foods they have eaten. Our work uses shopping receipts to generate suggestions about healthier food items that could help to supplement missing nutrients. Our application, based on shopping receipt data, provides access to ambiguous suggestions for more nutritious purchases.
Our goal is to contribute a better understanding of how a sensor-based application can be integrated in everyday life. To do this, we chose an approach that can easily be replicated for many users, deployed, and tested for months at a time. We are currently in the process of conducting a diary study that can provide data on which we can train our prediction algorithms. We conducted a formative user study that suggested that receipts may provide enough information to extend our work by also estimating what people are actually eating, as opposed to simply what they are purchasing. We are also interviewing and observing people's shopping and food managing habits to further inform the system design. | <urn:uuid:0cbebbe3-f6c6-48cc-9401-6782625b11a6> | 2013-05-18T07:21:00Z | CC-MAIN-2013-20 | [
[
-0.0384424589574337,
-0.005301339086145163,
0.02219741977751255,
0.0108506940305233,
0.058283731341362,
-0.02988591231405735,
-0.0015035961987450719,
0.0942460298538208,
-0.0007595486240461469,
0.0155629962682724,
0.0605158731341362,
0.0429067462682724,
-0.06076... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974744 | 216 | http://www.eecs.berkeley.edu/IPRO/Summary/Old.summaries/03abstracts/jmankoff.2.html | 0.377631 |
|27.10.2009, 15:30||◄ last page|
Spanish national player, Begoña Fernandez, believes that Itxako were equal to Oltchim.
Itxako ready for top level
Itxako started their Champions League season with a good performance. However, it was not enough to beat Oltchim at home, but they played a very close game. The team from Estella were exposed to a very high level. They feel that it is possible to catch up with the opponents. Spanish national player, Begoña Fernandez, was optimistic after the first round.
Eurohandball.com: How do you feel after the first game in the Champions League?
Begoña Fernandez: I’m sad because we lost the game. However, we have shown that we are at a very high level and we can face any rival in the competition. We have a very good team and last season we have beaten Brasov, a very similar team to Oltchim. Then we played in a better form and now it is still the beginning of the season. It was hard for us.
Eurohandball.com: Do you think your performance can still be better?
Begoña Fernandez: Of course and we have to keep on working to improve. We have to fight for our objectives and try to do better every day.
Eurohandball.com: Do you think Oltchim took advantage of your mistakes?
Begoña Fernandez: I think it was key to the game. We spoke about it at halftime. We had our chances to win the match, but they have more experience in this competition and it is very important at the decisive moments. We probably felt the pressure in the last minutes.
Eurohandball.com: Two great pivots were facing each other, Stanca and you. What do you think about her?
Begoña Fernandez: She is a great player, in my opinion one of the best pivots of Europe. Comparing me to Stanca is not important now. I’m very sad for the defeat because we could even have won the game and the result was not just. Oltchim are great team, but we made many mistakes ourselves.
TEXT: Fernando Urra Goni | <urn:uuid:afae5fa4-a103-4287-bedf-fba4b6db0274> | 2013-05-18T05:22:47Z | CC-MAIN-2013-20 | [
[
0.02674788050353527,
-0.015360169112682343,
-0.006852489430457354,
-0.01681673713028431,
0.10858050733804703,
-0.0643538162112236,
-0.008077330887317657,
0.06117584928870201,
0.01893538050353527,
-0.055349577218294144,
0.06567796319723129,
0.015161546878516674,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98215 | 474 | http://www.ehfcl.com/women/2009-10/article/12687/Itxako+ready+for+top+level | 0.195407 |
U.S. Energy Information Administration - EIA - Independent Statistics and Analysis
Today in Energy
The Strait of Hormuz (shown in the oval on the map), which is located between Oman and Iran, connects the Persian Gulf with the Gulf of Oman and the Arabian Sea. Hormuz is the world's most important oil chokepoint due to its daily oil flow of almost 17 million barrels per day (bbl/d) in 2011, up from between 15.5-16.0 million bbl/d in 2009-2010. Flows through the Strait in 2011 were roughly 35% of all seaborne traded oil, or almost 20% of oil traded worldwide.
On average, 14 crude oil tankers per day passed through the Strait in 2011, with a corresponding amount of empty tankers entering to pick up new cargos. More than 85% of these crude oil exports went to Asian markets, with Japan, India, South Korea, and China representing the largest destinations.
At its narrowest point, the Strait is 21 miles wide, but the width of the shipping lane in either direction is only two miles, separated by a two-mile buffer zone. The Strait is deep and wide enough to handle the world's largest crude oil tankers, with about two-thirds of oil shipments carried by tankers in excess of 150,000 deadweight tons.
Several alternatives are potentially available to move oil from the Persian Gulf region without transiting Hormuz, but they are limited in capacity, in many cases are not currently operating or operable, and generally engender higher transport costs and logistical challenges.
- Alternate routes include the 745-mile Petroline, also known as the East-West Pipeline, across Saudi Arabia from Abqaiq to the Red Sea. The East-West Pipeline has a nameplate capacity of about 5 million bbl/d, with current movements estimated at about 2 million bbl/d.
- The Abqaiq-Yanbu natural gas liquids pipeline, which runs parallel to the Petroline to the Red Sea, has a 290,000-bbl/d capacity.
- Additional oil could also be pumped north via the Iraq-Turkey pipeline to the port of Ceyhan on the Mediterranean Sea, but volumes have been limited by the closure of the Strategic Pipeline linking north and south Iraq.
- The United Arab Emirates is also completing the 1.5 million bbl/d Abu Dhabi Crude Oil Pipeline that will cross the emirate of Abu Dhabi and end at the port of Fujairah just south of the Strait.
- Other alternate routes could include the deactivated 1.65-million bbl/d Iraqi Pipeline across Saudi Arabia (IPSA) and the deactivated 0.5 million-bbl/d Tapline to Lebanon.
EIA's World Oil Transit Chokepoints analysis brief contains additional information about other chokepoints, and the Middle East & North Africa overview contains additional information about countries in the region. | <urn:uuid:59115ba6-5e81-4858-b414-89604ce9f241> | 2013-05-18T06:29:11Z | CC-MAIN-2013-20 | [
[
0.03466796875,
0.04052734375,
-0.036865234375,
0.0027313232421875,
0.0751953125,
-0.0771484375,
-0.00390625,
0.09375,
-0.00933837890625,
-0.011962890625,
0.07421875,
0.035400390625,
-0.044189453125,
0.021240234375,
0.0283203125,
-0.0238037109375,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940473 | 615 | http://www.eia.gov/todayinenergy/detail.cfm?id=4430 | 0.296767 |
Skip to main content
More Search Options
A member of our team will call you back within one business day.
This is what you’ll need:
Soap and warm water, or a moist towelette
Water-soluble lubricating jelly (not petroleum jelly)
Toilet or basin
Self-catheterization helps you empty your bladder if it doesn’t empty by itself. It also helps if your bladder doesn’t empty all the way. Follow the steps below.
First wash your hands and your penis. Use warm soapy water or a moist towelette.
Lubricate 2–4 inches of the catheter tip. Place the other end in the toilet or basin.
Grasp the tip of your penis. Hold it up and out at a 45° angle to your stomach.
Slowly insert the catheter into your urethra. If it doesn’t go in, take a deep breath and bear down as if to trying to urinate. If you feel a sharp pain, remove the catheter and try again.
When the urine starts flowing, stop inserting. Lower the angle of your penis.
When the urine stops flowing, slowly remove the catheter.
Wash the catheter in mild soap and water.
Rinse it well. Run water through it. Then let it air-dry.
Wash your hands. If you use a basin, wash it out. | <urn:uuid:ddff3325-a1e7-4857-b8fa-ca1113ba21aa> | 2013-05-18T07:13:20Z | CC-MAIN-2013-20 | [
[
-0.0006733813206665218,
0.0173611119389534,
0.002999897813424468,
-0.016339870169758797,
0.10947712510824203,
-0.03492647036910057,
-0.0036509395577013493,
0.06658496707677841,
-0.025224672630429268,
-0.029616013169288635,
0.12091503292322159,
0.02124183066189289,
... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.86119 | 301 | http://www.einstein.edu/einsteinhealthtopic/?languagecode=es&healthTopicId=452&healthTopicName=Urology&articleId=82504&articleTypeId=3 | 0.253927 |
1. Linguistic Background
The languages that are currently spoken in the Pacific
region can be divided broadly into three groups: the Australian and New Guinean
languages formed by people who participated in the region’s earliest migrations
over a period of 20,000-30,000 years starting several tens of thousands of years
ago, and the Austronesian languages spoken by Mongoloid people who migrated
from the Asian continent around 3,000 B.C. The region has numerous languages,
including 250 Aboriginal languages in Australia and 750 Papuan languages on
the island of New Guinea (including the Indonesian territory of Irian Jaya)
and neighboring areas. There are also 350 Austronesian languages in Melanesia,
20 in Polynesia, 12 in Micronesia and 100 in New Guinea (Comrie, Matthews, and
Polinsky 1996). There is wide variation not only among language groups, but
also among the families of languages. Few language families have been identified
among the languages of Australia and New Guinea using the methods of comparative
linguistics. Pacific languages are also characterized by the small size of speaker
populations and by the absence of dominant languages. However, there are usually
bilingual people who can speak or at least understand the languages of neighboring
populations, and it is believed that this situation has existed for a long time.
In terms of cultural factors, it appears that the diversification of languages
in the Pacific region was accelerated by the emblematic function of language
in the creation of a clear distinction between “ingroup” and “outgroup.”
The languages of New Guinea and the region around it show diverse linkages and wide variations between languages. The Austronesian languages of the Pacific region are mostly classified as Oceanian languages, while the Chamorro and Palau languages of Micronesia are classified into the languages of Western Malaya and Polynesia (WMP, Indonesian family), and the indigenous languages of Maluku and Irian Jaya in Eastern Indonesia into the Central Malayo-Polynesian (CMP) or the South Halmahera-West New Guinea (SHWNG) subgroups. In particular, there are strong similarities between the linguistic characteristics of the CMP and SHWNG languages and those of the Melanesian branch of the Oceanian languages. These linguistic conditions and characteristics are attributable to ethnic migrations within the region over a long period of time, accompanied by contacts and linguistic merging with indigenous Papuan people. Papuan languages are still found in parts of Indonesia, including Northern Halmahera and the islands of Pantar and Alor and central and eastern Timor in the Province of Nusa Tenggara. In New Guinea, contact with Papuan languages has caused some Austronesian languages to exhibit a word order change from subject-verb-object to subject-object-verb (Austronesian Type 2) (Sakiyama 1994).
2. Linguistic Strata
With the start of colonization by the European powers
in the nineteenth century, a new set of linguistic circumstances developed in
the region. First, pidgin languages based on European and Melanesian languages
gradually emerged as common languages. The establishment of plantations in Samoa
and in Queensland, Australia, which had concentrations of people who spoke Melanesian
languages, was important in providing breeding grounds for pidgin languages.
A pidgin language is formed from elements of the grammar of both contributing
languages, though the pidgin languages tend to be looked down upon from the
perspective of the more dominant of the two parent languages. The region’s
newly formed common languages, including Tok Pisin, Bislama, and Solomon Pidgin,
flourished after they were taken back to the homelands of the various speakers.
This was possible because Vanuatu, the Solomon Islands and Papua New Guinea
were all multilingual societies without dominant languages. The number of speakers
of pidgin languages increased rapidly in this environment. At the same time,
the continuing existence of ethnic minority languages came under threat.
Examples of pidgins that were creolized (adopted as mother languages in their own right) include Solomon Pijin, which eventually had over 1,000 speakers aged five and over (1976) in the Solomon Islands. Bislama, a mixture of over 100 indigenous languages grafted upon a base of English and French, is now spoken by almost the entire population of Vanuatu (170,000 in 1996) and is partially creolized. Of particular interest is the fact that a group of more than 1,000 people who emigrated to New Caledonia have adopted Bislama as their primary language. The situation in Papua New Guinea, which has a population of 4,300,000 (1996), is even more dramatic. By 1982 the number of people using Tok Pisin as their primary language had reached 50,000, while another 2,000,000 used it as a second language (Grimes 1996).
3. Minority Languages and Common Languages in the Pacific Region
The Atlas of the World’s Languages in Danger of Disappearing published by UNESCO (Wurm 1996) provides merely a brief overview of the current situation in Papua New Guinea, Australia, the Solomon Islands, and Vanuatu. There is no mention of Micronesia, New Caledonia, or Polynesia, presumably because of a lack of information resulting from the large number of languages in these areas. The following report covers areas and languages that I have researched and endangered languages covered by field studies carried out by Japanese researchers.
3.1 Belau (Palau), Micronesia
According to Belau (Palau) government statistics (1990),
the total population of 15,122 people includes 61 people living on outlying
islands in Sonsorol State, and 33 in Hatohobei (Tochobei) State. Apart from
the Sonsorol Islands, Sonsorol State also includes the islands of Fanah, Meril
and Pulo An. In addition to the Hatohobei language, the language mix on these
outlying islands also includes nuclear Micronesian (Chuukic) languages, which
are the core Oceanian languages spoken in the Carolines. They differ from Palauan,
which is an Indonesian language. To lump these languages together as the Sonsorol
languages with a total of 600 speakers (Wurm and Hattori 1981-83) is as inaccurate
as combining the Miyako dialects of Okinawa into a single classification.
The number of Chuukic speakers has declined steadily since these figures were compiled. Starting in the German colonial period of the early twentieth century, people have been relocated from these outlying islands to Echang on Arakabesan Island in Belau. Today there are several hundred of these people. Many of those born in the new location only speak Palauan. A study by S. Oda (1975) estimated that there were 50 speakers of Pulo Annian. The language of Meril continued to decline and has now become extinct.
From the early part of the twentieth century until the end of World War II, Micronesia was under Japanese rule, administered by the South Seas Mandate. Japanese was used as a common language, and its influence is still evident today. The linguistic data on Micronesia presented by Grimes (1996) is distorted by the fact that, while the number of English speakers is shown, no mention is made of Japanese. A study carried out in 1970 (Wurm, Mühlhäusler, and Tryon 1996) found that people aged 35 and over could speak basic Japanese. This group is equivalent to people aged 63 and over in 1998. An estimate based on Belau government statistics (1990) suggests that more than 1,000 of these people are still alive. In the State of Yap in the Federated States of Micronesia, where the percentage of females attending school is said to have been low, we can assume that the number of Japanese speakers has fallen below 500.
It has been suggested that if Japan had continued to rule Micronesia, Japanese would certainly have become the sole language in the region, and indigenous languages would have disappeared (Wurm, Mühlhäusler, and Tryon 1996). This seems an overly harsh appraisal of Japan’s language policy. Except in the schools, as a matter of fact no significant steps were taken to promote the use of Japanese. Micronesia previously had no common language for communication between different islands. Even today, old people from different islands use Japanese as a common language (Sakiyama 1995; Toki 1998). However, the role of this Japanese pidgin appears to have ended within a single generation, and in this sense it too is an endangered language. Pidgin Japanese continues to be used as a lingua franca by Taiwanese in their fifties and older (Wurm, Mühlhäusler, and Tryon 1996), and the number of speakers is estimated to have been 10,000 in 1993 (Grimes 1996).
3.2 Yap, Micronesia
Ngulu Atoll is situated between the Yap Islands and the Belau Islands. The Nguluwan language is a mixture of Yapese and Ulithian, which belongs to the Chuukic family. It has inherited the Ulithian phonetic system and a partial version of Yap grammar (Sakiyama 1982). Nguluwan appears to have evolved through bilingualism between Yapese and Ulithian, and to describe it as a dialect of Ulithian (Grimes 1996) is inappropriate. In 1980 there were 28 speakers. Even with the inclusion of people who had migrated to Guror on Yap Island, where the parent village is located, the number of speakers was fewer than 50. Speakers are being assimilated rapidly into the Yapese language and culture.
3.3 Maluku, Indonesia
The book Atlas Bahasa Tanah Maluku (Taber et al. 1996) covers 117 ethnic languages (Austronesian, Papuan), including numbers of speakers for each language, areas of habitation and migration, access routes, simple cultural information, and basic numbers and expressions. This work is especially valuable since it corrects inaccuracies and errors in the 1977 Classification and Index of the World's Languages by C. Y. L. Voegelin and F. M. Voegelin. It also distinguishes languages and dialects according to their a priori mutual intelligibility. Fifteen languages are listed as having fewer than 1,000 speakers. They include the Nakaela language of Seram, which has only 5 speakers, the Amahai and Paulohi languages, also of Seram, which are spoken by 50 people each, and the South Nuaulu and Yalahatan languages, which have 1,000 speakers each on Seram Island. The data, however, are not complete. For example, the Bajau language is not included, presumably because of the difficulty of accessing the various solitary islands where the Bajau people live. The author researched the Yalahatan language in 1997 and in 1998, and the Bajau language (2,000 speakers) on Sangkuwang Island in 1997.
3.4 Irian Jaya, Papua New Guinea
Detailed information about the names, numbers of speakers,
and research data for over 800 languages spoken in New Guinea and its coastal
regions can be found in the works by the Barrs (1978), Voorhoeve (1975), and
Wurm (1982). However, not only the minority languages but even the majority
languages other than a few have yet to be surveyed and researched adequately.
There are many languages for which vocabulary collection has yet to be undertaken.
It appears that dictionaries or grammars have been published for less than one-tenth
of the region’s languages. However, the gospel has been published in several
dozen languages using orthographies established by SIL. Papuan languages range
from those with substantial speaker populations, including Enga, Chimbu (Kuman),
and Dani, which are spoken by well over 100,000 people, to endangered languages
such as Abaga with 5 speakers (150 according to Wurm ), Makolkol with
7 (unknown according to Wurm), and Sene with under 10. There are very many languages
for which the number of speakers is unknown and more up-to-date information
is needed. Also, despite having substantially more than 1,000 speakers (Wurm
1982; Grimes 1996), Murik is in danger of extinction due to the creolization
of Tok Pisin (Foley 1986). Moreover, it is questionable whether the present
lists include all of the region’s languages.
Information about Irian Jaya is even sparser. A study on popular languages carried out by the author in 1984-85 revealed that Kuot (New Ireland), Taulil (New Britain), and Sko (Irian Jaya) all had several hundred speakers and that, in the case of Taulil in particular, an increasing number of young people were able to understand what their elders were saying but could no longer speak the language themselves. There has been a rapid shift to Kuanua, an indigenous language used in trade with neighboring Rabaul, which is replacing Taulil.
3.5 Solomon Islands, Melanesia
The total population of the Solomon Islands is 390,000 (1996). There are 63 Papuan, Melanesian, and Polynesian indigenous languages, of which only 37 are spoken by over 1,000 people (Grimes 1996). The Papuan Kazukuru languages (Guliguli, Doriri) of New Georgia, which were known to be endangered as early as 1931, have become extinct already, leaving behind just some scant linguistic information. The Melanesian Tanema and Vano languages of the Santa Cruz Islands and the Laghu language of the Santa Isabel Islands were extinct by 1990. This does not mean that the groups speaking them died out, but rather that the languages succumbed to the shift to Roviana, a trade language used in neighboring regions, or were replaced by Solomon Pijin (Sakiyama 1996).
3.6 Vanuatu, Melanesia
The situation in Vanuatu is very similar to that in the
Solomon Islands. The official view, written in Bislama, is as follows:
I gat sam ples long 110 lanwis evriwan so i gat bigfala lanwis difrens long Vanuatu. Pipol blong wan velej ol i toktok long olgeta bakegen evridei nomo long lanwis be i no Bislama, Inglis o Franis. (Vanuatu currently has 110 indigenous languages, which are all very different linguistically. On an everyday basis people in villages speak only their local languages, not Bislama, English, or French). (Vanuatu, 1980, Institute of Pacific Studies)
Among the Melanesian and Polynesian indigenous languages spoken by 170,000 people, or 93% of the total population (1996), there are many small minority tongues. These include Aore, which has only a single speaker (extinct according to Wurm and Hattori [1981-83]); Maragus and Ura (with 10 speakers each); Nasarian, and Sowa (with 20); and Dixon Reef, Lorediakarkar, Mafea, and Tambotalo (with 50). If languages with around 100 speakers are included, this category accounts for about one-half of the total number of languages (Grimes 1996). The spread of Bislama has had the effect of putting these languages in jeopardy.
3.7 New Caledonia, Melanesia
New Caledonia has a total population of 145,000 people,
of whom 62,000 are indigenous. As of 1981, there were 28 languages, all Melanesian
except for the one Polynesian language Uvean. The only languages with over 2,000
speakers are Cemuhi, Paicî, Ajië, and Xârâcùù, along with Dehu and Nengone,
which are spoken on the Loyalty Islands.
Dumbea (Paita), which is spoken by several hundred people, has been described by T. Shintani and Y. Paita (1983). And M. Osumi (1995) has described Tinrin, which has an estimated 400 speakers. Speakers of Tinrin are bilingual in Xârâcùù or Ajië. Nerë has 20 speakers and Arhö 10, while Waamwang, which had 3 speakers in 1946, is now reported to be extinct (Grimes 1996). Descendants of Javanese, who began to migrate to New Caledonia in the early part of the twentieth century, now number several thousand. The Javanese language spoken by these people, which has developed in isolation from the Javanese homeland, has attracted attention as a new pidgin language.
When Europeans first arrived in Australia in 1788, it is estimated that there were 700 different tribes in a population of 500,000-1,000,000 (Comrie, Matthews, and Polinsky 1996). By the 1830s Tasmanian had become extinct, and today the number of Aboriginal languages has fallen to less than one-half what it once was. However, T. Tsunoda left detailed records of the Warrungu language, the last speaker of which died in 1981, and the Djaru language, which has only 200 speakers (Tsunoda 1974, 1981). Yawuru, which belongs to the Nyulnyulan family, reportedly has fewer than 20 speakers, all aged in their sixties or older. The language is described by K. Hosokawa (1992).
The Pacific has been heavily crisscrossed by human migration
from ancient to modern times. All Pacific countries except the Kingdom of Tonga
were colonized. This historical background is reflected in the existence of
multilevel diglossia in all regions of the Pacific.
Depending on the generation, the top level of language in Micronesia is either English (the official language) or pidgin Japanese (used as a lingua franca among islands). The next level is made up of the languages of major islands that exist as political units, such as Palauan, Yapese and Ponapean. On the lowest level are the various ethnic languages spoken mainly on solitary islands.
In the Maluku Islands of Indonesia, local Malay languages such as Ambonese Malay, North Maluku Malay and Bacanese Malay, form a layer beneath the official language, Indonesian. Under them are the dominant local languages, such as Hitu, which is spoken by 15,000 people on Ambon Island, and Ternate and Tidore, which are spoken in the Halmahera region. These are important as urban languages. On the lowest level are the various vernaculars.
In Papua New Guinea, standard English forms the top level, followed by Papua New Guinean English. Tok Pisin and Hiri Motu are used as common languages among the various ethnic groups. Beneath these layers are the regional or occupational common languages. For example, Hiri Motu is used as the law enforcement lingua franca in coastal areas around the Gulf of Papua, Yabem as a missionary language along the coast of the Huon Gulf, and Malay as a trade language in areas along the border with Indonesia. On the next level are the ethnic and tribal languages used on a day-to-day basis.
An example of a similar pattern in Polynesia can be found in Hawaii, where English and Hawaiian English rank above Da Kine Talk or Pidgin To Da Max, which are mixtures of English and Oceanic languages and are used as common languages among the various Asian migrants who have settled in Hawaii. Beneath these are ethnic languages, including Hawaiian and the various immigrant languages, such as a common Japanese based on the Hiroshima dialect, as well as Cantonese, Korean, and Tagalog.
All of the threatened languages are in danger because of their status as indigenous minority languages positioned at the lowest level of the linguistic hierarchy. Reports to date have included little discussion of the multilevel classification of linguistic strata from a formal linguistic perspective. It will be necessary in the future to examine these phenomena from the perspectives of sociolinguistics or linguistic anthropology.
Barr, Donald F., and Sharon G. Barr. 1978. Index of Irian Jaya Languages. Prepublication draft. Abepura, Indonesia: Cenderawashih University and Summer Institute of Linguistics.
Comrie, Bernard, Stephan Matthews, and Maria Polinsky. 1996. The Atlas of Languages. New York: Chackmark Books.
Foley, William A. 1986. The Papuan Languages of New Guinea. Cambridge, New York: Cambridge University Press.
Grimes, Barbara F., ed. 1996. Ethnologue: Languages of the World. Dallas: International Academic Bookstore.
Hosokawa, Komei. 1992. The Yawuru language of West Kimberley: A meaning-based description. Ph.D. diss., Australian National University.
Oda, Sachiko. 1977. The Syntax of Pulo Annian. Ph. D. diss., University of Hawaii.
Osumi, Midori. 1995. Tinrin grammar. Oceanic Linguistics Special Publication, No. 25. Honolulu: University of Hawaii Press.
Sakiyama, Osamu. 1982. The characteristics of Nguluwan from the viewpoint of language contact. In Islanders and Their Outside World.Aoyagi, Machiko, ed. Tokyo: Rikkyo University.
---. 1994. Hirimotu go no ruikei: jijun to gochishi (Affix order and postpositions in Hiri Motu: A cross-linguistic survey). Bulletin of the National Museum of Ethnology,vol. 19 no. 1: 1-17.
---. 1995. Mikuroneshia Berau no pijin ka nihongo (Pidginized Japanese in Belau, Micronesia). Shiso no kagaku, vol. 95 no. 3: 44-52.
---. 1996. Fukugouteki na gengo jokyo (Multilingual situation of the Solomon Islands). In Soromon shoto no seikatsu shi: bunka, rekishi, shakai (Life History in the Solomons: Culture, history and society). Akimichi, Tomoya et al, eds. Tokyo: Akashi shoten.
Shintani, Takahiko and Yvonne Païta. 1990. Grammaire de la Langue de Païta. Nouméa, New Caledonia: Société d'études historiques de la Nouvelle-Calédonie.
Taber, Mark and et al. 1996. Atlas bahasa tanah Maluku (Maluku Languages Atlas). Ambon, Indonesia: Summer Institute of Linguistics and Pusat Pengkajian dan Pengembangan Maluku, Pattimura University.
Toki, Satoshi, ed. 1998. The remnants of Japanese in Micronesia. Memoirs of the Faculty of Letters, Osaka University, Vol. 38.
Tsunoda, Tasaku. 1974. A grammar of the Warrungu language, North Queensland. Master's thesis, Monash University.
---. 1981. The Djaru Language of Kimberley, Western Australia. Pacific Linguistics, ser. B, No. 78. Canberra: Australian National University.
Voorhoeve, C. L. 1975. Languages of Irian Jaya: Checklist, Preliminary classification, language maps, wordlists. Canberra: Australian National University.
Wurm, Stephen A. 1982. Papuan Languages of Oceania. Tübingen: Gunter Narr Verlag.
---. and Shiro Hattori, eds. 1981-83. Language Atlas of the Pacific Area. Pacific Linguistics, ser. C, No. 66-67. Canberra: Australian National University.
---, Peter Mühlhäusler, and Darrel T. Tryon. 1996. Atlas of languages of intercultural communication in the Pacific, Asia, and the Americas. 3 vols. Trends in Linguistics. Documentation 13. New York: Mouton de Gruyter.
*Translation of the author’s essay “Taiheiyo chiiki no kiki gengo”, Gekkan Gengo, Taishukan Publishing Co., 28(2), 102-11, 1999, with the permission of the publisher.
Any comments and suggestions to firstname.lastname@example.org | <urn:uuid:a58eb30a-d617-46b9-af87-d5abe8362da9> | 2013-05-18T06:26:04Z | CC-MAIN-2013-20 | [
[
0.02587890625,
-0.00311279296875,
-0.01312255859375,
0.005767822265625,
0.107421875,
-0.1025390625,
-0.0277099609375,
0.083984375,
-0.016845703125,
0.03125,
0.09521484375,
-0.0115966796875,
0.00909423828125,
0.061767578125,
0.0213623046875,
-0.024536... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.92494 | 5,264 | http://www.elpr.bun.kyoto-u.ac.jp/essay/sakiyama.htm | 0.872342 |