Datasets:

text
stringlengths
130
541k
id
stringlengths
47
47
date
stringdate
2013-05-18 04:54:19
2013-06-20 13:35:46
dump
stringclasses
1 value
embeddings
listlengths
1
351
file_path
stringclasses
916 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
30
166k
url
stringlengths
14
835
quality_score
float64
0.16
1
Novell recently signed an agreement with Microsoft. From the press release: Under the patent agreement, both companies will make up-front payments in exchange for a release from any potential liability for use of each others patented intellectual property, with a net balancing payment from Microsoft to Novell reflecting the larger applicable volume of Microsoft’s product shipments. Novell will also make running royalty payments based on a percentage of its revenues from open source products. A day later, Ballmer came out with this statement: The distributors of other versions of Linux cannot assure their customers that Microsoft won't sue for patent infringement. "If a customer says, 'Look, do we have liability for the use of your patented work?' Essentially, If you're using non-SUSE Linux, then I'd say the answer is yes," Ballmer said. I guess I should be angry at Novell. However, I realise that companies are actually just people doing their jobs. This is why I strongly think that the Novell Manager who dealt with the agreement with Microsoft should be sacked. Novel should do so as soon as physically possible - every day makes it worse. I will call this not-so-bright manager "John". I used to have respect for Novell. I was always a little unsure about them, but their fight against SCO showed Novell's good side. Then, I guess John came along, and thought in his ignorance that he was doing something good, and compromised Novell possibly beyond repair. John, listen carefully: Microsoft doesn't make a deal with anybody - and I mean anybody - unless the final goal is to send the other party bankrupt; Microsoft will scheme, have "secret plans", misuse whatever power or technology you provide them, and eventually crush you. If you don't believe me, please allow me to refresh your memory - or maybe just tell you the story straight out. Since I can't possibly list every single fishy episode, I will just pick a few. Microsoft signed a contract with IBM: they will never ever be able to release their own operating system; and due to this, they will be able to "share resources" with IBM in order to release OS/2. Microsoft then releases Windows 3.0. They call it an "Operating Environment". The contract was disputed over the meaning of the term "operating system". IBM didn't fight very well, and they lost. Microsoft walked away with a lot of IBM's code, sold it as "Windows", and made tons of money. Spyglass develops Spyglass Mosaic, a fantastic internet browser; to do so, Spyglass licenses NCSA's source code, but never used it. Microsoft needed a browser. So, they licensed Spyglass' code, with this arrangement: Spyglass will get a small quarterly fee, and a portion of the revenues for IE's sale. The contract didn't talk about a minimum price set for Internet Explorer. Microsoft gave away Internet Explorer for free -- they obviously worked out that a small percentage of zero is zero. Eventually, Microsoft and Spyglass made up. I am sure Spyglass hoped for a much better return.Microsoft never mentions Spyglass in their page about Internet Explorer's history. Nice one. Sendo teams up with Microsoft. Microsoft apparently bought 10% of Sendo, and then walked away with Sendo's customers and technology. From the court's proceedings: "Sendo alleges that Microsoft, which invested $12 million in the handset firm for a minority stake of about 10 percent, was struggling to break into the wireless industry, and that the software firm "recognized Sendo had the technology and experience it lacked to quickly penetrate this lucrative new market. As such, Microsoft set about through a secret plan ('The Secret Plan') to obtain that technology and know-how from Sendo with the false promises that Microsoft would co-develop, help finance, and the be the 'go to market' partner for Sendo's 2.5G Smartphone, the Z100." Dear John, do you see a pattern? John, the list can go on, and on, and on, and on. In every single case, you'll see this story repeated: - a company is convinced by Microsoft that they are offering a once in a lifetime deal; - the whole world pays for the mistakee; - the "single company" goes bankrupt So, John, I am sure you had the best of intentions, but please, please just go away. If I were Novell's boss, I would sack you in no time and would try to get the contract cancelled. If you are indeed Novell's boss, congratulations: you are about to disappear, and we will need to work hard and pick up the pieces. Free Software Magazine's readers: please contribute to this page with more of Microsoft's exploits, especially those ones where a well-meaning company is pushed out of existence by Microsoft's tactics.
<urn:uuid:f2fa1090-c6b5-43a1-a81f-d647c246337e>
2013-05-18T17:18:43Z
CC-MAIN-2013-20
[ [ -0.03515625, 0.0274658203125, 0.01141357421875, -0.0162353515625, 0.07421875, -0.01373291015625, 0.0025482177734375, 0.1064453125, -0.0194091796875, -0.04443359375, 0.0255126953125, 0.0262451171875, -0.07177734375, 0.0079345703125, 0.037353515625, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96555
1,029
http://www.freesoftwaremagazine.com/comment/30897
0.295498
If you own a small business, you know the need for computing power to keep your business organized. A computer system needs to be robust and also needs to be flexible to fit your needs. There are very few companies today that can go without the use of computers. Therefore, it is important that the owners purchase the systems they truly need. They need to know what to look for when purchasing computers for their businesses. It is important to understand hardware, software, networking, and the expandability of the system. Here are a few guidelines that can help you, as a business owner, choose a computer system for your business. • Determine your requirements and build your system around those. If you are concerned about security, purchase a system that does not include any writable media such as CDs or DVDs. You may consider computers that do not have a hard drive; they just simply connect to your network. • Your computer should be network-capable. Whether or not you have a network currently, you should have this option for future expansion to network capabilities. This will save you money in the future. • Your computer should also have wireless networking capabilities. Again, this is to provide you the ability for expansion and growth. • Purchase a computer with plenty of RAM. You should get a minimum of 4GBs, with 8GBs or more being optimal. Newer software require high amounts of memory, so you don’t want to be frustrated by poorly running software due to a lack of memory. • You should have a good technical support program to accompany your purchase. You should try to find local tech support services, because sending your machine away for repairs will be costly to your business. • Compare prices after you have determined your specs. Get several quotes from different companies.
<urn:uuid:266faaea-dff6-4f4b-966a-8fa674828ab1>
2013-05-18T17:57:05Z
CC-MAIN-2013-20
[ [ -0.033914729952812195, 0.005289082881063223, 0.008478682488203049, -0.03262273967266083, 0.08462532609701157, -0.028262274339795113, 0.0077115632593631744, 0.061369508504867554, -0.04328165203332901, -0.02059108577668667, 0.07590439170598984, 0.0040778424590826035, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965029
365
http://www.freezer-burn.org/
0.28002
"Sex Positive" explores the life of Richard Berkowitz, a revolutionary gay S&M- hustler-turned-AIDS activist in the 1980s, whose incomparable contribution to the invention of safe sex has never been aptly credited. Berkowitz emerged from the epicenter of the epidemic as a community leader, demanding a solution to the problem before anyone else would pay attention. However, it was not Berkowitz' voice alone that sparked contention. Dr. Joseph Sonnabend, a controversial virologist and AIDS doctor, postulated that AIDS was more complicated than just a new virus. With Sonnabend's theory in tow, Berkowitz fought, alongside beloved activist and musician Michael Callen, for safer sex practices without giving up on sex altogether. "Sex Positive" explores the explicit bravery of this unrecognized triumvirate, and their dire quest to save lives in the midst of unwavering dissent. Now destitute and alone, Mr. Berkowitz bestows graphic testimony of sex, death and betrayal, while placing the invention of "safe sex" in a fresh and compelling context. Cast: Richard Berkowitz Directed by: Daryl Wein Opens: Aug 15, 2008 LA (Academy Run)
<urn:uuid:0e62bdcb-5095-44c6-a779-cb203e4da023>
2013-05-18T17:29:38Z
CC-MAIN-2013-20
[ [ -0.024433724582195282, 0.008546560071408749, 0.002700293669477105, 0.0037489512469619513, 0.09270134568214417, -0.06963087618350983, -0.004509228281676769, 0.09815436601638794, -0.03649329021573067, -0.06711409240961075, 0.026635905727744102, 0.015834731981158257, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931044
250
http://www.fresnobee.com/movies/movie/15816.html?date=02/08/13&movie=15816
0.229555
Register New Player Welcome to our world of fun trivia quizzes and quiz games: Studies Have Shown... "What do the results of the latest study really prove? This quiz explores the techniques used to avoid inferring too much from scientific studies and tests." 15 Points Per Correct Answer - No time limit I'll bet you've noticed the resemblance between the surface of a shelled walnut and the surface of a human brain. Perhaps, then, you won't be surprised to learn that in THREE separate surveys, 100% of HIGHLY SUCCESSFUL FunTrivia quiz takers reported using WALNUTS before taking quizzes!!! Which of the following could be inferred with certainty from these survey results? None of these. Eating walnuts before taking quizzes improved the performance of the participants in my survey. Eating walnuts before taking quizzes will improve your quiz performance. The respondents to my survey believed that eating walnuts improved their performance. During World War I, tin helmets replaced cloth helmets. Contrary to expectation, the number of injuries increased. Which of the following could be inferred with certainty from the facts presented? The number of injuries increased after tin helmets were introduced. Soldiers wearing tin helmets were more likely to suffer fatal injury than those wearing cloth helmets. Tin helmets provided protection that was inferior to cloth helmets. All of these. Helmet laws for motorcyclists are controversial. Some years following the repeal of Louisiana's motorcycle helmet law, the journal "Academic Emergency Medicine" (Volume 9, Number 5 418-419, 2002) reported on changes in accident statistics. Which of the following unequivocally indicates an increased risk as a result of not wearing a helmet? Unhelmeted fatalities increased from 8.4 to 29.0 per year after the law was repealed. Unhelmeted motorcyclists were found to have a significantly higher incidence per collision of head injury and fatality. After repeal of the helmet law, helmet use decreased from 79% to 46%, and fatalities in all patients increased from 3.4% to 5.2%. All of these I demonstrated that 100% of highly successful FunTrivia quiz-takers consumed walnuts prior to quizzes. Having been criticized for not having a control group, I undertook to make a comparison using historical controls. I analyzed an equal number of quiz-takers afflicted with chronically low quiz performance and could find no evidence that any of them reported eating walnuts prior to taking quizzes. Which of the following would NOT be a valid criticism of my study methods? I failed to disclose the specifics of my methods for determining walnut use in the study and control groups and could be hiding an ascertainment error/bias. I failed to specify the number of study participants. Retrospective studies never prove cause and effect. My study was retrospective, and retrospective studies never provide statistically valid, useful results. Randomized, controlled, double-blinded studies are the gold standard for medical investigation. In 2001, a group of neurologists was asked to help investigate the importance of a component of this method during a study of a treatment for multiple sclerosis. These neurologists were asked to evaluate subjects but were told before doing the evaluation whether or not the subjects had received placebo or the proposed intervention. Which aspect of randomized, controlled, double blinded studies was being omitted for these neurologist to allow that particular aspect to be studied? None of these According to the coronary risk calculator provided at the NIH website, the risk of a coronary event for a 35 year old non-smoking woman with normal blood pressure, normal HDL cholesterol and a total cholesterol of 300 is 1% for ten years. Assuming that 200 such women were treated for ten years with cholesterol lowering drugs that reduced the risk of coronary events by 50%, how many coronary events would we expect to prevent in a ten year period? A 35-year-old woman dentist is offered a free cardiac treadmill at a dental convention. Before accepting the offer she calculates her expected coronary risk and finds it to be 1%. Assuming a 20% false positive rate and a 10% false negative rate, what would her risk of coronary artery disease be should she be found to have an abnormal cardiac stress test? David G. Myers' "Exploring Psychology" states, "There is a highly significant tendency for first-born individuals within a family to have higher average scores (on tests of intelligence) than their later-born siblings." Assuming Dr. Myers is speaking of statistical significance, what can we infer about intelligence test scores of first-born as opposed to later born siblings? The difference in test scores is highly unlikely to be explained on the basis of chance variation of statistical samples. The difference in test scores is large in magnitude and highly unlikely to be related to chance. The difference is large in magnitude. The difference in test scores results in highly significant differences in school performance. "Web MD", an Internet medical information provider, ran a report on February 4, 2003 that was headlined "Selenium May Fight Prostate Damage" and "Supplementation May Reduce Prostate Cancer Risk". The study, however, was not performed on humans but on elderly, male beagles. The results of this study can be applied with complete confidence to which of the following groups? All of these Elderly male humans Elderly male beagles Any age and species of dog I have decided to make a spring water extract of walnuts that I call "Quizzlenut" available in the United States for improving quiz taking health. (Remember, I have performed three surveys showing that walnuts improve quiz-taking performance!) Will the US Food and Drug Administration analyze either my product to verify its contents or my claims for the product before it is marketed? Copyright, FunTrivia.com. All Rights Reserved. Legal / Conditions of Use Compiled Jun 28 12
<urn:uuid:d7d6de1a-6baf-4ca5-8b3a-bb2c43e6d7b2>
2013-05-18T17:18:25Z
CC-MAIN-2013-20
[ [ -0.01141357421875, 0.01129150390625, 0.0047607421875, -0.0140380859375, 0.0966796875, -0.076171875, -0.023681640625, 0.130859375, -0.00130462646484375, 0.003875732421875, 0.05908203125, 0.032958984375, -0.056884765625, 0.0234375, 0.035400390625, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948921
1,218
http://www.funtrivia.com/playquiz/quiz1956061665f58.html
0.452917
The following shows how to make a "Karaoke-Style Captioning-Subtitles video". First I use AVI2WAV to save the audio from the video. I then use Audacity audio editor to know what is said in video one sentence at a time. I separate the sentence from the rest of the video's audio in Audacity and save the audio. I bring the audio just saved into Audacity, clean it up a bit and slow it down 30 using the effect Tempo and save it with a different file name. Having heard the sentence enough that I remember it well enough to type the sentence using Wordpad. Wordpad is in richtext format. It is important to keep it in richtext. Next I highlight the text which will be the sentence that becomes the captioning-subtitle. I make the font larger and use the bold font I copy the sentence by using edit/copy. In microsoft Paint I load a picture from the video, which I had captured, and paste the sentence onto the picture. With some editing I make the sentence fit in well with the picture. I save the picture which now has the captioning-subtitle in it. In Paint then I put a rectangle around the first word in the sentence, reverse the color and save the picture with whatever name and two zeros after the file.name. I put a rectangle around the second word, save this picture as I did the in the previous picture except instead of 00 it is saved as 01, and so on. I use Audacity audio editor to save individual sentence audio clips. I load the pictures saved in Paint to Microsoft Movie Maker. The sound needs to be synchronized with each individual word highlighted. Individual frames at the timeline need to be wide enough to click on them to change the width of the frames according to how long it takes for a word to be said. There may be pauses or slowness when a person says a sentence so these frames are made wider to slow down the movement of individual word-frames so the sentence a person says is in rhythm/synchronization. Longer words require wider frames. Certain words like at, in, it, or, etc. require the frames for these words to be narrowed to speed up the rhythm because they are said faster. Movie Maker is the only application that I know which does this. I happened upon this function by accident about six months ago. I was lucky to come across this function. I don't read much how to do something, Instead I tinker around because I like using different multimedia applications and I don't like paying for any of them if it is at all possible. I have bought many but only when I couldn't find what I want from freeware. The process of making the videos for a Mac can be done if there is a word processor which has the equivalent of writing a sentence like in Wordpad's rich-text-format, and then highlighted and copied. A paint application must also allow highlighted and copied sentences to be pasted into a picture previously loaded into the paint application. Unfortunately, not all word processors nor all paint programs allow these things to occur. You can download a Mac version of Audacity at Sourceforge.net. For conversion of Quicktime .mov files obtain "Free MOV 2 Avi". Also found these for Macs. And Macs have iMovie: ..Download AVI2WAV - afreeCodec.com AVI2WAV - AVI to WAV is a simple program which can extract sound from AVI file ( both ... afreeCodec - Audio and Video Software for Windows, Mac and Linux! ... ..Free, fully-functional multi-track audio editor for Windows (98 and later), Macintosh (MacOS and OSX), and Linux. audacity.sourceforge.net/ - 13k - That is probably more than you wanted to know about the process. Thanks for your patience and attention. If you have any questions please email me. firstname.lastname@example.org
<urn:uuid:7a05cbed-a7f9-4287-b2ef-311df2dfe77c>
2013-05-18T17:27:21Z
CC-MAIN-2013-20
[ [ -0.042236328125, 0.0228271484375, -0.003265380859375, -0.007232666015625, 0.068359375, -0.031982421875, 0.00799560546875, 0.0771484375, -0.0220947265625, 0.00518798828125, 0.08642578125, 0.022705078125, 0.024169921875, 0.006134033203125, 0.030029296875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930692
832
http://www.futureofeducation.com/profile/PhilipWagner
0.203595
Far Cry 3 Skills are divided in to three types which each gives you a different ability. Far Cry 3 skills will guide you through all the three different skills that the game comes with, in which each gives you the ability to be able to survive in the island and give you the best abilities and change to be able to rescue your friends and get revenge for the death of your brother. Follow each of the three skills below that describes what you will be able to do. We will be bringing a complete guide on how to unlock each of the skills and what you will need to do. The Different skills that you will gather in Far Cry 3 will need to be unlocked by using any skill points that you gather during the game that will allow you to level ups your skills and become better hunter, warrior with better tactics and overall have a better chance to survive any enemies attacks and rescue your friends. - The Heron The Heron is divided into 3 different skills that you will need to unlock during the game and they will give you: The Spider – Stealth and survivial The Shark – Assault and healing Tattoos – Will let you know how skillful you are getting; the more skills you get to unlock the more tattoos you will have in your arm.
<urn:uuid:96324f31-878b-4049-8f93-1b88db9dd259>
2013-05-18T17:56:43Z
CC-MAIN-2013-20
[ [ -0.01112938579171896, 0.0011513157514855266, -0.0002587033959571272, -0.0028919957112520933, 0.12894736230373383, 0.030043859034776688, 0.0004660087579395622, 0.007785087917000055, -0.00014305784134194255, -0.02916666679084301, 0.01885964907705784, 0.022807016968727...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955727
257
http://www.gamerfuzion.com/far-cry-3-skills-guide/
0.277057
The goal of the game is to control your marble in order to get close to bright and colorful stars placed around the level and then let your zapper do the talking. The more stars you zap, the more points you get. Each level has a certain amount of points you need to get in order to complete it. The more points you gather the bigger you grow, and the harder you are to be pushed around by physics contraptions that you'll encounter such as jumppads, air vents and vortexes. The downside to this is that your own weight will slow your jumping down, making some places unreachable after growing too much.
<urn:uuid:105c9fcd-fa66-45c3-ac17-0430d51035d1>
2013-05-18T17:23:18Z
CC-MAIN-2013-20
[ [ -0.030399659648537636, 0.000969919201452285, 0.021471088752150536, 0.0126488097012043, 0.08375850319862366, 0.008715986274182796, 0.02604166604578495, 0.08545918017625809, -0.01052295882254839, -0.036564625799655914, 0.045493196696043015, 0.011639030650258064, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954761
130
http://www.gamershell.com/mac/marble_arena/user_reviews.html
0.217484
Born in the lab In early summer of 1965, a University of Florida assistant coach sat down with a team of university physicians and asked them to determine why so many of his players were being affected by heat and heat related illnesses. The researchers - Dr. Robert Cade, Dr. Dana Shires, Dr. H. James Free and Dr. Alejandro de Quesada - soon discovered two key factors that were causing the Gator players to 'wilt': the fluids and electrolytes the players lost through sweat were not being replaced, and the large amounts of carbohydrates the players' bodies used for energy were not being replenished. The researchers then took their findings into the lab, and scientifically formulated a new, precisely balanced carbohydrate-electrolyte beverage that would adequately replace the key components lost by Gator players through sweating and exercise. They called their concoction 'Gatorade'. Proven on the field Soon after the researchers introduced their Gatorade formula to the team, the Gators began winning... outlasting a number of heavily favored opponents in the withering heat and finishing the season at 7-4. The team's success progressed even more during the 1966 season, with the Gators finishing at 9–2 and winning the Orange Bowl for the first time ever in the history of the school. Word about Gatorade began to spread outside of the state of Florida, and both the University of Richmond and Miami of Ohio, began ordering batches of Gatorade for their football teams. Orders from other college football programs across the country soon followed, as playing without Gatorade on your sidelines began to be likened to playing with just ten men on the field. Today, Gatorade can be found on the sidelines of more than 70 Division I colleges as the official sports drink of their men's and women's intercollegiate sports. From the Orange Bowl to the Super Bowl In the summer of 1969, Coach Ray Graves of the Florida Gators suggested to the Kansas City Chiefs that they use Gatorade to combat the staggering effects of a blistering Missouri sun during training camp. The Chiefs were so impressed with the "Gator coach's aid" that they kept it on their sidelines throughout the entire season… which concluded with a stunning victory over the heavily favored Minnesota Vikings in Super Bowl IV. In the years that followed, more and more NFL teams began placing Gatorade on the sidelines of their games and practices, and in 1983, Gatorade became the official sports drink of the NFL-a title it holds to this day. Furthering the science of victory Two decades after Dr. Cade and his team worked diligently to develop the optimum hydration formula that would become Gatorade, the Gatorade Sports Science Institute was founded in Barrington, Illinois, to conduct scientific research in the areas of exercise science, hydration, and sport nutrition. Three years later, the lab would be expanded to provide advanced testing for athletes and new Gatorade products and flavors and develop education materials for sports health professionals around the world. Gatorade is now also the official sports drink of the NBA, AVP, and PGA, Major League Baseball, Major League Soccer, and numerous other elite and professional organizations and teams. Hydration at 180 mph In 2001, after determining that professional race car drivers were not staying adequately hydrated throughout the course of their races, Gatorade and GSSI begin working with auto racing organizations to develop a hydration tool that could withstand 130-degree temperatures and keep drivers hydrated safely throughout the course of a race. The result of their research was the development of GIDS, the Gatorade In-Car Drinking System, which is now considered an essential piece of racing equipment. Rising to new challenges After years of careful research by the staff at GSSI into the needs of athletes engaged in high-demand training and competition, Gatorade launched the Gatorade Performance Series, an elite line of sports nutrition products, in 2001. These products include Gatorade Energy Drink, Gatorade Energy Bar, and the Gatorade Nutrition Shake. Four years later, after studying endurance athletes, GSSI developed the Gatorade Endurance Formula. Featuring a higher concentration of sodium-the key electrolyte found in Original Thirst Quencher-and four other electrolytes lost in sweat, Gatorade Endurance Formula is quickly becoming a mainstay on race courses the world over. Today & tomorrow Gatorade and GSSI continue to search for and study new and innovative ways to help athletes improve performance by facilitating proper hydration and nutrition. From the lab testing of athletes, to new flavor and delivery system development, to the publication and distribution of scientific research, the Gatorade Company and the GSSI perpetually strive to advance their collective mission of enabling athletes to always perform at their peak.
<urn:uuid:d9c8e22f-cefe-42b0-a6a6-7a32f5c458b7>
2013-05-18T17:18:06Z
CC-MAIN-2013-20
[ [ -0.032958984375, 0.01202392578125, -0.0113525390625, -0.015869140625, 0.103515625, -0.0218505859375, 0.020263671875, 0.09033203125, 0.01397705078125, -0.03466796875, 0.0751953125, 0.056640625, -0.004974365234375, 0.049072265625, 0.048583984375, 0.010...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966802
996
http://www.gatorade.com/?ATCLID=205703982&SPID=94496&DB_OEM_ID=27300
0.243929
Historical Documents & Records Search Tips Historical Documents & Records Last and First Name Search - Searching both first and last name fields returns historical documents and records where the surname is "near2" the first name. - The search engine will automatically find the first and last name occurrences within two words of each other in the historical documents and records archive. - Searching both first and last name helps find occurrences of middle names or initials in the historical documents and records archive. - The "near2" search command is not order specific, so your documents and records search will retrieve the person's name regardless of how it is ordered: the first name then the last name or the last name then the first name. - The historical documents and records search default is intended to find the most occurrences of the ancestor's name you are searching for. - If the family member's name you are searching for is popular, like Johnson, try using some of the search options such as location, date range, and keyword, in order to do a more targeted search for the exact Johnson you are searching for (see below). Historical Documents & Records Database Advanced Search Tips - There are two keyword search boxes to narrow your search for historical documents and records: - "Include keywords" box and "Exclude keywords" box (see below). - Use the Date search box to enter a specific date or date range of the historical documents and records you are searching for. Searching Historical Documents & Records with Keywords & Quotation Marks - All historical documents and records queries are full-text keyword searches against OCR-generated ASCII text. This means the complete text is scanned against your search query for keyword matches. - With the "Include keywords" box and/or "Exclude keywords" box, you can expand or narrow your historical documents and records search. - Place key phrases in quotations such as "George Washington" in the "Include" keyword box to narrow the historical documents search to the exact name, instead of using the last/first name search that returns results matching George "near2" Washington. - If too many names are returned in the historical documents and records archive search results, make your search more granular by entering names or places you do NOT want included in your search into the "Exclude" box. Historical Documents & Records Boolean Operators - Search the historical documents database using AND, OR, ADJx (order specific), NEARx (order non-specific) and Wildcards (such as "?" and "*"). Broaden or narrow your historical documents and records queries - By clearing populated search fields to broaden your query, or by populating empty search fields to narrow your query. Display historical documents and records search results in a variety of ways, such as: - Best matches (this is the historical documents and records database search default). - Oldest items (based on document and record publication dates). - Newest items (based on document and record publication dates). - Once the search default is changed, the current selection will remain the default until it is changed again. Search Historical Documents & Records by Date Range - If you know the date of the historical documents and records content you are searching for, use the "Date" search box: - Enter a specific date or a date range—a variety of date formats are accepted. - Examples: June 2, 1804, or 1804-1849, or June 1804-August 1949. Search Old Historical Documents & Records Using Colonial English Variant Spellings Several of the historical documents and records in the archives database are quite old, and the searches must accommodate Colonial English. - The long "s" character was nearly identical to the "f" in many old English texts. - When searching old historical documents and records on words containing the letter "s," use the "?" for "s." - Note: this can occur whether it is the first letter, a letter within a word, or at the end of a word. - The double "s" in keywords like Mississippi should be replaced with two wildcards in historical documents and records queries. Old Historical Documents and Records Colonial English Search Examples: |Modern Spelling||Colonial Spellings||Suggested Search| - Type was set by hand for early American documents, and sometimes printers didn't have all the pieces of type needed to correctly spell a word. This resulted in letters being omitted from words, or the substitution of letters that looked similar to the ones missing. - Many of these historic documents and records didn't use standard spellings. - Here are some examples of conventions that were common in old documents and records: - Use of name variants: Smith or Smythe - Use of "e" in word endings: Chesapeake or Chesapeak - Dropping the letter "h": Philadelphia or Philadelpia - Examples of adding the letter "e" to word endings: - Brown - Browne - Chesapeake - Chefopeak or Chefopeake - Clark - Clarke - highways - highwayes - Examples of the interchanging use of the letters "i" and "y": - adjoining - adjoyning - Pennsylvania - Pensilvania or Penfilvania - rails - rayls - Examples of irregular vowel usage: - clerk - cleark - color - colour - Delaware - Deleware - Elijah - Elifha - Israel - Ifreal - Ifral - Jehovah - Javovah Colonial Documents & Records Search Notes: - Use wildcards such as the question mark "?" or the asterisk "*" in your colonial documents or records searches. - A question mark is a single-character wildcard and an asterisk is a multi-character (allows for up to 5 characters) wildcard.
<urn:uuid:c3ad7806-1f17-447d-bbee-061d160a9c3b>
2013-05-18T17:58:49Z
CC-MAIN-2013-20
[ [ -0.004730224609375, 0.00555419921875, -0.00579833984375, -0.021728515625, 0.0830078125, -0.056640625, 0.0023345947265625, 0.09423828125, -0.045166015625, 0.0091552734375, 0.125, 0.041259765625, 0.043701171875, 0.01336669921875, 0.050537109375, -0.015...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.834958
1,221
http://www.genealogybank.com/gbnk/documents/?lname=Nikola&pg=12&fname=Tesla
0.437841
If any journalist wishes to run my story please contact me on 07432142015 My name is Chris, I am 26 years old. I started looking for my Birth Parents in January this year, I am here to share my story but first I thought I would share my Background Story A baby named Christopher by his natural mother was born at 16.31 hours, on Friday 25th July 1986, at Rutherglen Maternity Hospital, Glasgow. He was a healthy baby boy with a birth weight of 3.4 kgs. He remained in the Special Care Nursery until 30 July 1986, when he was transferred to a Foster Home. His natural mother, called Fiona, was 25 years of age when her son was born. He is her first child. She became known to the Social Work Department in the Hospital in March 1986. when she attended the Ante Natal Clinic. From the onset Fiona requested adoption for her expected baby. The natural father, Brian was also aged 25 years. He and Fiona had been going together for approximately one year before the pregnancy was established and the relationship seemed to be stable. However, it came to an abrupt end when he realised Fiona's plan for he was totally opposed to adoption. He immediately sought legal advice in an attempt to gain custody of his son. Fiona is the youngest of six children, having three sisters and two brothers. Fiona was a "late baby" so her siblings are several years her senior. She resides with her 72 year old father, her mother havind died in 1977. Her father was an officer in the army, so the family moved around a great deal. Indeed Fiona's early childhood was spent in Hong Kong. When he retired from the Army he took up a post as an Accountant on one of the Royal Estates. Fiona's mother never went out to work. Her family is caring and supportive especially father and sister and this was very apparant throughout the protracted legal issue. Fiona was given every opportunity to consider all options open to her in the knowledge that her father would give all the support that he could, but she never waivered from her decisions not to see the baby and to place him for adoption as she felt that was best for him. In appearance Fiona is an attractive young woman with dark brown wavy hair, grey/green eyes and fair skin. She is 5ft 3 tall and of slim build. She left school at 16, and went on to complete a course in Office Practice at a Further Education Centre. She then took up employment as a Clerkess in a First Aid Suppliers and there she has remained. She seems to enjoy it and enjoys the company of her colleauges. Fiona leads a quiet life but ocassionaly goes to a Disco or has a drink with friends. She also enjoys listening to pop music, watching tv and reading modern romances. She assists her father with the household chores. The natural father, Brian is 5ft 8inches and of stocky build. He has brown/auburn curly hair and blue eyes. He enjoys most sports but especially football, which he both plays and spectates. He is also involved with Karate. He occasionaly also goes to Discos and enjoys a social drink with friends. He is a time served Plumber & Gas Fitter, but has been unemployed for approximately 5 years. In 1981, he was knocked down while crossing the road and suffered extensive head injuries and various other fractures which resulted in him being in hospital for several months. He feels however, that he is now fully recovered from that. Brian has no siblings. He lives outwith the family home but is in regular contact with his parents who live close by. His father aged 54 years, is employed as a Slater and his mother aged 52 years, is a Cleaner. Both parents were in complete agreement with their sons plans to have custody of Christopher and were prepared to give him whatever support that was required to the extent of mother giving up her job if necessary. Although Fiona had the support of her family she felt that adoption would be in the best interests of Christopher. She was not planning to marry and she did not feel that she could cope with the responsibilty of a child while being a single parent. She knew her father would assist but he was 71 years of age when Christopher was born and she feared her inability to cope if anything happened to her father. Fiona opposed Brian having the care of Christopher, as she wanted her child to be reared by a couple who could give all the things that she could not provide. She also felt that Brian's mother would be the primary carer and although she had a good relationship with her while she was still seeing Brian, Fiona wanted her child to be reared by someone young who would have the energy to stimulate him. This was very closely linked to her own experience for her parents were in their forties when she was born. Fiona never waivered from her plan for adoption for her child and indeed as the months passed she seemed to become more determined. Brian never waivered from his decision either so he was most disappointed when in September 1987, the Court decided that Christopher should be placed for adoption outwith the natural family. It had taken over 13 months from Christophers birth to work through the legal process and for such a decision to be made. Neither Brian nor his family, had access to Christopher. Fiona was particularly pleased when she realised that her son was going to a couple who already had an adopted child. She had not wanted Christopher to grow up alone. Again this was linked to her own experience for in many ways she felt like an "only child" as her siblings were so much older. Fiona favoured Mr. Mrs Buchanan as prospective future adoptors and was very pleased when the Adoption Panell ratified the placement. Christopher met his new parents on 2 December 1987, and after a 5 day intoductory period, because of his age, he was recieved into their care on 8 December 1987. When an Adoption Order is made the Registrar General for Scotland makes an entry in Adoptive CHildrens Register, showing the adopters as the parents of the child. A full extract and abbreviated certificate of the entry in the Register can be obtained by the adopters from the General Register Office, New Register House, Edinburgh, on the payment of a fee. When Christopher reaches the age of 17, he will be entitled to see his original entry in the Birth register and to purchase a certificate of that entry if he wishes. This means that when he is 17, he will be able to find out his original name as well as the name and address of his natural mother, when she registered the birth. Should you or Christopher wish to discuss any matters in future years, please do not hesitate to make contact with a Local Authority who would be happy to discuss any matters of concern.
<urn:uuid:84673837-2b5a-4337-a480-bd60f694ac39>
2013-05-18T17:18:41Z
CC-MAIN-2013-20
[ [ 0.01116943359375, 0.030517578125, 0.00151824951171875, 0.00872802734375, 0.08544921875, -0.034912109375, -0.018798828125, 0.0908203125, -0.017333984375, -0.0673828125, 0.034423828125, 0.01513671875, 0.0076904296875, -0.033935546875, 0.02880859375, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.993077
1,412
http://www.genesreunited.co.uk/boards/board/success_stories/thread/1313355
0.321723
of lakes dot the marshy Arctic tundra regions. Now, in the latest addition to the growing body of evidence that global warming is significantly affecting the Arctic, two recent studies suggest that thawing permafrost is the cause of two seemingly contradictory observations both rapidly growing and rapidly shrinking lakes. Thawing permafrost is altering the lakes that dominate Arctic landscapes, such as this one in western Siberia. Courtesy of Laurence C. Smith. The first study is a historical analysis of changes to 10,000 Siberian lakes over the past 30 years, a period of warming air and soil temperatures. Using satellite images, Laurence Smith, a geographer at the University of California, Los Angeles, and colleagues found that, since the early 1970s, 125 Siberian lakes vanished completely, and those that remain averaged a 6 percent loss in surface area, a total of 930 square kilometers. They report in the June 3 Science that the spatial pattern of lake disappearance suggests that the lakes drained away when the permafrost below them thawed, allowing the lake water to seep down into the groundwater. However, the team also found that lakes in northwestern Siberia actually grew by 12 percent, and 50 new lakes formed. Both of the rapid changes are due to warming, they say, and if the warming trend continues, the northern lakes will eventually shrink as well. These two processes are similar, in that were witnessing permafrost degradation in both regions, says co-author Larry Hinzman, a hydrologist at the University of Alaska in Fairbanks, who in previous studies documented shrinking lakes in southern Alaska. In the warmer, southern areas, we get groundwater infiltration, but in the northern areas, where the permafrost is thicker and colder, its going to take much, much longer for that to occur. So instead of seeing lakes shrinking there, were seeing lakes growing. That finding is consistent with the second study, which focused on a set of unusually oriented, rapidly growing lakes in northern Alaska, an area of continuous permafrost. Jon Pelletier, a geomorphologist at the University of Arizona in Tucson, reports in the June 30 Journal of Geophysical Research Earth Surface that the odd alignment of the lakes is caused not by wind direction but by permafrost melting faster at the downhill end of the lake, which has shallower banks. Since the 1950s, scientists have attributed the odd alignment of the egg-shaped lakes to winds blowing perpendicularly to the long axes of the lakes, which then set up currents that caused waves to break at the northwest and southeast ends, thus preferentially eroding them. The prevailing wind direction idea has been around so long that we dont even think about it, Smith says, but Jons [Pelletier] work is challenging that. Its a very interesting paper. Wind-driven erosion occurs in the Great Lakes, but at rates of about a meter a year. The Alaskan oriented thaw lakes grow at rates of 5 meters or more per year. Pelletier says this rate difference suggests a different process is at work. According to the model, the direction and speed of growth depend on where and how quickly the permafrost thaws, which is determined by two factors: how the water table intersects the slope of the landscape and how fast the summer temperature increases. If the permafrost thaws abruptly, the shorter, downhill bank is more likely to thaw first. The soggy soil slumps into the water, and the perimeter of the lake is enlarged. Its not just the [global] warming trend, but also how quickly the warming takes place in the summertime, Pelletier says. Hinzman says that the lakes are just one part of the Arctic water cycle, which has seen an increasing number of perturbations in recent years. The whole hydrologic cycle is changing and this is just one component of that. Understanding how the hydrologic cycle is changing is important, Hinzman says, because the amount of freshwater runoff into the Arctic Ocean impacts global ocean circulation and the amount of sea ice, thus affecting climate worldwide. If global warming continues to the point where permafrost goes away, there will be fewer lakes, Smith says. And a drier, less marshy Arctic could alter weather patterns and ecosystems, researchers say, affecting everything from the subsistence lifestyle of native people to the hazard of fire on the tundra. Geotimes contributing writer Back to top
<urn:uuid:5fdf99e1-ac10-4897-aae4-baeb9600a36e>
2013-05-18T17:28:09Z
CC-MAIN-2013-20
[ [ -0.021240234375, 0.0024566650390625, -0.01470947265625, 0.0047607421875, 0.08447265625, -0.0751953125, 0.0274658203125, 0.10107421875, -0.0257568359375, -0.02783203125, 0.05712890625, 0.0169677734375, -0.03369140625, 0.031982421875, 0.0079345703125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945934
921
http://www.geotimes.org/sept05/NN_arcticlakes.html
0.203443
What a way to go. . . . Thai police: Carradine death may be accidental Posted 6/5/2009 2:43 PM ET By Michael Casey, Associated Press Writer BANGKOK — The body of American actor David Carradine, best known for the 1970s TV series "Kung Fu," was found in a hotel room closet with a rope tied to his neck and genitals, and his death may have been caused by accidental suffocation, Thai police said Friday. The 72-year-old actor's body was discovered Thursday in his luxury suite at Bangkok's Swissotel Nai Lert Park Hotel. Police initially said they suspected suicide, though Carradine's associates had questioned that theory and authorities later said no suicide note was found in his room. Police Lt. Gen. Worapong Chewprecha told reporters that Carradine was found with a rope tied around his genitals and another rope around his neck. "The two ropes were tied together," he said. "It is unclear whether he committed suicide or not or he died of suffocation or heart failure." Another senior officer, Col. Somprasong Yenthuam, said there was also strand of rope tied around Carradine's wrist. "The initial cause of death is likely asphyxiation, which was probably caused by the rope that was tied around his neck," said Somprasong. Police completed an autopsy on Carradine on Friday. But Somprasong, superintendent of the Lumpini police station, which is handling the case, said results would not be ready for at least three weeks because the cause of death was unclear. He called the time lag "normal." Dr. Nanthana Sirisap, director of Chulalongkorn Hospital's Autopsy Center, told reporters that the autopsy was conducted because of the "unusual circumstances surrounding Carradine's death," but did not elaborate. The body was later removed from the hospital to an undisclosed location by U.S. Embassy representatives while preparations were being made for its repatriation to the United States. Police Lt. Teerapop Luanseng had said Thursday that Carradine's body was found "naked, hanging in a closet," and that police at the time suspected suicide. But one of Carradine's managers dismissed the theory. "All we can say is, we know David would never have committed suicide," said Tiffany Smith of Binder & Associates, his management company. "We're just waiting for them to finish the investigation and find out what really happened. He really appreciated everything life has to give ... and that's not something David would ever do to himself." Pornthip Rojanasunand, director of Thailand's Central Institute of Forensic Science, said Carradine may have died attempting a sex act known as auto-erotic asphyxiation -- cutting off oxygen to the brain for sexual arousal. The practice is said to result in a form of giddiness and euphoria -- similar to alcohol or drug intoxication -- that enhances the sexual experience. "If you hang yourself by the neck, you don't need so much pressure to kill yourself. Those who get highly sexually aroused tend to forget this fact," said Pornthip, who is considered the country's top criminal forensics expert but who did not take part in the autopsy. Carradine had flown to Thailand last week and began work on a film titled "Stretch" two days before his death, Smith said. He had several other projects lined up after the action film, which was being directed by Charles de Meaux. Carradine was in good spirits when he left the U.S. for Thailand on May 29 to work on "Stretch," Smith said. "David was excited to do it and excited to be a part of it," she said by phone from Beverly Hills. Filming began Tuesday, she said, adding that the crew was devastated by Carradine's death and did not wish to speak publicly about it for the time being. Monica Donati, a spokesman for the French film company MK2, which was making "Stretch," said in statement from Paris that the film crew in Bangkok was "clearly shocked" by Carradine's death but would finish shooting. Carradine only had three more days of filming left in Bangkok, she said. Aurelio Giraudo, the hotel's general manager, said Carradine checked into the hotel May 31 and he last saw him June 3. He said Carradine chatted with staff and even played piano a few nights in the lobby as well as flute which the "guests really enjoyed." "I was a fan. I had a very nice talk with him when he checked in," Giraudo told The Associated Press. "He was very much a person full of life. I mentioned to him that I had seen (the movie) "Crank" with my family and that was the last smile he gave me." Giraudo said a chambermaid discovered Carradine's body, adding that she knocked and entered after there was no response. Police arrived shortly thereafter. Somprasong said there was no evidence there was anyone else in the room at the time of Carradine's death. Carradine, a martial arts practitioner himself, was best known for the U.S. TV series "Kung Fu," which aired in 1972-75. He played Kwai Chang Caine, an orphan who was raised by Shaolin monks and fled China after killing the emperor's nephew in retaliation for the murder of his kung fu master. Carradine also appeared in more than 100 feature films with such directors as Martin Scorsese, Ingmar Bergman and Hal Ashby. He returned to the top in recent years as the title character in Quentin Tarantino's two-part saga "Kill Bill." Bill, the worldly father figure of a pack of crack assassins, was a shadowy presence in 2003's "Kill Bill -- Vol. 1." In that film, one of Bill's former assassins (Uma Thurman) begins a vengeful rampage against her old associates, including Bill.http://content.usatoday.net/dist/custom/gci/InsidePage.aspx?cId=honoluluadvertiser&sParam=30910193.story
<urn:uuid:3f9149c4-a423-436a-b290-d334f7809f88>
2013-05-18T17:50:19Z
CC-MAIN-2013-20
[ [ -0.0037384033203125, 0.043212890625, -0.00732421875, -0.00799560546875, 0.125, -0.06396484375, -0.021728515625, 0.0908203125, -0.004608154296875, -0.0732421875, 0.05517578125, 0.03515625, 0.037109375, -0.03271484375, 0.01409912109375, -0.038330078125...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988995
1,330
http://www.getbig.com/boards/index.php?topic=284373.msg4023978
0.451257
- NEW: At least 59 people were killed Thursday, an opposition group says - Syria says terrorists committed "a new massacre" - More than 10,000 people have been killed over the past year, an activist group says - Annan, a former U.N. secretary-general, seeks to stop the fighting Shelling in the besieged Syrian city of Hama continued early Thursday, a day after the United Nations Security Council called for the regime to end the bloodshed. A number of civilians were wounded and buildings collapsed during the attack by Syrian security forces, according to the opposition Local Coordination Committees of Syria (LCC). Across the country, at least 59 people were killed Thursday, including 12 children and four women, the LCC said. The deaths included 23 in Idlib; 15 in Homs; 13 in Hama; three in Daraa; one in Lattakia; one in Aleppo; two in the Damascus suburbs and one in Damascus. Some of the dead included defected soldiers who refused to shoot at civilians, the LCC said. The clashes come after at least 82 people were killed across Syria Wednesday, including 45 in Homs, according to the opposition group. Homs has been a hotbed of anti-government sentiment during the yearlong uprising against President Bashar al-Assad's regime. Activists said the corpses of 39 people killed this month were recovered from the city's Refaie district Wednesday. The Syrian government, which routinely blames the violence on "armed terrorist groups," said a child and his brother were "martyred" by one such group Thursday in Homs. Three citizens were wounded in the same attack, the state-run news agency SANA reported. "Also in Homs, armed terrorist groups committed a new massacre, brutally murdering a number of citizens who had been abducted earlier," the report said, insisting that the groups take footage of the dead bodies and send them to news channels. Opposition groups have said they are sending out images of people killed by the Syrian regime in its brutal crackdown to crush an uprising. CNN cannot independently confirm reports of casualties or attacks in Syria because the government has severely restricted the access of international journalists. U.N. officials say the yearlong crisis has killed more than 8,000 people, while opposition activists put the toll at more than 10,000. After months of failed attempts to stop the bloodshed, the U.N. Security Council Wednesday issued a presidential statement endorsing the peace mission of diplomat Kofi Annan, the U.N.-Arab League joint special envoy to Syria. His mission is to stop the violence, gain "timely" humanitarian aid access and foster a Syrian-led political transition. "The Security Council calls upon the Syrian government and opposition to work in good faith with the envoy toward a peaceful settlement of the Syrian crisis," the statement said. Unlike resolutions, U.N. presidential statements aren't legally binding. But they require unanimous support. This is significant because Russia and China, two permanent council members, have been obstacles to adopting tough resolutions on Syria. In its statement, the council cited concern at the deteriorating situation in Syria and expressed regret at the death of thousands of people. "The Syrian government should immediately cease troop movements towards and end the use of heavy weapons in population centers, and begin pullback of military concentrations in and around population centers," the statement said. U.N. Secretary-General Ban Ki-moon spoke about the Security Council statement and the situation in Syria Thursday. "All the violence must stop," Ban said. "In clear and unmistakable terms, the Security Council called for an immediate end to all violence and human rights violations. It demanded secure humanitarian access and a comprehensive political dialogue between the government and the whole spectrum of the Syrian opposition." The council called for a "daily two-hour humanitarian pause" for relief efforts and intensifying "the pace and scale of release of arbitrarily detained persons." It wants freedom of movement for journalists and "a nondiscriminatory visa policy for them." It also urged respect for "freedom of association and the right to demonstrate peacefully." U.S. Secretary of State Hillary Clinton said the move shows the council is speaking with one voice. CNN's Amir Ahmed, Holly Yan, Arwa Damon, Mick Krever and Joe Sterling contributed to this report.
<urn:uuid:2871d7de-3f79-465e-9973-596e27e4fc3c>
2013-05-18T17:48:43Z
CC-MAIN-2013-20
[ [ 0.03173828125, 0.0283203125, -0.02685546875, 0.0264892578125, 0.1513671875, -0.05517578125, -0.03955078125, 0.1025390625, 0.000858306884765625, -0.03466796875, 0.08935546875, 0.0537109375, 0.0240478515625, 0.006195068359375, 0.029052734375, 0.0074768...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962295
892
http://www.ghsr.org/syriamonitoring/index.php?option=com_content&view=article&id=850:scores-die-in-syrian-attacks-un-condemns-violence&catid=366:news-from-the-media&Itemid=140
0.471169
Formed in 1997, Global Fund grantee Woman of Tomorrow (Femme de Demain) works with women who have been "forgotten," who live on land that has been so over-farmed it is depleted of nutrients. Many of them are heads of households, widows, teen mothers or young girls orphaned by AIDS. They cannot read, and are subject to fraudulent levies and taxes when they take their goods to market. To combat such bleak conditions, the group trains women in basic literacy, accounting and pricing. To address the over-dependence on agriculture, especially during the dry season, a 2001 Global Fund grant of $7,000 supported their efforts to teach women other ways to earn a living. The group also teaches women about their human rights, explaining that a woman who becomes economically empowered, but remains oppressed within her home may be even more miserable than she was before. Recent events in Togo have made the group's work even more challenging. In February 2005, Togo's 18-year dictatorship ended with the death of President Gnassingbé Eyadéma. Ensuing actions led to the instatement of his son, Faure Gnassingbé, as president and involved reports of electoral fraud, violent clashes and roughly 30,000 people fleeing the country. These events forced Women of Tomorrow to temporarily suspend its activities for four months. Want to Change the World?
<urn:uuid:75bc76f5-515b-46ad-80ba-e7b1d6cb3a07>
2013-05-18T17:27:18Z
CC-MAIN-2013-20
[ [ -0.008103649131953716, 0.026009317487478256, -0.01125776395201683, 0.025232918560504913, 0.09549689292907715, -0.03823757916688919, -0.004876746796071529, 0.0803571417927742, -0.02018633484840393, -0.01116071455180645, 0.08695652335882187, 0.0018439440755173564, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974138
290
http://www.globalfundforwomen.org/impact/9-africa/78-women-of-tomorrow
0.350107
Connect to share and comment The ruling family in Saudi Arabia has appointed Prince Salman bin Abdul Aziz al-Saud as the country’s new crown prince. The ruling family in Saudi Arabia has appointed Prince Salman bin Abdul Aziz al-Saud as the country’s new crown prince, making the current defense minister and former governor of the capital, Riyadh, heir to 88-year-old King Abdullah’s throne. The appointment of Salman, 76, which was expected, comes two days after the death in Geneva of Crown Prince Nayef bin Abdul Aziz al-Saud, who died at the age of 78 while undergoing medical treatment. Salman is believed to be less conservative than his late, hard-line brother, who maintained close links with Saudi Arabia’s powerful Wahhabi religious establishment and focused his energies on crushing Al Qaeda’s presence inside the kingdom. However, Salman – who will remain as defense minister and become deputy prime minister – is, like Nayef, part of the Sudairi group, a faction made up of the sons born to King Abdul Aziz by a favoured wife, Princess Hassa al-Sudaira, according to the BBC. More from GlobalPost: Saudi Arabia's crown prince Nayef buried in Mecca Nayef, who also served as interior minister, is to be replaced by Salman’s younger brother, Prince Ahmed bin Abdul Aziz al-Saud, the Saudi Press Agency reported. US President Barack Obama released a statement Saturday praising Nayef’s support for a US-Saudi Arabian partnership against terrorism, according to CNN: “Under his leadership, the United States and Saudi Arabia developed a strong and effective partnership in the fight against terrorism, one that has saved countless American and Saudi lives,” the president said. The new crown prince previously became embroiled in controversy when he was named as a defendant in a lawsuit brought by several insurance firms against Saudi Arabia, accusing the kingdom of channelling money to Al Qaeda through Saudi religious charities, the Associated Press reported. More from GlobalPost: Saudi Arabia and the counter revolution
<urn:uuid:8ac8034e-a484-4d9d-8728-9cc263ee5711>
2013-05-18T17:58:45Z
CC-MAIN-2013-20
[ [ 0.030791403725743294, 0.05817610025405884, -0.009827043861150742, -0.0022929769475013018, 0.111635223031044, -0.04769391939043999, -0.04926624894142151, 0.09171907603740692, -0.005928983446210623, -0.04585953801870346, 0.04559748247265816, 0.025157231837511063, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960028
439
http://www.globalpost.com/dispatch/news/regions/middle-east/saudi-arabia/120618/prince-salman-named-new-crown-prince-saudi-arabia
0.22909
Connect to share and comment Britain has pledged support to the Syrian rebels after UN Envoy Kofi Annan's resignation. Britain has pledged "practical but non lethal support" for Syrian rebels after UN envoy Kofi Annan resigned last night, a move seen as underscoring the failure of international diplomacy in halting the Syrian conflict. According to William Hague, Britain's foreign secretary, Annan's decision to resign was a "bleak moment" in the efforts to end the conflict, the Telegraph reported. "Given the scale of death and suffering and the failure so far of the diplomatic process we will, over the coming weeks, increase our practical but non-lethal support," he told BBC Radio. He maintained that British support will not involve sending armaments. Annan resigned as the international peace envoy for Syria on Thursday night, effectively closing the major diplomatic avenue for resolving Syria's civil war. He criticised the UN Security Council for "finger-pointing and name-calling" instead of taking action to resolve the crisis. Annan placed much of the blame of his departure on the Syrian government's intransigence. But Hague said that the move to support the rebels didn't mean that Britain was giving up on diplomacy. "We don't give up on the diplomacy with Russia and with China. But we will have to do other things as well" he said, Reuters reported. According to Syrian President Bashar al-Assad, the insurgency is the work of foreign-backed "terrorists", and his own forces acting to restore stability. Asked about reports that President Barack Obama has authorised the CIA to aid the opposition forces, Hague declined to comment on any potential involvement of UK intelligence. "I do not ever comment on intelligence matters but I can say that we are helping elements of the Syrian opposition," Hague said, the Daily Mail reported. More from Globalpost: Syria: Yarmouk refugee camp hit by mortar attack, 21 killed -- report
<urn:uuid:1047e17b-e82b-4257-948c-4022b779afeb>
2013-05-18T18:09:36Z
CC-MAIN-2013-20
[ [ 0.00847630761563778, 0.043300654739141464, 0.00032552084303461015, 0.03145425021648407, 0.12472766637802124, -0.057189542800188065, -0.025054465979337692, 0.09640523046255112, 0.014637799933552742, -0.04602396488189697, 0.05882352963089943, 0.026416122913360596, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94391
400
http://www.globalpost.com/dispatch/news/regions/middle-east/syria/120803/syria-britain-increase-non-lethal-support-syrian-rebe
0.327237
Mash the garlic, salt, cinnamon, coriander, black pepper, and cumin into a past using a mortar and pestle. Pat the chicken pieces dry. Rub the paste all over. Let marinate, covered and chilled, for 6-8 hours. Preheat the oven to 400°F. Heat olive oil and butter in a large oven-safe skillet (large enough to accomodate chicken in one layer) over medium-high heat. Brown the chicken pieces on all sides, about 3-4 minutes per side. Transfer the pan to the oven; bake for 20-30 minutes or until the juices run clear when the leg is pierced with a fork. Remove the chicken from the pan and transfer to a platter. Tent loosely with foil and let rest for 5 minutes before serving.
<urn:uuid:f118dcfb-f5e2-48b5-809d-63cd4a382e0f>
2013-05-18T17:27:24Z
CC-MAIN-2013-20
[ [ -0.01741071417927742, 0.012321428395807743, -0.008258928544819355, 0.059285715222358704, 0.0682142823934555, -0.0021651785355061293, -0.020267857238650322, 0.11142857372760773, 0.03732142969965935, 0.037142857909202576, 0.11142857372760773, 0.04928571358323097, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.895681
167
http://www.glutenfreeda.com/recipe-view.asp?cat=10&id=2366
0.165793
Makes 4 servings. Difficulty 1/3 cup pineapple juice 1/4 cup gf soy sauce 1 Tablespoon firmly packed brown sugar 1 Tablespoon vegetable oil 2 teaspoons fresh ginger, minced 1/4 teaspoon ground allspice 1/2 teaspoon hot red pepper flakes 1/2 teaspoon dry mustard 4 pork loin rib chops 1 fresh pineapple, cored and cut into 1/2 inch slices 1 red onion, cut into 1/2 inch slices Lime wedges for garnish In a bowl, whisk together the pineapple juice, gf soy sauce, brown sugar, oil, ginger, allspice, hot red pepper flakes and dry mustard. Place the pork chops in a large zip lock bag. Pour all but 1/4 cup of the prepared sauce into the bag. Seal the bag and turn to coat the pork thoroughly. Place in the refrigerator and marinate overnight. Meanwhile, place the pineapple and onions in a single layer in a baking dish. Pour the remaining 1/4 cup sauce over the pineapple and onions. Cover and refrigerate overnight. Prepare the grill. Grill the pork, pineapple and onions for approximately 5-7 minutes, turning once halfway through, until the pineapple and onions are nicely browned and the pork is no longer pink in the center. Transfer the pork to a platter and tent with foil to keep warm. Let rest for 5 minutes before serving. To serve, place a pork chop on a dinner plate and top with pineapple and onions.
<urn:uuid:64e40976-af69-401c-aa17-09aeefd83d31>
2013-05-18T17:57:14Z
CC-MAIN-2013-20
[ [ -0.02300824224948883, 0.02970466949045658, -0.019745878875255585, 0.02970466949045658, 0.05219780281186104, 0.016397664323449135, 0.002060439670458436, 0.048076923936605453, 0.030734889209270477, 0.036916207522153854, 0.10302197933197021, 0.049450550228357315, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.856685
302
http://www.glutenfreeda.com/recipe-view.asp?id=3116
0.600361
Free Software for Windows Here is a list of popular free software applications that run on Microsoft Windows — along with the proprietary applications they replace. If you are still a Windows user, you can take a first step towards free software by installing these applications. When we say these application programs are free software, we're talking about freedom, not price. It means that you are free to use these programs constructively, either alone or in a community, while respecting the freedom of others. The source code is available, so that you can study the software, adapt it to your needs, fix bugs, and release versions with new features. You can also convince or pay others to do these things for you. You are also free to give away and free to sell copies, under the terms of the applicable free software license. These programs are free software because you have freedom in using them. Free software develops under the control of its users. Microsoft Windows is a clear and instructive example of nonfree software. Its source code is a secret, so programmers cannot learn from it, fix it, adapt it to their clients (your) needs, or even verify what it really does. If you share copies with your neighbors, you will be called a "pirate", and users have been threatened with imprisonment for this. Nonfree software is completely controlled by its developer, who also has power over the users. We started the free software movement because this power is unjust. Using free software on Microsoft Windows (or any nonfree operating system) is the first step towards freedom, but it does not get you all the way there. You're still under Microsoft's power as long as you use Windows. So the next step is to replace Windows with a free operating system such as GNU/Linux. However, on this page we're concerned with the first step. Replacement for: Maya, 3DSMax Blender is the first and only fully integrated 3D graphics creation suite allowing modeling, animation, rendering, post-production, realtime interactive 3D and game creation and playback with cross-platform compatibility. Replacement for: Microsoft Visio Dia is designed to be much like the proprietary Microsoft program 'Visio'. It can be used to draw many different kinds of diagrams. It currently has special objects to help draw entity relationship diagrams, UML diagrams, flowcharts, network diagrams, and simple circuits. It is also possible to add support for new shapes by writing simple XML files, using a subset of SVG to draw the shape. It can load and save diagrams to a custom XML format (gzipped by default, to save space), can export diagrams to EPS or SVG formats and can print diagrams (including ones that span multiple pages). Replacement for: Trillian, AIM, MSN, Yahoo and ICQ chat clients Pidgin (gaim) is a multi-protocol instant messaging client, with support for: - AIM (Oscar and TOC protocols), - MSN Messenger, - Gadu-Gadu, and - Zephyr networks. Pidgin also supports plugins, for additional functionality. Replacement for: Photoshop, Paint Shop Pro GIMP is an acronym for GNU Image Manipulation Program. It can be used as a simple paint program, an expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. GIMP is expandable and extensible. It is designed to be augmented with plug-ins and extensions to do just about anything. Anyone who is familiar with the GNU/Linux operating system has probably seen/used the GIMP at some stage. In terms of compatibility, GIMP can open/manipulate the PhotoShop PSD format and the Paint Shop Pro PSP format. Replacement for: Napster, etc. GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing. GNUnet uses a simple, excess-based economic model to allocate resources. Peers in GNUnet monitor each others behavior with respect to resource usage; peers that contribute to the network are rewarded with better service. Replacement for: Adobe Illustrator, Macromedia Freehand, CorelDraw or Xara Xtreme Inkscape is an vector graphics editor, with capabilities similar to Illustrator, Freehand, CorelDraw, or Xara Xtreme using the W3C standard Scalable Vector Graphics (SVG) file format. Supported SVG features include shapes, paths, text, markers, clones, alpha blending, transforms, gradients, patterns, and grouping. Inkscape also supports Creative Commons meta-data, node editing, layers, complex path operations, bitmap tracing, text-on-path, flowed text, direct XML editing, and more. It imports formats such as JPEG, PNG, TIFF, and others and exports PNG as well as multiple vector-based formats. Replacement for: Microsoft Visual C++ MinGW (Minimalist GNU for Windows) provides many of the GNU programming utilities on Windows. It includes the GNU Compiler Collection (GCC), Binutils, Gnu Debugger (GDB), make, and more. Replacement for: Outlook, Outlook Express Versatile and modular e-mail client. Supports themes and extensions to customise and increase its functionality. Has integrated "smart" spam filter, to cut down significantly on spam mail. Also integrates (via EnigMail extension) seamlessly with GNU GPG. Replacement for: Microsoft Office LibreOffice is a multi-platform office productivity suite compatible with all major file formats. Replacement for: PageMaker, InDesign, QuarkXPress Scribus is a desktop publishing application, like Adobe PageMaker or Adobe InDesign from the proprietary software world. It is free software, distributed under the terms of the Gnu General Public License. Scribus supports many major graphic formats including most all of the standard ones used in DTP in addition to SVG import and export. Replacement for: Windows Media Player, PowerDVD VLC (initially VideoLAN Client) is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network. Replacement for: BitTorrent Tribler is an application that enables its users to find, enjoy and share video, audio, pictures, and other things. Replacement for: Mozilla Firefox Iceweasel is a fork (from Firefox) with the following purpose : backporting of security fixes to declared Debian stable version and no inclusion of trademarked Mozilla artwork. This is a selection of the more common free software applications available for the Microsoft Windows platform, and is nothing like a comprehensive list.
<urn:uuid:9b93f220-d78d-40bd-bf6e-fa041615aeae>
2013-05-18T17:18:53Z
CC-MAIN-2013-20
[ [ -0.03515625, 0.0185546875, 0.0322265625, -0.01220703125, 0.059814453125, -0.08349609375, 0.01458740234375, 0.12255859375, -0.0252685546875, -0.01611328125, 0.0546875, 0.036865234375, -0.022216796875, 0.005401611328125, 0.021240234375, -0.010925292968...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.887244
1,491
http://www.gnu.org/software/for-windows.en.html
0.599403
The European governing body have moved to sanction the club for Sir Alex Ferguson's failure to fulfil media obligations in the aftermath of the Portuguese's red cardManchester United and Nani following the club's defeat to Real Madrid on Tuesday evening. The Portuguese winger was sent from the field during the Champions League last-16 second-leg after connecting with Los Blancos right-back Alvaro Arbeloa with a high boot. That decision left manager Sir Alex Ferguson infuriated, and the 71-year-old sent assistant Mike Phelan in his place to fulfil the club's media obligations after the game. Phelan revealed that Ferguson was "too distraught" with referee Cuneyt's Cakir's performance to face the press in the immediate aftermath, despite his absence contravening Uefa rules. The Red Devils also face sanctions over their failure to provide two players for press interviews after the game. The current Premier League leaders could face further disciplinary action should veteran defender Rio Ferdinand's sarcastic applause of Cakir shortly after the final whistle be mentioned in the official's report.
<urn:uuid:3487afdf-be65-4890-a41e-4f293f7eeddd>
2013-05-18T17:59:39Z
CC-MAIN-2013-20
[ [ 0.0189208984375, 0.048095703125, 0.004486083984375, -0.004241943359375, 0.07470703125, -0.0272216796875, 0.00250244140625, 0.06005859375, 0.039306640625, -0.052734375, 0.06298828125, 0.060302734375, -0.08056640625, 0.00848388671875, 0.0311279296875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942641
223
http://www.goal.com/en-gb/news/2914/champions-league/2013/03/06/3803596/uefa-opens-disciplinary-proceedings-against-manchester?ICID=AR_AB_latest
0.87061
Michael Shaara was a novelist, short story writer, and educator. He was born in Jersey City, New Jersey on June 23, 1928. Shaara earned a B.S. from Rutgers University and did graduate work at Columbia University and the University of Vermont. Shaara spent two years in the service, worked as a policeman and a sailor, and became associate professor at Florida State University in 1961. From 1961 to 1965 he wrote, produced, and performed in a show for educational television. Shaara published a novel in 1974 titled, The Killer Angels. The novel told the story of the Battle of Gettysburg from the point of view of the men fighting it. It received the Pulitzer Prize in 1975. In 1993, the novel was the basis for the motion picture Gettysburg. Shaara also published more than 70 short stories that appeared in several U.S. and foreign publications and wrote several more novels. Shaara died on May 5, 1988.
<urn:uuid:080cff67-bb88-42cb-aaac-d9f3ebbd48ce>
2013-05-18T18:07:13Z
CC-MAIN-2013-20
[ [ -0.028462441638112068, 0.01863262988626957, -0.023180751129984856, -0.020686618983745575, 0.0410798117518425, -0.03506455570459366, -0.010416666977107525, 0.04929577559232712, -0.042840376496315, -0.05046948418021202, 0.10152582079172134, 0.03066314570605755, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.990063
192
http://www.gohastings.com/catalog/contributor.jsp?PRODUCT_TYPE_ID=BOOK&CONTRIBUTOR_ID=253037
0.776521
Because “The Artist” beat “The Descendants” (left) for Best Picture at the Oscars. A strange pattern has emerged over the past 50 years, and it seems an incumbent president’s hopes for re-election are tied to which films win big at the two major Hollywood award shows, says OutFront producer Christopher Moloney. Specifically, if a film is named Best Picture (Drama) at the Golden Globes and Best Picture at the Academy Awards, the Republican candidate is elected. If not, the Democrat wins. The theory applies to the year the films are awarded, not the year they are released–this year’s awards went to films released last year–and if it holds, “The Descendants’ ” inability to repeat its Golden Globes triumph at this year’s Oscars means Obama will win. In 2004, George W. Bush, a Republican, was re-elected when “The Lord of The Rings: The Return of the King” won both the Golden Globe and the Oscar. In 1996, Bill Clinton, a Democrat, won a second term when “Sense & Sensibility” and “Braveheart” split the trophies. “Bugsy” won the Golden Globe and “Silence of the Lambs” took the Oscar in 1992, and George H. W. Bush lost to Clinton. Ronald Reagan won his second term in 1984, when “Terms of Endearment” won both statues, and four years before that, he beat Jimmy Carter during the “Kramer vs. Kramer” sweep. In 1972, Richard Nixon was re-elected on the strength of “The French Connection,” a film about a police officer who stumbles on a French connection, only to resign two years later when a security guard stumbles on a Cuban connection. And less than a year after assuming office for John F. Kennedy, Lyndon Johnson was re-elected when the Golden Globe and the Oscar went to two different films: one about a young Catholic priest from Boston confronting bigotry (“The Cardinal”), the other about a ladies’ man (“Tom Jones“). There are exceptions to the rule, of course. In 1976, when “One Flew Over the Cuckoo’s Nest” won both awards, things went crazy, and Gerald Ford failed to win. But as Ford was never actually elected as president or vice president in the first place, there is an argument to be made he was never a true incumbent. The only other time the election went off-script was in 1956, the first year the Golden Globes were held with a president seeking a second term. That year, “East of Eden” won the Golden Globe but not the Oscar, which went to “Marty,” and Adlai Stevenson, a Democrat, lost to incumbent Dwight D. The loss must have been particularly tough for John Steinbeck, the “East of Eden” author, who had actually sent a 19-page handwritten letter to the Democratic Digest, advising them on how to prevent Eisenhower from winning a second term. In the letter, Steinbeck wrote: “It is generally considered that novelists are not good politicians. As candidates I should (think) this would be true but as designers of political method the reverse is probably true.” Or maybe he should have just asked a screenwriter. |1st March 2012,|
<urn:uuid:6a04bffa-46c6-44b0-986d-32054d0c1441>
2013-05-18T17:27:51Z
CC-MAIN-2013-20
[ [ 0.0242919921875, 0.0194091796875, -0.0186767578125, -0.007476806640625, 0.04736328125, -0.015380859375, -0.0240478515625, 0.09521484375, -0.0250244140625, -0.025146484375, 0.0791015625, -0.0001544952392578125, -0.0206298828125, 0.009033203125, 0.04052734...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967683
744
http://www.goldenglobes.org/2012/03/does-the-globe-for-descendants-mean-obama-will-win/
0.254771
James Mishler wrote: Another geography questions... The forest of the Sylvan Downs, between the Saedre River and Dundraville, is unnamed and not described in the Gazetteer. Considering the nature of the Sylvan Downs, I'm guessing it is home to a moderately civilized elven society, but that too is not named in the Elven Nations entry. Is it something as simple as the "Sylvan Wood"? First off, thank you for your attention to the details of the setting, James. That's an enormous compliment. The forested area of the Sylvan Downs is composed of 5 different dales/downs each calling its own particular section of the wood by their own name, even though the forest is continuous. As a single entity, both the nation and the forest are known simply as the Sylvan Downs, with the distinction (forest vs. nation) being made in context. James Mishler wrote: There are also several other major forested sections in the North that are not named ... Nods. When it dawned on us just how cartographically "dense" the Northlands were, we had to drop some of the names and even town placements. With the exception of some of the very remote swaths of forest, most have names; I'll try to supply these, time pending. One important detail about the setting: a lot of it is relatively "new" to the experience of the modern human nations. Dragons, elves and fae have known the forests since the dawn of time, but this isn't the case for the humans. The dark ages have resulted in the great loss of a good deal of knowledge, that modern-era humans are only now beginning to regain, either by exploring the wildnerness, or recovering ancient tomes from past ages. To wit, exploring PCs should have the chance to name the forests themselves. The dragons might have their own name for it, but you can discuss that with Smaug over tea. This is somewhat akin to going hiking in the Rockies. You stand atop a mountain and see forests on all sides, but heck if you know their names, apart from "national wilderness area X." There is a ton of land out there, and for lack of a better phrase, a great deal of "geography." My ideal Known World map would have all of this information (Dragon names, Fae names, Elven names), coded with degrees of who knows it and Bardic Knowledge/Sage check DCs for the same, but that's a little unwieldly from a mapping stand point.
<urn:uuid:0e1086f5-3ed0-47b7-b5b7-165f675acac5>
2013-05-18T17:19:28Z
CC-MAIN-2013-20
[ [ -0.0174560546875, -0.0113525390625, -0.0179443359375, -0.0026397705078125, 0.07470703125, -0.0299072265625, 0.0004138946533203125, 0.08837890625, -0.0107421875, 0.0033416748046875, 0.0286865234375, 0.032958984375, -0.007080078125, 0.039306640625, 0.01806...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964343
534
http://www.goodman-games.com/forums/viewtopic.php?p=8068
0.16713
US 7843689 B2 A fire resistant and water resistant enclosure for an operable computer digital data storage device is provided. The enclosure has walls made of gypsum or concrete and, in one embodiment, has two small ventilation openings which remain open during normal operation of the digital data storage device and during the presence of fire. This embodiment has no moving parts. In the presence of fire, air and superheated steam from inside the enclosure expand and flow outwardly through the ventilation passageways. As those gases flow outwardly, they simultaneously block or prevent the transfer of heat from the exterior fire inwardly through those passageways. A water resistant pouch or coating surrounding the storage device prevents damage from flood, water, steam generated by the insulation or smoke from passing through said passageways and damaging the storage device. Another embodiment is provided utilizing one or more movable hatches which, in the presence of fire, cannot completely close, allowing superheated steam to escape from the enclosure yet during normal operation allow for better ventilation and cooling. A method is also provided for protecting the data storage device wherein the walls of the enclosure are supersaturated with water. The walls are coated with a vapor barrier such as plastic skin, plastic container or wax to prevent evaporation of water. In the presence of fire, the vapor barrier melts and the excess water stored in the walls absorbs latent heat of vaporization and extends the amount of time over which the enclosure is able to protect the storage device from damage. 1. Apparatus for protecting an operable computer digital data storage device from damage or loss of data caused by fire and/or water, comprising: an operable digital data storage device, a fire resistant enclosure for said operable digital data storage device, said enclosure being made of water based fire resistant insulation such as gypsum or concrete, one or more small ventilation openings which never completely close and seal the said enclosure, said openings being of a relatively small size, approximately 1% or less of said enclosure's exterior surface area, to allow for sufficient cooling during normal operation but allow heated air and steam from inside said enclosure to escape and simultaneously prevent the transfer of heat inwardly therethrough during a fire, and a water resistant pouch or coating enclosing said digital data storage device contained in said enclosure. 2. The apparatus of 3. The apparatus of 4. Apparatus for protecting an operable computer digital data storage device from damage or loss of data caused by fire and water, comprising: an operable digital data storage device, a fire resistant enclosure for said operable digital data storage device, said enclosure being made of water based fire resistant insulation such as gypsum or concrete, a movable fire resistant hatch positioned adjacent said opening which is never allowed to completely close, said hatch of relatively large size (2% or more of total enclosure exterior surface area) and movable between an open position wherein a relatively high amount of ambient air may pass through said opening, and a partially closed position (closing to 1% or less than the total enclosure external surface area) wherein superheated steam inside said enclosure may escape through said opening, hatch closure means for moving said hatch from its open to its partially closed position in the presence of fire, and a water resistant pouch or coating enclosing said digital data storage device contained in said enclosure. 5. The apparatus of 6. The apparatus of 7. The apparatus of 8. The apparatus of This application is a Continuation-in-Part of U.S. application Ser. No. 12/319,019 filed Dec. 31, 2008; and a Continuation-in-Part of U.S. application Ser. No. 12/009,072 filed Jan. 16, 2008. This application is also a Continuation-in-Part of U.S. application Ser. No. 11/980,215 filed Oct. 30, 2007; which is a Continuation-in-Part of U.S. application Ser. No. 11/285,854 filed Nov. 23, 2005 (now U.S. Pat. No. 7,291,784); which is a Continuation-In-Part of U.S. application Ser. No. 11/112,552 filed Apr. 22, 2005 (now U.S. Pat. No. 7,211,742). This application also claims the benefit of and priority from U.S. provisional application Ser. No. 61/127,217 filed on May 9, 2008 and Ser. No. 61/132,497 filed on Jun. 19, 2008. The present invention pertains to water and fire resistant enclosures for operable computer data storage devices. More particularly, by some estimates over 80% of the damage in a fire is actually caused by water exposure and not the fire! Extreme water pressure from fire hoses or damage from automatic sprinklers typically causes more damage than the fire itself. In addition, vast amounts of steam, superheated and generated by typical fire resistant insulations serve to also damage data storage devices if the steam is managed incorrectly. The present invention provides significant improvements in the cost and performance of these enclosures during normal operation as well as in the presence of a fire and/or flood. A problem with the movable hatch and fan design of U.S. Pat. No. 7,211,742 is that when the enclosure walls are made of gypsum or concrete, in the presence of fire, the movable hatch (or hatches) completely seals the ventilation openings of the enclosure. The prior art describes multiple enclosures for data storage devices using water based fire resistant insulations in which the enclosures are completely sealed. Similar to the effect of a stove top pressure cooking device for cooking food, a completely sealed container combined with the water carried by and chemically bound inside the gypsum or concrete walls is turned to steam and becomes superheated and pressurized since it is unable to easily escape from the interior chamber of the enclosure. The superheated steam, useful in cooking turkey, can easily destroy a data storage device beyond repair and cause the loss of valuable data. Allowing said steam to escape by not completely sealing the enclosure can dramatically reduce the interior temperature of the enclosure by over 100° F. allowing for greatly improved chances when recovering data after a fire. One aspect of the invention is to overcome the above stated problem by preventing the movable hatch (or hatches) from completely sealing the ventilation opening in the presence of fire. This aspect is useful for relatively high power (20 to 2000 watts) data storage devices. The movable hatch concept allows a relatively large opening (2% or more than the external surface area of the enclosure) for the computer data storage device to allow for maximum airflow during normal operations for sufficient cooling. When exposed to high ambient temperatures over 200° F., such as in a fire, the movable hatches would nearly completely close to protect from exterior heat. During the fire though, a critical difference from the prior art would be movable hatches that are designed to not completely close but allow a slight opening of 1% or less of the total external surface area of said enclosure for superheated steam to escape resulting in a dramatically cooler inner temperature than a completely sealed enclosure. The slight, yet critical, opening would allow the pressure inside the enclosure to equalize with the outer atmospheric pressure. From physics, the Combined Gas Law dictates [(P1V1)/T1=(P2V2)/T2], a drop in pressure from one condition to the next with no change in volume would result in a proportional drop in temperature (Kelvins). When comparing a data storage device with and without the small steam exhaust opening, test results have shown that the interior temperature can be decreased over 100° F. with the addition of the partially closed ventilation passageway in a fire! This dramatic improvement is critical to the survivability of electronics as when exposed to over 300°, typical active data storage media such as hard disk drives can quickly degrade and could become unrecoverable resulting in the loss of irreplaceable data. A critical issue arises in a design with hatches that never completely seal the inner cavity. As previously mentioned, water damage caused by fire fighters and automatic sprinklers can result in more damage than the fire itself. Water, in a flood, can obviously penetrate an enclosure that never seals. A critical aspect of this invention provides a water resistant barrier around the data storage device which is completely contained inside the fire resistant enclosure. As will be shown, this critical difference enables the invention to survive water damage from multiple sources including: fire hose spray, automatic sprinklers, complete submersion and water given off as steam from the fire resistant insulation. Another aspect of the invention is to overcome the same problem by utilizing a hatchless design. The hatchless design could be used for relatively low power devices (5-20 watts) in which during normal operation, a sufficient amount of air can be transferred through the enclosure for cooling the computer storage device contained within. It is significant to note that this embodiment of the invention has no moving parts! In the presence of fire, the insulation and chemically bound water is released through the small ventilation passageway to conduct steam outwardly before the steam becomes superheated to dangerous temperatures. The ventilation passageway is sufficiently small to prevent the transfer of excessive heat from said fire therethrough. A further aspect of the present invention is to increase the amount of water carried by the gypsum (or concrete) to prolong the time period during which the enclosure maintains a sufficiently low interior temperature to protect the data storage device. The walls are either supersaturated or supercharged with water according to the invention. Various techniques are also utilized to prevent the supersaturated walls from losing water to ordinary evaporation. The water is critical to successful operation of the enclosure, since it can dissipate enormous amounts of heat (latent heat of vaporization of water is equal to 2260 kJ/kg) as it is converted to steam. The amount of water dissipated during a fire is proportional to the duration of protection possible by the enclosure. Assuming the gypsum or concrete is supersaturated with twice the amount of water, the enclosure has twice the cooling power and in some cases can resist the presence of fire approximately twice as long!! The present invention relates generally to apparatus for protecting an operable computer digital data storage device from damage and loss of data resulting from fire or water exposure. More particularly, the present invention provides a compact, low cost, fire and water resistant enclosure for an operable computer digital data storage device. Typical computer digital data storage devices include computer hard disk drives, optical disk drives, solid state memory devices, tape drives, computers, or any other device which can actively read and write digital data with the intent of storing and retrieving computerized digital data. In the description below, reference is occasionally made simply to a hard disk drive as an example of a computer data storage device. It is to be understood that such a reference below is an example and not a limitation of the invention to hard drives. Also, in the description below, reference is occasionally made simply to a fan as an example of a device to force airflow through an enclosure. There are multiple devices which actively move air known by many names such as fan, blower, air pump, etc. It is to be understood that a reference of fan below is an example and not a limitation of the types of devices to actively move air. As digital data storage devices become able to store staggering amounts of data, the loss of a digital data storage device in disasters such as fire or flood becomes more and more catastrophic. For the home consumer, digital pictures, digital video and digitized music are becoming more and more common. By some estimates, digital storage requirements are growing at an average compounding rate of over 100% per year. According to some studies, over 90% of businesses close after experiencing catastrophic data loss. Smaller businesses and remote offices are especially vulnerable as they are typically without the resources to develop sophisticated disaster recovery plans. There is clearly a need to provide a compact, low cost, reliable fire and/or water resistant enclosure for operating digital data storage devices. The prior art contains numerous examples of enclosures that are more complicated, not waterproof, less reliable, more costly resulting in data loss when exposed to fire, floods or water damage from the act of fighting a fire. The present invention provides an improved compact, low cost, fire and/or water resistant enclosure for an operable computer digital data storage device. The phrase “fire resistant enclosure,” as used herein and in the claims, is hereby defined as an enclosure resistant to fire that occurs outside the enclosure. Fire resistance enclosures are designed to protect the contents inside the enclosure. The present invention differs from prior art “fire suppression enclosures” that are intended to suppress or to prevent the spread of fire that occurs within the enclosure, as for example in Blackmon et al, U.S. Pat. No. 6,548,753. Fire suppression enclosures are meant to protect the spread of fire to nearby objects outside the enclosure. As a result, fire suppression enclosures can be made of thin metal walls. On the other hand, fire resistant enclosures, such as the present invention, must include relatively thick, thermally insulating walls which incorporate insulation materials such as gypsum, ceramic fiber insulation or other possible fire resistant insulations. Enclosures made of thick, insulation filled walls filled with material such as gypsum present significantly different and more difficult design challenges than simple thin-walled metal enclosures due to the heat producing nature of active electronic storage devices. The present invention includes several alternate embodiments, all of which are intended to provide low cost, reliable fire resistant and water resistant enclosures for operating hard drives and other computer data storage devices. The embodiments include, for example, hatchless enclosures with and without fans; water resistant enclosures with and without movable hatches; free convection enclosures with and without movable hatches. The primary difference between the present invention and all known prior inventions is that the primary enclosure uses a water based insulation but is never completely sealed. Whether the enclosure has a hatch or is hatchless, a small opening is always present to allow for super heated interior steam from the insulation to escape during a fire. One embodiment of the present invention avoids the use of movable hatches, such as shown and described in U.S. patent application Ser. No. 11/112,552, referenced above, which application is hereby included herein by reference. The hatchless embodiment of the present invention also avoids the requirement of any fire or smoke sensing apparatus. Elimination of those components results in a significantly lower cost device. The linchpin for the preferred embodiment is the discovery that vents of a sufficiently small size (1% or less of the external surface area of said enclosure) formed in a relatively thick water based fire resistant insulation such as a gypsum or concrete wall, for example, 1.5 inches thick, will prevent damage by fire while simultaneously allowing enough air ventilation in the absence of fire to cool the operating storage device! We have tested the concept with a prototype subjected to fire, with no loss of data and no serious damage to the hard drive storage device! Prior to the water based insulation releasing steam, we believe that as the internal air temperature starts to rise in the presence of fire, the internal air expands and flows outwardly through the small vent or vents. (The fan or blower that may or may not be present forces air through the vents loses power and stops operating at the outset of a fire.) The outward flow of expanding air counteracts the flow of external heat from the fire through the small vents into the internal chamber. The small vent or vents can be designed as tortuous or labyrinthian passages to reduce the amount of external heat from a fire that flows into the inner chamber. Examples are described below and shown in the drawings. Our discovery is confirmed by the following calculation. Assuming constant atmospheric pressure, the internal volume of air will expand proportionally to the temperature rise in Kelvin (Tkelvin=Tcentigrade+273.15) according to the ideal gas theory and Combined Gas Law [(P1V1)/T1=(P2V2)/T2]. Assuming an initial temperature of 298 K (25° C.) and a final temperature of 373 K (100° C.), the internal chamber volume of air is expected to increase by approximately 25%. Therefore, it is believed that 25% of the volume of air in the inner chamber will slowly flow outwardly through the vent or vents as the temperature of the inner chamber gradually increases by 75° C. By sizing the inner chamber and vents appropriately, we have discovered that an insulated and vented chamber can be sufficiently fire resistant to prevent loss of data from most fires!! Additionally, as the temperature inside the enclosure reaches 373 K (100° C.) in a fire, the chemically bound water molecules in the water based insulation such as in gypsum or cement begin to release as steam providing a continuous outflow of gas throughout the fires duration as long as water is still present in the insulation. We are unaware of any prior art fire resistant enclosures for active data storage devices wherein vents in the walls remain open in the absence of fire and in the presence of fire. The prior art does include the Olzak et al U.S. Pat. No. 6,153,720 which teaches an aircraft recorder. The enclosure for the recorder includes vents which are normally closed but become opened in the presence of fire; a phase changing, heat absorbing layer melts and drains through the vents. The vents allow equalization of pressure if the recorder falls into the ocean. The Olzak et al enclosure does not teach or suggest forced air ventilation (or any ventilation) for an operating digital data storage device wherein significant amounts of heat are generated. It is simply not usable for the purpose of the present invention. Another embodiment of the invention includes a water resistant, smoke resistant and heat conductive “pouch” (covering, water vapor barrier or waterproof enclosure) which surrounds the data storage device. The “pouch” and data storage device are both positioned inside a fire resistant enclosure. Heat generated by the data storage device is conducted through the “pouch” (preferably metal) and is thereafter transferred to the exterior of the fire resistant enclosure by a variety of techniques. The “pouch” is fully submersible and protects the device and stored data in up to 30 feet of water and/or possible damage from smoke. Prevention of smoke or water damage is a significant issue with any enclosure with openings that readily allow water or smoke to enter the inner chamber and damage the data storage device. The present invention provides a waterproof barrier around the data storage device that conducts heat generated by the device without interfering with its operation and/or ability to properly dissipate heat. The prior art contains devices with complicated closure mechanisms to seal off water or smoke which rely on electrically driven water sensors and electromechanical actuators to seal off openings. Because the nature of water intrusion can be sudden and the speed of closure finite, one cannot be completely certain of preventing all water damage with a sensor and actuator architecture. The present invention, by surrounding the data storage device in a water resistant ‘pouch’ is inherently water proof to any exposure or flood while requiring no actuation or electrical power to protect against water damage! Another problem with prior art water based fireproof insulation enclosures is that, in some instances, when the water carried in the water based fire resistant insulation such as gypsum or concrete is exposed to a fire, the interior chamber becomes fully saturated with water vapor raising the humidity to 100%. That humidity can damage the data storage device. The waterproof barrier of the present invention can prevent damage to the data storage device from the 100% humidity condition within the chamber. The prior art includes water and fire resistant enclosures for paper documents (see Gelb et al U.S. Pat. No. 4,992,310); however, such enclosures are wholly unsuitable for an operating computer data storage device due to a lack of any features to provide cooling to the active electronics during normal use. Without such features, the internal temperature could rise to hundreds of degrees preventing the normal operation of typical electronic storage devices. The prior art also includes cooling jackets for data storage devices, but the cooling jackets are not water resistant (see Cheon U.S. published application 2004/0190255). The prior art includes a relatively large enclosure for operable digital data storage devices, such as the Engler U.S. Pat. No. 6,158,833, which dissipates heat generated by the digital data storage device by conduction through the insulated walls of the container. The Engler design requires a relatively large enclosure and a low wattage devices within the enclosure since it does not provide any active or fan-driven cooling system. The present invention, in contrast, provides a compact enclosure a fraction of the size of the Engler enclosure for similar wattage devices. The present invention has shown to reduce the size, weight and cost of the enclosure by up to 90% while accommodating the same or greater cooling capability. The compact size of the present invention in one embodiment is achieved primarily because of a forced-air cooling system not present in the Engler device. The prior art includes Pehrsson WO 89/06921, which provides a concrete wall enclosure with ventilation openings, a fan, and movable hatches. However, the hatches are designed to fully block and completely seal the openings in the event of fire which would result in data loss from superheated steam being unable to escape the completely sealed container. The present invention, as noted above, never fully closes the ventilation openings overcoming the issue of superheated steam. Pehrsson also does not provide any water resistant or smoke protection for the contents of the enclosure which could result in loss of data due to damage from elements common in almost all fires such as 100% humidity, smoke, fire sprinklers or fire hoses. Pehrsson also has no provisions for complete water immersion common in hurricanes, basements with broken water pipes or flooding common in many areas. The prior art includes other digital data storage device enclosures with a complicated array of active sensors and expensive electromechanical device to disconnect and completely seal in the inner chamber from the external environment, such as Pihl et al U.S. Pat. No. 5,479,341. The Pihl patent teaches of an enclosure that has no active cooling during normal operation and does not inherently protect the data storage device in advance of a flood but instead relies on complicated and expensive sensors and actuators to sense and shut the enclosure before water damage can occur. In addition, the Pihl enclosure is designed to completely seal off the protected interior chamber which results in no escape route for the superheated steam and elevated temperatures and pressure during a fire. The Kikinis U.S. Pat. No. 5,623,597 utilizes a rather complex, passive heat exchanger with a rather large heat sink structure. That design requires a cumbersome insulation injection mechanism to fill the heat sink space when a threshold temperature is sensed. The present invention includes a “free convection” embodiment having a much simpler and more robust design than the prior art resulting in a design that is inherently fire resistant and water resistant with no moving parts and can cost up to 90% less than previous inventions. The prior art also includes the Kishon et al published U.S. application No. U.S. 2004/0064631 dated Apr. 1, 2004. The Kishon et al device utilizes passive conduction of heat generated by the data storage device through screws extending from ambient air to the device cover (see paragraph ). This technique is limited by the relatively low amount of heat transferable through the metal screws. The active, fan-driven cooling provided by the present invention achieves a much greater cooling capacity. In addition, the Kishon patent teaches of a completely sealed enclosure and gypsum insulation which would result in superheated temperatures during a fire. The prior art also includes forced air cooling systems for operational digital data storage devices, but not used together with a compact, fire resistant and water resistant enclosure. A primary object of the invention is to provide a fire resistant and/or water resistant enclosure for an operable computer digital data storage device which is robust in design, can accommodate higher heat producing electronics and inexpensive to produce. A further object of the invention is to provide a water based fire resistant insulation such as a gypsum or concrete enclosure which may or may not utilize a fan and one or more vents to create either free or forced convection cooling and in which one or more movable hatches close in the presence of fire, but wherein the hatch closure does not fully seal the vent or vents, so that steam may be released through the partially sealed vent or vents. Another object of the invention is to provide a gypsum enclosure wherein the gypsum walls are supersaturated or supercharged with water, and wherein said additional water becomes vaporized in the presence of fire and greatly prolongs the time period during which the enclosure protects the data storage device from heat damage. A further object of the invention is to provide a fire resistant and water resistant enclosure for an operating data storage device having a hatchless enclosure which avoids the requirement of any fire, water or smoke sensing apparatus, and which has no moving parts. The operational digital data storage device would utilize vents of a sufficiently small size to prevent damage by fire while simultaneously allowing enough air ventilation to pass therethrough in the absence of fire to cool the operating storage device. Another object of the invention is to provide a fire resistant enclosure for an active data storage device wherein vents in the walls of the enclosure remain open in the absence of fire and in the presence of fire. A further object of the invention is to provide an enclosure for an operating computer data storage device wherein a heat conductive “pouch” surrounds the storage device, which is submersible and inherently protects the data storage device and data stored therein in advance of any potential flood or water exposure in up to 30 feet of fresh water or salt water. Other objects and advantages of the invention will become apparent from the following description and drawings wherein: The applications identified in the section entitled “Cross Reference to Related Applications” are all incorporated herein by reference. Openings or passageways 31 and 32 are formed in walls 24 and 23, respectively. Movable fire resistant hatches 51 and 52 are positioned adjacent openings or passageways 31 and 32. Hatches 51 and 52 have a first open position as shown in A water resistant coating, enclosure or ‘pouch’ 70 encloses the digital data storage device. The ‘pouch’ 70 must be thermally conductive to conduct the heat generated by storage device 10 and must simultaneously be water resistant. Examples of such waterproof coating are described in parent application Ser. Nos. 12/009,072 and 11/980,215 and are not described at length here. Those coatings include the following examples: aluminum foil; an extruded metallic container; an elastomeric, rubberized epoxy compound known as Cotronics “Duralco™ 4538,” available at www.cotronics.com; and a reaction injection molding thermoset polyurethane polymer from www.rimnetics.com. Stops 91 and 92 are provided to limit the motion of hatches 51 and 52 in the event of fire. Hatch closure means includes tabs 55 and 56 and springs 57 and 58 which move hatches 51 and 52 to their “closed” position in the event of fire. Tabs 55 and 56 are temperature sensitive elements which normally cause the hatches 51 and 52 to stay open. In the presence of a threshold temperature indicative of fire, the tabs 55 and 56 melt, allowing springs 57 and 58 to move hatches 51 and 52 to their closed position. It is also significant to note that water may enter through the opening through which superheated steam is escaping. The water resistant coating 70 completely surrounds the exterior of data storage device 10 and prevents water damage that would otherwise occur. The lines 180 provide data and power to data storage devices 110 a and 110 b through lower wall 121. Those lines become destroyed in the presence of fire. As shown in The embodiment shown in The fan 640 illustrated in The embodiment of The foregoing description of the invention has been presented for purposes of illustration and description and is not intended to be exhaustive or to limit the invention to the precise form disclosed. Modifications and variations are possible in light of the above teaching. The embodiments were chosen and described to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best use the invention in various embodiments and with various modifications suited to the particular use contemplated. The scope of the invention is to be defined by the following claims.
<urn:uuid:2af5dac7-926f-489a-8486-519d474330fb>
2013-05-18T17:58:07Z
CC-MAIN-2013-20
[ [ -0.0225830078125, 0.01239013671875, -0.01300048828125, -0.04052734375, 0.125, -0.0830078125, -0.0025177001953125, 0.08642578125, -0.015380859375, -0.06787109375, 0.09716796875, 0.0167236328125, -0.007659912109375, 0.01513671875, 0.021240234375, 0.004...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938299
6,010
http://www.google.com.au/patents/US7843689
0.278713
US 5162043 A An iontophoretic agent delivery device having donor and counter electrodes comprised of either metal or a hydrophobic polymer loaded with a conductive filler is provided. The agent reservoir in the donor electrode assembly contains about 10 to 60 wt % hydrophobic polymer, about 10 to 60 wt % hydrophilic polymer, and up to 50% agent. Similarly, the electrolyte reservoir contains about 10 to 60 wt % hydrophobic polymer, about 10 to 60 wt % hydrophilic polymer, and up to 50% electrolyte. The agent reservoir, the electrolyte reservoir and the electrodes are preferably in the form of films which are laminated to one another. The hydrophobic polymer component in the agent/electrolyte reservoir prevents the reservoir from delaminating from the metal/hydrophobic polymer based electrode, even after hydration of the reservoirs. 1. An electrically powered iontophoretic agent delivery device including a donor electrode assembly, a counter electrode assembly and a source of electrical power electrically connected to the donor electrode assembly and the counter electrode assembly, the donor electrode assembly comprising: a) an agent reservoir containing an agent, the agent reservoir adapted to be placed in agent transmitting relation with a body surface; and b) a donor electrode electrically connected to the source of electrical power, the donor electrode also being in electrical contact with the agent reservoir; wherein the agent reservoir is comprised of about 10 to 60 wt % of a polyvinylpyrrolidone, about 10 to 60 wt % of a solid heat fusible polyisobutylene and up to about 60 wt % of the agent. 2. The device of claim 1, wherein the donor electrode is comprised of a metal. 3. The device of claim 2, wherein the metal is selected from the group consisting of silver and zinc. 4. The device of claim 1, wherein the donor electrode comprises a hydrophobic polymer matrix containing a conductive filler. 5. The device of claim 4, wherein the conductive filler comprises metal particles. 6. The device of claim 4, wherein the conductive filler comprises carbon fibers. 7. The device of claim 4, wherein the agent reservoir and the donor electrode are each in the form of a film. 8. The device of claim 7, wherein the donor electrode and the agent reservoir are laminated to one another. 9. The device of claim 7, wherein the films are adhered to one other with an ionically conductive adhesive. 10. The device of claim 1, wherein the counter electrode assembly includes a counter electrode electrically connected to the source of electrical power and an electrolyte reservoir adapted to be placed in electrolyte transmitting relation with the body surface, the counter electrode also being in electrical contact with the electrolyte reservoir; wherein the electrolyte reservoir is comprised of about 10 to 60 wt % of a polyvinylpyrrolidone, about 10 to 60 wt % of a solid heat fusible polyisobutylene and up to about 50 wt % of the electrolyte. 11. The device of claim 10, wherein the counter electrode is comprised of a metal. 12. The device of claim 11, wherein the metal is selected from the group consisting of silver and zinc. 13. The device of claim 10, wherein the counter electrode is comprised of a hydrophobic polymer containing a conductive filler. 14. The device of claim 13, wherein the conductive filler comprises metal particles. 15. The device of claim 13, wherein the conductive filler comprises carbon fibers. 16. The device of claim 13, wherein the counter electrode and the electrolyte reservoir are each in the form of a film. 17. The device of claim 16, wherein the counter electrode and the electrolyte reservoir are laminated to one another. 18. The device of claim 16, wherein the films are adhered to one another with an ionically conductive adhesive. 19. The device of claim 10, wherein the electrolyte reservoir also comprises a tackifying resin. 20. The device of claim 19, wherein the tackifying resin comprises a low molecular weight polyisobutylene. 21. The device of claim 10, wherein the electrolyte reservoir comprises about 20 to 40 wt % polyvinylpyrrolidone. 22. The device of claim 10, wherein the electrolyte reservoir comprises about 30 to 50 wt % polyisobutylene. 23. The device of claim 10, wherein the electrolyte reservoir comprises about 25 to 50 wt % of the electrolyte. 24. The device of claim 10, wherein the electrolyte reservoir also contains a polyethylene glycol. 25. The device of claim 10, wherein the polyvinylpyrrolidone is crosslinked. 26. The device of claim 1, wherein the agent reservoir also comprises a tackifying resin. 27. The device of claim 26, wherein the tackifying resin comprises a low molecular weight polyisobutylene. 28. The device of claim 1, wherein the agent reservoir comprises about 20 to 40 wt % polyvinylpyrrolidone. 29. The device of claim 1, wherein the agent reservoir comprises about 30 to 50 wt % polyisobutylene. 30. The device of claim 1, wherein the agent reservoir comprises about 25 to 50 wt % of the agent. 31. The device of claim 1, wherein the agent reservoir also contains a polyethylene glycol. 32. The device of claim 1, wherein the polyvinylpyrrolidone is crosslinked. This application is a continuation of Ser. No. 07/502,608, filed Mar. 30, 1990, now U.S. Pat. No. 5,984,006, and benefit of the filing date of said earlier filed application is claimed under 35 U.S.C. This invention relates to a device for delivering an agent transdermally or transmucosally by iontophoresis. More particularly, this invention relates to an electrically powered iontophoretic delivery device having an agent reservoir at least partially composed of a hydrophobic polymer. Iontophoresis, according to Dorland's Illustrated Medical Dictionary, is defined to be "the introduction, by means of electric current, of ions of soluble salts into the tissues of the body for therapeutic purposes." Iontophoretic devices have been known since the early 1900's. British patent specification No. 410,009 (1934) describes an iontophoretic device which overcame one of the disadvantages of such early devices known to the art at that time, namely the requirement of a special low tension (low voltage) source of current which meant that the patient needed to be immobilized near such source. The device of that British specification was made by forming a galvanic cell from the electrodes and the material containing the medicament or drug to be delivered transdermally. The galvanic cell produced the current necessary for iontophoretically delivering the medicament. This ambulatory device thus permitted iontophoretic drug delivery with substantially less interference with the patient's daily activities. More recently, a number of United States patents have issued in the iontophoresis field, indicating a renewed interest in this mode of drug delivery. For example, U.S. Pat. No. 3,991,755 issued to Vernon et al; U.S. Pat. No. 4,141,359 issued to Jacobsen et al; U.S. Pat. No. 4,398,545 issued to Wilson; and U.S. Pat. No. 4,250,878 issued to Jacobsen disclose examples of iontophoretic devices and some applications thereof. The iontophoresis process has been found to be useful in the transdermal administration of medicaments or drugs including lidocaine hydrochloride, hydrocortisone, fluoride, penicillin, dexamethasone sodium phosphate, insulin and many other drugs. Perhaps the most common use of iontophoresis is in diagnosing cystic fibrosis by delivering pilocarpine salts iontophoretically. The pilocarpine stimulates sweat production; the sweat is collected and analyzed for its chloride content to detect the presence of the disease. In presently known iontophoretic devices, at least two electrodes are used. Both of these electrodes are disposed so as to be in intimate electrical contact with some portion of the skin of the body. One electrode, called the active or donor electrode, is the electrode from which the ionic substance, medicament, drug precursor or drug is delivered into the body by iontophoresis. The other electrode, called the counter or return electrode, serves to close the electrical circuit through the body. In conjunction with the patient's skin contacted by the electrodes, the circuit is completed by connection of the electrodes to a source of electrical energy, e.g., a battery. For example, if the ionic substance to be delivered into the body is positively charged (i.e., a cation), then the anode will be the active electrode and the cathode will serve to complete the circuit. If the ionic substance to be delivered is negatively charged (i.e., an anion), then the cathode will be the active electrode and the anode will be the counter electrode. Alternatively, both the anode and cathode may be used to deliver drugs of opposite charge into the body. In such a case, both electrodes are considered to be active or donor electrodes. For example, the anode can deliver a positively charged ionic substance into the body while the cathode can deliver a negatively charged ionic substance into the body. It is also known that iontophoretic delivery devices can be used to deliver an uncharged drug or agent into the body. This is accomplished by a process called electroosmosis. Electroosmosis is the transdermal flux of a liquid solvent (e.g., the liquid solvent containing the uncharged drug or agent) which is induced by the presence of an electric field imposed across the skin by the donor electrode. Furthermore, existing iontophoresis devices generally require a reservoir or source of the beneficial agent (which is preferably an ionized or ionizable agent or a precursor of such agent) to be iontophoretically delivered or introduced into the body. Examples of such reservoirs or sources of ionized or ionizable agents include a pouch as described in the previously mentioned Jacobsen U.S. Pat. No. 4,250,878, or a pre-formed gel body as described in Webster U.S. Pat. No. 4,383,529 and Ariura et al. U.S. Pat. No. 4,474,570. Such drug reservoirs are electrically connected to the anode or the cathode of an iontophoresis device to provide a fixed or renewable source of one or more desired agents. More recently, iontophoretic delivery devices have been developed in which the donor and counter electrode assemblies have a "multi-laminate" construction. In these devices, the donor and counter electrode assemblies are each formed by multiple layers of (usually) polymeric matrices. For example, Parsi U.S. Pat. No. 4,731,049 discloses a donor electrode assembly having hydrophilic polymer based electrolyte reservoir and drug reservoir layers, a skin-contacting hydrogel layer, and optionally one or more semipermeable membrane layers. In addition, Ariura et al, U.S. Pat. No. 4,474,570 discloses a device wherein the electrode assemblies include a conductive resin film electrode layer, a hydrophilic gel reservoir layer, and aluminum foil conductor layer and an insulating backing layer. The drug and electrolyte reservoir layers of iontophoretic delivery devices have been formed of hydrophilic polymers. See for example, Ariura et al, U.S. Pat. No. 4,474,570; Webster U.S. Pat. No. 4,383,529 and Sasaki U.S. Pat. No. 4,764,164. There are several reasons for using hydrophilic polymers. First, water is a the preferred solvent for ionizing many drug salts. Secondly, hydrophilic polymer components (i.e., the drug reservoir in the donor electrode and the electrolyte reservoir in the counter electrode) can be hydrated in situ (i.e., while attached to the body) by absorbing water from the skin (i.e., through transepidermal water loss or sweat) or from a mucosal membrane (e.g., by absorbing saliva in the case of oral mucosal membranes). Once hydrated, the device begins to deliver ionized agent to the body. This enables the drug reservoir to be manufactured in a dry state, giving the device a longer shelf life. Hydrogels have been particularly favored for use as the drug reservoir matrix and electrolyte reservoir matrix in iontophoretic delivery devices, in part due to their high equilibrium water content and their ability to quickly absorb water. In addition, hydrogels tend to have good biocompatibility with the skin and with mucosal membranes. In spite of these advantages however, hydrogels and other hydrophilic polymer components are difficult to laminate to other components of the delivery system. For example, when utilizing a drug reservoir matrix or an electrolyte reservoir matrix composed of a hydrophilic polymer, the matrix begins to swell as it absorbs water from the skin. In the case of hydrogels, the swelling is quite pronounced. Typically, the drug or electrolyte reservoir is in either direct contact, or contact through a thin layer of an electrically conductive adhesive, with an electrode. Typically, the electrode is composed of metal (e.g., a metal foil or a thin layer of metal deposited on a backing layer) or a hydrophobic polymer containing a conductive filler (e.g., a hydrophobic polymer loaded with carbon fibers and/or metal particles). The electrodes (i.e., either metal electrodes or hydrophobic polymers containing a conductive filler), on the other hand, do not absorb water and do not swell. The different swelling properties of the hydrophilic reservoirs and the electrodes results in shearing along their contact surfaces. In severe cases, the shearing action can result in the complete loss of electrical contact between the electrode and the reservoir resulting in an inoperable device. It is an object of this invention to provide improved drug reservoir and electrolyte reservoir matrices for an iontophoretic delivery device. It is another object of this invention to provide an improved iontophoretic delivery device which avoids the delamination problems of the prior art iontophoretic drug delivery devices. These and other objects are met by an electrically powered iontophoretic agent delivery device which includes a donor electrode assembly, a counter electrode assembly and a source of electrical power adapted to be electrically connected to the donor and counter electrode assemblies. The donor electrode assembly includes an agent reservoir containing the agent to be delivered. The agent reservoir is adapted to be placed in agent transmitting relation with a body surface, such as intact skin or a mucosal membrane. The donor electrode assembly also includes a donor electrode adapted to be electrically connected to the source of electrical power. The donor electrode has a surface which is in contact with the agent reservoir. The agent reservoir is comprised of about 10 to 60 wt % of a hydrophilic polymer, about 10 to 60 wt % of a hydrophobic polymer, and up to about 50 wt % of the agent. Such an agent reservoir can be secured, by laminating, to either a metal foil electrode or a hydrophobic polymer based electrode, and has a greatly reduced tendency to delaminate from the electrode even after the agent reservoir becomes hydrated. In a preferred embodiment, the counter electrode assembly of the delivery device includes a counter electrode adapted to be electrically connected to the source of electrical power and an electrolyte reservoir adapted to be placed in electrolyte transmitting relation with the body. The counter electrode has a surface which is in contact with the electrolyte reservoir. The electrolyte reservoir is also comprised of about 10 to 60 wt % of a hydrophilic polymer, about 10 to 60 wt % of a hydrophobic polymer, and up to about 60 wt % of the electrolyte. Such an electrolyte reservoir can be secured, by laminating, to either a metal foil electrode or a hydrophobic polymer based electrode, and has a greatly reduced tendency to delaminate from the electrode even after the electrolyte reservoir becomes hydrated. FIG. 1 is a schematic view of an iontophoretic drug delivery device according to the present invention; FIG. 2 is a schematic view of another embodiment of an iontophoretic delivery device according to the present invention; FIG. 3 is a graph of the current density over time for an electrode assembly described in Example II; and FIG. 4 is a graph of the electrical resistance over time for an electrode assembly described in Example II. FIG. 1 is a schematic view of an iontophoretic delivery device 10 for delivering a beneficial agent through a body surface 22. Body surface 22 is typically intact skin or a mucosal membrane. Iontophoretic delivery device 10 includes a donor electrode assembly 8 and a counter electrode assembly 9. Electrode assemblies 8 and 9 are connected in series with an electrical power source 27, which is typically one or more low voltage batteries, and an optional control circuit 19 which is described in more detail hereinafter. When the device 10 is in storage, no current flows because the device does not form a closed circuit. When the device 10 is placed on the skin or mucosal membrane of a patient and the electrode assemblies 8 and 9 are hydrated, the circuit between the electrodes is closed and the power source begins to deliver current through the device and through the body of the patient. The donor and counter electrode assemblies 8 and 9 normally include a strippable release liner, not shown, which is removed prior to application of electrode assemblies 8 and 9 to body surface 22. The donor electrode assembly 8 includes a donor electrode 11 and an agent reservoir 15. The agent reservoir 15 contains the beneficial agent to be iontophoretically delivered by device 10. The donor electrode assembly 8 is adhered to the body surface 22 by means of an ion-conducting adhesive layer 17. Device 10 includes a counter electrode assembly 9 which is placed on the body surface 22 at a location spaced apart from electrode assembly 8. Counter electrode assembly 9 includes a counter electrode 12 and an electrolyte reservoir 16. Counter electrode assembly 9 is adhered to the body surface 22 by means of an ion-conducting adhesive layer 18. As an alternative to the ion-conducting adhesive layers 17 and 18 shown in FIGS. 1 and 2, the iontophoretic delivery devices 10 and 20 may be adhered to the skin using an adhesive overlay. Any of the conventional adhesive overlays used to secure passive transdermal delivery devices to the skin may be used. Electrodes 11 and 12 are electrically conductive and may be formed of a metal, e.g., a metal foil or metal deposited or painted on a suitable backing. Examples of suitable metals include silver, zinc, silver/silver chloride, aluminum, platinum, stainless steel, gold and titanium. Alternatively, the electrodes 11 and 12 may be formed of a hydrophobic polymer matrix containing a conductive filler such as a metal powder, powdered graphite, carbon fibers or other known electrically conductive filler material. The hydrophobic polymer based electrodes may be made by mixing the conductive filler in the hydrophobic polymer matrix. For example, zinc powder, silver powder, silver/silver chloride powder, powdered carbon, carbon fibers and mixtures thereof can be mixed in a hydrophobic polymer (e.g., an ethylene vinyl acetate copolymer) matrix, with the preferred amount of conductive filler being within the range of about 30 to 90 vol % and the remainder being the hydrophobic polymer matrix. Electrodes 11 and 12 are electrically connected to power source 27 using well known means, e.g., printed flexible circuits, metal foils, wires or by direct contact. As an alternative to a battery as the power source 27, device 10 can be powered by a galvanic couple formed by the donor electrode 11 and counter electrode 12 being composed of dissimilar electrochemical couples and being placed in electrical contact with one other. Typical galvanic couple materials for delivering a cationic agent include a zinc donor electrode 11 and a silver/silver chloride counter electrode 12. A Zn-Ag/AgCl galvanic couple provides an electrical potential of about 1 volt. The electrolyte reservoir 16 contains a suitable pharmacologically acceptable salt. Suitable salts include sodium chloride, alkali metal salts, alkaline earth metal salts such as chlorides, sulfates, nitrates, carbonates, phosphates, and organic salts such as ascorbates, citrates, acetates and mixtures thereof. Reservoir 16 may also contain a buffering agent. Sodium chloride is a suitable electrolyte when the counter electrode 12 is the cathode and is composed of silver/silver chloride, optionally with a sodium phosphate buffer. FIG. 2 illustrates another iontophoretic delivery device designated by the numeral 20. Like device 10, device 20 also contains an electrical power source 27 (e.g., a battery) and an optional control circuit 19. However, in device 20 the donor electrode assembly 8 and the counter electrode assembly 9 are physically attached to insulator 26 and form a single self-contained unit. Insulator 26 prevents the electrode assemblies 8 and 9 from short circuiting the body by preventing electrical and/or ion transport between the electrode assemblies 8 and 9. Insulator 26 is preferably formed of a hydrophobic non-conducting polymeric material which is impermeable to both the passage of ions and water. Preferred insulating materials are nonporous ethylene vinyl acetate and closed cell foamed plastics. The agent reservoir and the electrolyte reservoir according to the present invention are each comprised of about 10 to 60 wt % of a hydrophilic polymer and about 10 to 60 wt % of a hydrophobic polymer; preferably about 20 to 40 wt % of a hydrophilic polymer and about 30 to 50 wt % of a hydrophobic polymer; and most preferably about 25 wt % of a hydrophilic polymer and about 40 wt % of a hydrophobic polymer. The agent reservoir matrix contains up to about 60 wt % of the agent, preferably about 25 to 50 wt % of the agent and most preferably about 35 wt % of the agent. The electrolyte reservoir matrix contains up to about 60 wt % of the electrolyte, preferably about 25 to 50 wt % of the electrolyte and most preferably about 35 wt % of the electrolyte. As used herein, a hydrophilic polymer is a polymer having an equilibrium water content of at least 20 wt %, preferably at least about 30 wt % and most preferably at least about 40 wt % after prolonged exposure to an atmosphere having a relative humidity of over about 90%. Also as used herein, a hydrophobic polymer is any polymer having an equilibrium water content of less than 20 wt %, preferably less than about 15 wt % and most preferably less than about 10 wt % after prolonged exposure to an atmosphere having a relative humidity of over about 90%. A suitable minimum amount of hydrophilic polymer is that which provides an interconnecting network of the hydrophilic polymer pathways throughout the reservoir, generally at least about 10 wt % hydrophilic polymer. On the other hand, a suitable minimum amount of hydrophobic polymer is that which provides sufficient structure to bond to another hydrophobic surface. Preferably, the hydrophobic polymer is heat fusible and can be heat fused to another polymeric surface such as a polymer based electrode or a membrane. Alternatively, if the electrode is composed of a metal, such as a metal plate, a metal foil or a metalized surface on a suitable backing material, the hydrophobic polymer preferably contains a resinous tackifying agent. Suitable hydrophobic polymers for use in the matrix of reservoirs 15 and 16 include, without limitation, polyethylene, polypropylene, polyisoprenes and polyalkenes, rubbers, copolymers such as Kraton polyvinylacetate, ethylene vinyl acetate copolymers, polyamides such as nylons, polyurethanes, polyvinylchloride, acrylic or methacrylic resins such as polymers of esters of acrylic or methacrylic acid with alcohols such as n-butanol, n-pentanol, isopentanol, 2-methyl butanol, 1-methyl butanol, 1-methyl pentanol, 2-methyl pentanol, 3-methyl pentanol, 2-ethyl butanol, isooctanol, n-decanol, or n-dodecanol, alone or copolymerized with ethylenically unsaturated monomers such as acrylic acid, methacrylic acid, acrylamide, methacrylamide, N-alkoxymethyl acrylamides, N-alkoxymethyl methacrylamides, N-tert-butylacrylamide, and itaconic acid, N-branched alkyl maleamic acids wherein the alkyl group has 10-24 carbon atoms, glycol diacrylates, and blends thereof. Most of the above listed hydrophobic polymers are heat fusible. Of these, ethylene vinyl acetate copolymers are preferred. In cases where the electrode is a metal foil or a metalized polymeric film, it may be necessary to add a tackifying resin to the hydrophobic polymer component in order to enhance its adhesiveness. Suitable hydrophobic polymers which can be rendered more adhesive by the addition of tackifying resins include, without limitation, cellulose acetate, cellulose acetate butyrate, ethylcellulose, poly(styrene-butadiene) and poly(styrene-isoprene-styrene) block copolymers, ethylene vinyl acetate copolymers such as those which are described in U.S. Pat. No. 4,144,317, plasticized or unplasticized polyvinylchloride, natural or synthetic rubbers, C.sub.2 -C.sub.4 polyolefins such as polyethylene, polyisoprene, polyisobutylene and polybutadiene. Examples of suitable tackifying resins include, without limitation, fully hydrogenated aromatic hydrocarbon resins, hydrogenated esters and low molecular weight grades of polyisobutylene. Particularly suitable are tackifiers sold under the trademarks Staybelite Ester Piccotac Suitable hydrophilic polymers for use in the matrix of reservoirs 15 and 16 include polyvinylpyrrolidones, polyvinyl alcohol, polyethylene oxides such as Polyox manufactured by BF Goodrich of Akron, Ohio; blends of polyoxyethylene or polyethylene glycols with polyacrylic acid such as Polyox with Carbopol as Sephadex (Pharmacia Fine Chemicals, AB, Uppsala, Sweden), Water Lock starch-graft-poly(sodium acrylate-co-acrylamide) polymer, cellulose derivatives such as hydroxyethyl cellulose, hydroxypropylmethylcellulose, low-substituted hydroxypropylcellulose, and cross-linked Na-carboxymethylcellulose such as Ac-Di-Sol (FMC Corp., Philadelphia, Pa.), hydrogels such as polyhydroxyethyl methacrylate (National Patent Development Corp.), natural gums, chitosan, pectin, starch, guar gum, locust bean gum, and the like, along with blends thereof. Of these, polyvinylpyrrolidones are preferred. Blending of the drug or electrolyte with the hydrophobic and hydrophilic polymer components is done mechanically, either in solution or by milling, extrusion or hot melt mixing, for example. The resulting reservoir layers may then be prepared by solvent casting, extrusion or by melt processing, for example. In addition to the drug and electrolyte, the reservoirs 15 and 16 may also contain other conventional materials such as dyes, pigments, inert fillers, and other excipients. The two phase reservoir matrix according to this invention has hydrophilic pathways in order to allow agent and/or electrolyte (e.g., agent or electrolyte ions) to pass through the reservoir under the influence of an electric field, i.e., the reservoir presents minimal mass transport resistance. The reservoir also has good hydration kinetics so that the time it takes to absorb water (e.g., from the body) and begin passing current, is acceptable. A suitable time to reach steady state moisture content is less than about 5 hours, preferably less than 1 hour, most preferably less than 10 minutes. Further, the reservoir layer provides for uniform current distribution so as to avoid highly localized current densities which could result in tissue damage. The reservoir matrix of the present invention exhibits excellent ionic conductivity so it is not rate limiting and does not require significant voltage during system operation, i.e., the reservoir presents minimal electrical resistance. By incorporating the hydrophilic polymer phase, the reservoir of this invention has been shown to exhibit an area resistance of less than about 10 kohm-cm.sup.2, preferably less than about 5 kohm-cm.sup.2, most preferably less than about 1 kohm-cm.sup.2 for reservoirs having a thickness of about 3 mils. A control circuit 19 is optionally provided. Control circuit 19 may take the form of an on-off switch for "on-demand" drug delivery (e.g., patient controlled delivery of an analgesic for pain relief), a timer, a fixed or variable electrical resistor, a controller which automatically turns the device on and off at some desired periodicity to match the natural or circadian patterns of the body, or other more sophisticated electronic control devices known in the art. For example, it may be desirable to deliver a predetermined constant level of current from device 10 since a constant current level ensures that the drug or agent is delivered through the skin at a constant rate. The current level can be controlled by a variety of known means, for example, a resistor or a simple circuit that employs a resistor and a field effect transistor. Control circuit 19 may also include an integrated circuit which could be designed to control the dosage of beneficial agent, or even to respond to sensor signals in order to regulate the dosage to maintain a predetermined dosage regimen. A relatively simple circuit can control the current as a function of time, and if desired, generate complex current waveforms such as pulses or sinusoidal waves. In addition, the control circuit 19 may employ a bio-feedback system which monitors a biosignal, provides an assessment of the therapy, and adjusts the drug delivery accordingly. A typical example is the monitoring of the blood sugar level for controlled administration of insulin to a diabetic patient. Alternatively, both the donor electrode assembly 8 and the counter electrode assembly 9 may be used to iontophoretically deliver different beneficial agents through body surface 22. For example, positive agent ions can be delivered through body surface 22 from the anode electrode assembly, while negative agent ions can be delivered from the cathode electrode assembly. Alternatively, neutral drugs can be introduced from either electrode assembly by electroosmosis. As an alternative to the side-by-side alignment of the donor electrode assembly 8, the insulator 26 and the counter electrode assembly 9 shown in FIG. 2, the electrode assemblies can be concentrically aligned with the counter electrode assembly positioned centrally and surrounded by the insulator 26 and the donor electrode assembly. The electrode assemblies can, if desired, be reversed with the counter electrode assembly surrounding the centrally positioned donor electrode assembly. The concentric alignment of the electrode assemblies can be circular, elliptical, rectangular or any of a variety of geometric configurations. The combined skin-contacting areas of electrode assemblies 8 and 9 can vary from less than 1 cm.sup.2 to greater than 200 cm.sup.2. The average device 10 however, will have electrode assemblies with a combined skin-contacting area within the range of about 5-50 cm.sup.2. This invention has utility in connection with the delivery of drugs within the class which can be delivered through body surfaces. As used herein, the expressions "agent" and "drug" are used interchangeably and are intended to have their broadest interpretation as any therapeutically active substance which is delivered to a living organism to produce a desired, usually beneficial, effect. In general, this includes therapeutic agents in all of the major therapeutic areas including, but not limited to, anti-infectives such as antibiotics and antiviral agents, analgesics and analgesic combinations, anesthetics, anorexics, antiarthritics, antiasthmatic agents, anticonvulsants, antidepressants, antidiabetic agents, antidiarrheals, antihistamines, anti-inflammatory agents, antimigraine preparations, antimotion sickness preparations, antinauseants, antineoplastics, antiparkinsonism drugs, antipruritics, antipsychotics, antipyretics, antispasmodics, including gastrointestinal and urinary, anticholinergics, sympathomimetrics, xanthine derivatives, cardiovascular preparations including calcium channel blockers, beta-blockers, antiarrythmics, antihypertensives, diuretics, vasodilators, including general, coronary, peripheral and cerebral, central nervous system stimulants, cough and cold preparations, decongestants, diagnostics, hormones, hypnotics, immunosuppressives, muscle relaxants, parasympatholytics, parasympathomimetrics, proteins, peptides, psychostimulants, sedatives and tranquilizers. It is most preferable to use a water soluble salt of the drug or agent to be delivered although non-ionized agents can be delivered from delivery devices 10 and 20 by the process of electroosmosis. The invention is also useful in the controlled delivery of peptides, polypeptides, proteins and other macromolecules. These macromolecular substances typically have a molecular weight of at least about 300 daltons, and more typically a molecular weight in the range of about 300 to 40,000 daltons. Specific examples of peptides and proteins in this size range include, without limitation, LHRH, LHRH analogs such as buserelin, gonadorelin, naphrelin and leuprolide, GHRH, insulin, heparin, calcitonin, endorphin, TRH, NT-36 (chemical name: N═[[(s)-4-oxo-2-azetidinyl]carbonyl]-L-histidyl-L-prolinamide), liprecin, pituitary hormones (e.g., HGH, HMG, HCG, desmopressin acetate, etc.), follicle luteoids, αANF, growth factor releasing factor (GFRF), βMSH, somatostatin, bradykinin, somatotropin, platelet-derived growth factor, asparaginase, bleomycin sulfate, chymopapain, cholecystokinin, chorionic gonadotropin, corticotropin (ACTH), erythropoietin, epoprostenol (platelet aggregation inhibitor), glucagon, hyaluronidase, interferon, interleukin-2, menotropins (urofollitropin (FSH) and LH), oxytocin, streptokinase, tissue plasminogen activator, urokinase, vasopressin, ACTH analogs, ANP, ANP clearance inhibitors, angiotensin II antagonists, antidiuretic hormone agonists, antidiuretic hormone antagonists, bradykinin antagonists, CD4, ceredase, CSF's, enkephalins, FAB fragments, IgE peptide suppressors, IGF-1, neurotrophic factors, parathyroid hormone and agonists, parathyroid hormone antagonists, prostaglandin antagonists, pentigetide, protein C, protein S, renin inhibitors, thymosin alpha-1, thrombolytics, TNF, vaccines, vasopressin antagonist analogs, alpha-1 anti-trypsin (recombinant). Having thus generally described our invention, the following examples will illustrate preferred embodiments thereof. A drug reservoir for an iontophoretic delivery device was made by mixing the following materials: 25 parts by weight of hydrophilic polyvinylpyrrolidone (Polyplasdone XL N.J.); 35 parts by weight of an ionizable model drug salt (positively charged drug ions and negatively charged counter ions); and 40 parts by weight of a hydrophobic ethylene vinyl acetate copolymer having a vinyl acetate content of 28% (EVA 28). The materials were mixed in a 50 cm.sup.3 Brabender mixer (Model 0040/SB sold by C. W. Brabender Instruments, Inc., South Hackensack, NJ). The mixer bowl was heated to a temperature of 70 about 20 minutes. The mixture was then melt-pressed in a hydraulic press (Pasadena Hydraulics, Inc., El Monte, Calif., Model No. PM-220) at a pressure of 30,000 psig and a temperature of 85 about 12 mils. The film was then laminated onto a hydrophobic polymer based electrode. The electrode was composed of an ethylene vinyl acetate copolymer having a vinyl acetate content of 9% (EVA 9) loaded with an electrochemically oxidizable material and carbon fibers. The film and the polymer based electrode were then placed over a heated hot plate (temperature of about 80 by manually applying pressure with a roller. The laminated electrode reservoir assembly was then exposed to a 95% relative humidity atmosphere in a glass desiccator chamber containing a saturated solution of Na.sub.2 HPO.sub.4.7H.sub.2 O at room temperature and allowed to hydrate overnight. Good intimate contact was maintained between the EVA 9 based electrode and the drug reservoir both during and after hydration. The reservoir matrix material of Example I was used in both the drug reservoir and the electrolyte reservoir of an iontophoretic drug delivery device. Metoclopramide HCL in the amount of 35 wt %, was mixed into the drug reservoir matrix material and was extruded in the form of a sheet having a thickness of 6 mils. The donor electrode had the same composition as the EVA 9 based electrode described in Example I. The donor electrode was secured to the drug reservoir by laminating the electrode to the reservoir using heat and pressure. Four samples of the donor electrode/drug reservoir assembly were each cut from the laminate and placed in a permeation cell. The drug reservoir side of the laminate was placed in contact with a compartment containing Dulbecco's phosphate buffered saline solution (pH 7). An Ag/AgCl electrode was placed in the Dulbecco's solution. A power source delivering 100 μA/cm.sup.2 of direct current was connected between the polymer electrode of the laminate and the Ag/AgCl electrode. The current passed through each of the laminates was measured as a function of time and the data is shown in FIG. 3. For the four samples tested, the drug reservoirs became sufficiently hydrated to pass substantially all of the current after only about 1 to 2 minutes. FIG. 3 shows that the drug reservoir matrix material of the present invention may be quickly hydrated to begin delivering drugs (as shown by the ionic conduction of the model drug salt through the reservoir) within a matter of minutes. The resistance of the laminate was also monitored over time by measuring the voltage drop across a standard 10 kohm resistor using a voltmeter and then calculating the resistance using Ohm's law (R=I/V). The results are shown in FIG. 4. For all four samples tested, the laminates exhibited a resistance of only about 1 kohm . cm.sup.2 after several minutes exposure to the Dulbecco's solution. A counter electrode assembly including a counter electrode and an electrolyte reservoir was also constructed. The counter electrode was composed of EVA 9 loaded with an electrochemically reducible material and carbon fibers. Sodium Chloride, in the amount of 35 wt %, was mixed into the electrolyte reservoir matrix material and was extruded in the form of a sheet having a thickness of 6 mils. The counter electrode was secured to the electrolyte reservoir by laminating using heat and pressure. The above-described donor and counter electrode assemblies can be electrically connected to a low voltage battery and such a device is effective to delivery metoclopramide transdermally. Having thus generally described our invention and described in detail certain preferred embodiments thereof, it will be readily apparent that various modifications to the invention may be made by workers skilled in the art without departing from the scope of this invention and which is limited only by the following claims.
<urn:uuid:131e1ff6-0c90-4dc4-b454-139417975b82>
2013-05-18T18:06:24Z
CC-MAIN-2013-20
[ [ -0.013916015625, 0.004180908203125, -0.0037384033203125, -0.053466796875, 0.11279296875, -0.080078125, 0.0048828125, 0.1201171875, -0.04345703125, -0.00046539306640625, 0.1025390625, -0.003936767578125, -0.0224609375, 0.060791015625, 0.0296630859375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.893528
8,757
http://www.google.de/patents/US5162043
0.661945
US 5744028 A A water dispenser including a water tank for storing water supplied from a water bottle; an electrolytic cell including an anode, a cathode, and a three-dimensional carbon electrode provided between the anode and the cathode, the electrolytic cell being provided downstream of the water tank; a water outlet valve provided downstream of the electrolytic cell; and a power supply for applying an electric current to the anode so as to polarize the electrode for sterilizing the water. 1. A water dispenser comprising: a water tank for storing water supplied from a water bottle, said water bottle being arranged to maintain an outlet of said water bottle at a fixed position in said water dispenser; an electrolytic cell including an anode, a cathode, and a three-dimensional carbon electrode between the anode and the cathode, the electrolytic cell being below the water tank to produce a flow of water from an outlet of said water tank into and through said electrolytic cell; a water outlet valve downstream of the electrolytic cell; and a power supply for applying an electric current between the anode and the cathode so as to polarize the electrode, thereby sterilizing the water. 2. The water dispenser of claim 1 further comprising an ultraviolet irradiation equipment between the electrolytic cell and the water outlet valve. 3. The water dispenser of claim 1 further comprising a heat absorption member in the water tank. The present invention relates to an apparatus for sterilization-treating electrolytically water to be treated for inhibiting various deteriorations of performance thereof caused by microorganisms of the water to be treated containing microorganisms, or for conducting irradiation of ultraviolet ray in addition to the foregoing, trying to assure smooth operation of the electrolytic treatment, and more particularly, relates to an offer of a dispenser capable of sterilizing bottle water easily and surely and thereby offering safe drinking water. Heretofore, various types of water solutions, and pure water or the like which does not contain any other materials have been used for various applications. With regard to these water solutions and others, when solutes thereof provide adequate nourishment, or when the temperature of the water solution is relatively high to be suitable for propagation of bacteria, microorganisms such as bacteria breed in the solution so that the microorganisms deteriorate the performance of the solution, or adversely affect products, or float or accumulate in a treating apparatus and frequently damage its function. The number of microorganisms in tap water is generally set to 30/ml or less under the condition that residual chlorine stays in the tap water as a sterilizing agent. When this tap water is used as heat exchanger cooling water, for example, the aforementioned microorganisms breed by leaps and bounds, causing corrosion of piping and generation of an offensive odor. In order to prevent these phenomena, various chemicals such as anti-mold and sterilizing agents or precipitation inhibiting agents have been added in water to be treated, or various kinds of filters have been installed in piping so far. However, there have been pointed out problems that the water to be treated is adversely affected by chemicals remaining from those added as stated above and a cost is required. Further, antibacterial activities for the chemicals added are started after a certain period of time, causing a problem of necessity for studying the chemicals to be used next and for adding more chemicals than needed, In addition, it is impossible in principle to filtrate and separate live bacteria through filter operations, and everlasting elimination of bacteria is impossible. With regard to each water to be treated, drinking water, in particular, is directly related to human health. Therefore, exterminations of microorganisms such as sterilization of bacteria contained in the drinking water and prevention of propagation of mold therein are indispensable, and a method by means of chlorine is dominant as a sterilization method or an anti-mold method. However, with regard to sterilization of tap water in urban area, its original water in rivers and lakes are contaminated with various kinds of organic matters, requiring addition of more chlorine than is needed. Therefore, there are caused disadvantages such as generation of organic halides and generation of the smell of bleach. In order to eliminate the aforementioned disadvantages caused by the method employing chlorine, there have been suggested sterilization methods employing those other than chlorine. Further, natural water is sold in the market as bottle water, and it also contains various microorganisms. For overcoming the aforementioned disadvantages in water to be treated, especially in bottle water, inventors of the invention attempt to propose a water treatment apparatus and a water treatment method wherein the above-mentioned water to be treated is fed to an electrolytic cell equipped with an electrode of a carbon 3-D fixed bed type (hereinafter referred simply to also as a 3-D electrolytic cell) housing therein a plurality of electrodes of a carbon 3-D fixed bed type (hereinafter referred to also as a carbon electrode) to be treated electrolytically so that microorganisms in the water to be treated are sterilized. This electrolytic sterilization method in a dispenser equipment is one wherein electricity is supplied to the aforesaid carbon electrode and thereby the electrode is polarized and microorganisms coming in contact with electrodes mainly polarized to be positive are sterilized as long as electricity keeps to be supplied. However, taking out of water from a dispenser equipment using bottle water is irregular, and during a suspension period up to the next taking out of water, microorganisms existing between an electrolytic cell and an outlet of treated water are propagated, thus microorganisms are contained in treated water taken out. An object of the invention is to provide a water treatment method which can eliminate the risk mentioned above. The object mentioned above can be attained by either of the following technical means (1) and (2). (1) A water treatment method for treating water contained in a dispenser equipment by providing an electrolytic cell equipment with electrodes of a carbon 3-D fixed bed type are installed as a sterilizing equipment for the dispenser equipment having a water outlet valve, wherein the electrolytic cell equipment with electrodes of a carbon 3-D fixed bed type is positioned to be close to the upstream side of the outlet valve. (2) A water treatment method for treating water contained in a dispenser equipment by providing an electrolytic cell equipment with electrodes of a carbon 3-D fixed bed type are installed and an ultraviolet irradiation equipment as a sterilizing equipment for the dispenser equipment at the upstream side of a water outlet valve, wherein the electrolytic cell equipped with electrodes of a carbon 3-D fixed bed type is positioned at the upstream side of the ultraviolet irradiation equipment. FIG. 1 is a schematic structural diagram of a dispenser equipment used in a water treatment method of the invention. FIG. 2 is a schematic longitudinal cross section showing another example of an electrolytic cell equipped with electrodes of a multi-electrode carbon packed 3-D bed type usable in the method of the invention. FIG. 3 is a schematic longitudinal cross section showing still another example of an electrolytic cell equipped with electrodes of a multi-electrode carbon 3-D fixed bed type usable in the method of the invention. FIG. 4 is a graph showing the relation between a length from an electrolytic cell of a dispenser equipment to an outlet for treated water and sterilizing effects. FIG. 5 is a schematic structural diagram wherein an ultraviolet irradiation equipment is added to a dispenser equipment used in a water treatment method of the invention. Working of the invention will be explained in detail as follows. The method of the working of the invention is to sterilize microorganisms contained in drinking water and bottle water used as reservoir water in a dispenser of a cup type, and it relates to operation methods of an electrolytic cell, an ultraviolet irradiation equipment and a dispenser equipment provided with a valve to take out treated water for supplying the water to be treated to the electrolytic cell equipped with an electrode of a carbon 3-D fixed bed type, and impressing D.C. or A.C. voltage on the electrolytic cell to sterilize microorganisms in the aforementioned water to be treated. The microorganisms in the invention include bacteria, germs, mold fungus, colon bacilli, yeast, slime mold, algae of a single cell, protozoans and viruses. It is considered that when water to be treated mentioned above is supplied to an electrolytic cell equipped with energized carbon electrodes, microorganisms in the water to be treated are brought by the liquid flow into contact with the polarized electrodes where the microorganisms receive energy at high voltage and powerful oxidation reaction takes place in a cell of the microorganisms accordingly, thus, its activity is weakened and microorganisms themselves are annihilated for sterilization. In the above-mentioned electrolytic treatment of water to be treated, sterilization of microorganisms can be conducted as long as the carbon electrode mentioned above is polarized properly and the supplied water to be treated is surely brought into contact with an anode which is polarized to be positive with voltage of 0.7 V (vs SCE) on the carbon electrode, but when either of the aforesaid two conditions is not satisfied, a sterilizing effect for microorganisms in treated water taken out of the electrolytic cell can not be high. Generally, ranges of the conditions suitable for electrolytic treatment are 5 mm/sec for a value of linear velocity LV for passage in the electrolytic cell, 0-5000 μs/cm for electric conductivity of water to be treated, 2.0-8.0 V/electrolytic cell for electrolytic voltage, and 0-5.0 A/dm.sup.2 for current density, and when the relation between a height of a carbon electrode housed in the electrolytic cell and the aforesaid linear velocity satisfies the following inequality, the water to be treated can be treated efficiently. Electrolytic cell height H (mm)!/ Linear velocity LV value (mm/sec)!≧1.0 (sec) In this case, the height of the electrolytic cell H is a height of an electrode of a carbon 3-D fixed bed type, and when plural electrodes are insulated each other and laminated, the total value thereof is a height in mm. The linear velocity LV value is a linear velocity in mm/sec at which the water to be treated runs through porous thin holes in the electrode of a carbon 3-D fixed bed type. Since these values vary while connecting them with each other, even when either of them is within the range, concentration of microorganisms is not necessarily at a satisfactory low level, while even when either value of them is out of the range, the concentration of microorganisms is sometimes within a satisfactory low level, which can be a good guide to continuation of normal operation. Especially, when water to be treated passes through the inside of a 3-D electrolytic cell spending the time represented by the above inequality, sterilization efficiency is high. It was further found that the electrolysis efficiency is further stabilized when the linear velocity LV value is 30 mm/sec or less in addition to the condition mentioned above. The basis for the above is that a turbulent flow in water to be treated is needed for the water to be treated to come to a polarized surface of the polarized electrode of a carbon 3-D fixed bed type. However, when the linear velocity LV value is too great, a period of time for microorganisms in the water to be treated to be in contact with the aforesaid polarized surface is short, causing low efficiency. Therefore, the upper limit value which does riot lower the efficiency is the LV value stated above. While, the lower limit of the LV value is 1-2 mm/sec which is a speed for generating a laminar flow. An electrolytic cell used in a method of the invention is an electrolytic cell equipped with electrodes of a carbon fixed bed 3-D type, namely, an electrolytic cell with a carbon electrode of a fixed bed mono-electrode type and an electrolytic cell with carbon electrodes of a 3-D fixed bed multi-electrode type. In these electrolytic cells, each of 3-D electrodes in the electrolytic cell has a large surface area, and accordingly, it is possible to increase a contact area between the surface of an electrode and water to be treated, and thereby it is possible to make the apparatus size small and to enhance efficiency of electrolytic treatment, which is an advantage. An electrode in an electrolytic cell equipped with carbon electrodes of a fixed bed 3-D type used in the invention generally includes a carbon electrode presenting a polarizing phenomenon and an electrode for supplying electric power. The carbon electrode has its shape matching the aforementioned electrolytic cell to be used, and when an electrolytic cell with carbon electrodes of a 3-D fixed bed multi-electrode type is used, it is feasible that the carbon electrode is made of carbon materials capable of transmitting the water to be treated mentioned above, for example, of carbon type materials such as activated carbon, graphite or carbon fiber each being felt-shaped, woven-cloth-shaped, and porous-block-shaped, and there is prepared an electrolytic cell with electrodes of a fixed bed multi-electrode type housing therein 3-D electrodes wherein D.C. voltage, A.C. voltage with 10 Hz or less is impressed between power-supply-electrodes each being made of porous plate that is flat-plate-shaped, expand-mesh-shaped or perforated-plate-shaped installed at both ends of the carbon electrode to polarize the aforesaid carbon electrode so that an anode can be formed on one end of the polarized electrode and a cathode can be formed on the other end thereof. In addition to the foregoing, it is also feasible to prepare an electrolytic cell with carbon electrodes of a 3-D fixed bed multi-electrode type wherein carbon 3-D material functioning as an anode independently and carbon 3-D material functioning as a cathode independently are arranged alternately so that they are not short-circuited and are connected electrically. Since the aforementioned electrode is made of carbon, it is oxidized by oxygen gas which is an electrolytic reaction product and an electrode crumbling sometimes takes place as carbon dioxide. For avoiding this, an electrode material wherein a base material such as titanium or the like is covered with platinum metallic oxide such as iridium oxide, ruthenium oxide or the like, or a porous electrode material wherein a base material such as porous material used generally as infusible metal electrode or titanium is covered with platinum metal through plating or the like can be provided to be in contact so that generation of oxygen may take place mainly on the porous metallic electrode material. It is preferable that an average diameter of an opening of the aforementioned carbon electrode is 25-300 μm. When the carbon electrode is housed in the electrolytic cell for treating water to be treated, drinking water for example, characteristics of the carbon electrode have an influence on how the water to be treated can flow easily or on electrolysis voltage. A diameter of an opening of the carbon electrode also has an influence which is relatively strong, and when the diameter of an opening of the carbon electrode is great, the water to be treated can pass through the electrolytic cell without coming in contact with the electrode, resulting in lowered efficiency of sterilization of microorganisms. When the diameter of an opening is small, on the contrary, it is impossible for the water to be treated to pass through the carbon electrode, pressure loss of liquid flow in the electrolytic cell is caused. According to the studies of the inventors of the invention, when a diameter of an opening of a carbon 3-D electrode is smaller than 25 μm, a sharp rise in electrolysis voltage is caused, while when it exceeds 300 μm, a sharp fall of current efficiency (sterilization efficiency) is caused, thus, satisfactory effect (sterilization efficiency) can not be attained in both cases. When a carbon electrode is used for an electrolytic cell in a method of the invention, therefore, it is preferable that an average diameter of an opening thereof is made to be 25-300 μm as stated above. Porosity of the carbon electrode (volume of void in electrode) volume of electrode) The prosity of the carbon electrode can be measured by normal Bet measurement method. It is possible to manufacture a carbon electrode having a desired diameter of an opening in the following method. For example, when forming a carbon electrode by sintering carbon particles, it is possible to make a carbon electrode having an arbitrary diameter of an opening by adjusting a diameter of an opening of the carbon electrode by means of adjustment of a particle size of a carbon particle to be used. Sintering temperature for graphitizing in this case is 1000 each having a predetermined diameter of an opening are laminated to be graphitized at the similar sintering temperature. When using an electrolytic cell with electrodes of a mono-electrode fixed bed type, a piece of 3-D material is provided in the electrolytic cell through a diaphragm or without a diaphragm, or a plurality of 3-D materials are provided in a single electrolytic cell in the state of the same electrolysis voltage. Regardless of a type of the electrode to be used, when a void through which the water to be treated can flow without touching the electrode, exists in the electrolytic cell in which the water to be treated flows, efficiency of treating water to be treated is lowered. It is therefore preferable to arrange electrodes in the electrolytic cell so that the water to be treated in the electrolytic cell may not shortcut without touching the electrode. Even when an anode chamber and a cathode chamber are formed by partitioning the inside of the electrolytic cell with a diaphragm, it is possible to supply electric power without using the diaphragm, but when using no diaphragm and narrowing the distance between poles of an electrode, it is possible to insert between both poles a net-shaped spacer made of organic high molecular material, for example, as an insulating spacer for preventing short-circuiting. When using a diaphragm, it is preferable to use a porous diaphragm such as, for example, one having a rate of hole area of not less than 10% and not more than 95%, preferably, not less than 20% and not more than 80%, so that a movement of flowing water to be treated is not disturbed, and the diaphragm is required to have fine holes each being enough in diameter at least to pass the above-mentioned water to be treated through. Conditions for operating the electrolytic cell having the aforesaid constitution are preferably established so that sterilization efficiency for microorganisms in water to be treated may be highest. When conducting electrolytic treatment in an electrolytic cell for water, there are available one-pass treatment and circulation treatment. For electrolytic treatment for drinking water, for example, it is difficult to use a circulation treatment though the sterilization efficiency rises in the circulation treatment. Therefore, one-pass treatment is usually used for electrolytic treatment of drinking water. In the one-pass treatment, it is preferable that liquid hourly space velocity of water to be treated, in particular, among conditions for electrolysis, is made to be small to the utmost to make the staying time of the water to be treated in the electrolytic cell longer. With regard to electrode voltage in the course of supplying water to be treated, it is preferable that anode voltage is set to be not more than +1.2 V (vs.SHE) and not less than +0.2 V (vs. SHE). When the voltage is within this range, generation of oxygen gas and hydrogen gas caused at both poles by ordinary electrolytic reaction is very small in quantity and they are hardly observed. Therefore, it is not necessary to consider generated gas which does not contribute to sterilization of the aforesaid microorganisms. Incidentally, it is preferable that a filtration device having a filter with an aperture of 10 μm or less, and of 5 μm or less for further certainty, is provided at an outlet of the electrolytic cell so that dead bodies of microorganisms and fine dust of crushed carbon electrodes sterilized by electrolytic treatment may be filtrated. Reliability and a feeling of security for sterilization of microorganisms conducted by the dispenser can be enhanced by providing the electrolytic cell like that mentioned above and further providing an ultraviolet irradiating unit at a location close to an outlet for treated water at the downstream side of the electrolytic cell. Next, preferable examples of an electrolytic cell usable for the invention will be explained as follows, referring to the attached drawings. However, the invention is not limited to the examples. FIG. 1 is a schematic structural diagram of a dispenser used in the water treatment method of the invention. Bottle 61 for bottle water 60 is installed at a fixed position on water tank 65 of dispenser 100. In that case, outlet 62 of the bottle 61 is also located at the fixed position on the water tank 65. Bottle water 60 in the bottle 61 keeps flowing into the water tank 65 until end surface 62A of the outlet 62 is aligned to a water level in the water tank 65. Under this state, bottle water 60 in the bottle 61 stops flowing out, thus, the water level in the water tank 65 stays to be aligned with the end surface 62A of the outlet 62. When water in the water tank 65 is consumed, the water level is lowered, and water in an amount equivalent to an amount corresponding to the lowered water level is replenished from the bottle 61 and thereby the water level is restored to its balanced initial level. On the other hand, an outlet at the lower portion of the water tank 65 is connected to an inlet of electrolytic cell 12, an outlet of the electrolytic cell 12 is connected to pipe 81, outlet 87 for taking out water at the final end of the pipe 81 is provided with valve (take-out valve) 85, thus, clean water treated in the dispenser equipment 100 can be received from the outlet (water supply port) 87. On the water tank 65, on the other hand, there are provided compressor 71, cooling pipe 72, heat radiating section 73, expansion valve 74 and heat absorption section 75 of heat pump 70 forming its loop, so that water in the water tank can be cooled. The heat radiating section 73 is provided on the outer wall in the rear of the dispenser equipment 100 so that heat may be radiated from that position. Inside the dispenser equipment 100, there are installed a power supply 76. Treated water in a necessary amount wherein microorganisms have been sterilized by the electrolytic cell 12 is supplied through opening/closing of the valve 85. FIG. 2 represents an example of an electrolytic cell with electrodes of a multi-electrode fixed bed type usable as another electrolytic cell of dispenser equipment 100. Cylindrical electrolytic cell main body 12 having flange 11 on each of its top and bottom is provided at its upper portion and lower portion inside therein respectively with power-supplying anode terminal 13 and power-supplying cathode terminal 14 both being mesh-shaped. Between these electrode terminals 13 and 14, there are laminated plural, three in the illustrated example, porous electrodes of a carbon fixed bed type 15, and four mesh-shaped diaphragms or spacers 16 are sandwiched between the carbon electrodes 15, between the carbon electrode 15 and the electrode terminal 13 and between the carbon electrode 15 and the electrode terminal 14. Each carbon electrode 15 is arranged to be in close contact with the inner surface of the electrolytic cell main body 12 so that an amount of water to be treated flowing between the carbon electrode 15 and the inner surface of the electrolytic cell main body 12 without passing through the inside of the carbon electrode 15 may be small to the utmost. When energizing the electrolytic cell having the constitution mentioned above while supplying bottle water 60 thereto from the above of the electrolytic cell as shown by an arrow, each of the fixed bed electrode 15 is polarized to be positive at its bottom surface and negative at its top surface and a porous anode is formed on the bottom surface of each fixed bed electrode 15, thus, the bottle water 60 comes in contact with this porous anode to be sterilized, and then is taken out to the lower portion of the electrolytic cell to be guided to an outlet. FIG. 3 shows another example of an electrolytic cell with electrodes of a multi-electrode fixed bed type of dispenser 100 usable in the method of the invention wherein mesh-shaped infusible metal electrode 17 is provided to be in close contact with the side of the carbon electrode 15 of the electrolytic cell in FIG. 2, namely the side to be polarized to be positive, and other members are the same as those in FIG. 2, therefore, they are given the same symbols and explanation therefor will be omitted here. Carbon electrode 15 impressed with D.C. voltage is polarized to the utmost at its both ends, and when generation of gas is caused, gas generation tends to occur at both ends of the carbon electrode 15. Therefore, an end portion of the carbon electrode 15 polarized most strongly, namely subjected to gas generation most actively, and is closer to power supplying cathode 14 is subjected to oxidation reaction and dissolution reaction of base material of an electrode which are quickest and most active. When this portion is provided with infusible metal electrode 17 as illustrated, oxygen gas is mostly generated from the infusible metal electrode 17 and carbon electrode 15 hardly generates oxygen gas, resulting in effective inhibition of crumbling of the carbon electrode 15. Bottle water 60 supplied to the electrolytic cell 12 is treated in the same manner as in FIG. 2 and microorganisms in the bottle water 60 are sterilized. The invention will be explained in detail as follows, referring to the examples to which an embodiment of the invention is not limited. There will be explained as follows an example of treatment of water to be treated such as drinking water or the like, which is from bottle water 60, and the examples do not limit the methods of the invention. An electrolytic cell of dispenser equipment 100 used in the present example of the water treatment method of the invention was prepared in accordance with the following constitution. The electrolytic cell was provided at the upstream side of treated water outlet valve 85 to be close thereto. In a cylindrical electrolytic cell with flanges made of transparent hard polyvinyl chloride resin having a height of 75 mm and inside diameter of 40 mm shown in FIG. 2, there were put five fixed beds (porous graphite, made by Tokai Carbon Co.) made of carbon material and having a diameter of 39.5 mm and a thickness of 10 mm, and they were sandwiched be six polyethylene-resin-made diaphragms each having a rate of hole area of 80%, a diameter of 40 mm and a thickness of 1 mm, in a way that each fixed bed was sandwiched by the diaphragms. Then, mesh-shaped power supply anode and cathode each being made of titanium that is plated with platinum, having a diameter of 38 mm and a thickness of 1 mm were brought into contact respectively with the top diaphragm and the bottom diaphragm. Thus, the electrolytic cell of the present example was prepared. Bottle water 60 for testing was prepared by adding microorganisms to the water to be treated at the rate of 800 pieces/ml. Then, the water to be treated for testing was subjected to electrolytic treatment by supplying it to the electrolytic cell from its top at the rate of 1.5 l/min.(treatment amount or treatment speed) and by picking up 25 cc of treatment water at intervals of 12 minutes and by repeating energizing for 5 minutes and suspension for 7 minutes using D.C. voltage as shown in FIG. 4 and thereby adjusting to obtain apparent current density of 0.2 A/dm2 and electrolytic voltage of 4.3-8.8 V (average electrolytic voltage 5.8 V), thus, electrolytic treated water was sampled and was cultured for three days, during which the number of microorganisms was counted hourly. Results of them are shown in Table 1. TABLE 1__________________________________________________________________________Micro- Tempera- Conduc- Number oforganism ture of Amount of tivity of micro-Operationconcent- water to be water to be water to be Electrolytic organisms intime ration treated treated treated voltage Current treated water(min.)(pcs./ml) ( (l/min.) (μs/cm) (V) (mA) (pcs/ml)__________________________________________________________________________0 855 22 1.50 264 5.7 27 012 838 23 1.51 260 5.7 29 024 841 22 1.50 260 5.6 31 136 857 24 1.51 258 5.7 30 048 880 23 1.50 261 5.6 30 060 845 23 1.52 260 5.8 28 0__________________________________________________________________________ Next, the dispenser and its electrolytic cell same as those in Example 1 were used for Example 2, and an amount of water to be treated was increased with the passage of time of operation intentionally. The treated water was taken out for sampling in the same manner as in Example 1, and each of them was cultured for three days, during which the efficiency of sterilizing microorganisms was examined through comparison. Results of them are shown in Table 2. TABLE 2__________________________________________________________________________Micro- Tempera- Conduc- Number oforganism ture of Amount of tivity of micro-Operationconcent- water to be water to be water to be Electrolytic organisms intime ration treated treated treated voltage Current treated water(min.)(pcs./ml) ( (l/min.) (μs/cm) (V) (mA) (pcs/ml)__________________________________________________________________________0 838 22 1.95 259 5.6 27 1512 844 23 2.01 260 5.6 27 724 847 22 1.93 255 5.6 26 2836 840 23 1.95 262 5.5 27 1548 850 22 1.88 257 5.5 27 760 844 23 1.90 254 5.7 28 10__________________________________________________________________________ Next, the dispenser and its electrolytic cell same as those in Example 1 were used for Example 3, and electrolytic voltage was decreased with the passage of time of operation intentionally. The treated water was taken out for sampling in the same manner as in Example 1, and each of them was cultured for three days, during which the efficiency of sterilizing microorganisms was examined through comparison. Results of them are shown in Table 3. TABLE 3__________________________________________________________________________Micro- Tempera- Conduc- Number oforganism ture of Amount of tivity of micro-Operationconcent- water to be water to be water to be Electrolytic organisms intime ration treated treated treated voltage Current treated water(min.)(pcs./ml) ( (l/min.) (μs/cm) (V) (mA) (pcs/ml)__________________________________________________________________________0 855 22 1.50 259 4.0 13 4812 848 23 1.51 255 3.7 12 5524 853 23 1.50 251 3.6 14 6036 853 23 1.51 263 3.8 12 4248 862 24 1.50 258 4.0 12 5360 851 23 1.50 255 3.9 12 55__________________________________________________________________________ As a result of the foregoing, it was found that the number of microorganisms in water picked up from the outlet 87 for taking out water is on a satisfactory level if it is based on the conditions shown in Example 1. However, in the case of changes of the conditions such as a change of flow rate of water to be treated and reduction of voltage for electrolysis as shown in Examples 2 and 3, the number of microorganisms in water picked up from the outlet 87 increases to be out of a satisfactory level, which is not preferable. On the contrary, it is understood that water taken out of the outlet 87 under the operation conditions within a range shown in Example 1 can maintain the preferable state of no microorganism. However, in the case of this dispenser equipment 100, a phenomenon that microorganisms increase in number takes place in pooled water in pipe 81 located between an outlet of the electrolytic cell and outlet 87 for taking out water when the water therein stays there for a long time. The inventors of the invention conducted experiments shown in Example 4 by operating again after a long time of suspension, concerning the relation between a length of pipe 81 and efficiency of sterilization. When a dispenser equipment is re-energized after its suspension for one hour from the stop of energizing made after the normal taking out of water under energizing of the dispenser equipment, the number of microorganisms in water taken out immediately after the re-energizing is about 100 pcs/ml on the assumption that a length (L) of pipe 81 is 300 mm, and a level of mostly zero in terms of the number of microorganisms was attained by water taken out after 3 seconds from the re-energizing. When the length (L) of pipe 81 is 150 mm, the number of microorganisms in water taken out immediately after the re-energizing is about 50 pcs/ml and a level of mostly zero in terms of the number of microorganisms was attained by water taken out after 2 seconds from the re-energizing. Further, when the length (L) of pipe 81 is 100 mm, the number of microorganisms in water taken out immediately after the re-energizing is about 35 pcs/ml and a level of mostly zero in terms of the number of microorganisms was attained by water taken out after 1.5 seconds from the re-energizing. When the length (L) of pipe 81 is 50 mm, the number of microorganisms in water taken out immediately after the re-energizing is about 15 pcs/ml and a level of mostly zero in terms of the number of microorganisms was attained by water taken out after 0.5 seconds from the re-energizing. FIG. 4 shows the foregoing in a form of a graph. Therefore, it is understood that the shorter the length (L) of pipe 81 up to the outlet 87 of the dispenser equipment 100 is, the better the result is. Incidentally, when the same tests were conducted in Examples 1, 2 and 3 under the condition that ultraviolet irradiating unit 90 is connected as shown in FIG. 5, the number of microorganisms per milliliter in treated water in each of Tables 2 and 3 was extremely reduced to be almost zero, similarly to the results of Table 1. It can be said, therefore, that the sterilization efficiency is higher in the case that ultraviolet rays are irradiated than in the case where an electrolytic cell only is provided. In addition, it is hard, from the viewpoint of the structure of the dispenser equipment, to make the length of the pipe 81 mentioned above to be equal to or less than a certain value. As shown in FIG. 5, when eliminating the limitation for the effect of a means for shortening pipe 81, the great effect can be attained in the constitution wherein a transparent material is used for part 82 of pipe 81 on which ultraviolet irradiating lamp 84 and reflecting mirror 83 are provided. When water to be treated, especially, bottle water, is supplied to an electrolytic cell provided with a fixed type 3-D electrode, or to an ultraviolet irradiating unit to be connected thereto, microorganisms in the water to be treated come into contact with a voltage-donated carbon electrode where they further come into contact with high-voltage current on the surface of the electrode to be subjected to powerful oxidation reaction, or to attenuation of their activities, or to their extinction, thus the microorganisms are sterilized. In the dispenser using bottle water, it is not used frequently but is used intermittently. Even in that case, it is possible to enhance sterilization efficiency sufficiently by controlling energizing time or by making the length of a pipe from an electrolytic cell to an outlet for water to be short to the utmost. Further, it has become possible to enhance a multiplier effect of sterilization efficiency by employing both an electrolytic cell and an ultraviolet irradiating unit.
<urn:uuid:136422bd-138b-456c-864b-31004ebeb0f8>
2013-05-18T17:29:54Z
CC-MAIN-2013-20
[ [ -0.01953125, 0.005340576171875, -0.0118408203125, -0.047119140625, 0.12451171875, -0.07568359375, 0.00262451171875, 0.08349609375, -0.024658203125, -0.0220947265625, 0.1376953125, 0.00714111328125, -0.048583984375, 0.020751953125, 0.032470703125, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932252
7,589
http://www.google.de/patents/US5744028?hl=de
0.804467
US 5384333 A A bio-injectable drug composition which provides long term drug release. The drug composition is made up of a pharmaceutically active agent in a biodegradable polymer matrix, where the polymer matrix is a solid at temperatures in the range 20 temperatures in the range 38 1. A drug delivery composition for injection into a body, comprising a pharmaceutically active agent and biodegradable polymer which are physically mixed together, wherein the polymer comprises from 30 to 99.5% by weight of said drug delivery composition, is solid at a temperature in the range 20 38 wherein A is a hydrophobic polymer or oligomer and B is a hydrophilic polymer or oligomer. 2. A drug delivery composition for injection into a body, comprising a pharmaceutically active agent physically mixed with a biodegradable block co-polymer of formula: wherein A is a hydrophobic polymer or oligomer and B is a hydrophilic polymer or oligomer; wherein the biodegradable block co-polymer comprises from 30 to 99.5% by weight of said drug delivery composition and is solid at a temperature in the range 20 38 wherein A is selected from the group consisting of polyglycolic acid, polyethylene terephthalate, polybutyl lactone polycaprolactone, D-polylactic acid, L-polylactic acid, polyglutamic acid, poly L-lysine, and poly L-aspartic acid; and wherein B is selected from the group consisting of polyethylene glycol, polypropylene glycol and polyvinyl alcohol. 3. A drug delivery composition according to claim 1, wherein A is selected from the group consisting of polyglycolic acid, polyethylene terephthalate, polybutyl lactone polycaprolactone, D-polylactic acid, L-polylactic acid, polyglutamic acid, poly L-lysine, and poly L-aspartic acid; and wherein B is selected from the group consisting of polyethylene glycol, polypropylene glycol and polyvinyl alcohol. 4. A drug delivery composition according to claim 1, wherein the biodegradable polymer is a polymer of formula: H[O(CH.sub.2).sub.5 C].sub.n --[OCH.sub.2 CH.sub.2 ].sub.m --[OC(CH.sub.2).sub.5 O].sub.n --H wherein m is in the range 9.09 to 45.45 and n is in the range 6.16 to 45.45. 5. A drug delivery composition as claimed in claim 1, wherein the pharmaceutically active agent is selected from gancyclovir, 5-fluorouracil, acyclovir, dexamethasone, triamcinolone, prednisone, floxuridine, doxorubicin, daunorubicin, mitomycin, cytarabine, methotrexate and thioguanine. 6. A drug delivery composition according to claim 5 wherein the pharmaceutically active agent is selected from gancyclovir and 5-fluorouracil. 7. A drug composition according to claim 1, wherein the pharmaceutically active agent is present in the amount 0.5 to 70% by weight relative to the total weight of the composition. 8. A drug delivery composition according to claim 7, wherein the pharmaceutically active agent is present in an amount 1 to 35% by weight relative to the total weight of the composition. 9. A drug delivery composition according to claim 8, wherein the pharmaceutically active agent is present in an amount 2% to 25% by weight relative to the total weight of the composition. 10. A drug delivery composition according to claim 1 comprising a pharmaceutically active agent and biodegradable tri-block copolymer of the formula wherein A is polycaprolactone with a molecular weight of 2000 and B is polyethylene glycol with a molecular weight of 600. The present invention relates to a biodegradable injectable drug delivery polymer system which provides an improved medium for the administration of sustained release drugs to the human body, especially to the eye. Current technology for the intraocular introduction of drugs consists of either bulky, implantable drug delivery devices or injectable microspheres which contain drugs. These delivery systems suffer from drawbacks which make them undesirable for general clinical use. In particular, implantation of bulky ocular implants requires surgery, with all its attendant risks. Microspheres suffer from the drawback that they migrate within the eye, either into the visual axis, or into adjacent tissue sites. Some patents which exemplify the current state of this technology, none of which have been developed into clinically useful devices, are discussed below. In order to discuss these devices, it is necessary to clarify some terms which are used in these patents. The literature uses the term "ocular" in a confusing manner, improperly categorizing intraocular devices with extra-ocular devices. "Ocular" should be referenced using these terms which reflect anatomy, physiology and the invasiveness of the particular method. As used in this application, "extraocular" refers to the ocular surface and the (external) space between the eyeball and the eyelid. Example of "extraocular" regions include the eyelid fornix or cul-de-sac, the conjunctival surface and the corneal surface. This location is external to all ocular tissue and an invasive procedure is not required to access this region. Extraocular devices are generally easily removable, even by the patient. Examples of extraocular systems include contact lenses and "topically" applied drops. The following patents disclose extraocular systems which are used to administer drugs to the extraocular regions. Higuchi et al. discloses in U.S. Pat. Nos. 3,981,303, 3,986,510 and 3,995,635, a biodegradable ocular insert which contains a drug. The insert can be made in three different shapes for retention in the cul-de-sac of the eyeball, the extraocular space between the eyeball and the eyelid. Several common biocompatible polymers are disclosed as suitable for use in fabricating this device. These polymers include zinc alginate, poly (lactic acid), poly (vinyl alcohol), poly (anhydrides) and poly (glycolic acid). The patents also disclose membrane coated devices with reduced permeation to the drug and hollow chambers holding the drug formulation. British Patent 1,529,143 discloses a crescent-shaped drug releasing ocular insert. This insert is placed and retained in the upper fornix above the upper eyelid and the eyeball. This is another extraocular device. Hughes et al., U.S. Pat. No. 4,201,210 discloses an extraocular device for use in animal eyes. This device is a controlled release system in the shape of a ring. Theeuwes, U.S. Pat. No. 4,217,898, discloses microporous reservoirs which are used for controlled drug delivery. These devices are placed extraocularly in the ocular cul-de-sac. Four device shapes are disclosed. Among the polymer systems of interest include poly (vinylchloride)-co-poly (vinyl acetate) copolymers. Kaufman discloses in U.S. Pat. Nos. 4,865,846 and 4,882,150 discloses an ophthalmic drug delivery system which contains at least one bio-erodible material or ointment carrier for the conjunctival sac. Suitable drugs which are used in this delivery system include pilocarpine. The patent discloses polymer systems, such as, poly (lactide), poly (glycolide), poly (vinyl alcohol) and cross linked collagen, as suitable delivery systems. Brightman et al., U.S. Pat. No. 4,474,751, discloses a biodegradable ocular insert for the controlled delivery of ophthalmic material. This insert is an extraocular insert which is attachable to the third eyelid in animal eyes. The insert is used for the controlled delivery of medication. The preceding patents all relate to extraocular systems, as the term is defined above. Intraocular systems are those systems which are suitable for use in any tissue compartment within, between or around the tissue layers of the eye itself. These locations include subconjunctival (under the ocular mucous membrane adjacent to the eyeball), orbital (behind the eyeball), and intracameral (within the chambers of the eyeball itself). In contrast to extraocular systems, a surgical procedure consisting of injection or implantation is required to access these regions. This requires a direct invasion of the integrity of the eye during implantation, and would require major surgery to remove. The following patents disclose intraocular devices. Wong, U.S. Pat. No. 4,853,224, discloses microencapsulated drugs for introduction into the chamber of the eye. Polymers which are used in this system include polyesters and polyethers. Examples of drugs which can be delivered by this system include 5-fluorouracil, pilocarpine and acyclovir. Lee, U.S. Pat. No. 4,863,457, discloses a biodegradable device which is surgically implanted intraocularly for the sustained release of therapeutic agents. The device is designed for surgical implantation under the conjunctiva (mucous membrane of the eyeball). The device is disc-shaped with a protruding "handle" for suture fixation. Krezancaki, U.S. Pat. No. 4,188,373, discloses a pharmaceutical vehicle which gels at human body temperature. This vehicle is an aqueous suspension of the drug and gums or cellulose derived synthetic derivatives. The suspension remains liquid below 30 temperature), and only undergoes a sol-gel transformation in the temperature range 25 covalent chemical interaction is taking place within the site of injection. Haslam et al. discloses in U.S. Pat. Nos. 4,474,751 and 4,474,752 a polymer-drug system which is liquid at room temperature and gels at body temperature. Suitable polymers used in this system include polyoxyethylene and polyoxy propylene. Suitable drugs include 5-FU, gentamycin, triamcinolone, and acyclovir. This system requires an intraocular, temperature dependent chemical polymerization reaction between the polymer components. This is fundamentally different from the concept of the present invention. U.S. Pat. No. 4,474,753 discloses the use of this system in a topical setting. The present invention relates to novel biodegradable polymer systems called "meltamers" and their use to introduce pharmaceutically active agents into the body, especially into intraocular portions of the eye. The present polymer compositions can be introduced into the eye via injection, and thus avoid the need for surgical invasion of the eyeball itself. In addition, the present compositions avoid the need for covalent chemical reactions to take place within the eyeball. This offers a vastly simplified procedure compared to previous methods. One aspect of the present invention is a drug delivery composition comprising a pharmaceutically active agent and a biodegradable polymer, wherein said biodegradable polymer is solid at temperatures in the range 20 38 A further aspect of the present invention is a method of introducing a pharmaceutically active compound into the human body, the method comprising the steps of: (a) forming a drug delivery composition which comprises a pharmaceutically active agent and a biodegradable polymer, wherein the biodegradable polymer is solid at temperatures in the range 20 is liquid at temperatures in the range 38 the drug delivery composition is formed by mixing the pharmaceutically active agent with the biodegradable polymer; (b) liquefying the drug delivery system by heating to a temperature where it liquifies; and (c) injecting the liquid polymer into the body. Other objects, features and characteristics of the present invention, as well as the methods of operation and functions of the related elements of the structure, and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following detailed description and the appended claims with reference to the accompanying drawings all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. The present invention provides a bio injectable drug delivery system and a method of introducing a drug into the body for sustained release. The drug delivery system of the present invention comprises biodegradable drug delivery systems which include a drug containing polymer matrix which is solid at 20 temperature range 38 approximately 50 portion of the body requiring treatment, where it resolidifies. No covalent reaction, setting or other clinical process is required, other than cooling. This allows all polymer/drug interactions to be pre-formulated in the laboratory prior to injection. This pre-formulation results in an injectable system which has excellent sustained drug release characteristics without the drawbacks of invasive surgery or chemical reactions. The polymer biodegrades completely and leaves no ghost or residue. The present injectable delivery system provides an improved way of delivering drugs into the body. This provides the drugs in a form which allows sustained release of the drug compound into the body. Currently topical medicines or injections of soluble drugs are the only options for clinical use. These media have short half-lives. The drug delivery polymer is not limited to the delivery of soluble or liquid drug formulations. For example, the polymer can be used as a matrix for stabilizing and retaining at the site of injection drug-containing microspheres, liposomes or other particulate-bound drugs. In addition, pharmacologically active proteins, such as growth factors, cytokines or other biological response modifying substances can be incorporated and delivered with this polymer system. Significant problems are associated with the use of currently available technology for intraocular sustained released. These involve the use of bulky implants which require surgical implantation, and injectable microspheres which suffer from migration problems. The present system provides the advantage that it is simple to use. A simple injection, for example, with an 25 gauge needle, is all that is required to introduce the drug delivery device into the eye. Once inside the eye, it solidifies by a simple cooling process. Then the solid polymer slowly degrades and releases the drug. No covalent chemical reactions are required, thus obviating problems which are related to different intraocular conditions which might arise due to different applications, prior surgery or concurrent disease. Furthermore the device dissolves completely and thus does not leave a ghost or residue which would require surgical removal. Potential uses for the present invention include controlled delivery of drugs or active agents to the vitreous cavity of the eye for treating diseases such as complicated retinal detachment, CMV retinitis in AIDS and other conditions. The system could also be used for the sustained release of anti-metabolites subconjunctivally to prevent wound healing of a filtering bleb after laser glaucoma filtering surgery to control fibroblast proliferation. The system is also suitable for use in delivery of sustained release of antibiotics or anti-inflammatory drugs in the eye, for example after cataract surgery. Additionally, the present system is suitable for use in other parts of the body which require sustained drug therapy. Examples of these uses include intralesional therapy of cutaneous disorders, intra-articular delivery of agents and intracranial drug delivery. These uses are intended as illustrative and do not limit the scope of the present invention. Those skilled in the art may desire other uses for this system within the scope of the present invention. A preferred use of the present invention is for the introduction of pharmaceutically active compounds into the intraocular region of the eye. However, the present drug delivery system should not be viewed as limited to intraocular use. The present invention avoids the hazards of eye surgery to insert the drug delivery device and also avoids intraocular chemical reactions. Any biodegradable polymer system which has the following characteristics is suitable for use in the biodegradable polymer matrix in the present system. Homopolymers, co-polymers, block co-polymers, waxes and gels which are: biodegradable, compatible with a variety of drugs; are solid at temperatures; between 20 38 without additional chemical reactions at these temperatures and can be formed in laboratory and used without the need for further chemical interaction. The polymer matrix can be formed in the lab or production by any suitable means, and can be compounded with the drug by any means which allow the above requirements to be satisfied. A preferred polymer system is a triblock copolymer. This block copolymer has the general formula: where A represents a hydrophobic polymer block and B represents a hydrophilic polymer. The biodegradable monomers and polymers are preferably linked through ester groups. Preferred hydrophobic polymers and oligomers include, but are not limited to units selected from polyglycolic acid, polyethylene terephthalate, polybutyl lactose, polycaprolactone, D-polylactic acid, L-polylactic acid, polyglytamic acid, poly-L-lysine and poly-L-aspartic acid. Preferred hydrophilic polymers include polyethylene glycol, polypropylene glycol and poly vinyl alcohol. A particularly preferred biodegradable polymer matrix is a triblock copolymer of poly caprolactone (PCL)--polyethylene glycol (PEG)-poly caprolactone. This polymer contains ester bonds which hydrolyze in a hydrophilic environment, such as the eye. This preferred polymer has the formula: H[O(CH.sub.2).sub.5 CO].sub.n --[OCH.sub.2 --CH.sub.2 O].sub.m --[OC(CH.sub.2).sub.5 O].sub.n --H where m is in the range 6.67 to 16.67 and n is in the range 4.65 to 17.54. A particularly preferred embodiment of this polymer is the block copolymer of two units of poly caprolactone with a molecular weight of 2000 and one unit of polyethylene glycol with a molecular weight of 600. Polymers of this type can be formed by melt polymerization. The biodegradable polymer matrix should make up 30 to 99.5% of the drug delivery composition by weight, preferably 65 to 99% by weight, more preferable 75 to 98% of the drug delivery composition by weight. Any pharmaceutically active compound which is compatible with the biodegradable matrix can be used in this system. Preferred drugs are ophthalmologically active compounds. Examples of suitable drugs include ganciclovir, acyclovir, foscarnet, 5-fluorouracil, dexamethasone, Triamcinolone, prednisone, floxuridine, doxorobicin, daunorubicin, mitomycin, cytarabine, methotrexate and thioguanine. The drug should be present in the drug delivery composition of 0.5 to 70% by weight, preferably 1-35% by weight and most preferably 2-25% by weight relative to the weight of the total composition. The present invention is further illustrated by the following examples which illustrate the formulation and use of this invention. These examples are intended as illustrative and are not intended to limit the scope of the claimed invention. Mix 19.7 gm (0.033 moles) PEG-600 with 136.2 gm (0.068 moles) PCL-2000 in a round bottom flask at 50 vacuum. Provide a by-product reservoir for the escaping water from the reaction. Recrystallize by dissolving the polymer into hot ethyl acetate (1st solvent) and filtering the solution through a Whatman No. 2 filter. Then add hexane (2nd solvent) dropwise to the warm filtrate until solution starts to become cloudy. Add enough of 1st solvent to make solution clear again. Allow the solution to cool (refrigeration overnight). Meltamer crystals form during cooling. Filter the cool solution and rinse crystals with cold, fresh 1st solvent. Dry crystals in warm (<50 under partial (˜0.5 mmHg) vacuum Yield was 69% after recrystallization. Mix 0.04 moles PEG-400 with 0.08 moles PCL-1250 in a round bottom flask at 50 by-product reservoir for the escaping water from the reaction. Recrystallize as described above. Yield was 74% after recrystallization. Other possible 1st solvents are: acetone, chloroform, dichloroethane, and toluene. Other possible 2nd solvents are: water, methanol, and ethanol. In vitro meltamer degradation can be followed in water bath at 37 C. Load samples of each meltamer into syringes, heat them in oven at 55 disappearance times (from 30 minutes to 3 days) are noted. In vivo compatibility and degradation lifetimes in the eye can be ascertained by injecting the sterilized meltamer into both the anterior chamber (AC) and vitreous cavity of laboratory rabbits' eyes. Vitreous cavity degradation appears to be faster than AC degradation. Still, meltamer remains present in both cavities for over three months. Chemical analysis includes determination of solubilities in common laboratory solvents, nuclear magnetic resonance and fourier transform infrared analyses to confirm chemical structure, and differential scanning calorimetric analysis to determine melting temperature. A summary of some differential scanning calorimetric results is shown in Table 1. TABLE 1______________________________________Melting Temperatures of Meltamers MELTINGMELTAMER TEMPERATURE (______________________________________PCL530-PEG1000-PCL530 25PCL530-PEG400-PCL530 30PCL530-PEG600-PCL530 38PCL1250-PEG400-PCL1250 42PCL1250-PEG1000-PCL1250 44PCL2000-PEG1000-PCL2000 48PCL2000-PEG400-PCL2000 48PCL1250-PEG600-PCL1250 49PCL2000-PEG600-PCL2000 52______________________________________ Drugs such as gancyclovir can be incorporated into the meltamer by first exposing both drug and meltamer to liquid nitrogen, then grinding them together. Drug percentages can range from 2.5 to 30 weight percent. The meltamer-drug composition can then be loaded into syringes for ethylene oxide sterilization for in vivo use. While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiment, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. Citas de patentes
<urn:uuid:b52b977a-7b64-4fda-be94-bf3652bea365>
2013-05-18T17:51:25Z
CC-MAIN-2013-20
[ [ -0.0120849609375, 0.01904296875, -0.0185546875, -0.04541015625, 0.07373046875, -0.10693359375, 0.00469970703125, 0.1005859375, -0.03369140625, -0.01434326171875, 0.0888671875, 0.00762939453125, -0.00311279296875, 0.068359375, 0.052490234375, -0.05444...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.892301
4,974
http://www.google.es/patents/US5384333?hl=es&dq=flatulence
0.967083
US 5437878 A Disclosed are chewing gum compositions exhibiting a reduced tendency to adhere undesirably to solid dental surfaces in the mouth, the compositions comprising a gum base which comprises about 8 to about 18 wt. % of low molecular polyisobutylene; about 1 to about 4 wt. % of high molecular weight polyisobutylene; about 16 to about 30 wt. % of polyvinyl acetate; about 16 to about 30 wt. % of inorganic filler; about 1 to about 6 wt. % of polyethylene; about 18 to about 30 wt. % of a fat component selected from the group consisting of hydrogenated and partially hydrogenated vegetable oils and mixtures thereof; about 1 to about 6 wt. % of emulsifier; and about 2 to about 10 wt. % of microcrystalline wax. 1. A chewing gum exhibited reduced tack to dental surfaces, comprising a gum base, an optional sweetener component and an optional flavor component, wherein the gum base consists of: (a) about 8 to about 18 wt. % of low molecular weight polyisobutylene and about 1 to about 4 wt. % of high molecular weight polyisobutylene; (b) about 16 to about 30 wt. % of polyvinyl acetate; (c) about 16 to about 30 wt. % of inorganic filler; (d) about 1 to about 6 wt. % of polyethylene having a molecular weight of about 2,000; (e) about 18 to about 30 wt. % of a fat component selected from the group consisting of hydrogenated and partially hydrogenated vegetable oils and mixtures thereof; (f) about 1 to about 6 wt. % of emulsifier; and (g) about 2 to about 10 wt. % of microcrystalline wax wherein said chewing gum does not contain a resin or rosin component or derivative. 2. A chewing gum in accordance with claim 1 wherein said inorganic filler is selected from the group consisting of aluminum hydroxide, magnesium hydroxide, alumina, aluminum silicates, calcium carbonate, talc, and combinations thereof. 3. A chewing gum in accordance with claim 2 wherein the filler comprises calcium carbonate. 4. A chewing gum in accordance with claim 1 wherein said low molecular weight polyisobutylene has a Flory molecular weight of about 49,000 to about 60,000; said high molecular weight polyisobutylene has a Flory molecular weight of 750,000 to 1,000,000; and said polyvinyl acetate has a weight average molecular weight of about 7,000 to about 13,000. 5. A chewing gum in accordance with claim 1 comprising a flavorant. 6. A chewing gum according to claim 5 wherein said flavorant is selected from the group consisting of peppermint oil, menthol, cinnamon oil, spearmint oil, vanilla, wintergreen oil, lemon oil, orange oil, grape, lime oil, grapefruit oil, apple, apricot essence, and mixtures thereof. 7. A chewing gum according to claim 1, further comprising a sweetener. 8. A chewing gum according to claim 7 wherein said sweetener is selected from the group consisting of sucrose, glucose, corn syrup, dextrose, invert sugar, fructose, saccharine, salts of saccharine, cyclamic acid, salts of cyclamic acid, aspartame, dihydrochalcones, glycyrrhizin, stevia rebaudiana, monellin, thaumatin, sucralose, isomaltitol, neosugar, lactitol, polydextrose, maltitol, sorbitol, sorbitol syrup, mannitol, xylitol, hydrogenated starch hydrolysate, acesulfame, salts of acesulfame, and mixtures thereof. Chewing gums in accordance with the present invention, comprise a gum base which represents a carefully optimized combination of ingredients and amounts thereof. In the following description, each of the ingredients will be discussed in turn. It should be recognized, however, that in the present invention, the result is indeed greater than the sum of the contributions of each of the component ingredients, and nothing in the following discussion should be taken as representing that any particular ingredient contributes only the properties which it would be expected to contribute to any other gum base formulation in any other context. The present invention thus resides in considerable part in the effective combination of properties exhibited by the gum base itself and by chewing gums incorporating that gum base, so it should be borne in mind that the properties exhibited by the product are very much the result of the combined presence of each of the ingredients described herein, present in the relative amounts described herein. The gum base contains about 8 wt. % to about 18 wt. % of low molecular weight polyisobutylene, preferably having a Flory molecular weight of about 49,000 to 60,000. The gum also contains about 1 wt. % to about 4 wt. % of high molecular weight polyisobutylene which preferably has a Flory molecular weight of about 750,000 to about 1,000,000. Polyisobutylene is an elastomer, and thus contributes chewability and good mouth feel to the gum base and to gums containing the gum base. The gum base in accordance with the present invention also includes about 16 wt. % to about 30 wt. % of polyvinyl acetate having a weight average molecular weight in the range of about 7,000 to 13,000. The gum base according to the present invention also contains about 1 wt. % to about 6 wt. % of polyethylene. Polyethylene found to be particularly useful in the gum bases of the present invention has a molecular weight of about 2,000. The gum base in accordance with the present invention further contains about 16 wt. % to 30 wt. % of an inorganic filler. The filler is preferably selected from the group consisting of aluminum hydroxide, magnesium hydroxide, alumina, aluminum silicates, calciumcarbonate, and talc, and combinations thereof. The preferred filler is food grade calcium carbonate. The gum base in accordance with the present invention also contains about 18 wt. % to about 35 wt. % of a fat component selected from the group consisting of hydrogenated and partially hydrogenatedvegetable oils and mixtures thereof, said group including but not limited to soybean, cottonseed, corn, peanut and palm oils, and animal fats such as lard and tallow. The gum base of the present invention also contains about 1 wt. % to about 6 wt. % of an emulsifier which is preferably a mono- or di- glyceride ester of a fatty acid. An example is glycerol monostearate. The gum base of the present invention also contains about 2 wt. % to about 10 wt. % of microcrystalline wax. This component is believed to be especially surprising in view of the prior art teaching against the presence of a wax component in a non-stick gum. The preferred microcrystalline wax has a melt point in the range of 165 195 As indicated above, the chewing gums of the present invention preferably do not contain a resin or rosin component or derivative such as the methyl, glycerol or pentaerythritol ester of rosins or modified rosins, such as hydrogenated, dimerized, or polymerized rosins. Examples of such components absent from this invention include the pentaerythritol ester of wood rosin, glycerol ester of wood rosin, of partially dimerized wood rosin, of polymerized rosin of tall oil rosin, of wood rosin, or of partially hydrogenated wood rosin, the partially hydrogenated methyl ester of rosin; and terpene resins including polyterpene and polymers of α-pinene or β-pinene. The gumbase of the present invention having the foregoing characteristics, can be formulated using straightforward techniques conventional in this field. Typically, the polyisobutylene and polyvinyl acetate are placed in a mixer, and the other ingredients are gradually fed in while the contents of the mixer are subjected to heat and high shear or kneading. Heating to temperatures on the order of about 100 while mixing for about 2 to 4 hours, are typical formulating conditions. Chewing gum incorporating this invention can be made in the conventional manner, which is familiar to those of ordinary skill in this art. The present invention contemplates the optional inclusion of a sweetener component which comprises any one or more sweeteners known in the art, including both intense and bulk sweeteners. Thus, sweeteners may be chosen from the following non-limiting list, which includes sugars such as sucrose, glucose, corn syrup, dextrose, invert sugar, fructose and mixtures thereof; saccharine and its various salts such as the sodium or calcium salt; cyclamic acid and its various salts such as the sodium salt; free aspartame; dihydrochalcone sweetening compounds; glycyrrhizin; steviu rebaudiana (stevioside); monellin, thaumatin, polydextrose, and maltitol; and sugar alcohols such as sorbitol, sorbitol syrup, mannitol, xylitol, and the like. Also contemplated as a sweetener is the nonfermentable sugar substitute hydrogenated starch hydrolysate (also known as Lycasin) which is described in U.S. Pat. No. Re. 26,959. Also contemplated is the synthetic sweetener 3,6-dihydro-6-methyl-1-1,2,3-oxathiazin-4-one-2,2-dioxide, particularly the potassium (acesuliflame-K), sodium and calcium salts thereof as described in German Pat. No. 2,001,017.7. Products within the scope of the present invention may include no sweetener at all. If sweetener is included, the amount of sweetener is effective to provide the desired degree of sweetness, generally 0.001 to 70 wt. % of the final product. Suitable flavorants include both natural and artificial flavors and mints, such as oil of peppermint, menthol, oil of spearmint, vanilla, oil of cinnamon, oil of wintergreen (methyl salicylate), and various fruit flavors, including but not limited to lemon oil, orange oil, grape flavor, lime oil, grapefruit oil, apple, apricot essence, and combinations thereof. The flavorings are generally utilized in amounts that will vary depending upon the individual flavor, and may, for example, range in amounts of about 0.5% to about 3% by weight of the final composition weight. Colorants can be present in the chewing gums of the present invention. Examples include the pigments such as titanium dioxide, natural colorants such as turmeric and carmine, and other dyes suitable for food, drug and cosmetic applications known as F.D. & C. dyes, and the like. The materials may be incorporated in amounts of up to about 1% by weight, preferably up to about 6% by weight. The non-stick characteristics of gum according to the present invention have been demonstrated using test panels of persons wearing removable dental work (partial, bridges, upper or lower or full dentures). In testing of about 600 such people, who were asked to rank stickiness to their dental work from 1 (always stuck to dental work) to 7 (did not stick to dental work), gum according to the present invention scored 6.58, with 85% of the respondents giving the gum a score of 7. The gum also exhibits superior flavor retention. Examples of a gum base in accordance with the present invention, useful in formulating chewing gums exhibiting little or no tack, are set forth in the following table: ______________________________________ Amount, Wt. %Component 1 2 3 4______________________________________Filler (Calcium Carbonate) 20.8 23.5 25.0 27.0Polyisobutylene (low mol. wt.) 11.6 12.0 12.0 9.8Polyisobutylene (high mol. wt.) 2.9 2.0 2.5 2.5Polyvinyl Acetate 28.3 25.0 25.0 25.0Microcrystalline Wax 2.8 10.0 5.0 5.0Polyethylene (Mol. wt. = 2,000) 5.3 5.0 3.0 5.0Hydrogenated and Partially 23.0 21.0 24.5 24.5Hydrogenated Vegetable OilsGlycerol Monostearate 5.3 1.5 3.0 3.25______________________________________ The present invention relates to chewing gums and more particularly to chewing gums exhibiting improved mouth feel and flavor retention while exhibiting simultaneously little or no tendency to adhere to the hard surfaces within the mouth, including teeth, fillings, dentures, and the like. It is widely recognized that conventional chewing gum has a well-known tendency to stick not only to itself but also to any surface with which it comes into contact. Thus, it has generally been accepted that chewing gum is necessarily tacky, once it is masticated and moistened, such that it will adhere to floors, pavement, wastebaskets, and the like, a phenomenon which is a familiar part of the everyday world. However, this tendency to adhere to surfaces also gives the gum a tendency to adhere to solid surfaces within the mouth, including the surfaces of the natural teeth, to fillings and particularly to other dental work such as crowns, bridges, and most particularly dentures. This tendency of chewing gum to adhere to such surfaces has generally been assumed to be a necessary draw-back to be tolerated if one wishes to enjoy the more desirable aspects of chewing gum. Attempts to modify the tendency of chewing gum to stick where it is not desired, such as to dental work in the mouth, have not surprisingly led to modified gum formulations which have proven unattractive for any of a variety of reasons. The problem can be summarized by recognizing that a chewing gum formulation requires a careful balancing of the identities, properties, and amounts of the components which make up the chewing gum base, as well as of those components which are added to the gum base such as extenders, flavorants, sweeteners, and the like. Thus, it can be appreciated that alteration of one or more aspects of a chewing gum formulation, whether it be changing ingredients, amounts, ratios of ingredients, or any other aspect, may have an unpredictable effect on the properties of the chewing gum product. Thus, any adjustment to a chewing gum formulation in the attempt to reduce the tendency of the gum to stick to dental surfaces in the mouth runs a significant risk of sacrificing one or more of a gum's more desirable properties enumerated herein. In that case, a gum exhibiting a lessened tendency to stick to dental work will nonetheless not be a satisfactory product. Thus, there remains a need for a chewing gum formulation having a reduced tendency, or complete freedom, from adhering to dental work in the mouth, which retains or even improves the other properties which are all desired of a commercially satisfactory chewing gum formulation. One attempt to formulate a chewing gum having a reduced tendency to stick to other solid surfaces is described in U.S. Pat. No. 3,984,574. This patent discloses a chewing gum said to contain 5-35% of an elastomer which can be polyisobutylene, polyisoprene and isobutylene-isoprene copolymer or a butadiene-styrene copolymer; 5-50% of hydrogenated or partially hydrogenated vegetable oils or animal fats; 5-40% of mineral adjuvants; polyvinyl acetate in an amount up to 55%; fatty acids present in an amount up to 20%; and mono and diglycerides of fatty acids present in amounts up to 10%. This patent specifically teaches that using wax as an ingredient in conjunction with rubber will not produce a non-stick formulation. By contrast, the gums of the present invention utilize a combination of wax and rubber which create a product that both is non-stick and has superior flavor duration and texture over products believed to be based on the teachings of U.S. Pat. No. 3,984,574. U.S. Pat. No. 4,518,615 purports to describe a chewing gum that is said not to adhere to dentures and other dental surfaces. The gum includes an elastomer, an elastomer solvent, polyvinyl acetate, emulsifier, low molecular weight polyethylene, waxes, plasticizer and filler. The elastomer solvents disclosed are methyl, glycerol and pentaerythritol esters of rosins and modified rosins, and resins such as terpenes. The present inventors have discovered that these elastomer solvent components can detract from the desired properties of the gum; accordingly, the gums of the present invention do not have such a component. The present invention satisfies this need, while exhibiting the advantageous properties enumerated herein. For instance, the chewing gum according to the present invention is satisfactorily soft so that the initial chews of a new piece of gum quickly begin to convert it to the desired fully masticated state. The gum remains soft throughout the chew. The gum according to the present invention also exhibits an initial release of flavor and/or sweetness upon the initial bite, exhibits long flavor retention throughout the course of mastication in the mouth, and remains integral rather than disintegrating or dissolving during the course of mastication. The chewing gum of the present invention comprises a gum base, and also optionally comprises one or both of a sweetener component and a flavor component, wherein the gum base comprises about 8 to about 18 wt. % of low molecular weight polyisobutylene; about 1 to about 4 wt. % of high molecular weight polyisobutylene; about 16 to about 30 wt. % of polyvinyl acetate having a weight average molecular weight of about 7,000 to about 13,000; about 16 to about 35 wt. % of an inorganic filler; about 1 to about 6 wt. % of polyethylene having a weight average molecular weight of about 2,000; about 18 to about 30 wt. % of a fat component selected from the group consisting of hydrogenated and partially hydrogenated vegetable oils and mixtures thereof; about 1 to about 6 wt. % of emulsifier; and about 2 to about 10 wt. % of microcrystalline wax. Citas de patentes
<urn:uuid:001f7828-931b-41be-84b5-6a81e7267e64>
2013-05-18T17:50:51Z
CC-MAIN-2013-20
[ [ -0.002288818359375, 0.006988525390625, -0.02783203125, -0.038818359375, 0.09912109375, -0.10009765625, -0.0167236328125, 0.12890625, -0.034423828125, -0.0361328125, 0.1279296875, 0.013916015625, -0.0869140625, 0.11083984375, 0.049560546875, -0.044433...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.914801
3,989
http://www.google.es/patents/US5437878
0.929212
US 6253301 B1 A data caching system and method includes a data store for caching data from a main memory, a primary tag array for holding tags associated with data cached in the data store, and a duplicate tag array which holds copies of the tags held in the primary tag array. The duplicate tag array is accessible by functions, such as external memory cache probes, such that the primary tag remains available to the processor core. An address translator maps virtual page addresses to physical page address. In order to allow a data caching system which is larger than a page size, a portion of the virtual page address is used to index the tag arrays and data store. However, because of the virtual to physical mapping, the data may reside in any of a number of physical locations. During an internally-generated memory access, the virtual address is used to look up the cache. If there is a miss, other combinations of values are substituted for the virtual bits of the tag array index. For external probes which provide physical addresses to the duplicate tag array, combinations of values are appended to the index portion of the physical address. Tag array lookups can be performed either sequentially, or in parallel. 1. In a multiprocessor system comprising a main memory and a plurality of processors that contend for access to the main memory via a common bus, each of said processors having an associated data caching system a data caching system comprising: a virtually-addressed data store for caching data from the main memory for access by the associated processor; a virtually-addressed primary tag array for holding physical tags associated with data cached in the data store; an address translator that maps virtual page addresses to physical page addresses; a first comparator to compare a physical page address, translated from a virtual address by the address translator, with a physical tag produced by the primary tag array responsive to the virtual address, a match indicating a cache hit; a duplicate tag array, comprising a plurality of secondary tag arrays, for holding copies of the tags held in the primary tag array, each secondary tag array being referenced by a common physical address portion concatenated with a unique value, wherein the secondary tag arrays are simultaneously referenced; and a plurality of second comparators, each second comparator associated with respective secondary tag array, each second comparator comparing the translated physical page address with a physical tag produced by its associated secondary tag array responsive to the concatenated physical address portion and unique value, a match indicating a hit in the data store at a location referenced by the concatenated physical address portion and unique value, wherein the primary tag array remains available to its associated processor's core while the duplicate tag array is accessed by a physical-address probe sent from another processor of the multiprocessor system. 2. The data caching system of claim 1, wherein the data store comprises a plurality of blocks for caching data; the primary tag array comprises a plurality of locations for holding the tags, each location corresponding to a data store block such that a tag location and its corresponding data store block are referenced by an index portion of a memory address associated with data cached in the data store block, the memory address comprising a page address and an index portion, and each tag comprising the page address of the memory address; and the duplicate tag array comprises a plurality of locations, each location holding a copy of the tag stored in a corresponding primary tag array location and being referenced by the same index upon a primary cache miss, and being referenced only by a portion of a physical address provided by a probe upon a probe request. 3. The data caching system of claim 2, wherein each data store block comprises sixty-four byte, each byte within a block being referenced by an offset portion of a memory address. 4. The data caching system of claim 2, further comprising: an address translator mapping virtual page addresses to physical page addresses, and wherein each primary tag array location and its corresponding data store block is referenced by an unmapped index portion of a virtual address, each tag comprises a physical page address associated with data cached in the corresponding data store block, the primary tag array comparator compares a physical page address mapped by the address translator from a virtual page address with a tag indexed by the index portion of the virtual address, each duplicate tag array location is referenced by the same unmapped index portion of a virtual address as its corresponding primary tag array location, and the duplicate tag array comparator compares a physical page address with a tag read from a duplicate tag array location indexed by the index portion of the virtual address. 5. The data caching system of claim 1, further comprising: a substitution means for substituting various values in place of the virtual page address portion of the index. 6. The data caching system of claim 1 wherein a virtual address comprises sixty-four bits and a physical address comprises forty-three bits, the tag array being indexed by two virtual page address bits and seven unmapped index bits. 7. In a multiprocessor system comprising a main memory and a plurality of processors that contend for access to the main memory vai a common bus, a method of caching data in one of the processors, comprising: mapping a virtual page address of a virtual address to a physical page address; storing caching data from a main memory in a virtually-addressed data store; holding physical tags in a virtually-addressed primary tag array, the tags being associated with the data cached in the data store; comparing a mapped physical page address with a physical tag produced by the primary tag array responsive to the virtual address, a match indicating a hit; holding copies, in a duplicate tag array having a plurality of secondary tag arrays, of physical tags held in the primary tag array, each secondary tag array being referenced by a common physical address portion concatenated with a unique value, wherein the secondary tag arrays are simultaneously referenced; comparing the mapped physical page address with a physical tag produced by a secondary tag array responsive to the concatenated physical address portion and unique value, a match indicating a hit in the data store at a location referenced by the concatenated physical address portion and unique value; receiving a probe having a physical address sent from another processor in the multiprocessor system; and comparing the probe's physical page address with physical tags produced by the secondary tag arrays responsive to the concatenated physical index address portion of the probe's physical address and associated unique values, a match indicating a hit in the data store at a location referenced by the concatenated physical address portion and the unique value causing the hit. In general, main memory access is relatively slow compared to central processing unit (CPU) execution times. Therefore, most CPU architectures include one or more caches. A cache is a high-speed memory which can be associated with a small subset of referenced main memory. Because most memory reference patterns only require a small subset of the main memory contents, a relatively smaller, high-speed cache can service many of the memory references. For example, instruction caches can improve efficiency because often in software programs a small section of code may be looping. By having the instructions in a high-speed, local instruction cache, they are accessed much faster. Data caches can likewise improve efficiency because data access tends to follow the principle of locality of reference. Requiring each access to go to the slower main memory would be costly. The situation can be even worse in a multi-processor environment where several CPUs may contend for a common bus. Data cache systems in some configurations comprise both a data store and a tag array. The data store holds data copied from the main memory. Each tag array location holds a tag, or physical page address, for a block of consecutive data held in the data store in association with the tag location. During a memory access, a virtual page address from the CPU core is translated by a page translator into a physical page address. The remainder of the address, or a portion thereof, is used to index into the tag array. The tag retrieved from the indexed tag array is compared with the translated physical page address, a match indicating that the referenced data is in the data store. A mismatch indicates that the data will have to be retrieved from main memory. Page translation occurs in parallel with the tag array lookup, minimizing delay. A need also exists in multiprocessor systems to test the contents of the data cache system from outside the CPU. Several processors may reference the same physical address in memory. Besides looking up its own local cache, each CPU must check the caches of other CPUs in the system. Failure to do so would result in data incoherency between the individual caches as each CPU reads and writes to its own local copy of the same data from main memory. To prevent this incoherency, a CPU sends “probes” to other CPUs during a memory reference. Each data cache system receiving a probe uses a physical address provided by the probe to look into its own tag array. If the data resides in its data store, the data cache system responds to the probing CPU accordingly allowing ownership arbitration to take place. A problem with the physically-addressed, physically-tagged data caching system in a virtually-addressed computer architecture as described above is that the cache is limited to the size of a memory page. This results because address bits which are not part of the page address are the only unmapped bits and thus are the only bits that can be used to index the cache. As capacity for larger caches grows, the size limitation takes on greater import. The present invention resolves this problem by indexing the tag array and data cache using virtual page address bits with the assumption that the bits used to index the tag array are the same for the corresponding physical page address. If the assumption is correct, a cache hit is correctly detected. This enables a four-fold increase in the size of the cache in one embodiment. Another problem with the prior art is contention for the tag array. Functions external to the CPU core, such as probes from other CPUS, contend with the CPU core's own need to access the tag array. Whenever the tag array is servicing a probe, the tag array is unavailable to the CPU core to determine if data the CPU core needs is in the data store. Therefore the CPU core has to wait for the probe to be serviced. The present invention resolves this by providing a duplicate tag array to service the probes. Accordingly, a preferred embodiment of the present invention comprises a data store for caching data from a main memory, a primary tag array for holding tags associated with data cached in the data store, and a duplicate tag array for holding copies of the tags held in the primary tag array. The duplicate tag array is accessible by external functions such as probes so that the primary tag array remains available to the processor core. A page address from a memory address provided by an external probe is compared with a tag read from the duplicate tag array location indexed by the index portion of the memory address. If there is a match, the data addressed by the memory address is currently cached in the data store. Otherwise the output indicates that the addressed data is not currently cached in the data store. The preferred embodiment of the present invention comprises an address translator which maps virtual page addresses of virtual addresses to physical page addresses, wherein a virtual address comprises a virtual page address and an unmapped index portion. A tag array holds tags associated with the data cached in the data store, and is referenced by indexes comprising portions of the virtual page addresses and unmapped index portions. A physical page address is compared with tags read from the tag array, a match indicating a hit. If there is a miss, other possible values are substituted for the virtual portion of the index in order to check other possible tag array locations for a hit. The tags can be read and compared by sequentially substituting for the virtual portion of the index until a match is detected indicating a hit, or alternatively and preferably, multiple tags are read and compared in parallel using a plurality of comparators. The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. FIG. 1 is a block diagram of a prior art physically-tagged, physically-indexed data cache. FIG. 2A is a block diagram of a typical multiprocessor computer system. FIG. 2B is a block diagram demonstrating virtual addressing in the multiprocessor system of FIG. 2A. FIG. 3 is a block diagram of a translation buffer demonstrating how several virtual addresses can map to the same physical address. FIG. 4 is a block diagram demonstrating how, in a physically-tagged, physically-indexed tag array different virtual addresses which map to the same physical address refer to the same tag array entry. FIG. 5 is a block diagram of a physically-tagged, virtually-addressed data cache system, with a duplicate tag array of the present invention. FIG. 1 is a block diagram demonstrating a prior art physically-tagged, physically-indexed data caching system comprising a translation buffer 307 and a data cache which itself comprises high-speed memory split into two parts: a data store 305 and a tag array 303. The primary task of the tag array 303 is to provide tag information to determine cache hits or misses. Virtual address space is typically broken up into pages, the high order bits of a virtual address 301 defining a virtual page address 301A, and the low-order bits defining an index 301B and offset 301C respectively within the page. The virtual page address 301A is mapped to a physical page address 329A by the translation buffer 307. The index 301B and offset 301C are not mapped and are thus essentially both virtual and physical. Each tag array location 315 corresponds to one block 318 of sixty-four bytes in the data store 305. Therefore, the index 313 comprises only the bits 329B required to address a block of data. Each value of the index 313 references some location in the tag array 303, for example location 315. The tag array 303 provides the tag 327 stored in location 315 upon presentation of the respective value of index 313. At the same time, the index 313 is used to reference the corresponding block 318 of data held in the data store 305. The offset 331 selects a particular location 318C within the block 318. The data stored in location 318C appears at the data store output 319, along with a valid bit (not shown). At the same time the tag array is referenced, the virtual page address 301A is translated by the translation buffer 307, so that no extra delay is caused by the translation. The value of the tag array output 327 is compared, at comparator 321, with the physical page address 329A from the translation buffer 307. If there is a match and the corresponding valid bit is set (a cache hit), the retrieved data 319 is valid and passed by gate 323 as valid data 325. Otherwise there is a cache miss and the data must be retrieved from main memory. FIG. 2A is a block diagram of a typical multiprocessor computer system. Several processors (CPUs) 101 are linked to main memory modules 103 and I/O modules 105 through a system bus 107. While every location in main memory has a unique physical address, modern CPUs typically use virtual addressing techniques in order to make available a virtual address space which can be larger or different than actual available physical memory. FIG. 2B demonstrates the principle of virtual addressing in a N-processor system. Typically, each CPU 101A-N has several processes running at any given time. For instance, CPU 101A is executing Processes 1 through M. CPU 101N is running Processes K through L. Typically, each process 153 running on each CPU 101 has its own virtual address space 155, which except in special circumstances such as shared memory, is independent of other processes' virtual spaces. At any given time, only some subset 163 of each virtual address space 155 is physically in main memory 157. As a specific example, memory block 163A in the virtual address space 155A of Process 1 153A of CPU 1 151A, having a virtual address range of 0x20FF to 0x21FF is mapped to physical memory block 157A having a physical address range of 0x81FF to 0x82FF. When data is needed that is not in physical memory, it is swapped in from disk storage 159 by a swapper 161. Each CPU 101 has a hardware-based translation buffer 307 that maps virtual addresses to the physical memory addresses that hold the desired data. Typically, the translation buffers 307 are integrated within their respective CPUs. In a multiprocessor system as shown in FIG. 2A, during a main memory reference, the caches of all CPUs must be checked to ensure the data is not owned by another CPU, which could result in data incoherency. This is accomplished by sending probes from the referencing CPU to the other CPUs, typically over the system bus 107. A probe is a query to determine if any other CPU owns, or controls, a block of data. FIG. 2A shows a probe 111 being sent from one CPU to the other CPUs in the system. Because the CPUs have no knowledge about other CPUs' virtual address space mappings, probes use physical addresses. As FIG. 3 demonstrates, several virtual addresses 351-357 can map to the same physical address. Typically, the translation buffer 307 holds the physical page address at locations indexed by corresponding virtual page address. Using binary digits, virtual address 351 has a virtual page address 351A of 00 . . . 01011011000. The corresponding location 359 in the translation buffer 307 happens to hold the physical page address 00 . . . 0011, meaning that virtual page address 00 . . . 01011011000 has been mapped to physical page address 00 . . . 0011. In the example of FIG. 3, three other virtual page addresses (ref. numbers 353, 355 and 357) are also mapped by the translation buffer to physical page address 00 . . . 0011. In the physically-tagged tag array of FIG. 4, the physical page address 367A (of FIG. 3) is the tag stored in locations in the tag array 303 indexed by the index portions 351B-357B of the respective addresses, which as discussed above, are unmapped and therefore both virtual and physical. Thus, the four virtual addresses of FIGS. 3,4, 351-357, all index the same location 315 in the tag array, because they all have the same index value: 101101. Now, when any one of these virtual locations is referenced, because they all point to the same place in the tag array, it receives the correct tag information. In the data cache system such as that described in FIGS. 1-4, the cache itself is physically indexed. This means the cache is limited to 213 locations where 13 is the number of bits in the index and offset. In modern microprocessors, data cache lookup is one of the core time-critical steps which determine the overall cycle-time of the machine. A larger cache reduces lookup latency, but this presents new problems. The larger the cache, the more bits are required to address it. FIG. 5 illustrates a physically-tagged, virtually-addressed data cache system, in which the tag array index 313A comprises virtual bits 343. Tag array 303A uses the index 313A to check for a cache hit. If no hit is found, the duplicate tag array 403 substitutes other values for bits 301D. As in the embodiment illustrated in FIG. 1, the virtual address 301 from the CPU core comprises the virtual page address 301A and the unmapped index 301B and offset 301C. Also similarly, the virtual page address 301A is sent to a translation buffer 307 for conversion to the physical page address 329A and the unmapped index bits 301B and offset 301C are transmitted to the tag array 303A and the data store 305A as an index in a look-up process. In order to increase the size of the data store, however, virtual bits 13 and 14 (see reference numeral 301D) are also concatenated with the unmapped bits to look into the tag array and data store. This results in a fifteen-bit data store index. Using virtual bits as a look up into a physically indexed tag array and data store never results in a false indication of a cache hit. This is because virtual address bits 13 and 14 are also passed to the translation buffer and the translated physical page address 329A is compared by comparator 321 to the physical page address that is issued from the tag array 303A. In contrast, however, it will sometimes occur that the system will indicate a cache miss when the data in fact resides in the cache. This will occur when virtual address bits 13 and 14 and physical address bits 13 and 14 differ from each other. This false cache miss will occur because using the virtual address bits instead of the physical address bits to look into the tag array causes the system to look in the wrong location for the data with the wrong index. This eventuality is compensated for by the additional inclusion of a duplicate tag structure 403. In the case of a cache miss, the virtual address bits <12:6> 301B are sent to the duplicate tag array 403, concatenated with the four separate combinations of virtual address bits VA <14:13> 409A-409D and sent in parallel to four separate tag arrays 403A-403D respectively. The page addresses issued from each of these tag arrays are then compared to the translated page address 329A in four comparators 427A-427D respectively. In this way, the system, in the event of a cache miss, checks all possible combinations of the virtual address bits <14:13> to ensure that the data does not reside in the data store. According to the invention, the duplicate tag array 403 is also used to perform probe processing to enable other CPUs to determine whether or not the CPU has ownership over data by possessing it in its data store. A physical probe address 112 comprising a physical page address 112A, index 112B and off-set 112C, passes through selectors 475A and 475B. 475B provides the index portion of the probe address 112B as the index into tag arrays 403A-403D. Since the system of the four parallel tag arrays looks up a duplicate tag entry for every combination of bits <14:13>, only bits <12:6> of the probe address are used. The page portion of the probe address 112A is then compared to the output of the tag arrays 403A-403D in comparators 427A-427D to indicate whether or not the data resides in the data store. In summary, the system according to the present invention allows for larger data stores by increasing the size of the number of bits used in text data store by two bits in the preferred embodiment. Additionally, the use of the duplicate tag array allows probe processing to take place without contention for the primary tag array 303A. The only contention occurs in the simultaneous incidence of a potential cache miss either due to the non-existence of the data in the data store or where virtual address bits <14:13> differ from physical address bits <14:13> and the simultaneous occurrence of a probe to be processed. In this case, there will be some contention for the duplicate tag array. In a preferred embodiment, the data cache is a 2-way set associative cache. More generally, the data cache can be an n-way set associative cache for any number n. The above discussion applies equally for any value of n. While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the specific embodiments of the invention described specifically herein. Such equivalents are intended to be encompassed in the scope of the claims. Citas de patentes
<urn:uuid:2b18fb20-c3df-4bbe-bef0-30be060cc804>
2013-05-18T17:43:09Z
CC-MAIN-2013-20
[ [ 0.0064697265625, 0.020263671875, -0.004119873046875, -0.033447265625, 0.03515625, -0.060791015625, 0.00750732421875, 0.10693359375, -0.016845703125, -0.01068115234375, 0.1279296875, 0.002166748046875, -0.025146484375, 0.03515625, 0.030517578125, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.889962
5,024
http://www.google.es/patents/US6253301?dq=flatulence
0.396252
Travel to Northern India: Konarak The Sun Temple at Konarak is a superlative in a country of superlatives. Built, it appears, in the 13th century, it was abandoned after the Muslim invasion of Orissa early in the 16th. Composed largely of khondalite, a gneiss that weathers easily, without maintenance the temple began to fall apart. Approximately half of it was gone when European visitors arrived for the first time in the 19th century. Shortly after 1900, serious conservation efforts were made to stabilize what remained. That lesser half, amounting to no more than the entrance porch or jagamohana of the vanished sanctuary or rekha is one of India's most spectacular sights. This is the straight-on approach. The surviving porch of the temple is the triangular mass behind this bhoga-mandapa or Hall of Offering. It's hard to imagine a more densely decorated surface. We'll ascend the platform. The roof is missing; it may have echoed the huge roof of the porch. From the top, you can see across the intervening ground to the stairs rising to the entrance of the temple. The entrance, sorry to say, was blocked with rock and sand in the 19th century for fear that the whole thing would otherwise topple. People who saw it before it was filled report that the interior was very simple, with corbelled stones stepping inwards on all sides to form a roughly pyramidal shape, corresponding to the elaborate external profile of the building. A king named Narasimha probably built the temple, but his motivation remains unclear. To mark a recovery from illness? It must have been something serious, because a Muslim chronicler at Akbar's Court, Abu'l-Fazl, reported that the temple cost 12 years of tax revenue from the province. A recent author writes that this was the "dazzling dream of an ambitious and mighty king, secular to the core and with immense zest for life, who wanted an edifice which would outrival the works of his forbears and immortalize his name." (Debala Mitra, Konarak, 1968 .) A closer view. The masonry blocks were laid without mortar, though there was a coat of lime plaster. The top of the porch, seen from the south. There's a complex vocabulary for these towers. The step-like layers, for example, are called pidhas. The structure simulates a temple cart riding on a dozen wheels. Another angle. The wheels were invisible until conservation work after 1900 cleared away a layer of beach sand that rose to the top of the platform. Seven horses pull the temple, which is dedicated to Surya, the sun god. The image is of the cart rising from the sea, now receded about a mile from what was the temple's beach-front location. A "petrified procession," some have called it. Perhaps their long burial in sand helped preserve the details of the wheels. A closer view. Detail, down to the cotter pin. The temple has hundreds of sexual images. Side view, from the south. The view here is from the southwest and shows the stump that remains of the sanctuary that rose to a height half-again as high as the porch. (This assumes that the sanctuary was actually built. Parts of it certainly were, because fragments survived until a storm of 1848.) To see something comparable to what existed here, see the pictures of Puri or, on a smaller scale, the temples at Bhubaneshwar. "There is, so far as I know, no roof in India where the same play of light and shade is obtained with an equal amount of richness and constructive propriety as in this instance, nor one that sits so gracefully of the base that supports it." (Fergusson, II, 107) A niche on the north side of the sanctuary carries a statue made of chlorite. It's Surya, a form of Vishnu; flanking his knees (and mostly missing from this image) are two adoring dawn maidens. The decoration also includes mythical animals, in this case a leogryph (the Sanskrit name is simply vyala, "lion,") atop an elephant. Another leogryph on the right; on the left, a pious nagni, a female naga with a human head, snake body, and hooded cobras behind. In the center is a maithuna, decorously or perhaps just very literally translated as a "loving couple." The arrangements (and positions) vary. A couple with a niche to themselves. Another wheel detail. An elephant, masterfully soft. Another elephant, this one preparing to hurl a demon. Lions atop elephants at the entrance steps through which we passed earlier. Colossal fragmentary lion. This is the ceiling at the entrance to the temple. The iron bars are original, apparently made by beating a bundle of hot bars into a mass. Similar beams were used at the top of the corbelled ceiling in the interior of the porch. Originally, a stone architrave hid them. It's been removed and put in a nearby museum, after 19th Century efforts to transport it to Calcutta foundered on logistics. A photograph of the partially collapsed interior of the temple before it was filled with a layer of rock pressed flush against the walls, then filled tight with sand, which was finally poured down a 6-inch shaft drilled at the peak. Since then, fears of water accumulating in the mass have led to pressure-grouting of the exterior stones. Not impressed? But look inside. Here's that massive architrave, carved from the same chlorite used in the statue of Surya. It was removed from the temple before 1838 by the local Raja of Khurda, who wanted to use it for his palace. Before he could do so, orders came from the British government to cease and desist. The British then attempted to move the stone to a museum in Calcutta, but it was too massive and so stayed here. It portrays the nava-grahas, or nine planetary gods. From left to right, Surya (Sun), Chandra (Moon), Mangala (Mars), Budha (Mercury), Brihaspati (Jupiter), Sukra (Venus), and Sani (Saturn). At the far right are Rahu and Ketu, invisible planets at war with the earth and sun. Surya, smiling with a lotus flower in each hand Rahu. He carries crescents because he is associated with lunar eclipses. Despite the sea's retreat from the site, there's plenty of sand still around. And relics, whether of the destroyed sanctuary or of other buildings once standing in the neighborhood. What you didn't want to see! Konarak is a popular place unless you come early. * Australia's Northern Territory * Austria * Bangladesh * Belgium * Brazil (Manaus) * Burma / Myanmar * Cambodia (Angkor) * Canada (B.C.) * China * Czech Republic * Egypt * France * Germany * Greece * Hungary * India: Themes * Northern India * Peninsular India * Indonesia * Israel * Italy * Japan * Jerusalem * Jordan * Kenya * Laos * Kosovo * Malaysia * Mexico * Morocco * Mozambique * Namibia * Netherlands * Norway * Oman * Pakistan * Philippines * Poland * Portugal * Singapore * South Africa * Spain * Sri Lanka * Sudan * Syria * Tanzania * Thailand * Trinidad * Turkey * United Arab Emirates * United Kingdom * U.S.: East * U.S.: West * U.S.: Oklahoma * Uzbekistan * Vietnam * West Bank * Yemen * Zimbabwe *
<urn:uuid:cf9789a6-681e-4f4c-97c6-9542e5892649>
2013-05-18T18:07:15Z
CC-MAIN-2013-20
[ [ -0.020751953125, 0.0038909912109375, -0.01275634765625, -0.01177978515625, 0.091796875, -0.044677734375, -0.0106201171875, 0.09326171875, -0.0186767578125, -0.03662109375, 0.0196533203125, 0.0400390625, 0.0220947265625, 0.0184326171875, 0.01031494140625,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951407
1,622
http://www.greatmirror.com/index.cfm?navid=1166&picturesize=big
0.192823
MIAMI - Miami Heat guard Dwyane Wade kept his composure when Boston Celtics guard Rajon Rondo fouled him around the neck late in the fourth quarter Tuesday. Referees issued Rondo a flagrant foul one after reviewing the play on video, and Wade had pointed words for Rondo's foul with 16.9 seconds remaining and the Heat up 118-107. "It was a punk play by him," Wade said. "The league will take care of it. He clotheslined me â?? with two hands." For a split second, it look like Wade wanted to react. But instead, he held the basketball in his hands and did nothing. "We're in the NBA. I've got my kids watching. So I stopped," Wade said. "I'm here to play basketball. That's what we are, we're basketball players. If you want to do something else, go do something else, boxing and all those other things. Like I said, I was glad I was able to stop myself in that very moment and move on from it." Copyright 2013 USATODAY.com Read the original story: Dwyane Wade calls Rajon Rondo flagrant foul 'a punk play'
<urn:uuid:7c0f1ffe-7690-4f35-88d9-42576c2eb450>
2013-05-18T17:50:45Z
CC-MAIN-2013-20
[ [ 0.0007175459177233279, -0.007896505296230316, 0.004648297559469938, -0.038082435727119446, 0.08378136157989502, -0.04323476552963257, 0.013832884840667248, 0.012768817134201527, 0.005404345691204071, -0.09094981849193573, 0.06227598711848259, 0.060483869165182114, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978205
254
http://www.greenbaypressgazette.com/usatoday/article/1670679&usatref=sportsmod?odyssey=mod%7Cnewswell%7Ctext%7C%7Cp
0.297198
II – GENERAL TERMS AND CONDITIONS OF USE OF THE WEBSITE These general terms and conditions of use (hereinafter referred to as “the General Terms and Conditions”) define the rights and obligations of individuals who log in to the Website (hereinafter referred to as “the Users”). By logging in to the Website, Users agree to comply with the General Terms and Conditions. By simply accessing the website, individuals tacitly agree to all the General Terms and Conditions. 1 – INTELLECTUAL PROPERTY The Website and all its constituent elements (text, images, trademarks, logos, software, databases, etc.) are the property of CHEQUE DEJEUNER and its subsidiaries (hereinafter referred to collectively as “the CHEQUE DEJEUNER GROUP”) and/or their right holders or partners, and are protected by intellectual property law or by legislation covering image rights. Any use or reproduction of the Website or any of its constituent elements that has not been expressly authorised by CHEQUE DEJEUNER is prohibited and may constitute counterfeiting under French law. CHEQUE DEJEUNER provides Users with access to the Website to inform them about the CHEQUE DEJEUNER GROUP, its latest news, its offers, its products and its services. Users may only use the Website for the aforementioned purpose. 2 – LIABILITY Users agree to use the Website for its intended purpose. CHEQUE DEJEUNER makes every effort to render the Website accessible to Users. CHEQUE DEJEUNER makes every effort to ensure that the information placed on the Website is accurate and up to date. Users are informed that the information placed on the Website is not exhaustive. CHEQUE DEJEUNER may not be held liable for any direct or indirect damages resulting from: - Use of the Website, or the partial or total inability to use the Website, - Content (information, data, images, etc.) published on the Website, - The quality of the services provided by the Website, - Use of the Internet. CHEQUE DEJEUNER reserves the right to rectify or modify the Website and the information it contains at any time and without prior notice. 3 – PERSONAL DATA CHEQUE DEJEUNER may collect personal data about Users via the Website (hereinafter referred to as the “Data”). The Data may be used strictly in accordance with the provisions of the French data protection law (“Loi Informatique et Libertés”) of 6 January 1978 (amended in 2004) and the recommendations of France’s National Data Protection Commission (“Commission Nationale Informatique et Libertés” or C.N.I.L.). In accordance with the French data protection law: • Any use made of the Data has been (or will be, in the case of uses that have not yet been devised) declared to the C.N.I.L.; • When Data is collected, Users will have access to the following information: the identity of the person in charge of its processing; the purpose for which the Data is to be used (e.g., ordering a gift box, invoicing, advertising), whether the information they are asked to provide is mandatory or optional, and their rights regarding the use of this data; • Users have the right to access, modify, correct and oppose any information about them by contacting CHEQUE DEJEUNER at the following email address: email@example.com. The Data may be used for commercial purposes, advertising purposes (most notably to inform Users about the latest products and services of the CHEQUE DEJEUNER GROUP’s companies) or statistical purposes (most notably to perform satisfaction surveys). 4 – COOKIES: Visiting the Website may lead to cookies being installed on Users’ computers. Cookies do not enable CHEQUE DEJEUNER to identify Users. However, cookies store information about their computer’s visit to the Website. CHEQUE DEJEUNER will be able to read this information during future visits. This information is stored on the User’s computer for a period of 3 months. Users may prevent cookies from being stored by adjusting their browser’s parameters. 5 – HYPERLINKS The Website contains hyperlinks to other websites. By clicking on these links Users will leave the Website. CHEQUE DEJEUNER may in no way be held liable for the contents of these other websites. Links to the Website’s homepage may be inserted into other websites without express authorisation from CHEQUE DEJEUNER. However, the Website must be opened in a new browser window. CHEQUE DEJEUNER reserves the right to request the deletion of these links without having to provide a reason. 6 – APPLICABLE LAW Any disputes relating to the Website are governed by French law. All disputes relating to the Website fall under
<urn:uuid:8f3db25f-2cbd-4f6c-9f7a-891087b1078f>
2013-05-18T17:47:28Z
CC-MAIN-2013-20
[ [ -0.01361083984375, -0.01068115234375, 0.00165557861328125, -0.04052734375, 0.09619140625, -0.10400390625, -0.0269775390625, 0.1181640625, -0.0033111572265625, 0.000583648681640625, 0.119140625, 0.0172119140625, -0.0615234375, -0.01177978515625, 0.0476074...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.901382
1,102
http://www.groupe-cheque-dejeuner.com/en/legal-notice.html
0.217912
A judge is to open a hearing in June to decide whether Mr Berlusconi and his former legal adviser, Mr Mills, should be sent for trial. Prosecutors claim the British lawyer took $600,000 (£345,000) from Italy's billionaire leader for witholding evidence in two trials involving Mr Berlusconi. Both men have denied the charges. The prosecutors received a letter written by Mr Mills two years ago in which he said he accepted the money after giving testimony that "kept Mr B out of a great deal of trouble". Mr Mills initially confirmed this in a statement to the prosecutors that he has since retracted. Court papers show the prosecutors claim the money was wrapped into a bigger payment of $2,050,000 made in 1997 to an account in Mr Mills's name. However, the payment did not come from Mr Berlusconi, but from a trust of which the beneficiary was another of Mr Mills's Italian clients, a Neapolitan shipowner, Diego Attanasio. Prosecutors have not produced evidence so far to show the money received by Mr Mills was paid by Mr Berlsuconi and appear to be relying on his retracted statement. Ever since changing his story in November 2004, Mr Jowell's husband has argued that Mr Attanasio ordered the transfer and was the sole source of the funds. The latest documents help support that claim. One is a fax sent to Mr Mills last Friday by Mr Attanasio's former trustees in the Bahamas. The fax states that they had been unable to find any credits to the trust's accounts "in the amount of or close to $600,000" - the sum prosecutors said Mr Mills was paid by Mr Berlusconi. A second document was among those flourished by Mr Berlusconi last week at a press conference in Rome at which he accused the prosecutors of conspiring to bring down his government. It is a letter written on July 17 1997 and signed by Mr Attanasio notifying his trustees in the Bahamas of the imminent arrival of $10m and instructing them to forward $2,050,000 of the money to Mr Mills's account. Beneath the ship owner's signature is a written note from Mr Mills: "I confirm that the above is the signature of Mr Diego Attanasio". The letter is dated just a few days before Mr Attanasio was jailed as part of an unconnected corruption investigation. A warrant was issued for his arrest on July 18 1997, and executed three or four days later, according to Italian media reports. Mr Mills told the Guardian he had prepared the letter for Mr Attanasio's signature. He said: "I have no recollection of how or where it was signed, but it is unquestionably his genuine signature." The new document is at odds with statements given by Mr Attanasio to the prosecutors last December and in February in which he said he ruled out "even indirectly having given orders" for the payment. Mr Attanasio acknowledged he had given Mr Mills a "large sum of money" before his arrest. But he said he had left it to his British lawyer to manage. The Italian daily La Repubblica reported on Saturday that prosecutors had "serious doubts" about the authenticity of Mr Attanasio's signed instructions. But Mr Mills told the Guardian he would also be producing notes of the instructions he received from the shipowner. This is the "clinching evidence" he referred to in an interview last week. The undated page of notes, which the Guardian has seen, sets out the flow of money in the way it was made. Mr Mills said it was written down in a book in which previous and subsequent entries were for July 15 and 21. Mr Mills said: "I have always maintained my total innocence."
<urn:uuid:4fb79677-e8b7-4e96-b026-59f1f8c5514c>
2013-05-18T17:48:20Z
CC-MAIN-2013-20
[ [ -0.005279541015625, 0.0284423828125, 0.0035858154296875, -0.01055908203125, 0.10888671875, -0.01129150390625, -0.0191650390625, 0.1083984375, -0.02099609375, -0.0263671875, 0.1025390625, 0.02197265625, -0.09912109375, -0.042236328125, 0.05078125, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.989989
770
http://www.guardian.co.uk/uk/2006/apr/10/politics.italy
0.591919
Chickpea, oh you wonderful legume. I've been eating it all my life, ever since my grandmother served it with couscous, cinnamon and sugar. When it comes to vegetarian dishes and curries, Channa Masala (chickpea curry) is one of my favourites. I mean, if you choose to use olive oil there's nothing bad in there for you. It's also my preferred dish to bring to potlucks as it's inexpensive to prepare and has a wide appeal. Channa masala is a great vegetarian and gluten-free dinner that pleases everybody. - 1/2 cup canola oil - 2 cups onions, finely chopped - 2 cinnamon sticks - 4 tbsp minced garlic - 3 tbsp minced ginger - 1 can diced tomatoes, drained - 2 tsp sea salt - 1/2 tsp ground black pepper - 1 tsp turmeric - 1 tbsp ground cumin - 1 tbsp ground coriander - 1 tbsp garam masala - 1/2 tsp cayenne powder - 3 cans chickpeas, drained and rinsed - 1/2 cup cilantro, chopped (including stems) 1. In a large pan, heat oil on medium heat for one minute.2. Add onions and cinnamon, and sauté for five to eight minutes, until onions are golden.3. Add garlic and sauté for four more minutes.4. Add ginger, tomatoes, salt, pepper, turmeric, cumin, coriander, garam masala and cayenne. Cook the masala for five minutes, until the oil separates.5. Add the chickpeas and cook for 10 minutes.6. Stir in cilantro and serve. DetailsPrep time: Cook time: Total time: Yield: 6-8 servings Recipes by the Haggis and the Herring: tasty world recipes tested in our kitchen
<urn:uuid:64166326-86a3-4a94-a8cf-995cac76b14c>
2013-05-18T17:17:55Z
CC-MAIN-2013-20
[ [ -0.015099158510565758, 0.024489182978868484, -0.016977163031697273, 0.016225961968302727, 0.047776442021131516, -0.003192608244717121, -0.017653245478868484, 0.08473557978868484, 0.0035306490026414394, -0.02358774095773697, 0.08653846383094788, 0.04266826808452606, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.882657
403
http://www.haggisandherring.com/2009/04/channa-masala.html
0.371171
Ness: I had to kill him. Malone: Oh, yeah. He's as dead as Julius Caesar... Would you rather it was you? Ness: No, I would not. Malone: Well, then, you've done your duty. Go home and sleep well tonight. Malone returns with George to see that Ness is trouble by having to kill a man.
<urn:uuid:f60f982b-76ff-43ab-98c5-137b3a2f092e>
2013-05-18T17:50:01Z
CC-MAIN-2013-20
[ [ 0.03694852814078331, 0.0056755514815449715, 0.0130514707416296, 0.016544118523597717, 0.10367646813392639, -0.053308822214603424, -0.015625, 0.04430146887898445, -0.01277573499828577, -0.11911764740943909, 0.01663602888584137, 0.016544118523597717, 0.03915441036...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.993217
82
http://www.hark.com/clips/xfhzdtsplp-hes-as-dead-as-julius-caesar
0.997046
"Yo ho, yo ho, a pirate's life for me. We pillage, we plunder, we rifle, and loot, Drink up, me 'earties, yo ho. We kidnap and ravage and don't give a hoot, Drink up me 'earties, yo ho. Yo ho, yo ho, a pirate's life for me." "It's peanut butter jelly time, peanut butter jelly time, peanut butter jelly time. Where he at? Where he at? There he go. There he go. Peanut butter jelly. Peanut butter jelly." "Peanut butter jelly, peanout butter jelly with a baseball bat. Where he at? Where he at? There he go. There he go." "… wonderful invention of Edison's phonograph…" "I coined the phrase; pardon my French" "Power Off! Let's Go!" "Parkay - butter..." "Pee Wee's Playhouse." "These pretzels are making me thirsty." "Every time I think I'm out, they pull me back in." "A perfect specimen of evolutionary progress." "Pink Panther theme" "This isn't one of those holidays where you have to pretend to be Jewish." "Guilty. I've done it from day 1. I mean that's part of the relationship I've had with Paula. Where, and I've looked upon it, by the way, in a kind of a fun way. It's never been done with any maliciousness." "So when a large rat fell in the terrain. It caused a premature end to the queen." "You have to do something about this Spirit. Our profits are down 20%." "I cannot let any man touch me, talk to me, or see me, or I'll be shooting out kids like a pez dispenser." Coach: "Yeah, a beautiful school teacher." Diane: "And Sam is her favorite?" Coach: "Well, I can't say that, but Sam's the only one I ever saw her kiss." Diane: "They kissed?!?" Coach: "Yeah, I saw them smooching in the parking lot. I was putting up a notice here on the bulletin board." Diane: "With probing ton... "These pretzels are making me thirsty." "You've got only one lifeline left, my friend. You can phone-a-friend with our friend's, AT&T, help. They will call anybody, anywhere in America to see if they can help you out." "Aren't the President's shorts a little short? Richie: "Whadda think the problem is?" Fonzie: "I don't know, I can't put my finger on it." "Lady you just toasted the best BLT joint in the tri-state area. Prepare to pick up the tab." "I can't stand pain!" "Please Wilbur! I'm not wearing pagimas!" "Pika! Pika, Pika!" "I just came in here to check my hair, Perfect as usual." "Oh yes, damn. Percy, the devil farts in my face once more." "Prepare to die!" "Prison, Scully. Your cellmate's nickname is gonna be Large Marge. She's gonna read a lot of Gertrude Stein." "Prepare to be astonished." "Having shed their protective shells they must grope around in the darkness. Careful not to wake their sleeping mates." "Their post coital legs stiff and buckling. The weary travelers go forth into the frosty, autumn air." "A group of perspective students launches an assault from the east. I am so going here." "Please give me a million dollars and a fridge with a padlock and, heh, oh, yeah, huge pectoral muscles." "I am programmed for practical functions only." "You don't drop a piranha in the kiddie pool and then stick around to watch the bubbles." "Are you pondering what I am pondering?" "People who do that should be arrested." "Yes please. Please let's go." "It's payback time." "These days, when someone smokes in the movies, they're either a psychopath... or European." "Now everybody from the 313 put your mothafuckin hands up and follow me! Everybody from the 313 put your mothafuckin hands up!" Hermione: "Next time there’s a ball, pluck up the courage and ask me before somebody else does, and not as a last resort!" Ron: "Well... that-that-that... that’s just completely off the point... Harry!" "Plop plop, fizz fizz, oh what a relief it is." "When you get nausea, heartburn, indigestion, upset stomach, diarrhea. Get Pepto Max." "When you get nausea, heartburn, indigestion, upset stomach, diarrhea." Announcer: "How does the president of Little Caesars think up his next great idea? What are his influences?" Chicken: "Buck buck." President: "That's it, pizza for a buck. Where do I come up with this stuff?" Announcer: "Pizza for a buck. Your pizza pizza bonus when you buy two pizzas with two toppings for $8.98." L... "You know what we can do with these lady cloths huh, why we an play Charlie's Angels." "Yeah I don't think nothing is getting to my wiener through this thing. It's even got a reservoir in there so you can pee in it." "Yeah I could use some god damn poontang myself right now." Container - "Butter." Vic - "Parkay margarine." Container - "Butter." Vic - "No, right on the lid, it says 'Parkay margarine.'" Container - "Butter." Announcer - "Parkay margarine from Kraft, the flavor says butter." "You're a whole new generation… Joy of Pepsi, generation… Tastes as good… and feel the Pepsi way." "He ate an answering machine then went back and had the phone for dessert." "Press the breaks! Pull over!" "I wish God would put your heart in some of my players' bodies." "No one, and I mean no one, comes into our house and pushes us around." "After high school, I'm gonna play football at Notre Dame." "I'm Rudy Ruettiger. I'm here to talk about playing football for Notre Dame." "Who cares what kind of job I did if it doesn't produce results it doesn’t mean anything." "Oh you are so full of crap. Your five foot nothing', a hundred and nothing' and you hung in with the best college football team in the land for two years, and you were also going to walk out of here with a degree from the University of Norte Dame in this life time you don't have to prove nothing to nobody except yo... "The problem with dreamers is, they usually aren't doers. Their achievements are grand up here but here where it counts, they fall short." Coach: "Notre Dame our mother." Team: "Pray for us!" "I've never been a part of a tie. I never even knew that was in the rule book." "It is about time we had playoffs in college football." "We are all gravely disappointed by the passing of Jason's mustache." "He's one of those guys that you know no matter how big he is still can be knocked on his butt. All those muscles are popcorn muscles. He's soft. In night clubs dancing with his shirt off like a girl. His nickname is peezy. I don't know what peezy is." "That pack of dogs ran right on up there and stole the cup and a biscuit too and got out again." "I would rather play with 10 people and just get penalized all the way." Alvin's Tutor: "Which two city-states fought in the Punic Wars?" Alvin Mack: "I dunno, Detroit and Buffalo?" "Hey 23, don't think I don't recognize you, you poo-butt motherfucker! Hey pay attention when I'm talking to you nigga!" Alvin Mack: "Hey Bud is it true, Joe's out four fuckin' games?" Bud-Lite Kaminski: "Yea." Alvin Mack: "Shit, defense is gonna have to pitch shut-outs now…" Joe: "Coach finds out you're nailin' his daughter, you'll be playin' dorm ball buddy." Bobby: I'll bail before that. Besides, this is what he gets for not startin' me." "Yo I'm a much bigger prize maker than Scott Sherman. Will you look at him. Look, he ain't nothing but a big fat pork rind eating line man on the scout team." "Let's put the women and children to bed and go lookin' for dinner!" "Staring defense! Place at the table! Place at the table!" "Penalty flag off the play!" Hale: Carrying the nukes. Do you love having the power of God at your finger tips?" Deakins: "Not tonight buddy." "First, let me make it very clear, poor people aren't necessarily killers. Just because you happen to be not rich doesn't mean you're willing to kill." "Plane leaves in an hour, be home by 8. Plenty of time for you all to do whatever the hell you all do on a Saturday night." "Point is that tree wouldn't have been there if he had a fullback blocking for him. And that is why I'm a fan of the power I formation." "Lets push them to the limit eh." Player: "Coach, you don't have any pads on." Jack: "Now you just play ball." "What I have learned in the last two weeks is that it is not working. So as of right now the power I goes in the trash." "Went to 20 homes, sat in 20 living rooms and I promised 20 mothers that I would look after their sons. That would have been the class of '73. There's not one of them left. So let me ask you Jack, how am I supposed to ever look a mother in the eye and promise her anything ever again." "Incredibly there has been another plane crash in moderate rain and fog in West Virginia." "Sooner or later you're going to have to play football big boy. Just snap the ball." "If they catch you they will pull you apart." "The Utah Utes record a perfect season." "And it's the perfect Utah Utes." "Put the mic in my hand. You understand I'm not a fool or a loser I'm a woman man." Worker: "I hit my print monitor up here." Nick Burns: "You used the print monitor huh, yeah that didn't work did it. The print monitor, no." Worker: "No, it didn't." Nick Burns: "Yeah that's because the print monitor monitors the document you're printing. It doesn't tell what printer the direction is going to go to." Woman: "It's been 10 years since a Florida ship got pirated." Horatio: "Till now." “That’s a good question. It’s been a long time since they’ve had peace in the Middle East.” "And even Madonna has had to get rid of one of her personal assistants. (pause) Our thoughts go out to you Guy Ritchie." Mistakes I made and clearly putting a ‘Mission Accomplished’ on a aircraft carrier was a mistake. It sent the wrong message, we were trying to say something differently and nevertheless it conveyed a different message. Obviously some of my rhetoric has been a mistake. Mark: "We can put on a big show and lavish costumes and huge expensive sets. We'll charge like $150 a ticket." Phantom: "What? No! Guys that’s the thing that isn't working anymore." "You've all seen how Orko's magical trick don't always go the way he planned. Sometimes they backfire on him. The same thing is true of practical jokes. Sometimes they don't go the way you planned and you and someone else can get hurt. So be sure to think twice playing a joke or trick on anybody. Might not go the wa... "Meddler, you'll pay for that." "In today's story I went in search of my mother. I found her but I also found something else. That the man who had cared fro me since I was a baby, who loved me as he would his own daughter was just as much my father as any parent could be. So whether they are someone we are born too or whether they chose us to adop... Transformer: "I have summoned you here for a purpose." Megatron: "Nobody summons Megatron." Transformer: "Than it pleases me to be the first." "The first decade of this new century has been a period of consequence -- a time set apart. Tonight, with a thankful heart, I have asked for a final opportunity to share some thoughts on the journey we have traveled together and the future of our nation." "It has been the privilege of a lifetime to serve as your president. There have been good days and tough days." When somebody says to me, "do you have a poncho?" I don't say "no", I say "not right now" because I do have a blanket and scissors. At any moment I am 4 minutes from a poncho. If you wait here, I will be back with a serape made out of a comforter in 4 minutes. "Over the years they've taken you on amazing journeys to wrolds you've never imagined. And places you only dreamed of." Boy scout: "Hi Mr. Fredricksen, please let me in." Carl: "No. Oh alright." "You know what you are. Your skin is pale white and ice cold. You don't go out in the sun light." "Previously on Battlestar Galactica." "Is that how it worked? They programmed you to be my friend. Emulate all the qualities I respect. Tell me jokes and I laugh at them." "We are here today not simply to pay tribute to those patriots who founded our nation in Philadelphia or defended it in Baltimore, but to take up the cause for which they gave so much. The trials we face are very different now, but they are severe in their own right." "So, Baltimore, starting now, let's take up in our own lives the work of perfecting our union." "And yet, what you showed me time and again is that no matter who we are, no matter what we look like, no matter where we come from or what faith we practice, we are a people of common hopes and common dreams, who ask only for what was promised us as Americans - that we might make of our lives what we will and see o... "And yet, they were willing to put all they were and all they had on the line - their lives, their fortunes, and their sacred honor - for a set of ideals that continue to light the world. That we are equal. That our rights to life, liberty, and the pursuit of happiness come not from our laws, but from our maker. And... "And yet while our problems may be new, what is required to overcome them is not. What is required is the same perseverance and idealism that our founders displayed." "We are here today not simply to pay tribute to our first patriots but to take up the work that they began." "This is what I believed, but you made this belief real. You proved once more that people who love this country can change it." "With the time I got left I'm going to play my way, get my dollars up. So when you go to waive me, trade me, injury/reserve me or whatever the fuck you all do. I'll be worth 10 times what I was worth before I got here." "Shit you ain't say two words to me till…went down and then it was go out there and play like you're in the hood and you're throwing the ball and your momma is ringing the dinner bell." "On this day, we come to proclaim an end to the petty grievances and false promises, the recriminations and worn out dogmas, that for far too long have strangled our politics." "For us, they packed up their few worldly possessions and traveled across oceans in search of a new life." "Starting today, we must pick ourselves up, dust ourselves off, and begin again the work of remaking America." "Instead, they knew that our power grows through its prudent use; our security emanates from the justness of our cause, the force of our example, the tempering qualities of humility and restraint." "For we know that our patchwork heritage is a strength, not a weakness." "I mean this team did everything they could to stay in it. And we had to do everything we could to keep the lead. Just a phenomenal team effort overall." "I'm so proud of our organization, I mean I don’t know how to say it because I know I'm supposed to find words but it's hard. This is a time when I just want to watch our players enjoy what they did. Cause they, what they accomplished, what our organization accomplished is so special." "You know I never really paid that much attention to it, you know what I'm saying. I'm just a player, I'm a player Greg. And I just play with whatever they put, we gonna play with a sock, we gonna play with a sock." "Sedin is not English for punch me or headlock me in a scrum." "This is the last day I'm gonna talk about Pavel so any questions, ask them now. Next time I'm gonna mention his name is when I tell you guys where he's going. I'm pleased to announce that Pavel Bure has been traded to the Florida Panthers." "To the people of poor nations, we pledge to work alongside you to make your farms flourish and let clean waters flow; to nourish starved bodies and feed hungry minds." "This is the price and the promise of citizenship." "In a world where political strife is too often settled with violence, we come here every four years to bestow the power of the presidency upon our democratically elected leader." "May all people of goodwill today join together to work for a more just, a more healthy and a more prosperous nation and a peaceful planet." Guy: "I don't even have to ask... but I will. What do you think of this one?" Guy 2:"Does the term cruel and unusual punishment mean anything to you?!" "Merciful Father, I have squandered my days with plans of many things. This was not among them... but at this moment, I beg only.... to live the next few minutes well." "I promised I'd come back and help you. See I always keep my promises." Catherine: "I'm not the one who designed the procedure. I mean I wish I could take credit for it but I can't. I was chosen to do a job. They picked me.... but if you think there is someone better, or someone who is more devoted to your son." Dr. Lee: "No one is doubting your ability Cathrine." Alonzo: "May I read my paper?" Jake: "I'm sorry sir..." Alonzo: "Thank you..." "You know what the gas chamber smells like? Pine oil... That's where your headed boy, to a pine oil heaven. I'm gonna get that gun then I'm gonna get that money. I don't believe you got it in you Jake. I'm gonna go get it right now." "It's not what you know.... its what you can prove." "That is not a ball point pen." Gerard: "Well he's not going in there to pray." n Newman: "No sir." Boss: "You know what your problem is?" Robbie: "I can think of a couple of women who would be happy to tell you." Tad:"I know what that is! Oh oh Sandy Plankton saw one. He called it... uh... he said it was called a 'butt'." Pearl:"Wow...That's a pretty big butt." Bloat:"Uh oh... Darla." Nemo:"What's wrong with her?" Gurgle:"She wouldn't stop shaking the bag." Bubbles:"Poor Chuckles." Deb:"He was her present last year." Bloat:"Took a ride on the porcelain express." Peach:"She's a fish killer!" "If you bother us again, I'll personally punch you in the nose so hard it will look like other people's noses." Sparrow:"Parla... parsnipe... parsley... partner... partner..." Pirate:"Parley?" Sparrow:"That's the one! Parley!" Pirate:"Parley?! Damn to the depths whatever mutton head thought of parley!" Sparrow:"That would be the french." Graham:"Who wrote this book?" Morgan:"Scientists who've been persecuted for their beliefs." Graham:"That means they're unemployed." Morgan:"If your gonna make fun of it then forget it." Bo:"This is serious." Val:"What the hells in those things Bert?" Bert:"A few household chemicals in the proper proportions." Grandma Georgina:"You smell like peanuts. I love peanuts!" Wonka:"Oh thank you. You smell like... old people... and soap." Slannen:"What is going on here?" Nish:"Well, can we at least take him to go?" Slannen:"Put the nice man down." Benjamin:"And perhaps that's his weakness." Gabriel:"Sir?" Benjamin:"Pride. Pride's a weakness." Jean:"Personally I would prefer stupidity." Benjamin:"Pride will do." Agent: "We feel your pain Gonzo." Gonzo: "They feel my pain!" Rizzo: "I have a papercut that's a doozy, you feel my pain too?" "Perhaps we've been incorrectly labeled." "People are always telling you that change is a good thing. But all they are really saying is that something that you didn't want to happen at all... has happened." Frank:"She fell in love with Generalissimo Franco?!" Kathleen:"Don't say that... really, we don't know that." Frank:"Who else could it have been?! It was probably around 1960!" Kathleen:"Do you want some popcorn?" Frank:"I can't believe this! I mean its not like he was something normal like a Socialist or an anarchi... "I love Patricia. I love Patricia! Patricia is... Patricia is amazing.... Patricia makes coffee nervous." Jack: "Are you okay? Where's the chopper? Where did it crash?" Man: "Crash? I put her down safe and sound right over there." Jack: "What's this for?" Scientist: "Rescuing you and your people can't really say is our primary objective." Jack: "What are you doing John?" John: "Put the phone down." Jack: "Good bye John." John: "You're going to have to lie." Jack: "Excuse me?" John: "You, after you go, then you have to lie about everything. It's the only way to protect it." Jack: "It's an island John. No one needs to protect it." Chris: "All my filth is in alphabetical order. This for example was under H, for toy." Mitch: "What is that?" Chris: "This, it's a penis stretcher. Wanna try it?" Mitch: "No!" "Oh Well, plan B - Let's just kill each other." "Personally, I think you're a fucking idiot." "Excuse me, we're going to need the two of you to pick up the pace." Dan: "That's pointless." Sawyer: "More pointless than staring at a hole in the ground."
<urn:uuid:1de96b0b-baf8-457b-acc3-baaaf1dc99e2>
2013-05-18T17:19:33Z
CC-MAIN-2013-20
[ [ -0.01226806640625, 0.01611328125, -0.00390625, 0.013916015625, 0.09228515625, -0.07421875, -0.0009613037109375, 0.06591796875, -0.01068115234375, -0.04248046875, 0.05029296875, 0.0284423828125, 0.06005859375, 0.005401611328125, 0.043212890625, -0.007...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965739
5,192
http://www.hark.com/directory/clip_listing/P/10
0.58054
The House on Fortune Street by Margot Livesey It seems like mutual good luck for Abigail Taylor and Dara MacLeod when they meet at university and, despite their differences, become fast friends. Years later they remain inseparable: Abigail, the actress, allegedly immune to romance, and Dara, a therapist, throwing herself into relationships with frightening intensity. Now both believe they've...
<urn:uuid:264dfce1-82dd-436b-a743-14d3c27fc604>
2013-05-18T17:29:29Z
CC-MAIN-2013-20
[ [ -0.0076497397385537624, 0.0445963554084301, 0.0063883461989462376, 0.02604166604578495, 0.0777994766831398, -0.02897135354578495, 0.0071614584885537624, 0.0904947891831398, -0.01725260354578495, -0.0063883461989462376, 0.0628255233168602, -0.009033203125, 0.0602...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964789
83
http://www.harpercollins.com/author/index.aspx?authorid=33305
0.376623
Hi. I'm Kim Kardashian and welcome to my Harper's Bazaar photo shoot. Today, you play Cleopatra. Cleopatra with a K. What will you say as being a queen at the moment? I really would like to think that I'm not that big of a diva. Maybe just like little blow up here and they're like nothing too crazy. If running a country was as easy as Twittering, I would absolutely love to run a country. How would I run it though? I would just make sure that everyone was kind of in track and everyone was nice. That would be like the perfect world, all glamor all the time. And then will you maybe consider a Cleopatra look to the next red carpet? I would love to do a Cleopatra look for the red carpet. That's a good one for next year, you know, it would be cool.
<urn:uuid:dba2caf2-6279-4263-9be6-8701e7abb215>
2013-05-18T17:59:05Z
CC-MAIN-2013-20
[ [ -0.004128885921090841, 0.004958711098879576, 0.013681994751095772, -0.007205310743302107, 0.05213730409741402, -0.001042341347783804, -0.010443652980029583, 0.0446891188621521, -0.04889896512031555, -0.0443652868270874, 0.04274611547589302, 0.006598121952265501, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982263
190
http://www.harpersbazaar.com/fashion/fashion-video/kim-kardashian-cleopatra-with-a-k-video-756527876001
0.846079
We were unable to open the pop-up window required by the page you're trying to view. If the window does not open within the next in 5 seconds, please check your pop-up blocker settings and click the button below to try again. In addition to the pop-up blocker included in your browser , please be aware that many add-ons such as the Google toolbars also contain built-in pop-up blockers.
<urn:uuid:353e95d6-a393-4b87-95c3-326bdf71daf4>
2013-05-18T17:26:33Z
CC-MAIN-2013-20
[ [ -0.026739690452814102, -0.028028350323438644, 0.034471649676561356, -0.012967139482498169, 0.057667527347803116, -0.05025773122906685, -0.006080863531678915, 0.09858247637748718, -0.06378865987062454, -0.08891752362251282, 0.015625, 0.06797680258750916, -0.12048...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967192
90
http://www.harvest.org/r?id=2817&mid=3639&use_ref=1
0.205118
The Havre Northstars, one of the top teams in the state this season and undefeated in conference play, took to the field for two games Thursday afternoon against the newest team in the league Tri-County. Both games only lasted five innings as the Northstars pounded the Tri-County team, which committed a combined 20 errors in the two games. For the Havre fans who traveled to Conrad to see the two teams play, the first inning in each game looked a lot like Sunday's second game with Fort MacLeod. In the first game, the Northstars scored seven runs in the first inning en route to a whopping 26-2 win. The second game was not much better as Havre scored nine runs in the first inning en route to a 13-2 win. After jumping out to a 7-0 lead in the first inning of game one, the Northstars continued to take advantage of Tri-County's miscues, scoring nine runs in the second inning. Havre had only four hits but capitalized on five Tri-County errors. The Northstars scored four runs in the third inning, two in the fourth and four more in the fifth to continue the rout. Every Northstar player scored at least twice in the game, with most scoring three or four times. The Northstars had 13 hits in the game and Tri-County committed 13 errors. Tri-County's two runs came in the fourth inning on one hit and two Havre errors. Dusty Heath led all batters with a 4-for-5 game with four runs scored, four RBI, and three doubles. Designated hitter Cory Junck followed with a 3-for-4 game with four runs scored and three RBI. Ian Spencer pitched all five innings for the win. Spencer allowed three hits and walked two. He struck out five. Both runs given up by Spencer were unearned. In the second game, Havre scored in only two innings, but it was enough for another big win. The Northstars scored nine runs in the first inning on five hits. Tri-County committed two errors. Tyler VanderMars racked up three RBI in the inning and scored once. VanderMars was hit by a pitch on his first at bat and then drove home two with a single his second time up. Heath and Eric Lipp each also had RBI singles. Five Tri-County errors in the second inning allowed the Northstars to score four more runs on only one hit. Tri-County scored one run in both the second and third innings. Heath once again led the way for Havre with a 2-for-2 game with two singles, two runs scored and one RBI. Junck pitched five innings for the Northstars and allowed only one hit and walked just one. He struck out seven. Both Tri-County runs allowed by Junck were unearned. The Northstars' next games are Sunday at home against Lethbridge. They will play two seven-inning games, beginning at 6 p.m.
<urn:uuid:ae2d7f38-70b4-400d-8a81-1862943ef32c>
2013-05-18T18:08:49Z
CC-MAIN-2013-20
[ [ 0.0546875, -0.0302734375, -0.01214599609375, -0.0234375, 0.016845703125, -0.064453125, 0.010498046875, 0.08251953125, -0.0167236328125, -0.078125, 0.0859375, 0.047607421875, -0.0517578125, 0.00011348724365234375, 0.055908203125, 0.019287109375, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973282
628
http://www.havredailynews.com/cms/news/story-98185.html
0.28112
Re: Happy Holidays Happy Holidays to you as well -- and everyone that participates on this board. NP, I am so sorry about your fall. I hope you have recovered some by now and aren't as sore. I know exactly how you feel on that one. Sometimes I think my main goal on a daily basis is simply NOT to fall. Like you, I hate feeling dependent on people. It really stinks, but it's the reality of our situations. Try to keep your chin up and enjoy the holidays as much as possible. I hope everyone has a happy, and very safe, holiday.
<urn:uuid:b66ec383-9b69-4f3d-ad0f-58601d529f9f>
2013-05-18T18:06:58Z
CC-MAIN-2013-20
[ [ -0.013569079339504242, 0.033599622547626495, 0.017974624410271645, 0.016564849764108658, 0.042293231934309006, -0.06625939905643463, -0.0003047168720513582, 0.08176691830158234, -0.023496240377426147, -0.03876879811286926, 0.009633458219468594, 0.01762218028306961, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.990216
127
http://www.healthboards.com/boards/4147487-post2.html
0.618399
Drugs A - Z Dextromethorphan Hydrobromide, Guaifenesin, Pseudoephedrine Hydrochloride Oral capsule, liquid filled Generic Name: dextromethorphan/guaifenesin/pseudoephedrine | Brand Name: Relacon-DM NR What is this medicine?DEXTROMETHORPHAN; GUAIFENESIN; PSEUDOEPHEDRINE (dex troe meth OR fan, gwye FEN e sin; soo doe e FED rin) is a combination of a cough suppressant, an expectorant, and a decongestant. It used to provide relief from cough and congestion. This medicine will not treat an infection. This medicine may be used for other purposes; ask your health care provider or pharmacist if you have questions. What should I tell my health care provider before I take this medicine?They need to know if you have any of these conditions: - difficulty passing urine - high blood pressure, heart disease - liver disease - an unusual or allergic reaction to dextromethorphan, guaifenesin, pseudoephedrine, other medicines, foods, dyes, or preservatives - pregnant or trying to get pregnant How should I use this medicine?Take this medicine by mouth with a glass of water. Follow the directions on the prescription label. Do not crush or chew. If this medicine upsets your stomach, take with food or milk. Take your doses at regular intervals. Do not take your medicine more often than directed. Talk to your pediatrician regarding the use of this medicine in children. Special care may be needed. Patients over 60 years old may have a stronger reaction and need a smaller dose. Overdosage: If you think you have taken too much of this medicine contact a poison control center or emergency room at once. NOTE: This medicine is only for you. Do not share this medicine with others. What if I miss a dose?If you miss a dose, take it as soon as you can. If it is almost time for your next dose, take only that dose. Do not take double or extra doses. What may interact with this medicine?Do not take this medicine with any of the following medications: - ergot alkaloids like dihydroergotamine, ergonovine, ergotamine, methylergonovine - MAOIs like Carbex, Eldepryl, Marplan, Nardil, and Parnate - stimulant medicines for attention disorders, weight loss, or to stay awake This medicine may also interact with the following medications: - medicines for blood pressure - medicines for cold, cough or allergy - some medicines for Parkinson's disease - St. John's wort This list may not describe all possible interactions. Give your health care provider a list of all the medicines, herbs, non-prescription drugs, or dietary supplements you use. Also tell them if you smoke, drink alcohol, or use illegal drugs. Some items may interact with your medicine. What should I watch for while using this medicine?Use as directed by your doctor or health care professional. Do not take more than the recommended dose. Tell your doctor if your symptoms do not improve within 5 days or if they get worse. If you have trouble falling asleep at night, take the last dose of the day at least a few hours before bedtime. Drink water as instructed while you are taking this medicine to help loosen mucus. What side effects may I notice from receiving this medicine?Side effects that you should report to your doctor or health care professional as soon as possible: - allergic reactions like skin rash, itching or hives, swelling of the face, lips, or tongue - difficulty passing urine - fast or irregular heartbeat - fear, anxiety, restless, tremor - high blood pressure - trouble breathing - unusually weak or tired Side effects that usually do not require medical attention (report to your doctor or health care professional if they continue or are bothersome): - loss of appetite - stomach upset, nausea This list may not describe all possible side effects. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088. Where should I keep my medicine?Keep out of the reach of children. Store at room temperature between 15 and 30 degrees C (59 and 86 degrees F). Protect from light. Throw away any unused medicine after the expiration date. NOTE:This sheet is a summary. It may not cover all possible information. If you have questions about this medicine, talk to your doctor, pharmacist, or health care provider. Remember, keep this and all other medicines out of the reach of children, never share your medicines with others, and use this medication only for the indication prescribed.
<urn:uuid:d3c7b665-2adb-432a-86a8-58910eb098f4>
2013-05-18T17:22:21Z
CC-MAIN-2013-20
[ [ -0.015380859375, 0.040771484375, -0.00213623046875, -0.0279541015625, 0.123046875, -0.107421875, -0.002410888671875, 0.0888671875, -0.02392578125, -0.05126953125, 0.072265625, 0.03076171875, -0.004425048828125, 0.0000514984130859375, 0.064453125, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.870203
1,037
http://www.healthline.com/goldcontent/dextromethorphan-guaifenesin-pseudoephedrine-1?brand=Relacon-DM+NR
0.345657
I completed nine months of treatment at the women's residential facility. By the time I left the program, I had regained custody of my children, was accepted to family housing, and working part-time at a local restaurant. If you or a loved one needs help, please contact us today, or call: Hon Willie L. Brown, Jr. Traci Des Jardin Jeff Hays and Carole Shorenstein Hays Dr. Robert Corrigan
<urn:uuid:5d94b748-7f96-44ab-9fa2-a838cf48424a>
2013-05-18T17:37:09Z
CC-MAIN-2013-20
[ [ -0.01953125, 0.012675382196903229, 0.002192283049225807, 0.0020926338620483875, 0.06377550959587097, 0.03029336780309677, -0.0012755101779475808, 0.017777424305677414, -0.037308674305677414, -0.07684949040412903, 0.06218112260103226, 0.0390625, -0.02264030650258...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.896163
97
http://www.healthright360.org/about/honorary-and-advisory-council
0.228745
As a preschooler, your child should have a healthy attitude toward eating. Ideally, by this age she no longer uses eating—or not eating—to demonstrate defiance, nor does she confuse food with love or affection. Generally (although almost certainly not always), she’ll now view eating as a natural response to hunger and meals as a pleasant social experience. Despite your preschooler’s general enthusiasm for eating, she still may have very specific preferences in food, some of which may vary from day to day. Your child may gobble down a particular food one day, and then push away the plate with the same food the next day. She may ask for a certain food for several days in a row, and then insist that she doesn’t like it anymore. As irritating as it may be to have her turn up her nose at a dish she devoured the day before, it’s normal behavior for a preschooler, and best not to make an issue of it. Let her eat the other foods on her plate or select something else to eat. As long as she chooses foods that aren’t overly sugary, fatty, or salty, don’t object. However, encourage her to try new foods by offering her very small amounts to taste, not by insisting that she eat a full portion of an unfamiliar food. As a parent, your job is to make sure that your preschooler has nutritious food choices at every meal. If she has healthy options on the dining room table, let her make the decision of what (and how much) to eat. If she’s a picky eater—resisting eating vegetables, for example—don’t get discouraged or frustrated. Keep giving them to her even if she repeatedly turns up her nose at the sight of them. Before long, she may change her mind, developing a taste for foods that she once ignored. This is the period of time that healthy snacking and healthy habits get reinforced and/or established. Remember, meals don’t need to be elaborate to be nutritious. If you have only a few minutes to prepare a meal, try a turkey sandwich, a serving of green beans, an apple, and a glass of nonfat or low-fat milk. A simple lunch like this takes less time to prepare than driving through a fast-food restaurant, and it is much healthier. Television advertising, incidentally, can be a serious obstacle to your preschooler’s good nutrition. Some studies show that children who watch over twenty-two hours of TV per week (over three hours of screen time a day) have a greater tendency to become obese. Children this age are extremely receptive to ads for candy and other sugary sweets, especially after they’ve visited other homes where these foods are served. Obesity is a growing problem among children in America. For this reason, you need to be aware of your youngster’s eating habits, at home and away, and monitor them to make sure she’s eating as healthy as possible.
<urn:uuid:a9e70429-1d58-48a3-b043-b8a80374a281>
2013-05-18T17:48:59Z
CC-MAIN-2013-20
[ [ -0.01904296875, 0.0185546875, 0.0174560546875, 0.009033203125, 0.0869140625, -0.04638671875, 0.0111083984375, 0.09521484375, -0.0201416015625, -0.0145263671875, 0.07470703125, 0.018310546875, -0.0537109375, -0.001922607421875, 0.04248046875, -0.02221...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973723
625
http://www.healthychildren.org/English/ages-stages/toddler/nutrition/pages/Feeding-and-Nutrition-Your-Three-Year-Old.aspx
0.354142
Bullying is any behavior person(s) exhibit that intends to harm or distress a targeted person(s) consistently. The types of bullying are: Physical - Verbal - Cyber - Relational (Social Aggression) Your child feels sad about attending school - Refusal to go to school - Loss of personal items such as toys, clothing or lunch money - Child may appear withdrawn or anxious -Change in sleeping and/or eating habits - Complaints of headache and/or stomach ache - Frequent visits to Health Office If you suspect your child is involved in bullying behavior, please consider the following: Discuss your concerns with your child, school, or social worker - Determine if your child has been having any particular problems with other children - Assess if your child is experiencing difficulties in other areas - Assist your child in understanding the serious nature and consequences of bullying behavior - Share your concerns with your child's teacher or any other significant adult (example teacher, coaches, scout-leaders etc.) Ignore or walk away - tell the person to stop and then walk away - Warn that you will get help from an adult and then walk away - Get help. Tell an adult what has happened Bullies keep bullying because of inaction. Make sure your child communicates their concerns to a trusted adult. Also, if they see bullying happening and they feel comfortable doing so, they should firmly state that those actions are inappropriate.
<urn:uuid:be9f62e2-7280-4aef-8de4-3ac6c237a6aa>
2013-05-18T17:26:33Z
CC-MAIN-2013-20
[ [ -0.01520522404462099, -0.0003031716332770884, 0.023227611556649208, -0.0018656715983524919, 0.14179104566574097, -0.05186567083001137, 0.011567164212465286, 0.08619403094053268, -0.009654850699007511, -0.0548507459461689, 0.11119402945041656, 0.041044775396585464, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936571
287
http://www.heightsschools.com/ABFAQ.cfm
0.829248
The prime goals of company management are to secure the company’s long-term survival and to generate attractive returns. Various strategic and operational controlling requirements can be derived from these goals (included the balanced scorecard, etc.). Strategic controlling supports management on the one hand through a strategic mindset that leads to a forward-looking corporate culture in all functional areas of the company and on the other through coordination in the establishment of an infrastructure to support the strategic planning and implementation process. The task of operational controlling is to support management in setting up a results-oriented planning and controlling system and to provide a quantitative apparatus for result-oriented controlling within the company. A professional system combining strategic and operational controlling makes it easier for you to keep track of your management performance.
<urn:uuid:4fbad2ad-f4f9-4444-8e91-cbf9ce5e3113>
2013-05-18T18:05:37Z
CC-MAIN-2013-20
[ [ -0.032821230590343475, 0.02287011221051216, 0.01571229100227356, 0.015625, 0.10195530951023102, -0.0722765326499939, -0.026012569665908813, 0.11173184216022491, -0.0024114002007991076, -0.040851954370737076, 0.029155027121305466, 0.010562150739133358, -0.1173184...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92214
155
http://www.helbling.ch/hba/services/financial-performance-management/strategic-operational-controlling
0.57621
1. Bedtime Story Aragorn was pleased that his duties were over in time to allow him to join his wife in a family ritual that he usually missed: putting the child to bed. Every night, after the nursemaids had bathed and dressed the young prince in his nightclothes, the queen would dismiss them and take Eldarion to his bedchamber herself. She would tell him a story and sing softly in her lovely voice. Elven dreams and visions of great beauty would drift across his eyes, until they closed in a sound sleep. The king strode through the nursery suite, and the startled maids dropped curtseys as he passed; they called out "my lord king," and he greeted them briefly with a smile and a nod. But when he turned into Eldarion's room, he found a somewhat different scene from what he had expected. Barefoot and nightgowned, his four-year-old son was standing in the middle of the room, brandishing a wooden sword and shouting, "You might be a play-acting spy! What do you say to that?" Seeing his father, Eldarion put on a ferocious face and charged. "Strider!" he shouted. "Arwen," the king said, as he held the small body whacking at him with the wooden sword, "what are you teaching our son?" Laughing helplessly at her husband's surprised face, Arwen gasped, "The Prancing Pony—I told him the story of the Hobbits and the Ranger, and he just found out that you are Strider. He is being Sam. Such great timing!" Aragorn closed his hand around the small arm brandishing the wooden sword. The scowl on his son's fair Elven face bore an uncanny resemblance to Sam Gamgee's look of suspicious disapproval. He was about the right height, too. "That's enough, my son. Shall we discuss this, perhaps?" and he knelt down to look at his son face to face. Eldarion let out a peal of delighted laughter and threw his arms around his father's neck. "Is it really true, papa? You are Strider?" "Oh, it is really true," Aragorn said. "But you are Strider, too." He picked up the boy and they joined the queen on the bed. "No, I'm not," the prince said. "I am Eldarion." "And is Eldarion your only name?" "I am the son of Elessar," he said proudly. "And what is the name of our House?" Aragorn asked him. "Oh!" the prince said. "Telcontar. Is that what you mean?" "Most certainly. And that is 'Strider.'" "Strider!" the boy shouted again. Slipping off his father's lap, he began strutting around the room. "Here is Eldarion being Strider." "Arwen," Aragorn said to his wife, "promise me one thing." "And what is that, my love?" "Do not tell him about Gollum." "Lurking by a stagnant mere, peering in the water as the dark eve fell, I caught him, Gollum. He was covered with green slime. He will never love me, I fear; for he bit me, and I was not gentle." —Aragorn at the Council of Elrond This is a work of fan fiction, written because the author has an abiding love for the works of J R R Tolkien. The characters, settings, places, and languages used in this work are the property of the Tolkien Estate, Tolkien Enterprises, and possibly New Line Cinema, except for certain original characters who belong to the author of the said work. The author will not receive any money or other remuneration for presenting the work on this archive site. The work is the intellectual property of the author, is available solely for the enjoyment of Henneth Annûn Story Archive readers, and may not be copied or redistributed by any means without the explicit written consent of the author.
<urn:uuid:95e62698-d7d4-4763-af1a-3e73b5aa2bd1>
2013-05-18T18:07:37Z
CC-MAIN-2013-20
[ [ 0.011962890625, 0.0069580078125, -0.0013580322265625, 0.0123291015625, 0.11376953125, 0.000339508056640625, -0.006256103515625, 0.1181640625, -0.018798828125, -0.038818359375, 0.018310546875, 0.025390625, 0.0302734375, -0.0390625, 0.045654296875, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.984549
867
http://www.henneth-annun.net/stories/chapter_view.cfm?stid=5366&spordinal=1
0.824928
'Dig That Crazy Christmas' is the indispensable soundtrack to the yule tide, featuring Setzer's blistering takes on classics like "Let It Snow! Let It Snow! Let It Snow!," "My Favorite Things," "Jingle Bell Rock," "White Christmas" and "You're A Mean One, Mr. Grinch." The hitmaker also wrote two new songs for the album, "Hey Santa" and "Santa Drives a Hot Rod." 1. Dig That Crazy Santa Claus 2. Angles We Have Heard On High 3. Getting' In The Mood (For Christmas) 4. White Christmas 5. My Favorite Things 6. Let It Snow! Let It Snow! Let It Snow! 7. Zat You Santa Claus? 8. Hey Santa! 9. You're A Mean One, Mr. Grinch 10. Cool Yule 11. Jingle Bell Rock 12. What Are You Doing New Year's Eve 13. Santa Drives A Hot Rod
<urn:uuid:842b066c-b05b-469f-9435-41ea8a506edd>
2013-05-18T17:17:44Z
CC-MAIN-2013-20
[ [ -0.006516768131405115, 0.01554878056049347, 0.009070121683180332, 0.014405488036572933, 0.12560975551605225, 0.0021913109812885523, -0.006631097756326199, 0.04695121943950653, -0.03109756112098694, -0.05487804859876633, 0.07439024746417999, 0.015320122241973877, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.828577
210
http://www.hepcat.se/product_info.php?cPath=1_16&products_id=1115
0.47471
Please complete and submit the form below and an HFF representative will respond as soon as possible. Please indicate the general category of your question: -- Select a Category -- Privacy And Security Please provide us with your contact information: Remember my contact information for my next inquiry. -- Type Message Here -- * Indicates a required field.
<urn:uuid:a3cc6f0f-6230-4395-ae72-d0fbe06da591>
2013-05-18T17:18:40Z
CC-MAIN-2013-20
[ [ -0.040713027119636536, 0.011938820593059063, 0.020686618983745575, 0.029709506779909134, 0.07790493220090866, 0.05281690135598183, -0.012378960847854614, 0.009958186186850071, -0.01171875, -0.019146127626299858, 0.07438380271196365, 0.019806338474154472, -0.0013...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.72485
72
http://www.hfflp.com/ContactUs/Inquiry.aspx?T=2
0.164892
The surname ACKNER is not included in the US Census Bureau's ranking of surnames with 100 or more people. Since fewer than 100 people with this surname were included in the 2000 Census, it is relatively uncommon. Data: Frequently Occurring Surnames from Census 2000", US Census Bureau. Histopolis currently has 1 grave(s) with the surname Histopols Grave Index for the surname has a Soundex code of A256. The following surname(s) may sound similar to since they share the same Soundex code.
<urn:uuid:6bb48fb7-f3a8-4fd2-bcf9-6f748e200e6c>
2013-05-18T17:39:23Z
CC-MAIN-2013-20
[ [ -0.021898673847317696, 0.030066287145018578, -0.016335226595401764, 0.00887784082442522, 0.05160984769463539, -0.059659089893102646, -0.0234375, 0.09564393758773804, -0.013553503900766373, -0.026751894503831863, 0.09185606241226196, 0.05066287890076637, -0.09043...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.915741
120
http://www.histopolis.com/Surname/Ackner
0.264737
On this day in 1863, Union General Ulysses S. Grant breaks the siege of Chattanooga, Tennessee, in stunning fashion by routing the Confederates under General Braxton Bragg at Missionary Ridge. For two months following the Battle of Chattanooga, the Confederates had kept the Union army bottled up inside a tight semicircle around Chattanooga. When Grant arrived in October, however, he immediately reversed the defensive posture of his army. After opening a supply line by driving the Confederates away from the Tennessee River in late October, Grant prepared for a major offensive in late November. It was launched on November 23 when he sent General George Thomas to probe the center of the Confederate line. This simple plan turned into a complete victory, and the Rebels retreated higher up Missionary Ridge. On November 24, the Yankees captured Lookout Mountain on the extreme right of the Union lines, and this set the stage for the Battle of Missionary Ridge. The attack took place in three parts. On the Union left, General William T. Sherman attacked troops under Patrick Cleburne at Tunnel Hill, an extension of Missionary Ridge. In difficult fighting, Cleburne managed to hold the hill. On the other end of the Union lines, General Joseph Hooker was advancing slowly from Lookout Mountain, and his force had little impact on the battle. It was at the center that the Union achieved its greatest success. The soldiers on both sides received confusing orders. Some Union troops thought they were only supposed to take the rifle pits at the base of the ridge, while others understood that they were to advance to the top. Some of the Confederates heard that they were to hold the pits, while others thought they were to retreat to the top of Missionary Ridge. Furthermore, poor placement of Confederate trenches on the top of the ridge made it difficult to fire at the advancing Union troops without hitting their own men, who were retreating from the rifle pits. The result was that the attack on the Confederate center turned into a major Union victory. After the center collapsed, the Confederate troops retreated on November 26, and Bragg pulled his troops away from Chattanooga. He resigned shortly thereafter, having lost the confidence of his army. The Confederates suffered some 6,600 men killed, wounded, and missing, and the Union lost around 5,800. Grant missed an opportunity to destroy the Confederate army when he chose not to pursue the retreating Rebels, but Chattanooga was secured. Sherman resumed the attack in the spring after Grant was promoted to general in chief of all Federal forces.
<urn:uuid:7b1a4a78-5b08-48b8-86b9-bcbde260344d>
2013-05-18T17:58:28Z
CC-MAIN-2013-20
[ [ 0.01123046875, 0.0264892578125, -0.0303955078125, -0.0020294189453125, 0.099609375, -0.045166015625, -0.018310546875, 0.08837890625, -0.01556396484375, -0.0576171875, 0.095703125, 0.044921875, -0.03564453125, 0.01055908203125, 0.039306640625, 0.01116...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975761
513
http://www.history.com/this-day-in-history/-battle-of-missionary-ridge?catId=2
0.940027
In the streets of Prague and in the United Nations headquarters in New York City, Czechs protest against the Soviet invasion of their nation. The protests served to highlight the brutality of the Soviet action and to rally worldwide condemnation of the Soviet Union. On August 21, 1968, more than 200,000 troops of the Warsaw Pact crossed into Czechoslovakia in response to democratic and free market reforms being instituted by Czech Communist Party General Secretary Alexander Dubcek. Negotiations between Dubcek and Soviet bloc leaders failed to convince the Czech leader to back away from his reformist platform. The military intervention on August 21 indicated that the Soviets believed that Dubcek was going too far and needed to be restrained. On August 22, thousands of Czechs gathered in central Prague to protest the Soviet action and demand the withdrawal of foreign troops. Although it was designed to be a peaceful protest, violence often flared and several protesters were killed on August 22 and in the days to come. At the United Nations, the Czech delegation passionately declared that the Soviet invasion was illegal and threatened the sovereignty of their nation. They called on the U.N.'s Security Council to take action. The Council voted 10 to 2 to condemn Russia's invasion; predictably, the Soviet Union vetoed the resolution. The 1968 invasion of Czechoslovakia severely damaged the Soviet government's reputation around the world, and even brought forth condemnation from communist parties in nations such as China and France. Nonetheless, Dubcek was pushed from power in April 1969 and the Czech Communist Party adopted a tough line toward any dissent. The "Prague Spring" of 1968, when hopes for reform bloomed, would serve as a symbol for the so-called "Velvet Revolution" of 1989. In that year, Czech dissidents were able to break the Communist Party's stranglehold on their nation's politics by electing Vaclav Havel, the first noncommunist president in 40 years.
<urn:uuid:cbbbe908-244f-44cc-a4ac-0762f8ebf597>
2013-05-18T17:19:26Z
CC-MAIN-2013-20
[ [ -0.01480978261679411, 0.029483696445822716, -0.00964673887938261, 0.015896739438176155, 0.125543475151062, -0.09510869532823563, -0.03478260710835457, 0.11358695477247238, -0.030978260561823845, -0.04836956411600113, 0.05624999850988388, 0.02241847850382328, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973815
388
http://www.history.com/this-day-in-history/czechs-protest-against-soviet-invasion
0.897612
By default, all search terms are optional.Objects that contain the terms are rated higher in the results. For example, wiki forum will find: objects that include the term wiki objects that include the term forum objects that include both terms Add a plus sign ( + ) before a term to indicate that the term must appear in results. Add a minus sign ( - ) before a term to indicate that the term must not appear results.To reduce a term's value without completely excluding it, use a tilde. Use parenthesis ( ) to group terms into subexpressions. Use double quotes ( " ) around a phrase to find terms in the exact order, exactly as typed. Add an asterisk ( * ) after a term to find objects that include the root word. For example, run* will find: objects that include the term run objects that include the term runner objects that include the term running Reducing a term's value Add a tilde ( ~ ) before a term to reduce its value indicate to the ranking of the results.Objects that contain the term will appear lower than other objects (unlike the minus signwhich will completely exclude a term). Changing relevance value Add a less than ( < ) or greater than ( > ) sign before a term to change the term's contribution to the overall relevance value assigned to a row.
<urn:uuid:1f642c9b-357d-432e-b013-9e2fc20e0174>
2013-05-18T17:37:17Z
CC-MAIN-2013-20
[ [ -0.030523255467414856, -0.0009149190154857934, -0.006618563085794449, -0.022632889449596405, 0.049418605864048004, -0.040490034967660904, -0.004879568237811327, 0.06686046719551086, -0.03758305683732033, 0.012925664894282818, 0.15614618360996246, 0.03135382011532783...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.907133
286
http://www.historynevada.com/tw/tiki-browse_categories.php
0.934244
"Hey Vern," roll the credits. Jim Varney, the big-nosed, gawky actor who brought empty-headed hayseed pitch-man Ernest P. Worrell to life in a series of popular, albeit arguably annoying TV commercials and then in a skein of kids' movies, died today of lung cancer. He was 50. Varney, an actor since his teen years, had been in the public eye for more than 25 years. He was a stand-up comic in New York in the early 1970s, and became a regular on the TV variety series "Johnny Cash and Friends" in 1976. He also was a regular on "Fernwood 2-Night," "Operation Petticoat" and other late 1970s TV comedy shows. His (literally) in-your-face TV ads, with his nose pressed against the camera and his incessant "Hey Vern" sales spiels, began airing in 1980. But it was Varney's "Ernest" movies, with their innocent brand of slapstick, goofball comedy, that endeared him to kids. The movies always featured a story in which Ernest, the idiot savant, helps a group of children out of some problem or predicament. The first of these films was "Ernest Goes to Camp" (1987), followed by "Ernest Saves Christmas," "Ernest Scared Stupid," "Ernest Rides Again," "Ernest Goes to School," "Slam Dunk Ernest," "Ernest In the Army" and others. Some were released theatrically, while others were of the straight-to-video variety. Varney also did a lot of non-"Ernest" stuff, including "Wilder Napalm" (1993) with Dennis Quaid and Debra Winger. In that same year, he played Jed Clampett in the big-screen version of "The Beverly Hillbillies."
<urn:uuid:facfd760-73b9-4c46-bb3e-7cb0cae10529>
2013-05-18T17:21:57Z
CC-MAIN-2013-20
[ [ 0.012341223657131195, 0.002688365988433361, -0.018187066540122032, 0.0015426529571413994, 0.06639722734689713, -0.014001154340803623, 0.004618937615305185, 0.08718244731426239, -0.034497689455747604, -0.0499422624707222, 0.09122401475906372, 0.04590069130063057, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988963
402
http://www.hollywood.com/news/brief/311947/farewell-ernest
0.333418
Car: not necessary Vauxhall is a beautiful inner-city area of South London, in the London Borough of Lambeth. At one point, it was in the historic county of Surrey. It's currently a popular residential area for Members of Parliament and civil servants, due to its proximity to the Houses of Parliament and Whitehall. Vauxhall is also known for its ethnic diversity, boasting a very strong Portugese and Muslim community. In recent years, Vauxhall's riverside has undergone major development, with a number of modern and residential blocks being constructed. One of these, the MI6, has been featured in many James Bond films, and is the home of the British Secret Intelligence Service. Other landmarks of the area include the Brunswick House, a listed Georgian mansion and former home of the Dukes of Brunswick; St. Peters Church, in Kennington Lane; and, soon, St. George Wharf, which will be the tallest residential building in the entire United Kingdom. Other Activities: Shopping, Sightseeing, historical walks, excellent transport options, direct access to one of the world's best cities.
<urn:uuid:7884938c-5597-4aa4-bf7c-cd0f896f262c>
2013-05-18T17:38:01Z
CC-MAIN-2013-20
[ [ 0.031603772193193436, 0.01674528233706951, 0.0028596697375178337, 0.011320754885673523, 0.12641508877277374, -0.03844339773058891, -0.03938679397106171, 0.06603773683309555, 0.010554245673120022, -0.05259434133768082, 0.06415094435214996, 0.02841981127858162, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951065
227
http://www.homeaway.co.uk/p811560?uni_id=1178378
0.692735
That sounds great! Unfortunately I'm in the UK so won't be able to get to your farmers markets! I'd love to have a go at making some lip balm, can anyone recommend a good recipe for a beginner please? Just nothing with avocado in please! Thx.
<urn:uuid:5dc0e385-ac04-4020-b78f-03bed9532a9c>
2013-05-18T17:48:49Z
CC-MAIN-2013-20
[ [ -0.061298076063394547, 0.05600961670279503, 0.0018780047539621592, 0.05312500149011612, 0.05673076957464218, -0.04374999925494194, -0.042307693511247635, -0.021754806861281395, -0.0317307710647583, -0.03677884489297867, -0.003725961549207568, 0.008533653803169727, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956113
58
http://www.homegrown.org/group/homemadecosmetics/forum/topics/lip-balms
0.747045
220. Is the incidence of complications of CLE significantly higher in cases of alkaline reflux than in cases of acid reflux? RA. Hinder (Omaha) 221. What are the characteristic features of stricture in Barrett's mucosa? K. Moghissi (Hull) 222. What is termed a Savary's ulcer? How does the evolution of a typical Barrett's ulcer differ from that of a Savary's ulcer? E. Brossard, J.B. Ollyo, C. Fontolliet, M. Savary, Ph. Monnier (Lausanne) 223. Is Helicobacter pylori involved in the pathogenesis of the Barrett type ulcer? E. Brassard (Lausanne)
<urn:uuid:10097753-fbd6-46d1-a37c-ae9d72aa4e33>
2013-05-18T17:27:07Z
CC-MAIN-2013-20
[ [ 0.015355603769421577, 0.020294539630413055, 0.015535200946033001, -0.022719109430909157, 0.09841953963041306, -0.009518678300082684, -0.020114943385124207, 0.0840517207980156, -0.02514367736876011, -0.05531609058380127, 0.11063218116760254, 0.011763649061322212, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.842703
172
http://www.hon.ch/OESO/Vol_3_Eso_Mucosa/331_Ulcers.html
0.699134
An excerpt from www.HouseOfNames.com archives copyright © 2000 - 2013 Where did the Italian Ciccaroni family come from? What is the Italian Ciccaroni family crest and coat of arms? When did the Ciccaroni family first arrive in the United States? Where did the various branches of the family go? What is the Ciccaroni family history?The surname Ciccaroni came from the personal name Cicco, which is found in southern Italy and the Venetian region as a popular and affectionate form of the name Francesco. In comparison with other European surnames, Italian surnames have a surprising number of forms. They reflect the regional variations and the many dialects of the Italian language, each with its own distinctive features. For example, in Northern Italy the typical Italian surname suffix is "i", whereas in Southern Italy it is "o". Additionally, spelling changes frequently occurred because medieval scribes and church officials often spelled names as they sounded rather than according to any specific spelling rules. The spelling variations in the name Ciccaroni include Cicco, Cicchi, De Cicco, D'Accico, Daccico, Cicchello, Cicchelli, Cicchella, Ciccarello, Ciccarelli, Ciccarella, Ciccariello, Cicchetto, Cicchetti, Cicchitto, Cicchino, Cicchini, Ciccolo, Ciccolino, Ciccolini, Coccolone, Coccoloni, Ciccolella, Ciccotto, Ciccotti, Ciccotta, Cicconi, Ciccone, Ciccaglione, Ciccaglioni, Ciccalotti, Ciccarese, Ciccaresi, Ciccarino, Ciccarini, Ciccarone, Ciccaroni, Cichetti, Cicutto, Cicala, Cicconetti, Cicalotti, Ciceri, Cicero, Cicera, Cicinelli, Cicogna, Ciconi and many more. First found in Piedmont. Earliest records date back to the year 1112, when Pompeo Cicala was a valiant soldier in the city of Genoa. This web page shows only a small excerpt of our Ciccaroni research. Another 262 words(19 lines of text) covering the years 1493, 1623, 1673, 1686, 1751, 1780, and 1804 are included under the topic Early Ciccaroni History in all our PDF Extended History products. Another 162 words(12 lines of text) are included under the topic Early Ciccaroni Notables in all our PDF Extended History products. Early North American records indicate many people bearing the name Ciccaroni were among those contributors: Liberato Diciocco, age 27, who arrived at New York on Dec. 20, 1882, aboard the "Italia"; Bernardo Cichero, who arrived in Philadelphia, Pennsylvania, in 1855. The Ciccaroni Family Crest was acquired from the Houseofnames.com archives. The Ciccaroni Family Crest was drawn according to heraldic standards based on published blazons. We generally include the oldest published family crest once associated with each surname. This page was last modified on 14 January 2011 at 09:59. houseofnames.com is an internet property owned by Swyrich Corporation.
<urn:uuid:96354a77-2136-4431-8cbb-92e896f424aa>
2013-05-18T17:57:31Z
CC-MAIN-2013-20
[ [ -0.024169921875, -0.005523681640625, -0.010986328125, -0.0257568359375, 0.052490234375, 0.0634765625, 0.008544921875, 0.09326171875, -0.02685546875, -0.12109375, 0.1611328125, 0.009765625, 0.07275390625, 0.00982666015625, 0.039794921875, -0.054931640...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.902765
691
http://www.houseofnames.com/ciccaroni-family-crest?a=54323-224
0.669889
How about we… we can pass a blunt and talk about the good life. Wussup wussup. I'm jordan, you can call me debbie. Origanally from eastoakland.. Cali raised/born I'm a fiesty lil thang also pretty blunt. I'm Italian and a whitegirl .. Btw i smoke weed
<urn:uuid:bc54ade5-f3c8-424c-9c28-6076553de6db>
2013-05-18T17:48:12Z
CC-MAIN-2013-20
[ [ 0.0026458031497895718, 0.03942587226629257, 0.021166425198316574, -0.0017827943665906787, 0.028161337599158287, -0.018531976267695427, -0.02943313866853714, 0.05922964960336685, -0.004996366333216429, -0.06104651093482971, -0.0011525708250701427, 0.03324854746460914...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.891478
75
http://www.howaboutwe.com/users/L1LDebbie
0.514885
One of the most common uses of Flash memory is for the basic input/output system of your computer, commonly known as the BIOS (pronounced "bye-ose"). On virtually every computer available, the BIOS makes sure all the other chips, hard drives, ports and CPU function together. Every desktop and laptop computer in common use today contains a microprocessor as its central processing unit. The microprocessor is the hardware component. To get its work done, the microprocessor executes a set of instructions known as software (see How Microprocessors Work for details). You are probably very familiar with two different types of software: - The operating system - The operating system provides a set of services for the applications running on your computer, and it also provides the fundamental user interface for your computer. Windows 98 and Linux are examples of operating systems. (See How Operating Systems Work for lots of details.) - The applications - Applications are pieces of software that are programmed to perform specific tasks. On your computer right now you probably have a browser application, a word processing application, an e-mail application and so on. You can also buy new applications and install them. It turns out that the BIOS is the third type of software your computer needs to operate successfully. In this article, you'll learn all about BIOS -- what it does, how to configure it and what to do if your BIOS needs updating.
<urn:uuid:616e3cef-b8cf-45a1-bf66-aa1696265647>
2013-05-18T17:56:41Z
CC-MAIN-2013-20
[ [ -0.026552287861704826, -0.0015190972480922937, 0.023182189092040062, -0.014808006584644318, 0.06576797366142273, -0.05310457572340965, 0.007863562554121017, 0.08496732264757156, -0.03737745061516762, -0.03165849670767784, 0.03860294073820114, 0.006893382407724857, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947143
283
http://www.howstuffworks.com/bios.htm
0.921572
Featuring the new Quizbowl Resource Database: http://www.hsquizbowl.org/db/ bdubbs wrote:Hi Bro. Nigel, the field should be updated now. Usually most of the teams register within two weeks of the tournament, so we'll probably see the field expand as the tournament date nears. On another note, we just received notification today that our school will actually be having their placement test on Dec. 10th, which means we may have to change the tournament date to Jan. 28th at the earliest as to not conflict with any other tournaments in the region. Again, this is just tentative but a heads up just in case. List of villages in West Virginia wrote:Why, by the way, is January 28th the preferred date to change to? I already know that Alexa won't be able to make that tournament. List of villages in West Virginia wrote:What would the Blue Hen Invitational run its tournament on, then? And Delaware NAQT States? bt_green_warbler wrote:List of villages in West Virginia wrote:What would the Blue Hen Invitational run its tournament on, then? And Delaware NAQT States? IS #115 and #116 respectively (unless I've missed a conflict) Manheim Township (1) That's fine. I would be happy to read in this top group. NAQT packets go really really fast so 25 minute games should be the norm, if not faster among the TOP. TEAMS.Bad Boy Bill wrote:I suspect we'll want to make groups of 5 or 6 and do five rounds in the morning as usual. (If, say a 19th team happens, probably a partial round robin.) In the afternoon, and if I draft the most efficient moderators for the top group, do you think we could do a five-round playoff round robin, followed by an advantaged final as necessary? I'll probably only want to do three afternoon rounds for the other brackets, but I could change my mind depending on how the morning goes. I mean, if it's clearly going slower in the morning, then we''ll re-evaluate, but i'd hope we wouldn't have to. Robbie Ram wrote:Has the tournament schedule (specifically, registration window & start time for the rounds) been nailed down yet? Those of us traveling to Wilmington from multiple hours away need to know that info ASAP so we can figure out at what ungodly hour of the morning we need to leave in order to arrive there on time! Thanks. Users browsing this forum: No registered users and 2 guests
<urn:uuid:5a810efb-462d-4266-a5b1-6cdc1ec7a528>
2013-05-18T17:27:17Z
CC-MAIN-2013-20
[ [ -0.006744384765625, 0.005889892578125, 0.00830078125, 0.000782012939453125, 0.0576171875, -0.01904296875, -0.01141357421875, 0.055419921875, 0.0028533935546875, -0.03662109375, 0.019287109375, 0.03662109375, -0.062255859375, -0.0111083984375, 0.037109375...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961594
543
http://www.hsquizbowl.org/forums/viewtopic.php?p=234430
0.345973
The most depressing headline of 2002 : Here it is, on the last day of the year, courtesy of the NYT: "Yanks Sign Clemens and May Seek Colón." Ugh. ... The Yanks now have eight starting pitchers. ... The feud between Lucchino and Steinbrenner continues. From the same article: "Larry Lucchino, president of the Red Sox, roused George Steinbrenner's wrath by referring to the Yankees as the evil empire after they beat the Red Sox to Contreras a week ago. Steinbrenner, the Yankees' principal owner, needs no more reason than that comment to direct Cashman to make sure the Red Sox do not acquire Colón." ... They're going to sign Colón just to spite us. Larry, please, apologize. Say something. But just back off.
<urn:uuid:63d01a0b-3a4a-4b3f-ac1d-06164e4cb972>
2013-05-18T17:27:40Z
CC-MAIN-2013-20
[ [ 0.013621794991195202, 0.02660256437957287, 0.012099359184503555, 0.006850961595773697, 0.08910256624221802, -0.0051282052882015705, 0.018910257145762444, 0.09935897588729858, 0.021474359557032585, -0.06410256773233414, 0.045192308723926544, 0.0625, -0.0471153855...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92879
176
http://www.hubblog.com/2002/12/most-depressing-headline-of-2002-here.html
0.237523
PARIS (AP) -- Striker Karim Benzema insists he is not feeling the pressure ahead of World Cup qualifiers against Georgia and Spain, despite not scoring in his past 10 games for France and regularly finding himself on the Real Madrid bench. Benzema was in good form last season for both club and country, but has not scored for France since his brace against Estonia last June in a warmup match before the European Championship. "No, it doesn't weigh on me, of course I want to score but I can't start thinking 'I must score, I must score' because it will affect my game," Benzema said Sunday on French television show Telefoot. "Even if I don't score and we win, I will be happy. People don't look at the effort I make on the field. But the No. 1 striker must score goals and I hope they will come soon. We'll see after these two games." Benzema has scored 15 goals in 55 games for France, a modest return for a forward of his stature. "I am criticized every time in France, but that is part of my status now and you have to accept it with a smile," he said. "There are always difficult moments in a career, now I am coming back well and I feel really good." France coach Didier Deschamps has backed Benzema to come good, adding that France needs him back to his best against Georgia and reigning European and world champion Spain. After securing a 1-1 draw away to Spain, France is level on points at the top of Group I, and two wins will put France into top spot with only one team qualifying automatically for the 2014 World Cup. Benzema has struggled to hold down a regular place for Real Madrid this season, starting only 12 of 22 league games, and scoring eight goals. Last year, Benzema finished the season with 21 league goals, only to see his confidence dip at Euro 2012, where he had a poor tournament. "It's a bit harder for him because he's playing a bit less and it's difficult to get into a rhythm when you're coming on at the end of games," Deschamps said. "No one's irreplaceable, but I have enormous confidence in Karim with respect to his ability. He just needs that little spark to get going again. I think a goal would do him some good. "He could be more efficient and he's looking to be. But he is doing other things in the game as well," Deschamps added. "The longer it goes on and he doesn't score, people will mention his statistics. But I repeat: I have faith in him." Meanwhile, Deschamps is hopeful winger Franck Ribery will shake off an ankle ligament problem in time to play against Georgia. "Franck wants to play, there's a problem with his ankle but it shouldn't prove to be a major problem," Deschamps said.
<urn:uuid:cf484181-98dd-4fb0-9e71-4982e5fd22fb>
2013-05-18T18:07:37Z
CC-MAIN-2013-20
[ [ 0.0281982421875, 0.00921630859375, -0.005126953125, -0.00726318359375, 0.07861328125, -0.039794921875, 0.004241943359375, 0.1025390625, 0.0341796875, -0.07177734375, 0.064453125, 0.05517578125, -0.0030517578125, -0.0089111328125, 0.047607421875, 0.00...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.987003
610
http://www.hudsonhubtimes.com/ap%20sports/2013/03/17/benzema-confident-despite-france-scoring-slump
0.265896
Newsweek's Michele Bachmann Cover Raises Eyebrows (PHOTO, POLL) Newsweek's latest issue features a Michele Bachmann cover that's sure to stir up controversy. The cover shows Bachmann standing against a stark blue background, looking directly into the camera with a wide-eyed expression. The headline advertising the magazine's story reads, "THE QUEEN OF RAGE." "Rage" is a word that doesn't appear in Newsweek's actual profile of Bachmann, though author Lois Romano does criticize what she calls the "radical" nature of the Tea Party that Bachmann champions. Conservative websites are already crying foul over the cover, with some saying it makes Bachmann look "crazy" and one blogger asking, "Can anyone really say with a straight face that the mainstream media is not totally biased against conservatives?" It's not the first time Newsweek has faced conservative backlash for a cover. In June, the magazine portrayed Mitt Romney as one of the stars of the Broadway show "The Book of Mormon." And, of course, it drew widespread criticism for its infamous Sarah Palin cover in 2009. See the Bachmann cover below, and tell us whether you think it crosses a line.
<urn:uuid:1582b2b6-760b-4244-944c-519310ac33d5>
2013-05-18T17:32:24Z
CC-MAIN-2013-20
[ [ -0.009848151355981827, 0.03653169050812721, 0.007207306567579508, 0.017385562881827354, 0.06822182983160019, 0.00500660203397274, -0.0034936179872602224, 0.06866197288036346, -0.0257482398301363, -0.022777289152145386, 0.030369717627763748, 0.03807218372821808, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939469
250
http://www.huffingtonpost.com/2011/08/08/newsweeks-michele-bachman_n_920860.html
0.28684
Newt Gingrich: Ron Paul's Political Base Is Made Of 'People Who Want To Legalize Drugs' Republican presidential candidate Newt Gingrich slammed rival Ron Paul when he claimed Paul's political base is made of "people who want to legalize drugs." Gingrich hurled the criticism in a radio interview Tuesday, even after repeatedly promising to keep his campaign "positive." The former House Speaker hit Paul not only for his volunteer base, but also for his views on 9/11 and his non-confrontational policy on Iran. "This is a guy who basically says, if the United States were only nice, it wouldn't have had 9/11," Gingrich said. "He doesn't want to blame the bad guys." "He dismisses the danger of an Iranian nuclear weapon and seems to be indifferent to the idea that Israel could be wiped out," Gingrich continued. "And as I said, I think the key to his volunteer base is people who want to legalize drugs." Paul has dealt with daily hits from his rivals since seeing a bump in the polls ahead of the Iowa caucuses. Michele Bachmann recently said it would be "dangerous" for Paul to become president, and Perry hit Paul for "still birthing earmarks as we speak." Gingrich's campaign has taken on an increasingly angry tone since he made the promise to stay "positive." HuffPost's Jon Ward reports that while campaigning in Iowa, Gingrich has repeatedly blasted his opponents for their negative ads and claimed "they ought to be ashamed" for their attacks against him. Also on HuffPost:
<urn:uuid:056748aa-ef7c-4436-bff5-3dac0bb5f325>
2013-05-18T17:36:53Z
CC-MAIN-2013-20
[ [ -0.011667754501104355, 0.008689621463418007, 0.0050995429046452045, 0.01827676221728325, 0.08681461960077286, -0.03312663361430168, -0.00620104419067502, 0.09725848585367203, -0.003630874678492546, -0.020724542438983917, 0.08061357587575912, 0.03280026093125343, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985833
319
http://www.huffingtonpost.com/2011/12/22/newt-gingrich-ron-paul-drugs_n_1165250.html
0.478543
At the IAEA's initiative, a Chernobyl Forum has been launched, with the participation of international organizations from within the UN family and representatives of the three countries primarily affected by the 1986 Chernobyl accident. The Forum was established with a view to contributing to the implementation of the new United Nations strategy launched in 2002 on the Human Consequences of the Chernobyl Nuclear Accident - A Strategy for Recovery. At the first organizational meeting, held from 3 to 5 February 2003 in Vienna, representatives of the participating UN organizations and countries discussed the following issues: Following detailed discussions at the meeting it was decided to establish the Chernobyl Forum as a series of managerial, expert and public meetings with the following main objectives: The first expert meeting of the Chernobyl Forum will be organized in June 2003. The prime expectation from the Chernobyl Forum is that it will be able to issue authoritative statements and recommendations that will contribute to overcoming the widespread disagreements over the long-term impact of the Chernobyl accident. Reports will be produced aimed at assisting the affected countries to optimize their activities related to remediation of land contaminated with long-lived radionuclides and to providing health care to people affected by the accident. The Forum will identify any further research that might be needed to clarify remaining disagreements related to the long-term impact. Members of the Forum are the relevant organizations from within the UN system -- including the IAEA, Food and Agriculture Organization (FAO), United Nations Environment Programme (UNDP), Office for the Coordination of Humanitarian Affairs (OCHA), the UN Development Programme (UNDP), the UN Scientific Committee on the Effects of Atomic Radiation (UNSCEAR), the World Health Organization (WHO), and the World Bank -- as well as representatives of the three States primarily affected by the Chernobyl accident, namely, Belarus, the Russian Federation and Ukraine. It is also envisaged that other relevant international and national organizations, together with individual experts, who have been instrumental in the assessment and remediation efforts following the Chernobyl accident, will take part in the Forum. An important task of the Chernobyl Forum will be to provide information to the public on the health and environmental effects of the Chernobyl accident. Public information specialists will be involved in the work of the Forum from the outset. An international conference, aimed at informing decision-makers, the general public and the media about the work, the findings and the recommendations of the Forum will be organized once the activities of the Forum are concluded.
<urn:uuid:800b460b-042a-45ac-a10a-2d1d8874df2b>
2013-05-18T17:57:29Z
CC-MAIN-2013-20
[ [ 0.0034027099609375, 0.00787353515625, -0.0096435546875, 0.0101318359375, 0.18359375, -0.0625, -0.020263671875, 0.10498046875, -0.0027923583984375, -0.08203125, 0.0498046875, -0.01422119140625, -0.05615234375, 0.033447265625, 0.034912109375, 0.0125122...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923495
506
http://www.iaea.org/newscenter/features/chernobyl-15/forum_launched.shtml
0.367649
Letter of April 9, 1932, from Feigin to Ordzhonikidze (a close friend of Stalin's), about conditions on the kolkhozes (collective farms), and Dr. Kiselev's memorandum of March 25, 1932, about those conditions. This 1932 letter documents in great detail the devastating effects of collectivization in the Novosibirsk area of Siberia. An accompanying physician's report describes the deleterious medical conditions the famine has produced. This document is among the first detailed descriptions of the collectivization and its results in Siberia. Letter page 1- facsimile Letter page 2- facsimile Letter - translation
<urn:uuid:b5ec8f67-232b-4da4-bc6c-bf24dfe5a502>
2013-05-18T18:06:12Z
CC-MAIN-2013-20
[ [ -0.00007829337118891999, 0.022198276594281197, -0.00162984908092767, 0.01136853452771902, 0.12758620083332062, -0.03771551698446274, -0.015948275104165077, 0.0961206927895546, -0.015409482643008232, -0.07672413438558578, 0.03125, 0.022413793951272964, 0.00223599...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.880327
140
http://www.ibiblio.org/pjones/russian/Collectivisation_and_Industrialization__Conditions_on_a_Collective_Farm.html
0.774039
Booking a Cyprus hotel is a great choice for a sunshine break, and one that also lets you discover rich cultural attractions. Head to Paphos and you'll find a wealth of archaeological treasures, as well as some fantastic annual festivals. Indeed, the city boasts a host of fun yearly events, which include everything from fine operas to celebrations of beautifully-crafted wines. To discover some of the best festivals to attend during Paphos trips, read our guide. Paphos Aphrodite Festival Typically taking place every September, the Paphos Aphrodite Festival is among the most famous and best-loved. Comprising performances of opera, the event is held outside the city's medieval castle in celebration of the goddess of love and beauty. A different opera is chosen each year, with 2012's performance scheduled to be Giuseppe Verdi's Otello, which, as you may have guessed, is based on Shakespeare's Othello. This performance has particular significance for Cyprus, as the action unfolds at its Castle of Famagusta. Produced by the Opera of the Slovak National Theatre, this show is set to meet the festival's usual high standards. If you're planning to attend during a family holiday, you should note that, while children are welcome, they must be at least seven years old to attend. What's more, tickets are available online and can be collected either at the venue on the day or posted to your home, so remember to plan in advance if you hope to go! This year's performances will take place on the 7th, 8th and 9th of September. If you consider yourself something of a wine buff, attending the Dionysia Festival is an absolute must. This three-day event dates back to the 1960s and is held in honour of Dionysus, the Greek god of wine. It will be no surprise, then, that the festivities are heavily focused on the region's fine wines - but these are not the only attraction. The event is enlivened by everything from traditional Cypriot dance to local arts and crafts, so you can expect to have a full, exciting and varied day out when you come here. This festival is situated a little outside of the city itself, in the village of Stroumbi. It is generally held towards the end of the summer and, if you attend on the last day, you should be able to see a dance contest, with the winners crowned Miss Grape and Star Dionysia. Paradise Jazz Festival Should music be your passion, make sure you head to the Paradise Jazz Festival. This year's event will take place in July and August, with final dates yet to be confirmed. Held at the city's Paradise Place, it's the ideal way to see live jazz and blues performed - and there is certainly an eclectic mix of shows to watch. While including plenty of traditional acts, the festival also gives a stage to musicians who have made their own instruments out of recycled materials - and who use them to perform tunes of their own composition. This is just a handful of the annual festivals that take place in Paphos. Among your other options are Koumandaria Festival - another event ideal for wine lovers - and the Anthestiria Flower Festival. Indeed, there are so many to choose from that it is well worth doing a little forward planning before booking your trip to make sure it coincides with any events that catch your eye.
<urn:uuid:cc75e0fd-15fc-4233-9b3c-8b1e4eb3fb2a>
2013-05-18T17:18:41Z
CC-MAIN-2013-20
[ [ 0.00677490234375, 0.0087890625, -0.00457763671875, 0.0078125, 0.11328125, -0.06689453125, -0.01220703125, 0.09326171875, -0.0478515625, -0.0517578125, 0.040771484375, 0.004974365234375, -0.0027313232421875, -0.026611328125, 0.0299072265625, -0.011047...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964451
714
http://www.idealshortbreaks.co.uk/culture/2012/03/19/when-to-visit-paphos-for-the-annual-events-and-festivals
0.225877
First-Hand:The Foundation of Digital Television: the origins of the 4:2:2 component digital standard Contributed by Stanley Baron, IEEE Life Fellow By the late 1970's, the application of digital technology in television production was widespread. A number of digital television products had become available for use in professional television production. These included graphics generators, recursive filters (noise reducers), time base correctors and synchronizers, standards converters, amongst others. However, each manufacturer had adopted a unique digital interface, and this meant that these digital devices when formed into a workable production system had to be interfaced at the analog level, thereby forfeiting many of the advantages of digital processing. Most broadcasters in Europe and Asia employed television systems based on 625/50 scanning (625 lines per picture, repeated 50 fields per second), with the PAL color encoding system used in much of Western Europe, Australia, and Asia, while France, the Soviet Union, Eastern Europe, and China used variations of the SECAM color encoding system. There were differences in luminance bandwidth: 5.0 MHz for B/G PAL, 5.5 MHz for PAL in the UK and nominally 6 MHz for SECAM. There were also legacy monochrome systems, such as 405/50 scanning in the UK and the 819/50 system in France. The color television system that was dominate in the Americas, Japan, and South Korea was based on 525/60 scanning, 4.2 MHz luminance bandwidth, and the NTSC color standard. NTSC and PAL color coding are both linear processes. Therefore, analog signals in the NSTC format could be mixed and edited during studio processing, provided that color sub carrier phase relationships were maintained. The same was true for production facilities based on the PAL system. In analog NTSC and PAL studios it was normal to code video to composite form as early as possible in the signal chain so that each signal required only one wire for distribution rather than the three needed for RGB or YUV component signals. The poor stability of analog circuitry meant that matching separate channel RGB or YUV component signals was impractical except in very limited areas. SECAM employed frequency modulated coding of the color information, which did not allow any processing of composite signals, so the very robust SECAM composite signal was used only on videotape recorders and point to point links, with decoding to component signals for mixing and editing. Some SECAM broadcasters avoided the problem by operating their studios in PAL and recoding to SECAM for transmission. The international community recognized that the world community would be best served if there could be an agreement on a single production or studio digital interface standard regardless of which color standard (525 line NTSC, 625 line PAL, or 625 line SECAM) was employed for transmission. The cost of implementation of digital technology was seen as directly connected to the production volume; the higher the volume, the lower the cost to the end user, in this case, the broadcasting community. Work on determining a suitable standard was organized by the Society of Motion Picture Engineers (SMPTE) on behalf of the 525/60 broadcasting community and the European Broadcasting Union (EBU) on behalf of the 625/50 broadcasting community. In 1982, the international community reached agreement on a common 4:2:2 Component Digital Television Standard. This standard as documented in SMPTE 125, several EBU Recommendations, and ITU-R Recommendation 601 was the first international standard adopted for interfacing equipment directly in the digital domain avoiding the need to first restore the signal to an analog format. The interface standard was designed so that the basic parameter values provided would work equally well in both 525 line/60 Hz and 625 line/50 Hz television production environments. The standard was developed in a remarkably short time, considering its pioneering scope, as the world wide television community recognized the urgent need for a solid basis for the development of an all digital television production system. A component-based (Y, R-Y, B-Y) system based on a luminance (Y) sampling frequency of 13.5 MHz was first proposed in February 1980; the world television community essentially agreed to proceed on a component based system in September 1980 at the IBC; a group of manufacturers supplied devices incorporating the proposed interface at a SMPTE sponsored test demonstration in San Francisco in February 1981; most parameter values were essentially agreed to by March 1981; and the ITU-R (then CCIR) Plenary Assembly adopted the standard in February 1982. What follows is an overview of this historic achievement, providing a history of the standard's origins, explaining how the standard came into being, why various parameter values were chosen, the process that led the world community to an agreement, and how the 4:2:2 standard led to today's digital high definition production standards and digital broadcasting standards. It is understood that digital processing of any signal requires that the sample locations be clearly defined in time and space and, for television, processing is simplified if the samples are aligned so that they are line, field, and frame position repetitive yielding an orthogonal (rectangular grid) sampling pattern. While the NTSC system color sub carrier frequency (fsc) was an integer sub multiple of the horizontal line frequency (fH) [fsc = (m/n) x fH] lending itself to orthogonal sampling, the PAL system color sub carrier employed a field frequency off set and the SECAM color system employed frequency modulation of the color subcarrier, which made sampling the color information, contained within those systems a more difficult challenge. Further, since some European nations had adopted various forms of the PAL 625 line/50Hz composite color television standard as their broadcast standard and other European nations had adopted various forms of the SECAM 625 line/50Hz composite color television standard, the European community's search for a common digital interface standard implied that a system that was independent of the color coding technique used for transmission would be required. Developments within the European community In September 1972, the European Broadcasting Union (EBU) formed Working Party C, chaired by Peter Rainger to investigate the subject of coding television systems. In 1977, based on the work of Working Party C, the EBU issued a document recommending that the European community consider a component television production standard, since a component signal could be encoded as either a PAL or SECAM composite signal just prior to transmission. At a meeting in Montreux, Switzerland in the spring of 1979, the EBU reached agreement with production equipment manufacturers that the future of digital program production in Europe would be best served by component coding rather than composite coding, and the EBU established a research and development program among its members to determine appropriate parameter values. This launched an extensive program of work within the EBU on digital video coding for program production. The work was conducted within a handful of research laboratories across Europe and within a reorganized EBU committee structure including: Working Party V on New Systems and Services chaired by Peter Rainger; subgroup V1 chaired by Yves Guinet, which assumed the tasks originally assigned to Working Party C; and a specialist supporting committee V1 VID (Vision) chaired by Howard Jones. David Wood, representing the EBU Technical Center, served as the secretariat of all of the EBU committees concerned with digital video coding. In 1979, EBU VI VID proposed a single three channel (Y, R-Y, B-Y) component standard. The system stipulated a 12.0 MHz luminance (Y) channel sampling frequency and provided for each of the color difference signals (R-Y and B-Y) to be sampled at 4.0 MHz. The relationship between the luminance and color difference signals was noted sometimes as (12:4:4) and sometimes as (3:1:1). The proposal, based on the results of subjective quality evaluations, suggested these values were adequate to transparently deliver 625/50i picture quality. The EBU Technical Committee endorsed this conclusion at a meeting in April 1980, and instructed its technical groups: V, V1, and V1 VID to support this effort. SMPTE organized for the task at hand Three SMPTE committees were charged with addressing various aspects of world wide digital standards. The first group, organized in late 1974, was the Digital Study Group chaired by Charles Ginsburg. The Study Group was charged with investigating all issues concerning the application of digital technology to television. The second group was a Task Force on Component Digital Coding with Frank Davidoff as chairman. This Task Force, which began work in February 1980, was charged with developing a recommendation for a single worldwide digital interface standard. While membership in SMPTE committees is generally open to any interested and affected party, the membership of the Task Force had been limited to recognized experts in the field. The third group was the Working Group on Digital Video Standards. This Working Group was charged with documenting recommendations developed by the Study Group or the Task Force and generating appropriate standards, recommended practices, and engineering guidelines. In March 1977, the Society of Motion Picture and Television Engineers (SMPTE) began development of a digital television interface standard. The work was assigned by SMPTE's Committee on New Technology chaired by Fred Remley to the Working Group on Digital Video Standards chaired by Dr. Robert Hopkins. By 1979, the Working Group on Digital Video Standards was completing development of a digital interface standard for NTSC television production. Given the state of the art at the time and the desire to develop a standard based on the most efficient mechanism, the Working Group created a standard that allowed the NTSC television video signal to be sampled as a single composite color television signal. It was agreed after a long debate on the merits of three times sub carrier (3fsc) versus four times sub carrier (4fsc) sampling that the Composite Digital Television Standard would require the composite television signal with its luminance channel and color sub carrier to be sampled at four times the color sub carrier frequency (4fsc) or 14.31818... MHz. During the last quarter of 1979, agreement was reached on a set of parameter values, and the drafting of the Composite Digital Television Standard was considered completed. It defined a signal sampled at 4fsc with 8 bit samples. This standard seemed to resolve the problem of providing a direct digital interface for production facilities utilizing the NTSC standard. By 1980, the Committee on New Technology was being chaired by Hopkins and the Working Group on Digital Video Standards was being chaired by Ken Davies. Responding to communications with the EBU and so as not to prejudice the efforts being made to reach agreement on a world wide component standard, in January 1980, Hopkins put the finished work on the NTSC Composite Digital Television Standard temporarily aside so that any minor modifications to the document that would serve to meet possible world wide applications could be incorporated before final approval. Since copies of the document were bound in red binders, the standard was referred to as the "Red Book". Seeking a Common Reference The agenda of the January 1980 meeting of SMPTE's Digital Study Group included a discussion on a world wide digital television interface standard. At that meeting, the Study Group considered the report of the European community, and members of the EBU working parties had been invited to attend. Although I was not a member of the Study Group, I was also invited to attend the meeting. It was recognized that while a three color representation of the television signal using Red, Blue, and Green (R, G, B) was the simplest three component representation, a more efficient component representation, but one that is more complex, is to provide a luminance or gray scale channel (Y) and two color difference signals (R-Y and B-Y). The R-Y and B-Y components take advantage of the characteristics of the human visual system which is less sensitive to high resolution information for color than for luminance. This allows for the use of a lower number of samples to represent the color difference signals without observable losses in the restored images. Color difference components (noted as I, Q or U, V or Dr, Db) were already in use in the NTSC, PAL, and SECAM systems to reduce the bandwidth required to support color information. Members of the NTSC community present at the January 1980 Study Group meeting believed that the EBU V1 VID proposed 12.0 MHz, (3:1:1) set of parameters would not meet the needs for NTSC television post production particularly with respect to chroma keying, then becoming an important tool. In addition, it was argued that: (1) the sampling frequency was too low (too close to the Nyquist point) for use in a production environment where multiple generations of edits were required to accommodate special effects, chroma keying, etc., and (2) a 12.0 MHz sampling system would not produce an orthogonal array of samples in NTSC (at 12.0 MHz, there would be 762.666... pixels per line). The NTSC community offered for consideration a single three channel component standard based on (Y, R-Y, B-Y). This system stipulated a 4fsc (14.318 MHz) luminance sampling frequency equal to 910 x fH525, where fH525 is the NTSC horizontal line frequency. The proposal further provided for each of the color difference components to be sampled at 2fsc or 7.159 MHz. This relationship between the luminance and color difference signals was noted as (4:2:2). Adopting 4fsc as the luminance sampling frequency would facilitate trans coding of video recorded using the “single wire” NTSC composite standard with studio mixers and editing equipment based on a component video standard. Representatives of the European television community present at the January 1980 Study Group meeting pointed to some potential difficulties with this proposal. The objections included: (1) that the sampling frequency was too high for use in practical digital recording at the time, and (2) a 14.318 MHz sampling system would not produce an orthogonal array of samples in a 625 line system (at 14.318 MHz, there would be 916.36... pixels per line). During the January 1980 Study Group meeting discussion, I asked why the parties involved had not considered a sampling frequency that was a multiple of the 4.5 MHz sound carrier, since the horizontal line frequencies of both the 525 line and 625 line systems had an integer relationship to 4.5 MHz. The original definition of the NTSC color system established a relationship between the sound carrier frequency (fs) and the horizontal line frequency (fH525) as fH525 = fs/286 = 15734.265... Hz, had further defined the vertical field rate fV525 = (fH525 x 2)/525 = 59.94006 Hz, and defined the color sub carrier (fsc) = (fH525 x 455)/2 = 3.579545.... MHz. Therefore, all the frequency components of the NTSC system could be derived as integer sub multiples of the sound carrier. The 625 line system defined the horizontal line frequency (fH625) = 15625 Hz and the vertical field rate fV625 = (fH625 x 2)/625 = 50 Hz. It was noted from the beginning that the relationship between fs and the horizontal line frequency (fH625) could be expressed as fH625 = fs/288. Therefore, any sampling frequency that was an integer multiple of 4.5 MHz (fs) would produce samples in either the 525 line or 625 line systems that were orthogonal. I was asked to submit a paper to the Study Group and the Task Force describing the relationship. The assignment was to cover two topics. The first topic was how the 625 line/50Hz community might arrive at a sampling frequency close to 14.318 MHz. The second topic was to explain the relationship between the horizontal frequencies of the 525 line and 625 line systems and 4.5 MHz. This resulted in my authoring a series of papers written between February and April 1980 addressed to the SMPTE Task Force explaining why 13.5 MHz should be considered the choice for a common luminance sampling frequency. The series of papers was intended to serve as a tutorial with each of the papers expanding on the points previously raised. A few weeks after I submitted the first paper, I was invited to be a member of the SMPTE Task Force. During the next few months, I responded to questions about the proposal, and I was asked to draft a standards document. Crunching the numbers The first paper I addressed to the Task Force was dated 11 February 1980. This paper pointed to the fact that since the horizontal line frequency of the 525 line system (fH525 had been defined as 4.5 MHz/286 (or 2.25 MHz/143), and the horizontal line frequency of the 625 line system (fH625) was equal to 4.5 MHz/288 (or 2.25 MHz/144), any sampling frequency that was a multiple of 4.5 MHz/2 could be synchronized to both systems. Since it would be desirable to sample color difference signals at less than the sampling rate of the luminance signal, then a sampling frequency that was a multiple of 2.25 MHz would be appropriate for use with the color difference components (R-Y, B-Y) while a sampling frequency that was a multiple of 4.5 MHz would be appropriate for use with the luminance component (Y). Since the European community had argued that the (Y) sampling frequency must be lower than 14.318 MHz and the NTSC countries had argued that the (Y) sampling frequency must be higher than 12.00 MHz, my paper and cover letter dated 11 February 1980 suggested consideration of 3 x 4.5 MHz or 13.5 MHz as the common luminance (Y) channel sampling frequency (858 times the 525 line horizontal line frequency rate and 864 times the 625 line rate both equal 13.5 MHz). My series of papers suggested adoption of a component color system based on (Y, R-Y, B-Y) and a luminance/color sampling relationship of (4:2:2), with the color signals sampled at 6.75 MHz. In order for the system to facilitate standards conversion and picture manipulation (such as that used in electronic special effects and graphics generators), both the luminance and color difference samples should be orthogonal. The desire to be able to trans code between component and composite digital systems implied a number of samples per active line that was divisible by four. The February 1980 note further suggested that the number of samples per active line period should be greater than 715.5 to accommodate all of the world wide community standards active line periods. While the number of pixels per active line equal to 720 samples per line was not suggested until my next note, (720 is the number found in Rec. 601 and SMPTE 125), 720 is the first value that “works.” 716 is the first number greater than 715.5 that is divisible by 4 (716 = 4 x 179), but does not lend itself to standards conversion between 525 line component and composite color systems or provide sufficiently small pixel groupings to facilitate special effects or data compression algorithms. </p> Additional arguments in support of 720 were provided in notes I generated prior to IBC'80 in September. Note that 720 equals 6! [6! (6 factorial) = 6x5x4x3x2x1] = 24 x 32 x 5. This allows for many small factors, important for finding an economical solution to conversion between the 525 line component and composite color standards and for image manipulation in special effects and analysis of blocks of pixels for data compression. The composite 525 line digital standard had provided for 768 samples per active line. 768 = 28 x 3. The relationship between 768 and 720 can be described as 768/720 = (28 x 3)/(24 x 32 x 5) = (24)/(3 x 5) = 16/15. A set of 16 samples in the NTSC composite standard could be used to calculate a set of 15 samples in the NTSC component standard. Proof of Performance At the September 1980 IBC conference, international consensus became focused on the 13.5 MHz, (4:2:2) system. However, both the 12.0 MHz and 14.318 MHz systems retained some support for a variety of practical considerations. Discussions within the Working Group on Digital Video Standards indicated that consensus could not be achieved without the introduction of convincing evidence. SMPTE proposed to hold a “Component Coded Digital Video Demonstration” in San Francisco in February 1981 organized by and under the direction of the Working Group on Digital Video Standards to evaluate component coded systems. A series of practical tests/demonstrations were organized to examine the merits of various proposals with respect to picture quality, production effects, recording capability and practical interfacing, and to establish an informed basis for decision making. The EBU had scheduled a series of demonstrations in January 1981 for the same purpose. SMPTE invited the EBU to hold its February meeting of the Bureau of the EBU Technical Committee in San Francisco to be followed by a joint meeting to discuss the results of the tests. It was agreed that demonstrations would be conducted at three different sampling frequencies (near 12.0 MHz, 13.5 MHz, and 14.318 MHz) and at various levels of performance. From 2nd through the 6th of February 1981 (approximately, one year from the date of the original 13.5 MHz proposal), SMPTE conducted demonstrations at KPIX Television, Studio N facilities in San Francisco in which a number of companies participated. Each participating sponsor developed equipment with the digital interface built to the specifications provided. The demonstration was intended to provide proof of performance and to allow the international community to come to an agreement. 'The demonstration organizing committee had to improvise many special interfaces and interconnections, as well as create a range of test objects, test signals, critical observation criteria, and a scoring and analysis system and methodology. The demonstrations were supported with equipment and personnel by many of the companies that were pioneers in the development of digital television and included: ABC Television, Ampex Corporation, Barco, Canadian Broadcasting Corporation, CBS Technology Center, Digital Video Systems, Dynair, Inc., KPIX Westinghouse Broadcasting, Leitch Video Ltd., Marconi Electronics, RCA Corporation and RCA Laboratories, Sony Corporation, Tektronix Inc., Thomson CSF, VG Electronics Ltd., and VGR Corporation. I participated in the demonstrations as a member of SMPTE's Working Group on Digital Video Standards, providing a Vidifont electronic graphics generator whose interface conformed to the new standard. Developing an agreement The San Francisco demonstrations proved the viability of the 13.5 MHz, (4:2:2) proposal. At a meeting in January 1981, the EBU had considered a set of parameters based on a 13.0 MHz (4:2:2) system. Additional research conducted by EBU members had shown that a (4:2:2) arrangement was needed in order to cope with picture processing requirements, such as chroma key, and the EBU members believed a 13.0 MHz system appeared to be the most economic system that provided adequate picture processing. Members of the EBU and SMPTE committees met at a joint meeting chaired by Peter Rainger in March 1981 and agreed to propose the 13.5 MHz, (4:2:2) standard as the world wide standard. By autumn 1981, NHK in Japan led by Mr. Tadokoro, had performed its own independent evaluations and concurred that the 13.5 MHz, (4:2:2) standard offered the optimum solution. A number of points were generally agreed upon and formed the basis of a new world wide standard. They included: - The existing colorimetry of EBU (for PAL and SECAM) and of NTSC would be retained for 625 line and 525 line signals respectively, as matrixing to a common colorimetry was considered overly burdensome; - An 8 bit per sample representation would be defined initially, being within the state of the art, but a 10 bit per sample representation would also be specified since it was required for many production applications; - The range of the signal to be included should include head room (above white level) and foot room (below black level) to allow for production overshoots; - The line length to be sampled should be somewhat wider than those of the analog systems (NTSC, PAL, and SECAM) under consideration to faithfully preserve picture edges and to avoid picture cropping; - A bit parallel, sample multiplexed interface (e.g. transmitting R-Y, Y, B-Y, Y, R-Y, ...) was practical, but in the long term, a fully bit and word serial system would be desirable; - The gross data rate should be recordable within the capacity of digital tape recorders then in the development stages by Ampex, Bosch, RCA, and Sony. The standard, as documented, provided for each digital sample to consist of at least 8 bits, with 10 allowed. The values for the black and white levels were defined, as was the range of the color signal. (R-Y) and (B-Y) became CR [=0.713 (R-Y)] and CB [=0.564 (B-Y)]. While the original note dated February 1980 addressed to the Task Force proposed a code of 252(base10) =(1111 1100) for ‘white’ at 100 IRE and a code of 72 (base10) =(0100 1000) for ‘black’ at 0 IRE to allow capture of the sync levels, agreement was reached to better utilize the range of codes to capture the grey scale values with more precision and provide more overhead. ‘White’ was to be represented by an eight bit code of 240(base10) =(1111 0000) and ‘black’ was to be represented by an eight bit code 16 (base10) =(0001 0000). The original codes for defining the beginning and the end of picture lines and picture area were discussed, modified, and agreed upon, as well as synchronizing coding for line, field, and frame, each coding sequence being unique and not occurring in the video signal.SMPTE and EBU organized an effort over the next few months to familiarize the remainder of the world wide television community with the advantages offered by the 13.5 MHz, (4:2:2) system and the reasoning behind its set of parameters. Members of the SMPTE Task Force traveled to Europe and to the Far East. Members of the EBU committees traveled to the, then, Eastern European block nations and to the members of the OTI, the organization of the South American broadcasters. The objective of these tours was to build a consensus prior to the upcoming discussion at the ITU in the autumn of 1981. The success of this effort could serve as a model to be followed in developing future agreements. I was asked to draft a SMPTE standard document that listed the parameter values for a 13.5 MHz system for consideration by the SMPTE Working Group. Since copies of the document were bound in a green binder prior to final acceptance by SMPTE, the standard was referred to as the “Green Book”. In April 1981, the draft of the standard titled “Coding Parameters for a Digital Video Interface between Studio Equipment for 525 line, 60 field Operation” was distributed to a wider audience for comment. This updated draft reflected the status of the standard after the tests in San Francisco and agreements reached at the joint EBU/SMPTE meeting in March 1981. The EBU community later requested a subtle change to the value of ‘white’ in the luminance channel, and it assumed the value of 235(base10). This change was approved in August 1981. After review and some modification as noted above to accommodate European concerns, the “Green Book” was adopted as SMPTE Standard 125. ITU/R Recommendation 601 The European Broadcasting Union (EBU) generated an EBU Standard containing a companion set of parameter values. The SMPTE 125 and EBU documents were then submitted to the International Telecommunications Union (ITU). The ITU, a treaty organization within the United Nations, is responsible for international agreements on communications. The ITU Radio Communications Bureau (ITU-R/CCIR) is concerned with wireless communications, including allocation and use of the radio frequency spectrum. The ITU also provides technical standards, which are called “Recommendations.” Within the ITU, the development of the Recommendation defining the parameter values of the 13.5 MHz (4:2:2) system fell under the responsibility of ITU-R Study Group 11 on Television. The chair of Study Group 11, Prof. Mark I. Krivocheev, assigned the drafting of the document to a special committee established for that purpose and chaired by David Wood of the EBU. The document describing the digital parameters contained in the 13.5 MHz, (4:2:2) system was approved for adoption as document 11/1027 at ITU-R/CCIR meetings in Geneva in September and October 1981. A revised version, document 11/1027 Rev.1, dated 17 February 1982, and titled “Draft Rec. AA/11 (Mod F): Encoding parameters of digital television for studios” was adopted by the ITU-R/CCIR Plenary Assembly in February 1982. It described the digital interface standard for transfer of video information between equipment designed for use in either 525 line or 625 line conventional color television facilities. Upon approval by the Plenary Assembly, document 11/1027 Rev.1 became CCIR Recommendation 601. The Foundation for HDTV and Digital Television Broadcasting Services The 4:2:2 Component Digital Television Standard allowed for a scale of economy and reliability that was unprecedented by providing a standard that enabled the design and manufacture of equipment that could operate in both 525 line/60Hz and 625 line/50Hz production environments. The 4:2:2 Component Digital Television Standard permitted equipment supplied by different manufacturers to exchange video and embedded audio and data streams and/or to record and playback those streams directly in the digital domain without having to be restored to an analog signal. This meant that the number of different processes and/or generations of recordings could be increased without the noticeable degradation of the information experienced with equipment based on analog technology. A few years after the adoption of the 4:2:2 Component Digital Television Standard, all digital production facilities were shown to be practical. A few years later when the ITU defined “HDTV,” the Recommendation stipulated: “the horizontal resolution for HDTV as being twice that of conventional television systems” described in Rec. 601and a picture aspect ratio of 16:9. A 16:9 aspect ratio picture requires one-third more pixels per active line than a 4:3 aspect ratio picture. Rec. 601 provided 720 samples per active line for the luminance channel and 360 samples for each of the color difference signals. Starting with 720, doubling the resolution to 1440, and adjusting the count for a 16:9 aspect ratio leads to the 1920 samples per active line defined as the basis for HDTV. Accommodating the Hollywood and computer communities' request for “square pixels” meant that the number of lines should be 1920 x (9/16) = 1080. Progressive scan systems at 1280 pixels per line and 720 lines per frame are also a member of the “720 pixel” family. 720 pixels x 4/3 (resolution improvement) x 4/3 (16:9 aspect ratio adjustment) = 1280. Accommodating the Hollywood and computer communities' request for square pixels meant that the number of lines should be 1280 x (9/16) = 720. The original 720 pixel per active line structure became the basis of a family of structures (the 720 pixel family) that was adopted for MPEG based systems including both conventional television and HDTV systems. Therefore, most digital television systems, including digital video tape systems and DVD recordings are derived from the format described in the original 4:2:2 standard. The existence of a common digital component standard for both 50 Hz and 60 Hz environments as documented in SMPTE 125 and ITU Recommendation 601 provided a path for television production facilities to migrate to the digital domain. The appearance of high quality, fully digital production facilities providing digital video, audio, and metadata streams and the successful development of digital compression and modulation schemes allowed for the introduction of digital television broadcast services. In its 1982-1983 award cycle, the National Academy of Television Arts and Sciences recognized the 4:2:2 Component Digital Standard based on 13.5 MHz (Y) sampling with 720 samples per line with three EMMY awards: The European Broadcasting Union (EBU) was recognized: “For achieving a European agreement on a component digital video studio specification based on demonstrated quality studies and their willingness to subsequently compromise on a world wide standard.” The International Telecommunications Union (ITU) was recognized: “For providing the international forum to achieve a compromise of national committee positions on a digital video standard and to achieve agreement within the 1978-1982 period.” The Society of Motion Picture and Television Engineers (SMPTE) was recognized: “For their early recognition of the need for a digital video standard, their acceptance of the EBU proposed component requirement, and for the development of the hierarchy and line lock 13.5 MHz demonstrated specification, which provided the basis for a world standard.” This narrative is intended to acknowledge the early work on digital component coded television carried out over several years by hundreds of individuals, organizations, and administrations throughout the world. It is not possible in a limited space to list all of the individuals or organizations involved, but by casting a spotlight on the results of their work since the 1960's and its significance, the intent is to honor them - all. Individuals interested in the specific details of digital television standards and picture formats (i.e. 1080p, 720p, etc.) should inquire at www.smpte.org. SMPTE is the technical standards development organization (SDO) for motion picture film and television production. - ↑ This article builds on a prior article by Stanley Baron and David Wood; simultaneously published in the SMPTE Motion Imaging Journal, September 2005, pp. 327 334 as “The Foundations of Digital Television: the origins of the 4:2:2 DTV standard" and in the EBU Technical Review, October 2005, as "Rec. 601 the origins of the 4:2:2 DTV standard.” - ↑ Guinet, Yves; “Evolution of the EBU's position in respect of the digital coding of television”, EBU Review Technical, June 1981, pp.111 117. - ↑ Davies, Kenneth; “SMPTE Demonstrations of Component Coded Digital Video, San Francisco, 1981”, SMPTE Journal, October 1981, pp.923 925. - ↑ Fink, Donald; “Television Engineering Handbook”, McGraw Hill [New York, 1957], p.7 4. - ↑ Baron, S.; “Sampling Frequency Compatibility”, SMPTE Digital Study Group, January 1980, revised and submitted to the SMPTE Task Force on Digital Video Standards, 11 February 1980. Later published in SMPTE Handbook, “4:2:2 Digital Video: Background and Implementation”, SMPTE, 1989, ISBN 0 940690 16, pp.20 23. - ↑ Weiss, Merrill &amp;amp;amp; Marconi, Ron; “Putting Together the SMPTE Demonstrations of Component Coded Digital Video, San Francisco, 1981”, SMPTE Journal, October 1981, pp.926 938. - ↑ Davidoff, Frank; “Digital Television Coding Standards”, IEE Proceedings, 129, Pt.A., No.7, September 1982, pp.403 412. - ↑ Nasse, D., Grimaldi, J.L., and Cayet, A; “An Experimental All Digital Television Center”, SMPTE Journal, January 1986, pp. 13 19. - ↑ ITU Report 801, “The Present State of High Definition Television”, Part 3, “General Considerations of HDTV Systems”, Section 4.3, “Horizontal Sampling”.
<urn:uuid:9a916a8d-2c90-4824-b961-0b5932af2602>
2013-05-18T17:39:21Z
CC-MAIN-2013-20
[ [ -0.031982421875, 0.02197265625, 0.0101318359375, -0.007720947265625, 0.057861328125, -0.076171875, 0.0069580078125, 0.107421875, -0.022705078125, -0.0030517578125, 0.068359375, 0.00567626953125, -0.0198974609375, 0.037841796875, 0.0306396484375, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944655
7,615
http://www.ieeeghn.org/wiki/index.php?title=First-Hand:The_Foundation_of_Digital_Television:_the_origins_of_the_4:2:2_component_digital_standard&redirect=no
0.528719
Frank B. Jewett Frank B. Jewett: Biography Born: 5 September 1879 Died: 18 November 1949 Frank B. Jewett was born on 5 September 1879 in Pasadena, CA, and graduated from the Throop Institute of Technology (later known as the California Institute of Technology) in 1898. He did graduate work at the University of Chicago, IL, where he received the doctoral degree in physics in 1902. He then accepted a teaching position at the Massachusetts Institute of Technology, Cambridge, where he remained until 1904, when he joined the Mechanical Department of the American Telephone and Telegraph Company (AT&T) in Boston, MA. Initially, he assisted George A. Campbell in research related to telephonic transmission. He then succeeded Campbell as director of the transmission research group in 1906. In 1907, the Mechanical Department merged with the Engineering Department of Western Electric, located in New York City, as part of a corporate reorganization. Jewett moved to New York, where he became a research manager under J. J. Carty, the chief engineer of AT&T. By 1912, AT&T was diversifying its research to include radio communication and electronic tubes. Jewett was among the AT&T engineers who witnessed a demonstration of the triode amplifier early in 1912, and he was instrumental in recruiting H. D. Arnold and others to develop the vacuum tube and its applications to telecommunications. Jewett led the engineering effort at AT&T that resulted in completion of the first transcontinental telephone line in time for the Panama-Pacific Exposition in San Francisco, CA, in 1915. That same year, AT&T engineers under Jewett demonstrated transatlantic radio telephony using a vacuum-tube transmitter. He was given a commission with the rank of major in the U.S. Army Signal Corps during World War I. In October 1917, Jewett presented a paper on the subject of industrial research at an AIEE meeting in Philadelphia, PA. He stated that the war already was "exerting an enormous, stimulating influence on the extension of industrial research." He discussed some differences and some connections between the research done in an industrial environment and the "pure science" research at universities. He observed that contemporary industrial researchers had progressed beyond "the era of the cut and try method." Jewett argued that industrial and academic research laboratories were "very closely associated and must grow together and with the same relative vigor if the best interests of civilization are to be served." He cautioned, however, that schools should not "attempt to enter too largely into the realm of industrial research" or they would run the risk of creating "an atmosphere highly prejudicial to the broad training of men or to pure scientific research." Conversely, he noted that "the industrial research organization is not equipped to undertake the general work of the university either in the training of men or the conduction of pure research, nor can it afford to do so." He concluded that industrial research was "destined to grow enormously, provided an adequate supply of capable and highly trained investigators can be secured." As part of an effort to make the industrial research environment more attractive to college-educated people he recruited, Jewett implemented a change in policy by encouraging his research staff to present and publish professional papers about their work. He assigned one individual to digest and report on the latest developments in science to the research engineers at Bell. As an example of the new policy, Jewett and a colleague, B. Gherardi, presented a joint paper on "telephone repeaters" at a joint meeting of the AIEE and the Institute of Radio Engineers in October 1919. In the paper, they reviewed the history of research and development on telephone amplifiers and asserted that "a complete solution of the problem was made possible only by the existence of a great unified engineering and research department, such as that maintained by the Bell System." They concluded that the successful application of the electron tube as a telephone repeater amounted to a "revolution in the entire scheme of telephone transmission." The Bell Telephone Laboratories were established in 1925 with a staff of approximately 3600 and with Jewett as president, a position he held until 1940. His style of research management has been characterized by historian G. Wise as "endothermic," in contrast to the "exothermic" management style of W. R. Whitney of the General Electric Research Laboratory. The exothermic manager was "like a chemical reaction that gives off energy to its surroundings," whereas the endothermic research managers "could draw energy from their institutional surroundings." As an endothermic prototype, Jewett seemed more comfortable in the committee room, on the telephone, or behind the desk than on the lecture platform or roaming the halls of the laboratory. Jewett was president of the AIEE from 1922 to 1923 and of the National Academy of Sciences from 1939 to 1947. He served on the National Defense Research Committee beginning in 1940 and conducted a survey of the capabilities of industrial research facilities throughout the country in preparation for the war effort. He also was chairman of the Board of Directors of Bell Laboratories from 1940 to 1944. In 1928 the AIEE awarded Jewett the Edison Medal "For his contributions to the art of electric communication." He died on 18 November 1949, in Summit, NJ, at age 70.
<urn:uuid:fff4a6e7-56b9-4c32-ae93-9633e37ee6ff>
2013-05-18T18:07:00Z
CC-MAIN-2013-20
[ [ -0.045654296875, 0.0380859375, -0.01177978515625, -0.022705078125, 0.09716796875, -0.0654296875, 0.0203857421875, 0.0927734375, -0.05224609375, -0.059814453125, 0.09716796875, 0.013916015625, -0.0150146484375, -0.0036163330078125, 0.0306396484375, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968071
1,076
http://www.ieeeghn.org/wiki6/index.php?title=Frank_B._Jewett&direction=prev&oldid=69362
0.840984
Overview: "Marc is a stand out guitar player, and I cite him as having amazing potential for the future" ~ Paul Turner, Jamiroquai ~ Marc Malone is an Anglo-Irish Alternative Rock Artist and Producer. The first of a kind, he possesses the zeal to bring genuine and inspiring music back into the mainstream. His first EP entitled Shades of Reality, released through Maloneproductions 2010, is available worldwide via all major online stores, including iTunes and Amazon. As well as being diverse in musical style, each song on this record is credible in relation to people’s lives. A regional tour in the West Midlands is currently taking place to promote the release of the EP. Shades of Reality features a different vocalist on each track, "It's like having a compilation album, but it's all original work by one Artist" says Malone. In its From: Birmingham, AL Format: Alternative, Rock Plays: 0 Plays Today: 0
<urn:uuid:54e9816a-dc76-4372-aada-32cfc5ec4143>
2013-05-18T17:28:10Z
CC-MAIN-2013-20
[ [ 0.010381355881690979, -0.004687500186264515, 0.0034427966456860304, 0.0034163135569542646, 0.017478814348578453, -0.01631355844438076, -0.013983051292598248, 0.07542373239994049, -0.016419490799307823, -0.05105932056903839, 0.08347457647323608, 0.027330508455634117,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921371
302
http://www.iheartradio.com/new2/artists/i/315784
0.162264
Nathalie is the name a Parisian prostitute assumes for a special mission or "private investigation." She is engaged in this unusual and secretive task by a professional, upper-middle-class ... See full summary » In 16th century Venice, when a merchant must default on a large loan from an abused Jewish moneylender for a friend with romantic ambitions, the bitterly vengeful creditor demands a gruesome payment instead. The daughter of a brilliant but mentally disturbed mathematician, recently deceased, tries to come to grips with her possible inheritance: his insanity. Complicating matters are one of her father's ex-students who wants to search through his papers and her estranged sister who shows up to help settle his affairs. This is 1977. Maria Callas; the most famous diva in the world, lives confined in her Paris apartment. Larry Kelly, a producer friend, offers her to sing Carmen in a televised concert. Unfortunately Maria's voice, tired and worn by years and strain, is not what it used to be. Larry knows the way around the problem : a technical stratagem will create the illusion. Maria, disregarding her friend Sarah's warning, agrees with the idea and the show is a tremendous success. With that in mind, Larry now considers a new version of "Tosca". But this time, Maria objects to the subterfuge. Her decision will mark the beginning of the end for the legendary singer... Written by This is a masterful film; I caught it at a gay film festival, but I don't understand why it hasn't been released. From the opening scenes with Jeremy Irons as an agent and a punk rock song playing in the background, you know you'in in the hands of a masterful storyteller. Zeffirelli structures the plot as the creation of a masterpiece that got away; a fictional film version of "Carmen." The conceit of the film is that Callas (late in her life) has been persuaded to make a film of Carmen (a role she had only recored but never sung). Since her voice is past its primew, she lip-syncs herself. This brilliant premise allows Fanny Ardant (who is simply brilliant as Callas) to lipsync to old Callas recordings. It also enables Zeffirelli to include several spectacular scenes from "Carmen" as part of the plot. I would rank this among the very best films about opera ever made. 11 of 18 people found this review helpful. Was this review helpful to you?
<urn:uuid:b3e32259-cf18-4c97-9d7a-d9f8daa98d64>
2013-05-18T17:28:51Z
CC-MAIN-2013-20
[ [ -0.0189208984375, 0.0115966796875, -0.0113525390625, 0.0218505859375, 0.06298828125, -0.0272216796875, 0.00921630859375, 0.1162109375, -0.03759765625, -0.044921875, 0.0179443359375, -0.009521484375, 0.00009298324584960938, 0.00193023681640625, 0.04028320...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952673
522
http://www.imdb.com/title/tt0274407/
0.236263
Avatar: The Last Airbender: Season 3, Episode 21 Sozin's Comet: Part 4 - Avatar Aang (19 Jul. 2008) Aang's moment of truth arrives. Can he defeat Ozai, the Phoenix King? Will he be forced to take a human life? All the characters face their greatest challenges. Director:Joaquim Dos Santos
<urn:uuid:40fa3a02-b9bb-4a71-b881-3292e5c2c535>
2013-05-18T18:06:19Z
CC-MAIN-2013-20
[ [ -0.0009147547534666955, 0.015031646005809307, 0.004623219836503267, 0.026700949296355247, 0.08188290894031525, 0.006576344836503267, -0.02887658216059208, 0.04766613990068436, 0.019976265728473663, -0.012954904697835445, -0.013943829573690891, 0.02393196150660515, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.780841
76
http://www.imdb.com/title/tt1204265/
0.158909
A group of up to 50 masked thugs attacked a bar packed with English football fans in Lyon on Wednesday night. Tottenham Hotspur supporters were in the Smoking Dog pub before their team's game in the French city. Witnesses said three Tottenham fans were taken to hospital, one with a head injury, and claimed the attack had an anti-Semitic motive. The Foreign and Commonwealth Office (FCO) said it was aware of reports of an attack and was offering assistance. Tottenham fans said the attackers, some making Nazi salutes, smashed doors and threw cast iron chairs, wooden objects, and a flare into the pub, where up to 150 supporters were drinking. They said the attack on the bar, which is popular among ex-pats, happened at 10.18pm. The thugs returned shortly afterwards to launch another assault on the pub, which was damaged extensively as a result. Landlord, Dave Eales from Retford, Nottinghamshire, said: "At 10.18 the pub was rammed with Tottenham fans watching the Champions League on the television. The front of the pub, which is made up of reinforced glass, was attacked by 20-25 people. They threw projectiles through the windows. There was a stand off. They didn't get into the bar. Then it calmed down. Then they came back a second time and it all started again. There were three injured Tottenham fans taken away by ambulance. One of them had a head injury. I'm not sure how bad it was." It is the second time that Tottenham fans have been targeted by an apparent anti-Semitic attack in the last three months. In November, fans of the club, which has a traditionally strong Jewish following, were ambushed inside a pub in Rome on the eve of their game against Lazio. Far-right thugs were blamed for that knife attack, and two witnesses claimed the assaults last night could have had an anti-Semitic motive. One, who did not want to be named, said: "There were 50 who attacked in the first wave and 25 in the second. It's a pretty scary thing when you're confronted by people doing Nazi salutes. A lit flare was thrown through the window as well as the heavy weight, the kind that's used on terraces to hold down umbrellas. It was terrifying. I've never seen anything like it. They threw iron stools through the windows as well." Tottenham fan James Taylor drove through the night from his home in Ilford, Essex, to attend the Europa League second round second leg clash. He had no doubt that this was not a random attack. "It was pre-meditated, pre-arranged. It was nothing to do with Spurs fans," he said. Tottenham Hotspur Football Club said they were aware of reports of the attack.
<urn:uuid:6d41f101-b05a-4a1d-bb32-83594d349f42>
2013-05-18T17:40:08Z
CC-MAIN-2013-20
[ [ 0.01336669921875, 0.0130615234375, -0.0142822265625, 0.015625, 0.1533203125, -0.05322265625, -0.0245361328125, 0.09619140625, 0.0113525390625, -0.07470703125, 0.09130859375, 0.0458984375, -0.0233154296875, -0.03564453125, 0.0286865234375, 0.014038085...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.990695
579
http://www.independent.ie/world-news/football-fans-attacked-in-france-29084915.html
0.258208
Now, as to this nonsense about secession, let me quote an impeccable authority: “As an American citizen, I take great pride in my country, her prosperity and her institutions, and would defend any state if her rights were invaded. But I can anticipate no greater calamity for the country than the dissolution of the Union. It would be an accumulation of all the evils we complain of, and I am willing to sacrifice everything but honor for its preservation. I hope, therefore, that all constitutional means will be exhausted before there is a resort to force. Secession is nothing but revolution.” The letter was written on Jan. 23, 1861, from an Army officer in Fort Mason, Texas, to his son. The recipient was Custis Lee. His father was Col. Robert E. Lee. Before the year had ended, Col. Lee became Gen. Robert E. Lee, commander of the redoubtable Army of Northern Virginia, which he led in an epic struggle aimed at dismembering the Union. Yet, he believed that secession was unconstitutional. “The framers of our Constitution never exhausted so much labor, wisdom and forbearance in its formation, and surrounded it with so many guards and securities, if it were intended to be broken by every member of the Confederacy at will,” he wrote to his son. “It is intended for perpetual union, so expressed in the preamble, and for the establishment of a government (not a compact) which can only be dissolved by revolution or by the consent of all the people in convention assembled.” Lee could conscientiously take up arms in behalf of secession only by appealing to the principles outlined in the Declaration of Independence, which appealed, not to statutory law but to “the laws of Nature and of Nature’s God.” It referred to “unalienable rights” under these higher laws, and declared that “... Whenever any form of government becomes destructive of these ends, it is the right of the people to alter or abolish it, and to institute new government.” The Declaration of Independence was written to justify secession from the British Empire. It was an extra-legal declaration, since the laws of the British Empire did not permit British colonies to leave the empire unilaterally. In declaring the right of secession under “the laws of Nature and of Nature’s God,” the authors of the Declaration issued a caveat: “Prudence, indeed, will dictate that governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed.” The South of Lee’s generation concluded that the cause of preserving its way of life, including the institution of slavery, was more than “light and transient,” and therefore justified the expenditure of 650,000 lives in a civil war. The trigger for that bloodbath was the election of Abraham Lincoln as 16th president of the United States. The re-election of Barack Obama in 2012 has apparently convinced a minority of those who voted against him that the cause of opposing him is worth plunging the nation into another secessionist crisis. Or maybe they’re just being frivolous. The White House issued an invitation to petition the administration for action on whatever issues they desired and promised to consider the proposals if enough signatures were acquired. Last time I checked, secessionist petitions were being circulated in 20 states. If you’re worried about the dissolution of the Union, let me provide a measure of comfort: Wofford stands a better chance of making it to the finals in college football’s Bowl Championship Series than those petitions have of delivering their respective states from the Union. The simple truth is that secession is beyond the gift of the Obama administration. The U.S. Constitution just does not allow for secession. I’ve heard all the arguments to the contrary, but they were all answered pretty conclusively at Appomattox Court House,on April 9, 1865. Modern-day secessionists claim that states have a right to secede under the 10th Amendment, which guarantees to states all rights not delegated to the federal government. But the 10th Amendment was adopted several years after the Constitution went into effect. That document prescribed a clear-cut procedure for admitting new states to enter the Union, but none for their withdrawal. The framers obviously decided against providing a way out of the Union. When New Yorkers, in their ratification convention, proposed a provision allowing for secession, Virginia’s James Madison — often called the Father of the Constitution — asserted that “the Constitution requires an adoption in toto, and for ever.” Did the 10th Amendment negate that statement? The Supreme Court, as recently as 1931, ruled that the amendment “added nothing to the (Constitution) as originally ratified.” But yes, there is a way for a state to secede. It could secede through a constitutional amendment that could either set up a procedure for secession, just as the original Constitution set up a procedure for entry. Or it could provide for the secession of an individual state. Such an amendment would require approval by a two-thirds majority of each house of Congress, then ratification by the legislatures of three-fourths of the states. If you like to bet long odds, put your money on Wofford to win the national college football championship.
<urn:uuid:ed9b53dc-0aad-40f4-a464-91381000141b>
2013-05-18T17:18:51Z
CC-MAIN-2013-20
[ [ -0.041748046875, 0.0184326171875, -0.002593994140625, 0.001678466796875, 0.08447265625, -0.05322265625, -0.0257568359375, 0.09619140625, -0.0213623046875, -0.0308837890625, 0.0625, 0.021484375, -0.0537109375, -0.008544921875, 0.031982421875, 0.040283...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971928
1,154
http://www.independentmail.com/news/2012/dec/09/guest-column-will-states-be-successful-secession-e/
0.320075
Al-Qaeda slams 'Hindu aggression' in Narendra Modi's Gujarat, calls for new 'jihad' - Trouble mounts for Sreesanth as Mumbai cops gather more evidence - SIT to seek Supreme Court guidance on Maya Kodnani death penalty issue - Tamil Nadu police bans Yasin Malik-linked pro-Eelam public meeting - Kings XI Punjab end IPL 2013 campaign with a win - Narendra Modi: India losing sheen as agricultural nation The latest issue of terror outfit al-Qaeda's online English magazine Inspire released last week talks about Hindu aggression in the state ruled by BJP's CM Narendra Modi and also in Kashmir. The 58-page latest issue, titled "We are all Usama", also talks about 'torching cars and causing road accidents as new means of jihad' and names writer Salman Rushdie as one of its targets for crimes against Islam. The magazine's contents reportedly have been used to motivate young men, part of several terror modules in the country, according to the interrogation reports of intelligence agencies. In September 2012, police in Karnataka, Andhra Pradesh and Maharashtra had arrested 18 terror suspects. Their interrogation reports said that they were radicalised through a combination of material on the Internet including the magazine. In an article titled "The Jihadi Experiences: The strategy of deterring with terrorism", Abu Mus'ab Al Suri, an al-Qaeda ideologue who was freed from Syria prison in December 2011, mentions Gujarat and Kashmir under the sub-section "why must these deterrence attacks be carried out?" Suri was arrested by the ISI and handed over to the CIA in 2011. The CIA hand him over to Syria and he was kept in jail for some time. Suri had also written a 1,600-page book "A Call to a Global Islamic Resistance" before he was apprehended in Pakistan. In an attempt to compare the situation in Palestine, Iraq, Afghanistan and Chechnya, Suri wrote in his article, "In Afghanistan, tens of thousands were killed in the December 2001 invasion by the Americans in blind rage, most were innocent civilians. All are being tortured and subjected to the most despicable crimes. The list goes on and on with Christian aggression in Indonesia, Phillippines and Africa, Buddhist aggression in Burma and Thailand, Hindu aggression in Gujarat and Kashmir. In every corner of the ummah (community) there is oppression." - Destitute, orphan students outclass rest in Andhra Class 10 exams - To re-energise ties, PM wants to visit US, waits for confirmation - NIA court says no terror link, frees 'Hizbul militant' Liyaqat on bail - CBI arrests its coal allotments investigator on bribery charge - ‘Cricketer-bookie Amit may have used Jiju to reach Sree’ - BCCI chief N Srinivasan says police must prove spot-fixing allegations
<urn:uuid:94dc90b3-6b14-4f1c-bdc3-93ad68a98569>
2013-05-18T17:58:47Z
CC-MAIN-2013-20
[ [ 0.0123291015625, 0.03466796875, -0.010986328125, 0.019287109375, 0.1435546875, -0.06640625, -0.033203125, 0.091796875, -0.00689697265625, -0.021240234375, 0.052978515625, 0.032470703125, -0.00799560546875, 0.0107421875, 0.021240234375, 0.009033203125...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953649
603
http://www.indianexpress.com/news/alqaeda-magazine-slams-hindu-aggression-in-narendra-modis-gujarat-calls-for-new-jihad/1082801/
0.196133
Cavendish, Henry, 1731–1810, English physicist and chemist, b. Nice. He was the son of Lord Charles Cavendish and grandson of the 2d duke of Devonshire. He was a recluse, and most of his writings were published posthumously. His great contributions to science resulted from his many accurate experiments in various fields. His conclusions were remarkably original. His chief researches were on heat, in which he determined the specific heats for a number of substances (although these heat constants were not recognized or so called until later); on the composition of air; on the nature and properties of a gas that he isolated and described as "inflammable air" and that Lavoisier later named hydrogen; and on the composition of water, which he demonstrated to consist of oxygen and his "inflammable air." In his Electrical Researches (1879) he anticipated some of the discoveries of Coulomb and Faraday. His experiments to determine the density of the earth led him to state it as 5.48 times that of water. His Scientific Papers were collected in two volumes ( Electrical Researches and Chemical and Dynamical ) in 1921. See biography by A. J. Berry (1960); J. G. Crowther, Scientists of the Industrial Revolution (1963). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. More on Henry Cavendish from Infoplease: See more Encyclopedia articles on: Physics: Biographies
<urn:uuid:5fc402be-5435-4539-b6e0-2d95022eded9>
2013-05-18T17:38:39Z
CC-MAIN-2013-20
[ [ -0.03430316224694252, 0.011763649061322212, -0.010281967930495739, -0.0210129301995039, 0.09482758492231369, -0.03466235473752022, 0.0016500538913533092, 0.08225574344396591, -0.024784483015537262, -0.0420258603990078, 0.06070402264595032, 0.006241020280867815, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97423
309
http://www.infoplease.com/encyclopedia/people/cavendish-henry.html
0.538911
Robert Maynard Hutchins Hutchins, Robert Maynard, 1899–1977, American educator, b. Brooklyn, N.Y., studied at Oberlin College, grad. Yale, 1921, taught in the Yale law school (1925–27), and served as dean (1927–29). He became president of the Univ. of Chicago in 1929 at the age of 30 and held that position until 1945; he served as chancellor there from 1945 until 1951. After 1943 he was chairman of the board of editors for the Encyclopaedia Britannica. An enthusiast for adult education, he received in 1946 a year's leave of absence to promote the "great books" program. He was associate director of the Ford Foundation from 1951 to 1954, when he became president of the Fund for the Republic, and later founder and president of the Center for the Study of Democratic Institutions in Santa Barbara, Calif. From 1969 to 1974 he was chairman of the board. His books include The Higher Learning in America (1936), Education for Freedom (1943), The Conflict in Education in a Democratic Society (1953), and The Learning Society (1968). See biography by H. S. Ashmore (1989). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
<urn:uuid:a4ddde4c-0136-4251-9484-fc78d9449b3a>
2013-05-18T17:18:25Z
CC-MAIN-2013-20
[ [ -0.030927835032343864, 0.02373281866312027, -0.01567869447171688, -0.01557130552828312, 0.0743127167224884, -0.03651202842593193, 0.012940292246639729, 0.05390893295407295, -0.03178694099187851, -0.05841924250125885, 0.0996563583612442, 0.03414948284626007, 0.05...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959056
269
http://www.infoplease.com/encyclopedia/people/hutchins-robert-maynard.html
0.376605
Mars has a striking red appearance, and in its most favorable position for viewing, when it is opposite the sun, it is twice as bright as Sirius, the brightest star. Mars has a diameter of 4,200 mi (6,800 km), just over half the diameter of the earth, and its mass is only 11% of the earth's mass. The planet has a very thin atmosphere consisting mainly of carbon dioxide (95%) with some nitrogen, argon, oxygen, and other gases. Mars has an extreme day-to-night temperature range, resulting from its thin atmosphere, from about 80°F (27°C) at noon to about - 100°F ( - 73°C) at midnight; however, the high daytime temperatures are confined to less than 3 ft (1 m) above the surface.Surface Features A network of linelike markings first studied in detail (1877) by G. V. Schiaparelli was referred to by him as canali, the Italian word meaning "channels" or "grooves." Percival Lowell, then a leading authority on Mars, created a long-lasting controversy by accepting these "canals" to be the work of intelligent beings. Under the best viewing conditions, however, these features are seen to be smaller, unconnected features. The greater part of the surface area of Mars appears to be a vast desert, dull red or orange in color. This color may be due to various oxides in the surface composition, particularly those of iron. About one fourth to one third of the surface is composed of darker areas whose nature is still uncertain. Shortly after its perihelion Mars has planetwide dust storms that can obscure all its surface details. Photographs sent back by the Mariner 4 space probe show the surface of Mars to be pitted with a number of large craters, much like the surface of Earth's moon. In 1971 the Mariner 9 space probe discovered a huge canyon, Valles Marineris. Completely dwarfing the Grand Canyon in Arizona, this canyon stretches for 2,500 mi (4,000 km) and at some places is 125 mi (200 km) across and 2 mi (3 km) deep. Mars also has numerous enormous volcanoes—including Olympus Mons (c.370 mi/600 km in diameter and 16 mi/26 km tall), the largest in the solar system—and lava plains. In 1976 the Viking spacecraft landed on Mars and studied sites at Chryse and Utopia. They recorded a desert environment with a reddish surface and a reddish atmosphere. Experiments analyzed soil samples for evidence of microorganisms or other forms of life; none was found, but a reinterpretation (2010) of the results in light of data collected later suggests that organic compounds may have been present. In 1997, Mars Pathfinder landed on Mars and sent a small rover, Sojourner, to take soil samples and pictures. Among the data returned were more than 16,000 images from the lander and 550 images from the rover, as well as more than 15 chemical analyses of rocks and extensive data on winds and other weather factors. Mars Global Surveyor, which also reached Mars in 1997 and remained operational until 2006, returned images produced by its systematic mapping of the surface. The European Space Agency's Mars Express space probe went into orbit around Mars in late 2003 and sent the Beagle 2 lander to the surface, but contact was not established with the lander. In addition to studying Mars itself, the orbiter has also studied Mars's moons. The American rovers Spirit and Opportunity landed successfully in early 2004 and have explored the Martian landscape ( Spirit's last transmission was in 2010). In 2008 NASA's Phoenix lander touched down in the planet's north polar region; it conducted studies for five months. Curiosity, another NASA rover, landed on Mars near its equator in 2012. Analysis of space probes' data indicates that Mars appears to lack active plate tectonics at present; there is no evidence of recent lateral motion of the surface. With no plate motion, hot spots under the crust stay in a fixed position relative to the surface; this, along with the lower surface gravity, may be the explanation for the giant volcanoes. However, there is no evidence of current volcanic activity. There is evidence of erosion caused by floods and small river systems as well as evidence of ancient lakebeds. The possible identification of rounded pebbles and cobbles on the ground, and sockets and pebbles in some rocks, suggests conglomerates that formed in running water during a warmer past some 2–4 billion years ago, when liquid water was stable and there was water on the surface, possibly even large lakes or oceans. Rovers have identified minerals believed to have formed in the presence of liquid water. There is also evidence of flooding that occurred less than several million years ago, most likely as the result of the release of water from aquifers deep underground or the melting of ice. However, other evidence suggests that the water would have been extremely salty and acidic. Data received beginning in 2002 from the Mars Odyssey space probe suggests that there is water in sand dunes found in the northern hemisphere, and the Mars Reconnaissance Orbiter, which went into orbit around the planet in 2006, collected radar data that indicates the presence of large subsurface ice deposits in the mid-northern latitudes of Mars. Most of the known water on Mars, however, lies in a frozen layer under the planet's large polar ice caps, which themselves consist of water ice and dry ice (frozen carbon dioxide); the lander Phoenix found and observed frozen water beneath the soil surface in the north polar region in 2008. Because the axis of rotation is tilted about 25° to the plane of revolution, Mars experiences seasons somewhat similar to those of the earth. One of the most apparent seasonal changes is the growing or shrinking of white areas near the poles known as polar caps. These polar caps, which are are composed of water ice and dry ice (frozen carbon dioxide). During the Martian summer the polar cap in that hemisphere shrinks and the dark regions grow darker; in winter the polar cap grows again and the dark regions become paler. The seasonal portion of the ice cap is dry ice. When the ice cap is seasonally warmed, geyserlike jets of carbon dioxide gas mixed with dust and sand erupt from the ice. Sections in this article: The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: Astronomy: General
<urn:uuid:0b209998-4433-4b7d-8629-dc91f68d4b69>
2013-05-18T17:20:33Z
CC-MAIN-2013-20
[ [ -0.025390625, -0.00390625, -0.0240478515625, 0.006927490234375, 0.043212890625, -0.08642578125, 0.0003490447998046875, 0.12890625, -0.00592041015625, -0.0303955078125, 0.078125, 0.015625, 0.032470703125, 0.06298828125, 0.015625, -0.0205078125, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955693
1,348
http://www.infoplease.com/encyclopedia/science/mars-astronomy-physical-characteristics.html
0.868901
Recreating the Wright Stuff A full-scale replica of the historic 1903 Wright Flyer was constructed and delivered to NASA's Ames Research Center at Moffett Field, Calif., for wind-tunnel testing during the spring of 1999. During the tests, engineers studied the biplane's stability, control, and handling at speeds up to 27 knots (30 mph) in the wind tunnel. The data obtained was used to build a second Wright Flyer, which was to be flown flown at Kitty Hawk, N.C., on Dec. 17, 2003, on the 100th anniversary of the first flight. Bad weather prevented pilot Kevin Kochersberger from completing the reenactment. Constructed by a team of volunteers from the Los Angeles section of the American Institute of Aeronautics and Astronautics (AIAA), using plans provided by the Smithsonian, the replica features a 40-foot, 4-inch wingspan reinforced with piano wire, cotton wing coverings, spruce propellers, and a double rudder. The second Flyer, with some modifications for safety, was built by the team of volunteers from the AIAA. Although others had created “flying machines” before them that could barely lift off the ground and were incapable of true flight, the Wright brothers painstakingly worked four years to construct the first power-driven, human-carrying craft that was heavier than air and capable of controlled, sustained flight. After many trials and setbacks, the former bicycle mechanics from Dayton, Ohio, flew into history in their double-winged craft on Dec. 17, 1903, with Orville at the controls and Wilbur running alongside him. The era of the air age began, and the world was never the same. Their invention would create a new industry and revolutionize transportation, commerce, and communication throughout the globe. In December 1998, President Clinton signed into law the Centennial of Flight Commemoration Act, which established a commission to coordinate the celebration in 2003 of the 100th anniversary of the Wright Brothers' first flight. Information Please® Database, © 2007 Pearson Education, Inc. All rights reserved. More on Recreating the Wright Stuff from Infoplease:
<urn:uuid:de645e5b-e0c6-425b-b5ca-7710660dd196>
2013-05-18T17:49:21Z
CC-MAIN-2013-20
[ [ -0.0416666679084301, 0.03106287494301796, -0.0012864895397797227, 0.002042789477854967, 0.062375251203775406, -0.06736526638269424, 0.004054391290992498, 0.10728543251752853, -0.041167665272951126, -0.03156187757849693, 0.08083832263946533, 0.049151696264743805, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960372
449
http://www.infoplease.com/ipa/A0778412.html
0.187401
WASHINGTON -- A congressional official says House Democratic Leader Nancy Pelosi has told her party caucus she will remain as minority leader in the new session of Congress. This official says the 72-year-old Pelosi made the decision to remain at the helm of the party's House leadership even though Democrats failed to win the necessary 25 additional seats to become the majority party again. An official close to Pelosi revealed her decision on condition of anonymity because she hadn't yet publicly announced it. Pelosi's quarter-century of service in Congress representing a San Francisco area district in the House includes becoming the first woman in history to serve as speaker. The tea party-fueled political wave of 2010 forced the gavel from her hand to Rep. John Boehner, an Ohio Republican.
<urn:uuid:67d75b4b-5163-48a7-87e0-39994c267514>
2013-05-18T17:48:55Z
CC-MAIN-2013-20
[ [ -0.025600282475352287, 0.06391242891550064, 0.004987641237676144, 0.02401129901409149, 0.02807203307747841, -0.014124293811619282, -0.000664834922645241, 0.0939265564084053, -0.04131355881690979, -0.05826271325349808, 0.019950564950704575, 0.01491878554224968, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97025
154
http://www.insidebayarea.com/breaking-news/ci_21740192/nation-world/ci_21993610/official-pelosi-remain-leader-house-democrats?source=inthenews
0.234971
SEOUL, South Korea - North Korea is warning that it is prepared to conduct a nuclear test and carry out more long-range rocket launches. In a statement carried today by state media, the National Defense Commission in Pyongyang threatened to wage a "full-fledged confrontation" against the U.S. for what it calls continued hostility. The declaration follows the U.N. Security Council's condemnation of North Korea on Tuesday and expanded sanctions against the regime for launching a rocket in December. North Korea said the launch was a peaceful satellite mission, but the U.S. and others say it was actually a test of long-range missile technology. North Korea's nuclear agitations follow a well-worn route. It starts with a long-range rocket launch. The United Nations punishes the act with sanctions. And Pyongyang responds by conducting a nuclear test. It happened in 2006, and again in 2009. With the U.N. leveling new sanctions, the world is about to find out whether North Korea's young new leader will detonate an atomic bomb.
<urn:uuid:a8af7059-541b-4829-8f5b-ca6b8876b94e>
2013-05-18T17:57:05Z
CC-MAIN-2013-20
[ [ -0.0396825410425663, 0.0404265858232975, -0.009610614739358425, 0.0553075410425663, 0.1001984104514122, -0.0798611119389534, -0.02504960261285305, 0.0627480149269104, -0.0481150783598423, -0.0456349216401577, 0.0550595223903656, 0.0184771828353405, -0.0434027761...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933148
217
http://www.insidebayarea.com/california/ci_22438075/untitled
0.773694
You must be registered to post a review. It's free, it's quick, it's simple. Register now or if you've already registered, Login. After you register an email will immediatly be sent to you. You must click on the link in the email to complete your registration.
<urn:uuid:60330a23-4563-41ca-8e42-da3301a060ba>
2013-05-18T17:56:29Z
CC-MAIN-2013-20
[ [ 0.0061800372786819935, 0.03544776141643524, 0.0251865666359663, 0.034981343895196915, 0.07789178937673569, -0.04757462814450264, -0.00903684739023447, -0.010319496504962444, -0.04547574743628502, -0.02845149300992489, 0.07835821062326431, 0.026119403541088104, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930842
61
http://www.insidecamps.com/review/review_form.php?item_id=1815
0.187438
The pain from kidney stones can be very severe. So it could easily cause you to feel hot, sweaty and flushed. But simply passing a kidney stone should not cause a fever. When someone is passing a stone or has a stone that is hung up along the urinary tract with a documented fever, my first concern is infection in the kidney (pyelonephritis). Urine that is either all or partly blocked from flowing freely from the kidney, through the ureter, into the bladder and out the urethra is more prone to bacterial infection. That infection is harder to clear because the normal flushing action is disrupted. Antibiotics alone may not be enough. A specialist (urologist) will evaluate the situation with a CT scan and/or a kidney ultrasound. Then he or she will decide if something must be done immediately to drain the infection. Here are potential options: - A tube is placed in the kidney to drain the infection. - The stone is removed by going in through the urethra, through the bladder, and into the ureter containing the stone. The stone is pulled out. This is performed in the operating room. - The stone could be broken into small pieces with shock waves (lithotripsy).
<urn:uuid:b897dfaf-a8fb-44f2-b4e1-0ca6d3e5f7b1>
2013-05-18T17:39:34Z
CC-MAIN-2013-20
[ [ -0.002151076914742589, 0.003985430579632521, -0.004961993079632521, 0.004434121772646904, 0.08868243545293808, -0.04054053872823715, -0.011296452954411507, 0.07136823982000351, -0.027871621772646904, -0.0810810774564743, 0.06461148709058762, 0.01551942527294159, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958284
261
http://www.intelihealth.com/IH/ihtIH/WSIH/23847/23938/1445062.html?b=
0.620397
When my husband read an early draft of this essay, he asked, "Why doesn't her partner have to support our daughter? After all, they agreed to raise children as Jews." What does it mean to raise a Jewish child?Go To Parenting June 27, 2006 When you first learn that your child is--or might be--marrying someone who's not Jewish, you may not feel like celebrating. This can be a difficult and stressful occasion instead of the joyous one you had hoped for. To help you, InterfaithFamily has compiled a series of tips from people whose own children have intermarried as well as outreach professionals and counselors. We'd like to thank the following contributors for many of these tips: S. Courtney Nathan, Ruth Nemzoff, Karen Kushner, Raquel Stabinski-Leib, Ed Olhava and Phoebe Lewitt, Marlene Beach, Phoebe F. Kerness, Paulette Mann, Jim Keen and Sam Osherson. This document is also available in easy-to-distribute PDF format. 1. When your child first tells you about her engagement, congratulate her and express your love for her. First impressions are very powerful, and if you react coldly to the news, your child may remember your response for a long time. 2. As soon as you have an opportunity, congratulate your child's partner and express your love for him. This can be a powerful way to welcome your child's partner into your family. 3. Treat your child as an adult. If he feels that you are speaking to him as one adult to another, and not as an anxious parent to a child, he'll be more receptive of your opinions. 4. Assume that your child has good judgment. If you think she is ignoring something, don't tell her. Ask her if she has thought of it. You won't always agree, but knowing that she and her partner are thinking things through will help. Don't lecture or be judgmental. 5. Accept your child's partner for who he is. Pushing people to be different creates resistance to change. People are much more likely to change when they feel respected and accepted. 6. Remember that it's not your fault. If your child chooses a partner of a different religion, it's not because you didn't give her a strong Jewish identity or because she's rejecting you. She's choosing a partner of a different religion because she fell in love with the partner, and the partner's religion--or your parenting--had very little to do with that decision. 7. Learn about your child's partner's religion and background. The more you know about where your child's partner came from, the better you will understand your child's and his partner's religious decisions. If you are knowledgeable about your child's partner's religion, it's more likely your child will listen to your perspective. Notice any and all similarities between their values and your Jewish values and discuss these similarities with your child's fiancé and her family. 8. Let your child know you want to be involved in her life. Ask what her plans are and ask to be included and informed. Be truthful about what you would like but understand that your wishes won't always be fulfilled. 9. Be honest about your feelings for Judaism and talk about them. Let your child and her partner hear how Judaism works in your life and why it has an important place for you. Before you discuss what Judaism means to you, it may be helpful to make a list of those Jewish practices and values which are meaningful to you. Once you clarify for yourself where your commitments to the Jewish religion and the Jewish people lie, you are better able to communicate with your children on this important and sensitive subject. Also be honest about your doubts and complaints about Judaism. 10. Invite your child and his partner to share in your holiday observances and celebrations, and to accompany you to temple when you go. Invite them to help you prepare for these occasions, thus providing an opportunity to teach about the holidays, their rituals and symbolic foods. You can be an ambassador to Judaism. 11. Celebrate your child and her partner's efforts to participate in Jewish rituals. Don't criticize them for not observing the way you do. 12. If possible, invite your child's partner's family for a small gathering just before or just after the wedding. Both are good opportunities to share your mutual joy over your children's wedding. 13. If your child is having an interfaith wedding ceremony, offer to help with one of the interfaith aspects, like helping them find someone who will create an interfaith ketubah. This gesture of acceptance can create a lot of good will. 14. Don't bring up grandchildren immediately. Your child has enough to worry about with planning a wedding, and this may add to the stress level or touch on a sore subject between you and him. However, if your child and his partner have started talking about children, it is OK to offer your input about how you would like them raised. Our children do want to please us, and gently explaining your wishes can affect your child's decisions.
<urn:uuid:447ee76b-1c60-4c98-87b7-812b4b3a0773>
2013-05-18T17:26:49Z
CC-MAIN-2013-20
[ [ -0.007415771484375, 0.0303955078125, 0.01904296875, -0.0107421875, 0.07861328125, -0.040771484375, 0.0164794921875, 0.1025390625, -0.0291748046875, -0.03466796875, 0.06005859375, 0.02685546875, -0.043701171875, -0.01226806640625, 0.043212890625, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966549
1,058
http://www.interfaithfamily.com/relationships/interdating/Tips_for_Parents_of_Children_Who_Are_Intermarrying.shtml
0.242265
1. Know your audience: Carefully consider the type of readers you’re targeting and/or trying to attract, and tailor your content to them. 2. Create a framework for future content needs: Map out potential blog ideas, stories, featured posts, etc. That way, you have something to work from each time content is needed. 3. Create a content schedule: If you find yourself not blogging enough, creating a schedule can be the perfect way to get focused and stay motivated. 4. Think Multimedia: Looks for ways to recycle the same content into different formats. 5. Always encourage reader feedback and welcome user-generated content as part of your publishing mix.
<urn:uuid:def9ff23-94f4-4be8-bcbd-3de22ea51181>
2013-05-18T18:05:39Z
CC-MAIN-2013-20
[ [ -0.011247783899307251, 0.025598404929041862, 0.02471187897026539, 0.010472074151039124, 0.06427305191755295, 0.030141843482851982, -0.007424645591527224, 0.08111701905727386, -0.019614361226558685, -0.04609929025173187, 0.05452127754688263, 0.028590425848960876, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.856214
141
http://www.internetmasterycenter.com/blog/2012/12/14/5-content-marketing-tips-to-publish-like-a-pro/
0.184767
Songs About Nuclear War from the Eighties, Songs Beginning with P During the eighties, the topic of nuclear war seemed to come up a lot. It was on the news frequently due to the arms build up under the Regean era. At one point I think there was enough fire power to destroy the world 100 times over (it's probably still something ridiculous like that though). With the end of the cold war all seemed fine, although recent events in India and Pakistan does help remind us that it could be triggered by almost any mad man who is This page currently edited by: Powerslave. Past editor: Speed Racer P.O.E. is from the Adam Ant Album Vive Le Rock. It was obviously inspired the the film Dr. Strangelove. One line goes like "Dang your ass Mr. Kruschev,don't go dropping on here." It also has line for line the speech Slim Pikins gave when he was about to drop the bomb. "Pa Pa Pa," by Los Prisioneros The most important Chilean band of the 1980s, Los Prisioneros, released 'Pa Pa Pa' on their 1987 album 'La Cultura De La Basura' (Trash Culture), and the song includes the following lyric: Me encantan las canciones de amor, y aquellas que piden un mundo mejor. Vivo con el miedo al dedo que alguna vez apretara el boton. A literal translation of which is: I adore songs about love, and those that ask for a better world. I live with the fear of the finger that one day will press the button. Yes, it's the dreaded Button again, and I'm sure the finger we're thinking of here is that of the late Ronald Reagan. Los Prisioneros are historically important as one of the principal manifestations of artistic defiance to Pinochet's military regime in Chile, but they are also the authors of some very fine pop songs, including 'Pa Pa Pa'. The odds are that you won't have heard of them if you are not from Latin America or Spain, but I'd strongly recommend getting hold of some of their music if you can. "Paranoid Chant," by Minutemen Song about how fear of World War III consumed kids in the 80s. "I try to talk to girls, but I keep thinking about World War III." A final page is written/ in the books of history/ as man unleashed his deadly bombs/ and sent troops overseas/ to fight a war that can't be won/ and kills the human race/ a show of greed and ignorance/ man's quest for dominance/ they say when a mistake is made/ a lesson has been learned/ but this time theres no second chance/ the hate engulfs the world/ a million lives are lost each day/ a city slowly burns/ a mother holds her dying child/ but no one is concerned. Party at ground zero A "B" movie starring you And the world will turn to flowing Pink vapor stew Johnny, go get your gun, for the commies are in our hemisphere today Ivan, go fly your MIG, for the Yankee imperialists have come to play Johnny goes to Sally's house to kiss her goodbye But Daddy says to spend the night They make love 'till the early morning light For tomorrow Johnny goes to fight Johnny, Ivan, Ian, everybody come along for our nations need new heroes Time to sing a new war song CHORUS Please do not fear 'cause Fishbone is here to say (say what?) Just have a good time the stop sign is far away The toilet has flushed and green lights are a ghost And drop drills will be extinct Speedracer cloud has come They know not what they've done Sin has just won The planet is a crumb CHORUS from their eponymous album of 1985 "Peace In Our Times (1984) ," by Elvis Costello and The Attractions "Meanwhile there's a light over the ocean "Burning brighter than the sun "And a man sits alone in a bar and says 'Oh God, "What have we done?' " (part of a nightmare description of life with "one spaceman in the White House") From the "Close To The Bone" album. Describes a post-war scenario. The war is one and everybody is supposed to celebrate. Yet, rather than celebrating and cheering, they are busy crying over the loss of their homes and their dear ones. "Poem For A Nuclear Romance," by Anne Clark Poem For A Nuclear Romance (2:47) Lyrics by Anne Clark Music by David Harrow What will it matter then When the sky's not blue but blazing red The fact that I simply love you When all our dreams lay deformed and dead We'll be two radioactive dancers Spinning in different directions And my love for you will be reduced to powder The screams will perform louder and louder Your marble flesh will soon be raw and burning And kissing will reduce my lips to a pulp Hideous creatures will return from the underground And the fact that I love you Will die You don't have to sleep to see mightmares Just hold me close Then closer still And you'll feel the probabilities Pulling us apart "Political Science," by Randy Newman No one likes us-I dont know why We may not be perfect, but heaven knows we try But all around, even our old friends put us down Lets drop the big one and see what happens We give them money-but are they grateful? No, theyre spiteful and theyre hateful They dont respect us-so lets surprise them Well drop the big one and pulverize them Asia's crowded, Europes too old Africa is far too hot And Canada's too cold South America stole our name Lets drop the big one There'll be no one left to blame us Well save Australia Don't wanna hurt no kangaroo We'll build an all American amusement park there They got surfin, too! Boom goes London and boom Paree More room for you and more room for me And every city the whole world round Will just be another American town Oh, how peaceful it will be Well set everybody free You'll wear a Japanese kimono And there'll be Italian shoes for me "Political Science," by Randy Newman lyrics like "let's drop the big one and see what happens" "President Reagan's Birthday Present," by The Jazz Butcher Red Russians shot my rocket down (x2) See, I was riding in my Jumbo I was sitting in the chair When a squadron full of Bolsheviks came flying through the air They were Communists and assholes, They were hicks and they were squares They were Communists in MiGs They got me then and there Red Russians shot my rocket down (x2) Bring it on down Rock it on down Oh, Rock and Roll - phew! It's a song about life. Yeh, it's a song about life. Yeh, real life Red Russians shot my rocket down (x2) So what are you gonna do? What are you gonna do about it? (repeat) What are you gonna do about this, President, Man? Happy Birthday, dear Mr. President! From the 1980 album 'A', titled after the British Govt's public information programme, the lyrics pretty much say it all..... They said protect and you'll survive --- (but our postman didn't call) 8lbs. of over-pressure wave seemed to glue him to the wall They said protect and you'll survive E.M.P. took out the radio --- (and our milk-man didn't call) Flash blinded by the pretty lights, didn't see his bottles fall or feel the warm black rain arrive Big friendly cloud builds in the West (and our dust-men haven't called) They left the dual carriageway at a hundred miles an hour --- a tail wind chasing them away And in deep shelters lurk below, sub-regional control who sympathise but cannot help to mend your body or your soul Self-appointed guadians of the race with egg upon their face When steady sirens sing all-clear they pop up, find nobody here And so I watch two new suns spin --- (our paper man doesn't call) Burnt shadow printed on the road --- now there's nothing there at all They said protect and you'll survive "Protect and Survive," by The Dubliners Well the government's made a document To help prevent embarrassment And in the event of an accident Catching us with our trousers down It's no use to you when you're dead Nor even when alive And the name of this peace of paper is Protect and survive So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive Well a nuclear strike can be recognised It would stand out in a crowd There's a flash, then a bang, then a blast of heat Then a bloody great mushroom cloud So if you happen to see one at the end of your street Would you please pick up the telephone And inform your local police So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive Put sticky tape on your windows Block your ears and close your eyes But it won't make a blind bit of difference You won't have to watch yourself fry If you find yourself in the target zone And you haven't got a shelter Take a spade into the garden And dig like merry hell, sir http://www.free-lyrics.org So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive They've got strategic ICBM's Both theatre and tactical With independently targeted Multiple reentry vehicle's Backfire bombers, Polaris sub's, cruise missiles And the boy's who hang around the Pentagon Can't wait to use these toys So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive When Armageddon gets underway And the rockets come pouring down All the bloody politicians who started it Will scuttle off underground And when they finally reemerge With no life to be found They can administrate the rubble And they can order each other a round So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive For they give us a four-minute warning When the rockets are on their way To give us time to panic and Christians time to pray So when you hear the siren's going Place your head between your thighs Whilst maintaining this posture You can make a final gesture And with a little muscular pressure You can kiss your arse goodbye So when the nuke's come raining down It's great to be alive, well World War Three can be such fun If you protect and survive Protect and survive Protect and survive Protect and... "Put Down your weapon, or we'll all be gone" (Diesel and Dust 1987) Do You Have a Nuclear War Song to Share? Please check out the Nuclear War Song submission page.
<urn:uuid:124c3ac9-c691-4a62-bb36-23ca85c2bf99>
2013-05-18T17:18:40Z
CC-MAIN-2013-20
[ [ -0.0216064453125, 0.00543212890625, -0.0106201171875, -0.001678466796875, 0.0751953125, -0.07763671875, 0.008056640625, 0.072265625, -0.035400390625, -0.041259765625, 0.037109375, 0.0308837890625, -0.0028839111328125, 0.00958251953125, 0.033447265625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934999
2,328
http://www.inthe80s.com/nuclearwar/p.shtml
0.200501
Half of young South Africans support the idea that labour laws are slowing job growth, a study released on Monday has found. This might reflect some frustration on the part of youth in terms of their job prospects, according to the TNS survey of 2000 adults between April 13 and 24. It found that only a minority of people felt that South Africa's labour laws were among the best in the world. Unemployed people were surprisingly positive about the labour laws, with 40 percent feeling they were among the best in the world. People living in Soweto and East London were most concerned about labour laws slowing job growth. People in Cape Town and East London felt least luckily that the country's labour laws were among the best in the world. The study also found that 89 percent of respondents felt jobs were difficult to find these days, and that 59 percent felt the situation would be worse in six months' time. The study also showed that while labour brokers were not particularly popular, many people polled did not express a view either way indicating that the role of labour brokers was not well understood. - Sapa
<urn:uuid:9a6fe76f-f4f8-453c-8b06-1085d312881c>
2013-05-18T17:51:20Z
CC-MAIN-2013-20
[ [ -0.00834898091852665, 0.028433475643396378, 0.008516631089150906, 0.0013244367437437177, 0.09978540986776352, -0.08690986782312393, -0.020118026062846184, 0.08744635432958603, -0.020922746509313583, -0.04721030220389366, 0.0657188817858696, 0.027494635432958603, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.989786
225
http://www.iol.co.za/business/business-news/sa-labour-laws-slow-job-growth-survey-1.1306474
0.348799
Thanks for visiting iRedDead. We hope you've found what you're looking for. If you like the site, why not register (at iGrandTheftAuto)? If you become a member you'll have the ability to comment on almost all content on the website and you'll be able to submit your own content! It's worth a try, surely? Oh yeah, if you register, this annoying message will disappear!
<urn:uuid:a54560a3-6530-4ef5-9efe-8fc1b0b76a78>
2013-05-18T17:17:03Z
CC-MAIN-2013-20
[ [ 0.009060889482498169, 0.0357603095471859, -0.0019027867820113897, 0.057023197412490845, 0.024484535679221153, -0.047680411487817764, -0.0037250323221087456, 0.04445876181125641, -0.028511598706245422, -0.08440721780061722, 0.06636597961187363, 0.040753867477178574, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946631
86
http://www.ireddead.com/image/reddeadredemption/304/here-comes-trouble/
0.531653
Javelin kills athletics official A javelin thrower accidentally killed a sports official at a German athletics meeting. Police in Dusseldorf said the 74-year-old man died in hospital after being hit in the throat. A spokesman said they have opened an investigation into the death but that initial indications were it had been a “tragic accident.” He said the 15-year-old athlete who threw the javelin was receiving psychological counselling. Hundreds took part in the youth athletics event at a stadium in the Rath district of Dusseldorf.
<urn:uuid:1c0aec1f-dc9a-483e-8b36-29c0efbbbe18>
2013-05-18T17:49:44Z
CC-MAIN-2013-20
[ [ -0.014723557978868484, 0.041826922446489334, -0.018149038776755333, -0.0010892427526414394, 0.13076923787593842, -0.06634615361690521, -0.011838942766189575, 0.07980769127607346, 0.013641826808452606, -0.04903846234083176, 0.042067307978868484, 0.054326921701431274,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985746
123
http://www.irishtimes.com/news/javelin-kills-athletics-official-1.732907
0.472101
Female members of a North Korean military band perform in celebration of the country's rocket launch in Pyongyang, North Korea. / Associated Press The Obama administration is condemning North Korea's missile launch, calling it "a highly provocative act" that threatens regional stability. "This action is yet another example of North Korea's pattern of irresponsible behavior," said a statement from National Security Council spokesman Tommy Vietor. "The United States remains vigilant in the face of North Korean provocations and fully committed to the security of our allies in the region." USA TODAY's Calum MacLeod reported that the governments of South Korea and Japan also condemned the launch that many see as "a giant step forward in its quest to develop the technology to deliver a nuclear warhead." The launch followed several previous failed attempts. "The regime's stated purpose for firing its long-range Unha-3 rocket was to put a peaceful satellite into orbit, but the United Nations, as well as the U.S. and its allies, see it as cover for a test of technology for missiles," wrote MacLeod. The launch is the latest distraction for President Obama, who is also grappling with civil war in Syria, unrest in Egypt, and the domestic budget battle known as the "fiscal cliff." Vietor's statement in full: "North Korea's launch today -- using ballistic missile technology despite express prohibitions by United Nations Security Council resolutions -- is a highly provocative act that threatens regional security, directly violates United Nations Security Council resolutions 1718 and 1874, contravenes North Korea's international obligations, and undermines the global non-proliferation regime. This action is yet another example of North Korea's pattern of irresponsible behavior. The United States remains vigilant in the face of North Korean provocations and fully committed to the security of our allies in the region. Given this current threat to regional security, the United States will strengthen and increase our close coordination with allies and partners. "On April 16, 2012, the United Nations Security Council expressed its 'determination to take action accordingly in the event of a further [North Korean] launch.' In the hours and days ahead, the United States will work with its Six-Party partners, the United Nations Security Council, and other UN member states to pursue appropriate action. The international community must work in a concerted fashion to send North Korea a clear message that its violations of United Nations Security Council resolutions have consequences. The international community continues to insist that North Korea live up to its commitments, adhere to its international obligations, and deal peacefully with its neighbors. "North Korea is only further isolating itself by engaging in such provocative acts. Devoting scarce resources to the development of ballistic missiles and nuclear weapons has not brought it security and acceptance by the international community -- and never will. North Korea will only truly strengthen itself by abiding by international norms, living up to its commitments and international obligations, and working to feed its citizens, to educate its children, and to win the trust of its neighbors." Copyright 2013 USATODAY.com Read the original story: U.S. condemns North Korea missile launch
<urn:uuid:ce06c6d1-74bf-40b3-8591-7399e3cb9fcb>
2013-05-18T17:18:41Z
CC-MAIN-2013-20
[ [ -0.035400390625, 0.033447265625, -0.0007781982421875, 0.04638671875, 0.12890625, -0.08984375, -0.0186767578125, 0.12060546875, -0.02734375, -0.06787109375, 0.07080078125, 0.01177978515625, -0.0478515625, 0.0361328125, 0.0419921875, 0.0286865234375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94594
632
http://www.jacksonsun.com/usatoday/article/1762927?odyssey=mod%7Cnewswell%7Ctext%7CFRONTPAGE%7Cs
0.531578
I'm playing with the El Gamal cryptosystem, and my goal is to be able to encipher and decipher long sequences of text. El Gamal requires the plaintext to be an integer. ... i converted a string to BigInteger as follows: Scanner sc=new Scanner(System.in); System.out.println("enter the message"); Is it possible to encrypt/decrypt a string using AES with a BigInteger (given one, not a randomly generated number) as a key in Java?
<urn:uuid:8da38ee3-e543-4fc8-9d3b-da19fec55014>
2013-05-18T18:07:58Z
CC-MAIN-2013-20
[ [ -0.06938976049423218, -0.013964074663817883, 0.036909449845552444, 0.0041215550154447556, 0.030757874250411987, -0.06692913174629211, 0.019069882109761238, 0.10039369761943817, -0.0063053639605641365, -0.01796259917318821, 0.07874015718698502, 0.02583661489188671, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.789977
111
http://www.java2s.com/Questions_And_Answers/Java-Data-Type/biginteger/cryptography.htm
0.989697
What issues do people raise in a federal criminal appeal? How Does Cooperating In A Federal Criminal Case Work? How do the federal sentencing guidelines work in federal fraud cases? How do the federal sentencing guidelines work? What's the process for imposing sentence in federal court? How Does A Federal Judge Decide What Sentence To Impose In a Federal Criminal Case? This week's wins cover three circuits and four diverse areas of law. Particularly interesting (to me) are the Fourth Circuit's opinion holding that it may not be a crime to steal the identity of a corporation. It feels...more JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free... Learn More or Schedule a demo
<urn:uuid:715e0bc2-9dae-4db0-90a5-1c2d2cd7ce61>
2013-05-18T17:19:22Z
CC-MAIN-2013-20
[ [ -0.04256134852766991, 0.035084355622529984, 0.01696702465415001, 0.007524923421442509, 0.08052147179841995, -0.004577262327075005, -0.007716641295701265, 0.11809816211462021, -0.03316717967391014, -0.0070935580879449844, 0.06441717594861984, 0.0004553297476377338, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.875013
153
http://www.jdsupra.com/topics/sentencing/illegal-reentry/corporations/
0.325888
- 1. A royal seat, or chair of state. The king sits "upon the throne of his kingdom" (Deut. xvii. 18). Pharaoh delegated full power toJoseph to rule over Egypt; "only in the throne will I be greater than thou" (Gen. xli. 40). The royal throne is sometimes designated as "the throne of the kings" (Jer. lii. 32). The most magnificent throne was that of Solomon (see Jew. Encyc. xi. 441 et seq.; J. S. Kolbo made a model of Solomon's throne and exhibited it in New York city in 1888). The throne, like the crown, was a symbol of sovereign power and dignity. It was also the tribunal, the "throne of judgment" (Prov. xx. 8), where the king decided matters of law and disputes among his subjects. Thus "throne" is synonymous with "justice." - 2. The Throne, the abode of God, known as "Kisse ha-Kabod" (the Throne of Glory), from which God manifests His majesty and glory. Micaiah "saw the Lord sitting on his throne, and all the hosts of heaven standing by him on his right hand and on his left" (I Kings xxii. 19; compare the vision of Isaiah [vi. 1] with that of Ezekiel [x. 1]). The throne of God is Heaven (Isa. lxvi. 1); in future it will be Jerusalem (Jer. iii. 17), and even the Sanctuary (Jer. xvii. 12). Thus the idea of the majestic manifestation of God gradually crystallized in the cabalistic expression "koaḥ ha-ẓimẓum" (the power of concentration). God's Throne is the symbol of righteousness; "justice and judgment are the habitation of thy throne" (Ps. lxxxix. 15 [A. V. 14]). The Throne of Glory is an important feature in the Cabala. It is placed at the highest point of the universe (Ḥag. 12b); and is of the same color as the sky—purple-blue, like the "sapphire stone" which Ezekiel saw and which had previously been perceived by the Israelites (Ex. xxiv. 10; Soṭah 17a). Like the Torah, it was created before the world (Pes. 54a). R. Eliezer said that the souls of the righteous are concealed under the Throne (Shab. 152b). When Moses ascended to heaven to receive the Torah the angels objected, whereupon God told him to hold on to the Throne and defend his action (Shab. 88b). It is asserted that the likeness of Jacob is engraved on the Throne of Glory (Zohar, Wayiggash, p. 211a). For the throne of Elijah see Elijah's Chair.
<urn:uuid:4415afe7-6053-4e77-bc1b-1f3c11cebbe1>
2013-05-18T18:05:47Z
CC-MAIN-2013-20
[ [ 0.0205078125, 0.0028839111328125, -0.0274658203125, -0.00958251953125, 0.09033203125, -0.064453125, -0.01287841796875, 0.08544921875, -0.01251220703125, -0.044677734375, 0.055419921875, 0.01177978515625, 0.0201416015625, 0.046630859375, 0.0311279296875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952351
603
http://www.jewishencyclopedia.com/articles/14381-throne
0.73211
AFANASYEV-CHUZHBINSKI, ALEXANDER STEPANOVICH: Christian Russian author and ethnographer (1817-75); he was an enlightened writer who did justice to the Jews. In his "Poyezdka v Yuzhnuyu Rossiyu" (2 vols., St. Petersburg, 1861-63) he gave a faithful picture of Jewish life in South Russia, and defended the Jews against the accusations of the prejudiced masses. - Sobranie Sochineni, ed. H. Hoppe, vols. viii. and ix., St. Petersburg, 1893; - Entziklopedicheski Slovar, vol. ii., St. Petersburg, 1893.
<urn:uuid:cefff22f-9a7f-482c-85bb-43dffd2ada96>
2013-05-18T17:37:25Z
CC-MAIN-2013-20
[ [ 0.016387194395065308, 0.002417587675154209, -0.006764481775462627, -0.019054878503084183, 0.08422256261110306, -0.0674542710185051, -0.023532774299383163, 0.11585365980863571, -0.019435975700616837, -0.10746951401233673, 0.01895960420370102, 0.038681402802467346, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.875628
157
http://www.jewishencyclopedia.com/articles/875-afanasyev-chuzhbinski-alexander-stepanovich
0.178591
Special National Intelligence Estimate Prospects for Further Proliferation of Nuclear Weapons (Excerpt) (August 23, 1974) 37. We believe that Israel already has produced and stockpiled a small number of fission weapons. [REDACTED] it cannot be proven beyond a shadow of a doubt. But several bodies of information point strongly in the direction of a program stretching back over a number of years: 43. The fact that Israel has made such a large investment in the Jericho missile system - which is only marginally useful if armed with high explosive warheads - is compelling substantiation for the judgement that Israel has nuclear weapons. Development began in France in 1963, was transferred to Israel in 1968, and was probably completed about 1970. The missile itself is essentialy unchanged from the the original French design. However, the Israelis replaced the orginial inertial guidance system with one of their own design which is based on components produced in Israel under licenses from US companies. 44. The Jericho is a mobile, two-stage, solid-propellant, short-range ballistic missile system with both tactical and strategic importance in the Middle East context. It is about 43 feet long, weighs almost 15,000 pounds and has a reentry vehicle that probably weighs about 2,200 pounds. Its maximum range is about 260 nm and the circular error probable (CEP) at that distance is estimated to be about 0.5 nm. 47. The Jericho missile was designed by the French to carry nuclear as well as conventional warheads. [REDACTED] Source: NSA Archives
<urn:uuid:2a3b3fe4-e2e3-4655-9b24-2c7f8d35e137>
2013-05-18T18:06:51Z
CC-MAIN-2013-20
[ [ -0.025204360485076904, 0.022138964384794235, -0.000333947129547596, 0.018392371013760567, 0.07356948405504227, -0.04734332486987114, -0.011835831217467785, 0.1117166206240654, -0.026566756889224052, -0.0286103542894125, 0.047683924436569214, 0.025034060701727867, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960844
317
http://www.jewishvirtuallibrary.org/jsource/US-Israel/snie_israel_1974.html
0.651464
Jewish World Review July 15, 2003/ 15 Tamuz, 5763 The fearsome reality of the surreal http://www.NewsAndOpinion.com | Some things are facts. It's a fact that if you can't tolerate the sickly sweet fragrance of formaldehyde, you won't make it as a mortician, and it's a fact that unless you cultivate a taste for the surreal, you can't stay in Washington very long. The Washington reality, after all, is invented anew every morning by the media, which is the town's dominant industry. The editors and reporters of the surreal world of the New York Times, The Washington Post and the major television networks are presently obsessed with proving that George W. Bush (with a little help from Tony Blair) invented the war with Iraq by inventing the threat posed by Saddam Hussein's weapons of mass destruction. To prove that Saddam's weapons program, and maybe even Saddam himself, never existed requires a provable fact on which to build a campaign to destroy the Bush presidency. Even a "factoid," which novelist Norman Mailer famously defined as something that smells like a fact and tastes like a fact and is taken for a fact, but in fact is not a fact, might work if you can't find the real thing. The fashionable factoid of the moment is that George W. invented and spread the fiction in his State of the Union address that Saddam tried to buy uranium "yellowcake," lightly processed ore from which a nuclear weapon could be made, from Niger. This was an error, passed along by British intelligence. But in the surreal world, there are no errors, only scandals. The proof of this scandal a scandal far greater than Teapot Dome, Watergate or Monica's thong is a 16-word sentence in George W.'s State of the Union address: "The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa." Not since the conspiracy mongers set out to prove that FDR set up Pearl Harbor to get us into World War II has so much mischief been predicated on such wishful partisan imagination. If the surrealists can prove that Saddam's weapons of mass destruction never existed, they can "prove" that the war was a horrific hoax, invented by Republicans to assure the re-election of a Republican president. It may be an error big enough to be twisted into an impeachment lie. Twisting this won't be easy, even for the New York Times, still smarting from its failed campaign to prove that keeping women out of the Masters would bring down civilization as Howell Raines knew it. But maybe it's a start. The reality of Saddam and weapons of mass destruction, for anyone who doesn't live in the surreal world of the dominant media, is grim enough and frightening enough. If the Israelis had not successfully destroyed his nuclear reactor in 1981, Saddam would have had his bomb years ago, and even at the end of the first Gulf war a decade ago, we learned that his nuclear program had survived and was far more advanced than the CIA told the first President Bush it was. Far more important than the 16 words about Nigerien yellowcake in George W.'s State of the Union address this year was this passage about Saddam's nuclear program: "The International Atomic Energy Agency confirmed in the 1990s that Saddam Hussein had an advanced nuclear-weapons development program, had a design for a nuclear weapon, and was working on five different methods of enriching uranium for a bomb." The CIA operative leading the charge against George W. is Joseph C. Wilson IV, who was sent to Niger to verify the intelligence account and after an exhausting eight days returned to Washington to report that he hadn't learned anything about uranium yellowcake, possibly because he had, by his own admission, spent his time "drinking sweet mint tea" with "dozens of people" who didn't know anything about it. Nevertheless, he concluded that it was "highly doubtful that any such transaction ever took place." Mr. Wilson, an "adjunct scholar" at a Saudi-backed "institute," a sometime essayist for the Nation magazine and speaker for a far-left "peace center," set out all this in an op-ed in the New York Times (where else?); this is the ammunition the guns of the dominant media are lobbing at the White House. The ammo bearer is the same Joseph C. Wilson IV who warned in the run-up to the Iraqi war that Saddam might use biological weapons against American troops. These are the biological weapons of mass destruction we're told don't exist and probably never did, only the fraudulent pretext for going to war. You might think the relevant question about Saddam's weapons of mass destruction is not whether he had them, but what did he do with them? But if you think that, it only proves that you live in the world where the surreal is not nearly as frightening as reality. And that's a fact. Enjoy this writer's work? Why not sign-up for the daily JWR update. It's free. Just click here.
<urn:uuid:12598a79-4795-42c2-9025-48c61213d4e5>
2013-05-18T18:06:00Z
CC-MAIN-2013-20
[ [ -0.0078125, 0.017822265625, 0.003387451171875, 0.0186767578125, 0.09521484375, -0.052734375, -0.01531982421875, 0.1240234375, -0.000354766845703125, -0.01007080078125, 0.052490234375, 0.0230712890625, 0.00543212890625, 0.013916015625, 0.03466796875, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974155
1,048
http://www.jewishworldreview.com/cols/pruden071503.asp
0.371945
How can I create a global ResourceBundle that will be recognized by all the classes in my application? Joe Sam Shirah Actually, ResourceBundles are effectively global within a VM. The reason is that a private static cache is searched and used to retain previously obtained bundles. Note that all variants of getBundle() are also static. While this design enhances performance after the first retrieval, there are no refresh/reload methods, leading to the "no standard way" answer to How can I reload ResourceBundles?.
<urn:uuid:1412b015-bd5a-49a3-9a58-e3a68e59e122>
2013-05-18T17:57:14Z
CC-MAIN-2013-20
[ [ -0.042500000447034836, -0.01575000025331974, 0.03550000116229057, -0.022749999538064003, 0.032499998807907104, -0.08049999922513962, 0.0007187500013969839, 0.09650000184774399, 0.016750000417232513, 0.016875000670552254, 0.07500000298023224, 0.061500001698732376, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.925175
109
http://www.jguru.com/faq/view.jsp?EID=455521
0.85087
Can You Protect In the 3rd century, when Rome dominated Europe, it was able to deploy 50 legions throughout the empire, securing even the furthermost areas. By the following century the empire had lost much of its muscle, however, and Rome's forces had diminished to just 25 legions. Emperor Constantine's problem: How to station legions in sufficient strength to protect the most forward positions of the empire without abandoning the core--namely Rome. He devised a new defensive strategy to cope with Rome's reduced power. The problem is not "solved" in a mathematical sense, but a set of rules exists that defines when a solution is acceptable. Once you understand the rules, you can attempt to see if you can improve on Constantine's choice of deployment. A region, then, may be thought of as either secured or securable. It is considered to be secured if it has one or more pebbles placed in it already. It is considered securable if a pebble can be deployed to that region in a single step. At any shift or movement from a region, two pebbles must initially be present together before one of them can be launched. That is, a pebble can only be deployed if it moves from an adjacent region where there is already another pebble to help launch it. This is analogous to the island hopping strategy pursued by General MacArthur in World War II in the Pacific theater--where movement only followed the chain of islands (secured areas). Now that you know the rules, the challenge is to place just four pebbles in the eight regions of the empire. Here is another alternative, not necessarily better than Constantine's strategy, but it gives you an idea of possibilities. We will place one pebble in Gaul, two in Rome, and one in Constantinople. Britain can now be reached in two steps (a pebble from Rome to Gaul and a pebble from Gaul to Britain), better for Britain than before. However, Asia Minor is now not reachable in one step, but two (from Rome to Constantinople and Constantinople to Asia Minor). All the rest of the empire is reachable in just one step. It is not clear that this is better than Constantine's strategy. Although the number of steps to the worst-off nodes has been reduced to two, the number of regions more than one step away has gone from one to two. Can you improve on Constantine's solution? If you can keep the number of nodes that can't be reached in one step to just one, and can reduce the maximum number of steps to reach that node to a number less than four, then you have done better than Constantine. Of course, you hit the jackpot if you can make all regions either initially secure or reachable in one step, given the rules. I will tell you that it is possible to do better than Constantine, but I won't tell you how. If you do have success at allocating the pebbles, you should think about the consequences of a second war occurring somewhere in the empire. Of the situations you create, which would be better in the event of a second war at one of the unsecured regions? The answer, which I mailed in early February, is in a sealed envelope in the desk drawer of editor Sue De Pasquale. She has agreed to publish it in the next issue of the Johns Hopkins Magazine. A final footnote RETURN TO APRIL 1997 TABLE OF CONTENTS.
<urn:uuid:1c33c1a0-3b78-4923-870e-a560cde843eb>
2013-05-18T17:28:23Z
CC-MAIN-2013-20
[ [ 0.003631591796875, 0.0162353515625, -0.00701904296875, 0.01239013671875, 0.0751953125, -0.07470703125, -0.017578125, 0.1025390625, -0.00653076171875, -0.0111083984375, 0.072265625, 0.0218505859375, -0.0615234375, 0.0032806396484375, 0.038818359375, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954871
711
http://www.jhu.edu/jhumag/0497web/locate3.html
0.946012
There was a time, not long ago, when assembling a viable dungeon party was more challenging than clearing the dungeon itself! Then the Dungeon Finder happened, and now finding a party in the World is easy-peezy. But then we thought, if it works in the World, then why not try it in real life? We present to you the Dungeon Finder collection. Wear your role proudly, and it just might help you find a party!
<urn:uuid:ab918600-446a-478c-b62e-6d069c7b759d>
2013-05-18T18:07:14Z
CC-MAIN-2013-20
[ [ -0.026765046641230583, -0.013888888992369175, 0.007306134328246117, -0.006908275652676821, 0.040219906717538834, -0.04311342537403107, -0.010923032648861408, 0.0850694477558136, 0.002513744169846177, -0.0186631940305233, 0.023582175374031067, 0.037905093282461166, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933038
89
http://www.jinx.com/p/world_of_warcraft_dungeon_role_dps_premium_tee.html?catid=&s=tshirt,s,black
0.18512