Datasets:

text
stringlengths
130
541k
id
stringlengths
47
47
date
stringdate
2013-05-18 04:54:19
2013-06-20 13:35:46
dump
stringclasses
1 value
embeddings
listlengths
1
351
file_path
stringclasses
916 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
30
166k
url
stringlengths
14
835
quality_score
float64
0.16
1
THE articles in your paper headed "Is Suicide a Crime?" have suggested to my mind to ask another question, "Is Fticide a crime?" Not that I personally have any serious doubts about the unlawfulness of such an act; but the custom prevails to such an extent in the United States that there are comparatively only few persons who can see any wrong in it. Medicines for this purpose are openly advertised and sold; in "respectable families" the ceremony is regularly performed every year, and the family physician who should presume to refuse to undertake the job, would be peremptorily dismissed, to be replaced by a more accommodating one. I have conversed with physicians, who have no more conscientious scruples to produce an abortion, than to administer a physic; on the other hand there are certain tracts from orthodox channels published against this practice; but they are mostly so overdrawn in describing the "fearful consequences," as to lose their power over the ordinary reader by virtue of their It must be confessed that there are certain circumstances under which it might appear that it would be the best thing as well for the child that is to be born as for the community at large, that its coming should be prevented. For instance, in a case where the mother earnestly desires the destruction of the child, her desire will probably influence the formation of the character of the child and render him in his days of maturity a murderer, a jailbird, or a being for whom it would have been better "if he never had been born." But if fticide is justifiable, would it then not be still better to kill the child after it is born, as then there would be no danger to the mother; and if it is justifiable to kill children before or after they are born then the next question arises: "At what age and under what circumstances is murder justifiable?" As the above is a question of vast importance for thousands of people, I should be thankful to see it treated from the An "M.D." F.T.S. Editor's Note.--Theosophy in general answers: "At no age as under no circumstance whatever is a murder justifiable!" and occult Theosophy adds:--"yet it is neither from the stand-point of law, nor from any argument drawn from one or another orthodox ism that the warning voice is sent forth against the immoral and dangerous practice, but rather because in occult philosophy both physiology and psychology show its disastrous consequence." In the present case, the argument does not deal with the causes but with the effects produced. Our philosophy goes so far as to say that, if the Penal Code of most countries punishes attempts at suicide, it ought, if at all consistent with itself, to doubly punish fticide as an attempt to double suicide. For, indeed, when even successful and the mother does not die just then, it still shortens her life on earth to prolong it with dreary percentage in Kama-loka, the intermediate sphere between the earth and the region of rest, a place which is no "St. Patrick's purgatory," but a fact, and a necessary halting place in the evolution of the degree of life. The crime committed lies precisely in the willful and sinful destruction of life, and interference with the operations of nature, hence--with KARMA--that of the mother and the would-be future human being. The sin is not regarded by the occultists as one of a religious character,--for, indeed, there is no more of spirit and soul, for the matter of that, in a ftus or even in a child before it arrives at self-consciousness, than there is in any other small animal,--for we deny the absence of soul in either mineral, plant or beast, and believe but in the difference of degree. But fticide is a crime against nature. Of course the skeptic of whatever class will sneer at our notions and call them absurd superstitions and "unscientific twaddle." But we do not write for skeptics. We have been asked to give the views of Theosophy (or rather of occult philosophy) upon the subject, and we answer the query as far as we know. Theosophist, August, 1883
<urn:uuid:477ff596-0b2c-4ab4-8f7f-49498536717a>
2013-05-21T17:31:13Z
CC-MAIN-2013-20
[ [ -0.03466796875, 0.01214599609375, -0.00653076171875, 0.00140380859375, 0.0830078125, -0.059326171875, -0.0126953125, 0.0869140625, -0.01177978515625, -0.0498046875, 0.050048828125, 0.0155029296875, -0.08544921875, 0.017578125, 0.039794921875, 0.01397...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945492
952
http://www.blavatsky.net/blavatsky/arts/IsFoeticideACrime.htm
0.523104
The Isa Conspiracy Part 1 Of 3 (Aired June 16, 1979) Alien Worlds was a syndicated radio show created by radio personality Lee Hansen. It aired 26 half-hour episodes between 1978 and 1980, becoming well known for its realistic sound effects, high production values and documentary style of dialog. The science fiction show was first syndicated by Watermark Inc. after Lee Hansen was hired as their creative director. After advancing the concept of an action-adventure dramatic radio series, Lee began developing the concept in the fall of 1978. Watermark premiered the first episode, "The Sun Stealers", on January 7, 1979. The series gained popularity thanks to its relatable characters, full symphonic soundtrack, realistic sound effects, high production values and documentary style format. Eventually over 500 US FM radio stations, along with stations in New Zealand and Australia aired the series.
<urn:uuid:bca45330-fae1-40bd-a717-6af391aa8ad1>
2013-05-21T17:17:03Z
CC-MAIN-2013-20
[ [ -0.006888854783028364, 0.02216748706996441, -0.005734297912567854, 0.020782019942998886, 0.05572660267353058, -0.03432881832122803, -0.0013854679418727756, 0.09482758492231369, -0.03771551698446274, -0.04156403988599777, 0.04371921345591545, 0.012084359303116798, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960953
177
http://www.blubrry.com/boxcars711/1666077/alien-worlds-the-isa-conspiracy-part-1-of-3-06-16-79/
0.787861
1799 Robert Mushen died in Wearmouth, Co Durham, England. He was the infant child of John Mushen and Jane Todner. 1802 Jane Yeal was born in Hartlepool, Co Durham. She was the daughter of William Yeal and Mary Horsley. 1842 Jane Pugh was born in Wales (probably Radnorshire). She was the daughter of Edward Pugh and Jane Evans, and spent most of her life in Pickering, Ontario, Canada.
<urn:uuid:83e8027f-157f-48eb-9057-9956a5e82d88>
2013-05-21T17:44:33Z
CC-MAIN-2013-20
[ [ 0.06367924809455872, 0.036851413547992706, -0.014224646613001823, -0.012824292294681072, 0.09433962404727936, -0.08136792480945587, -0.03508254885673523, 0.0766509398818016, -0.024174528196454048, -0.10908018797636032, 0.07900943607091904, 0.00392467575147748, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986804
103
http://www.blunderingblindlybackwards.blogspot.com/2011/09/on-this-day-8-september.html
0.954139
On the street between the impeachment and castle a divine release was being enacted engaging the durable peace in seething winter. A somber black cloud of smoke was slowly reclaiming the sun. A disgraced militant was pounding his chest for not killing priceless bees who were initializing the flowers of Aden. The death was laid out in a row before the child was born. Dead prophets were watching from the eyes of dolls.
<urn:uuid:69fa4646-1bab-4250-8295-78b613b84756>
2013-05-21T17:10:10Z
CC-MAIN-2013-20
[ [ -0.02663690410554409, 0.02008928544819355, 0.0023623511660844088, 0.02797619067132473, 0.11369047313928604, -0.0048735118471086025, -0.01607142947614193, 0.095238097012043, 0.008891369216144085, -0.01815476268529892, 0.03511904925107956, 0.02068452350795269, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.976429
95
http://www.boloji.com/index.cfm?md=Content&sd=Poem&PoemID=7774
0.695649
This sale is now finished. If you are interested in consigning in future sales, please contact the specialist department. If you have queries about lots purchased in this sale, please contact customer services. An early 20th century diamond single-stone ring A diamond pendant A pair of cloisonne enamel censers 18th/19th century
<urn:uuid:76f4a22a-9e47-4fee-96db-ae43d56fdf68>
2013-05-21T17:38:19Z
CC-MAIN-2013-20
[ [ -0.022708334028720856, 0.006718750111758709, 0.01770833320915699, -0.0013020833721384406, 0.10916666686534882, -0.06458333134651184, -0.0010807291837409139, 0.03333333507180214, -0.01927083358168602, -0.03791666775941849, 0.05999999865889549, -0.0037239582743495703,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.861151
72
http://www.bonhams.com/auctions/16323/?results_per_page=872
0.777536
Short Answer Key Part I, Essays 1 - 5, Evil and God, Miracles, Dogma and the Universe, Answers to Questions on Christianity, Myth Became Fact 1. Joad believed that various philosophical theories of human evolution were which of the following? 2. Which of the following is one of the options that Joad believed rational persons must choose from? 3. One of the options that Joad believed rational persons were forced to choose from is most like what world religion? 4. What belief does Joad recommend in the writings that Lewis responds to in Part I, Essay 1, "Evil and God"? 5. What belief does Lewis reject in Part I, Essay 1, "Evil and God"? 6. What justification does Joad give for his preference of belief in Part I, Essay 1, "Evil and God"? The horrors of World War II. 7. Lewis emphasizes what about the evils... This section contains 3,259 words| (approx. 11 pages at 300 words per page)
<urn:uuid:430388cd-e6e8-4766-8f9f-e7baf648e730>
2013-05-21T17:38:40Z
CC-MAIN-2013-20
[ [ -0.02120535634458065, -0.01555524580180645, 0.009974888525903225, -0.0028773716185241938, 0.0920758917927742, -0.0647321417927742, -0.0162527896463871, 0.0859375, -0.0205078125, -0.012067521922290325, 0.0538504458963871, 0.011090959422290325, 0.01018415205180645...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894505
218
http://www.bookrags.com/lessonplan/god-in-the-dock-essays-on-theology/shortanswerkey.html
0.810718
Dwelling Places: A Novel (Vinita Hampton Wright) Vinita Hampton Wright 352 pp., $23.95 Betty Smartt Carter So Wide and Deep I learned a lot from John Banville's latest novel, The Sea. For instance, I can rattle off five new terms for bodily excretions, including "particles of nether-do"; I can diagnose a case of "grog blossoms"; and I'm aware that "ichor" refers not only to the liquid flowing through the veins of the gods but to that watery stuff that leaks out of a paper cut. I also know that "strangury" is a mystical-sounding word for slow urination (yes, this is a book about growing old). Such discoveries mostly delight me, but others find Banville's writing pretentious and remote. "Banville's famously torrid affair with his thesaurus," writes Jessica Winters of the Village Voice, "has previously birthed erudite but emotionally delimited characters but The Sea nudges this pathos toward parody." It is true that if he paid a fine for every time he broke the writer's rule of ordinary language, Banville would have to mortgage his Booker Prize. It's unfair to say, though, that he dotes on words at the expense of human feeling. In fact, it's the preening language of The Sea that most reveals its hero, a man both vain and emotionally broken. Max Morden is an art historian of no particular genius. ("As for us middling men," he says, "there is no word sufficiently modest that yet will be adequate to describe what we do and how we do it.") For years he's been "mired" in a monograph on the French artist Pierre Bonnard (18671947), famous for his many portraits of his wife Marthe in the tub: "Brides-in-the-Bath," Max's wife Anna calls him. At their oceanside home, Anna herself spends long hours in the bath, soothing the pain of her cancer. Max sometimes worries she'll drown accidentally: "I would creep down the stairs and stand on the return, not making a sound, seeming suspended there, as if I were the one under water." Guiltily, he half wishes she'd go on and get it over with, for both their sakes. When she does at last die, in the hospital, he finds himself drowning in grief, past ...
<urn:uuid:e201c7f2-3d9a-4500-b2ea-c1824eb41f9f>
2013-05-21T17:45:20Z
CC-MAIN-2013-20
[ [ -0.01416015625, 0.01116943359375, -0.006317138671875, 0.01153564453125, 0.0791015625, -0.031494140625, -0.00616455078125, 0.11865234375, -0.02783203125, -0.057861328125, 0.046142578125, 0.026611328125, -0.0166015625, -0.007171630859375, 0.045166015625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969202
515
http://www.booksandculture.com/articles/2006/marapr/13.29.html
0.162492
BIC code: FGU See also: Historical Fiction - Add to BasketQueen Hereafter: A Novel Of Margaret Of Scotland - Paperback - Broadway Margaret is shipwrecked with her family on the coast of Scotland and forced to accept sanctuary from the recently widowed warrior-king Malcolm Canmore of Scotland. Malcolm sees a political prize in Margaret, and promises to help her brother, the outlawed rebel Edgar of England, in return for his sister's hand in marriage.
<urn:uuid:c4ad6c01-dbf2-480c-afb8-e9e385d47156>
2013-05-21T17:44:43Z
CC-MAIN-2013-20
[ [ 0.01032366044819355, 0.0535714291036129, -0.012834821827709675, 0.0532924123108387, 0.0809151753783226, -0.0354352667927742, -0.02887834794819355, 0.0859375, -0.00934709794819355, -0.0583147332072258, 0.02273995615541935, 0.01681082509458065, -0.0087890625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918715
100
http://www.booksfromscotland.com/Books/BIC/FGU?bl_AbcField=sortTitle&bl_AbcFilter=Q
0.481994
La guerra que prefieren los generales MEXICO CITY: Finally President Calderon, in recent statements, has acknowledged the growing consensus in the country that the Army should return to the barracks. Calderon has admitted, “There is enormous pressure that the troops not be in the streets," What makes the president's admission unsettling is that it could lead to a repugnant conclusion: That after nothing has been won in this war, the Army must withdraw, recognizing the defeat of the Mexican State by the forces of organized crime. Maybe it's time to interpret the call by civil society state in a different manner. The Army should be withdrawn from the streets, not declaring defeat, but to act like a true military. Since the Army was brought to the streets to combat organized crime it has been used with one arm tied behind it’s back, performing police functions within police constraints among the civilian population, when the military could and should be waging a war against crime with their full monopoly of power as a force trained and equipped to face the enemy in direct and extremely violent confrontation. Retired and outspoken Major General Luis Garfias Magana, no longer bound by the limits imposed by civilain control of the military, has another approach to the “drug war”. General Garfias explains, "We talk about 40% of national territory where the State no longer governs, a 40% that is slowly spreading.” If we divide the country into grids. If we clearly identify which areas are no longer governed by the rule of law and governed by organized crime. If these regions are isolated and sealed. If we evacuate the unarmed population. If we isolate and seal those regions imposing a state of emergency, with a suspension of individual guarantees, as permitted under Article 29 of the Constitution in areas where order is seriously disturbed "Then the army could come after them with all it’s might. By air, by land and by sea. With planes and helicopters, tanks and ships. To not leave a single rock unturned." If this is a war, implies the general, then so be it. The President and Congress should take the necessary steps to wage a territorially limited war and set the conditions for achieving the mission quickly. "According to the military this mission would last weeks or months," says General Garfias, “not years.” Another crucial role the military should have depends on the President’s focus as to the objective of this war. Renounce broad war against crime and drug trafficking across Mexico, and decide to restrict the scope of the conflict to the safety of civilians. The safety of the civilian population should not be defined by the extermination of the bandits, even for the drastic decrease of persons engaged in illicit activities. It should be defined by the dramatic depletion of crimes that directly destroy the lives of civilians. Theft, extortion, kidnapping and homicide. Another Major General, who asked that his name not be revealed given the nature of his statement, stated a similar view. "It’s fine by me if the drug cartels build a pipeline carrying cocaine direct from Sinaloa to California. If America does not wage war against drug dealers, why do we fight against those who transport drugs to keep American distributors happy? What we should care for is a life free of crime and fear for Mexicans. " This second approach does not contradict former General Garfias’ views which are directed to recapturing the areas where the rule of the Mexican State has been expelled. This second approach would be appropriate for the rest of the country and provides for an armed force of elite mobility and special attack, an elite force that in the short term can only be formed from the ranks of the Army or Navy. If members of a cartel steal, extort, kidnap or kill a civilian, this group reacts by attacking the cartel with a focused and ferocious intensity. Defining the objective of the war as the safety of civilians has specific benefits. It allows civilians to accept this war as their war. This would encourage drug lords to restrict the activities of their forces, to contain them, control them, as has been the case for some time across our northern border in the U.S. This policy would allow the Army to choose the areas of conflict to their advantage and that of the civilian polulations. And finally, it would give an objective criterion to a declaration of victory. When asked the question of who decided on this war and how to fight it, the President or the Generals of the Mexican Army, General Garfias laconically responded, “the President.” Some military officers now believe it is time for the military to decide how to wage this war.
<urn:uuid:ac79d1aa-70e0-40f2-a4e2-87429938efdf>
2013-05-21T17:31:35Z
CC-MAIN-2013-20
[ [ -0.033935546875, 0.0174560546875, -0.00909423828125, 0.0281982421875, 0.099609375, -0.056884765625, -0.0140380859375, 0.10498046875, -0.0108642578125, -0.0263671875, 0.055908203125, 0.029541015625, -0.041259765625, 0.01104736328125, 0.041015625, 0.02...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959895
972
http://www.borderlandbeat.com/2011/05/war-generals-want.html
0.207018
The vinification of sparkling wines in Champagne is strictly controlled and specific techniques must be used. Those wines labeled as méthode champenoise, méthode traditionelle, or traditional method are made in the Champagne tradition. Sparkling wine is made virtually everywhere wine is made, and can be done in several ways including the traditional method, transfer method, and the Charmat, or tank method. In all three methods of making wine sparkle, one must start with a still wine or wines. These wines can come from different vintages and be bottled as a non-vintage wine. In Champagne, as well as many other areas that strive to make the same style of wine, the base wines consist of any combination of
<urn:uuid:b22adc0d-7531-4e93-963f-0508816f3f9c>
2013-05-21T17:09:15Z
CC-MAIN-2013-20
[ [ -0.006905241869390011, -0.00466229859739542, -0.00846774224191904, -0.01582661271095276, 0.05282258242368698, -0.03770161420106888, 0.011542338877916336, 0.06290322542190552, -0.018245967105031013, -0.04556451737880707, 0.033467743545770645, 0.02207661233842373, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952391
154
http://www.bottlenotes.com/winemaking-process-sparkling-wine-production-overviewa
0.184212
No zeros occur in this puzzle. A: N across + E across. E: a cubic number. F: the reverse of F across is a prime number. H: I across + K down. I: subtract D down from I across, and the result is a square number. J: a prime number. L: all digits of L across are the same. N: subtract L across from A across and read the result backwards, and you get N across. A: D down multiplied with E across. B: a square number. C: another square number. D: a prime number. G: D down multiplied with the reverse of I across. K: I across - D down. L: a palindrome. M: a prime number.
<urn:uuid:359724b6-8144-408e-9315-b5e8633ee3a3>
2013-05-21T17:36:55Z
CC-MAIN-2013-20
[ [ 0.019689306616783142, 0.00772218219935894, -0.03161127120256424, 0.012192918919026852, 0.02176661789417267, -0.004538475535809994, -0.009393063373863697, 0.11199422180652618, -0.027637282386422157, -0.05382947996258736, 0.11705202609300613, 0.003973988350480795, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.805783
172
http://www.brainbashers.com/crosswordswithnumbers56.asp
0.99866
How machine learning can help to understand brain signals If a neurotechnological prosthesis should act upon commands from the brain, these have to be interpreted correctly. It is a challenging task because the amount of data is huge and the signals that the brain emits also change over time. Computer scientists therefore want to leave it to learning machines to solve this ever-changing puzzle. |Gunnar Grah talked to Martin Riedmiller, Machine Learning Lab| The usual way to make a computer do something goes like this: You decide what problem the machine is supposed to solve for you, then you write a programme that does exactly this. Modern washing machines work that way. They have been told exactly what to do at what moment. This approach works very well for clearly defined problems, like getting dirt out of laundry. But there are many problems where solutions are not obvious, and the point of departure might always be a little bit different and require different solutions. In this case, computer scientists opt for letting the computer figure out the optimal solution for itself, an approach that is called “machine learning”. The human as trainer, not programmer Machine learning resembles somewhat how humans acquire new skills, i.e. through examples, the structuring of a problem, and gaining experience. If, for instance, a computer is supposed to learn the different appearances of a broad-leaved tree and a conifer, a human “trainer” would provide the learning machine with examples of both classes, telling it in each case which class the tree on the picture belongs to. After some time, the computer will be able to correctly classify the presented trees, even though no human ever provided it with an actual list of things to look out for in order to master the task. If a problem requires not only a classification, but learning a complex procedure, like a robot walking on two legs without falling over, a trainer will at first be required to tell the machine whether an approach was “good” or “bad”. After sufficient training, the machine will master the problem and show some robustness in its solution, even if the situation varies slightly. Also, a trained machine will be able to solve a new situation – e.g. the robot carrying something and therefore changing its weight distribution – faster than if it was starting from scratch. Learning from the brain The secret of machine learning lies in the nature of the software that is at work at its base. A solution to a problem does not exist as specific lines of code that govern how the input from the environment is dealt with in order to reach a desired outcome. Instead, it employs an “artificial neural network”. This is a kind of programme that took its inspiration from the structure of the brain, where many individual items (the nerve cells) solve relatively simple problems (like adding or multiplying values), but are able to tackle much more complex tasks by being connected and existing in large numbers. An artificial neural network takes this concept into the realm of bits and bytes, but plays by the same rules. Learning, just as in the real brain, manifests itself in the change of connections between individual neurons. These connectivity patterns between a multitude of mathematically represented nerve cells are where the solution to a given problem is stored. In consequence, there exists no neat equation that provides the solution, even though the final answer that the machine provides to a given problem is simple. The biological brain has acted as an inspiration, but computer scientists take this metaphor only as far as it is useful to them. To date, making the individual artificial neuron more and more complex, and thus ever more life-like, has not provided any real advantages, and software engineers therefore tend to go for what works best, not necessarily what comes closest to a real nerve cell. In terms of the general architecture however, natural evolution has led to time-tested concepts that are being exploited. Machine learning programmes that analyse images, for instance, draw upon the structure of the visual cortex and the way how it breaks down the task into extracting individual features from a scene. Using artificial networks to understand real ones Within BrainLinks-BrainTools, the task is a formidable one: Machine learning is destined to help analysing signals recorded from brain activity. There is no intrinsic connection though that makes this link between a real and an artificial neural network something special: Neither is machine learning the only approach to make sense of the activity of billions of nerve cells, nor is it less suitable to analyse completely different sets of data, like stock market developments. Ultimately, machine learning should make it possible to read out movement commands from the brain’s surface. These could then be sent to a prosthesis or an assistive device like a robot – the use-case which the strategy “LiNC” within the cluster aims for. So far, it is an open question what kind of commands could actually be discriminated within the patterns of signals that electrodes can read out from the brain’s surface. Could machine learning reliably identify the difference between different grasp movements, for instance as they are necessary to grab either a pen or a bottle? Will the computer look for individual movements, or will it be able to extract whole intentions like “I want to put the bottle back into the fridge”? Such higher concepts would be an elegant way to steer a prosthetic arm. The user would not have to think all commands in the right order and with the right extent, but could leave it to the autonomously planning prosthesis to figure out the best way after sending a general command. However, there is a pitfall: In abstract concepts, it might become even more difficult to know what the activity pattern actually stands for. We might find an activity pattern that appears every time that the person thinks “fridge”, but it might actually stand for an association that the person makes, like “cold”. Between the infinite number of possible thoughts and possible connections, this will be an ambitious challenge for data analysis by machine learning. Furthermore, it remains to be seen how many activity patterns are identical between individuals. Ideally, a patient should not have to go through lengthy training sessions to teach the system all manners of different movements from scratch, but the device should arrive with some pre-installed knowledge of the most basic patterns. Even then, there would be enough that the system would have to learn in order to adapt to the individual patient. After all, no two brains – not even those of twins – are identical. And it is very likely that the same holds true for the brain’s activity patterns. But computer scientists are optimistic that these training sessions would not take too long – rather minutes or hours than days and weeks. But machine learning is not only a useful tool on the user’s end. Likewise, artificial neural networks could come in handy to help a robotic arm or other assistive device to execute movements and find the ideal action to reach a certain goal. What makes machine learning an attractive candidate for this task it that its artificial neural network learned the solution to a problem and wasn’t spoon-fed a singular answer. Therefore, the system is able to dynamically handle changes in the task or the environment in which it has to be executed.
<urn:uuid:98a69b41-9edb-4abe-9d66-1ea163f05967>
2013-05-21T17:18:05Z
CC-MAIN-2013-20
[ [ -0.041748046875, 0.0177001953125, 0.0133056640625, 0.000446319580078125, 0.0908203125, -0.046630859375, -0.0024566650390625, 0.1142578125, -0.00946044921875, -0.0169677734375, 0.050537109375, 0.00543212890625, -0.03466796875, 0.03515625, 0.026611328125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9536
1,482
http://www.brainlinks-braintools.uni-freiburg.de/researchprogram/articles/machine-learning
0.365704
Get involved: send your pictures, video, news and views by texting BWT to 80360 or you can email us » Soldier killed in 'insider attack' An "insider attack" has claimed the life of a British soldier in Afghanistan in the latest in a series of deaths caused by members of Afghan security forces. The soldier, from 28 Engineer Regiment, was shot dead by a suspected member of the Afghan National Army (ANA) on Monday at Patrol Base Hazrat in the Nahr-e Saraj district of Helmand Province, the Ministry of Defence (MoD) announced. His family have been informed. An MoD official in Kabul, who asked to remain anonymous, said six British soldiers were also wounded in the incident. The killed soldier, who was attached to 21 Engineer Regiment, is the latest victim of a "green-on-blue" attack - where Afghans turn their weapons on their coalition colleagues in Helmand Province. Attacks of this kind have claimed the lives of all six British soldiers killed during the current tour, Herrick 17, and so far at least 54 international troops have died as a result of such incidents. Announcing the latest death, the MoD said the soldier died as a result of small arms fire from a suspected member of the Afghan National Army, who turned his weapon on ANA and ISAF soldiers. He was killed by return fire. This insider attack takes to 439 the number of UK service members to have lost their lives since operations in Afghanistan began in October 2001. Major Laurence Roche, spokesman for Task Force Helmand, said: "It is my painful duty to report the death of a soldier from 28 Engineer Regiment, who was shot and killed by a suspected member of the Afghan National Army at a patrol base in the Nahr-e Saraj district of Helmand Province. "This is an extremely sad day for the Corps of Royal Engineers and everyone serving with Task Force Helmand. Our thoughts are with the soldier's family and friends at this time." The Taliban has claimed responsibility for the attack, identifying the shooter as Mohammad Qasim Faroq, and the latest death will undoubtedly heighten fears that insurgents will capitalise on significant reductions in troops in Afghanistan. https://www.gov.uk/government/organisations/ministry-of-defence(Ministry of Defence)
<urn:uuid:38c52c46-c788-4d3a-8215-b69c4eddadb8>
2013-05-21T17:10:03Z
CC-MAIN-2013-20
[ [ 0.00537109375, 0.052978515625, -0.03076171875, 0.0264892578125, 0.1533203125, -0.060302734375, -0.048828125, 0.09033203125, 0.0223388671875, -0.08544921875, 0.048583984375, 0.04541015625, -0.01397705078125, -0.01251220703125, 0.03369140625, 0.0144653...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.977181
490
http://www.braintreeandwithamtimes.co.uk/uk_national_news/10146289.Soldier_killed_in__insider_attack_/
0.169398
Brazil's National Department of Mineral Production (DNPM) is coordinating an analysis of the largest Brazilian sylvite beds found in the state of Amazonas, with the objective of establishing partnerships for exploration. Sylvite is a mineral from which potassium chloride (KCl) is extracted to be used as a fertilizer. Currently, Brazil imports 85% of the total potassium chloride consumed in the country. The remaining 15% come from the Taquari-Vassouras mine, located in the state of Sergipe, in the Northeast of the Brazil. Amazon sylvite beds were found in the 1980s, by Petrobrás. Estimated reserves are to the order of 1 billion tons, more than twice the 450 million-ton beds found initially in Sergipe, where sylvite is explored by the Companhia Vale do Rio Doce. Current annual production of potassium chloride is 600 thousand tons, which supplies part of the Center-South of the country. One of Brazil's government priorities is to invest in mineral research and exploration, says minister of Mines and Energy, Dilma Rousseff. According to the minister, if Brazil is to have development in mining, the government has to have an updated and modern mining department. Brazil was told last year that Canadian mining interests could invest as much as US$ 2 billion in gold, nickel, copper and diamond operations in Brazil. Last year the DNPM inaugurated a data bank network connecting its 25 districts nationwide at a cost of US$ 25 million. Translation: Andréa Alves
<urn:uuid:c687b22d-bb35-412d-9f43-941047ff1e91>
2013-05-21T17:11:03Z
CC-MAIN-2013-20
[ [ 0.005798512604087591, 0.030276203528046608, -0.020892351865768433, 0.012747875414788723, 0.10127478837966919, -0.04143059626221657, 0.02372521162033081, 0.05630311742424965, -0.015226628631353378, -0.03912889584898949, 0.06444758921861649, 0.01000354066491127, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955364
321
http://www.brazzilmag.com/component/content/article/21/1807-brazil-finds-large-sylvite-beds-in-the-amazon.html
0.607176
(AP) Ecuador decision on Assange asylum due By GONZALO SOLANO In the two months since Julian Assange ducked into Ecuador's London embassy to seek political asylum, President Rafael Correa has been consistently deferential to Britain while insisting on his right to protect what he sees as a free speech advocate facing persecution. Asked earlier this week if he felt solidarity with the WikiLeaks founder, Ecuador's leftist president told a TV interviewer "of course, but we also feel solidarity for England and for English and international law." The decision on Assange's petition, which his government said it would announce Thursday, would come only after careful scrutiny of the law and consultations with the governments involved, Correa insisted. And after London's Olympics fest was over. On Wednesday, the cordiality ended. Foreign Minister Ricardo Patino accused Britain of threatening to "assault our embassy" if Assange was not handed over. A storming of Ecuador's embassy would be interpreted as "hostile and intolerable and, as well, an attempt on our sovereignty which would oblige us to respond with the greatest diplomatic force," he said. London had warned Ecuador in writing earlier in the day that a 1987 British law permits it to revoke the diplomatic status of a building if the foreign power occupying it "ceases to use land for the purposes of its mission or exclusively for the purposes of a consular post." Its Foreign Office said later in statement that it is Britain's "obligation to extradite Mr. Assange." The former Australian hacker, who incensed U.S. government officials by publishing hundreds of thousands of secret U.S. diplomatic cables and Iraq and Afghan war dispatches in 2010, took refuge in the embassy on June 19 to avoid extradition to Sweden. He faces questioning there for alleged sexual misconduct and had exhausted all appeals after a 17-month legal battle. In statement, WikiLeaks accused Britain of trying to bully Ecuador into denying Assange asylum. "A threat of this nature is a hostile and extreme act, which is not proportionate to the circumstances, and an unprecedented assault on the rights of asylum seekers worldwide," it said. As news broke of the British warning on Wednesday, police reinforced Scotland Yard's presence at the embassy, which occupies an apartment in a district near the Harrods department store. A small group of Assange supporters later gathered outside overnight and into the morning. The atmosphere was largely peaceful, although police briefly scuffled with a handful of people who refused to be moved. There was no sign police might try to enter the embassy. British officials have vowed not to grant Assange safe passage out of their country. They say they will arrest him the moment he steps foot outside the embassy. The Associated Press found no record of the 1987 law ever being used to justify forcible entry into an embassy. Under the 1961 Vienna Convention, diplomatic posts are considered the territory of the foreign nation. Asked by the AP about Patino's characterization of Britain's warning, the Foreign Office said in an email that the letter "was not a threat" and was intended to clarify "all aspects of British law that Ecuador should be aware of." The Foreign Office insisted it was "still committed to reaching a mutually acceptable solution." Patino said the missive was delivered to his ministry in writing and verbally to its ambassador in London on Wednesday. The Foreign Office statement did not elaborate on Britain's intentions if Assange were to be granted asylum by Ecuador. Assange says the Swedish charges against him are trumped up, and his supporters say they believe the U.S. has secretly indicted him and would extradite him from Sweden. Correa has said Assange could face the death penalty in the U.S. and for that reason he considers the asylum request a question of political persecution. A U.S. and European-trained economist who won the presidency in November 2006 in his first bid for elected office, Correa has called Assange a beacon of free speech but has used criminal libel law to try to silence opposition media at home. WikiLeaks has strengthened him politically against the U.S., whose influence he has sought to diminish in Latin America as he deepens commercial ties with countries including China, which now buys most of Ecuador's oil, and pushes a populist agenda. One cable published by WikiLeaks prompted Correa to expel a U.S. ambassador in 2010 for alleging a former Ecuadorean police chief was corrupt and suggesting Correa had looked the other way. Analysts in Ecuador expressed doubts Wednesday that Britain would raid the embassy. Professor Julio Echeverria of Quito's FLACSO university said Britain "has a long establish tradition in Europe of respecting diplomatic missions," which under international law are considered sovereign territory. A former Ecuadorean ambassador to London, Mauricio Gandara, said he believed that if asylum were granted "Mr. Assange could be in the embassy for a long time." Associated Press writers Raphael Satter in London and Frank Bajak in Lima, Peru, contributed to this report.
<urn:uuid:5def8a61-28eb-48d2-a56f-f5cdce1e3eca>
2013-05-21T17:26:13Z
CC-MAIN-2013-20
[ [ -0.0223388671875, 0.04931640625, -0.005462646484375, 0.0208740234375, 0.103515625, -0.04443359375, -0.0196533203125, 0.10986328125, 0.0029449462890625, -0.05126953125, 0.11181640625, 0.0244140625, -0.0888671875, -0.034912109375, 0.04345703125, -0.017...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970731
1,031
http://www.breitbart.com/Big-Peace/2012/08/16/Ecuador-decision-on-Assange-asylum-due
0.210744
Page not found Unfortunately, the page you are trying to access is not available. We apologize for the inconvenience. Please try the following - Use the navigation bar above to find the link you are looking for - Click the back button to try another link - Please click here to return to the homepage
<urn:uuid:ad69fcc7-f2c5-4501-bffc-c661b7b9bece>
2013-05-21T17:25:23Z
CC-MAIN-2013-20
[ [ 0.015625, -0.019412878900766373, 0.01740056835114956, -0.027462121099233627, 0.08001893758773804, -0.03598484769463539, 0.0012650922872126102, 0.024502841755747795, -0.00736860791221261, -0.05942234769463539, 0.0024562026374042034, 0.05326704680919647, -0.083806...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.857741
64
http://www.brianatwood.com/Lesina/53780344,default,pd.html?variantSizeClass=&cgid=53787393&prefn1=variantColorValue&prefv1=Black%7CBlue&prefn2=catalog-id&prefv2=brianatwood-catalog
0.392711
About the area: Central New Jersey is the fastest growing area in the state and home to many major corporations. The blend of diverse cities and towns allow residents to live and work in close proximity to wide array of shopping, dining and entertainment. Middlesex County parks offer a broad range of excellent facilities, such as East Jersey Olde Towne, a collection of restored, reconstructed and replica buildings from the 18th and 19th centuries in Johnson Park. There are also numerous private recreational complexes in the County, including golf centers and courses. Among the historic sites that dot the county are the Cornelius Low House, which is an outstanding example of Georgian architecture and serves as the County museum, and the Edison Memorial State Park built on the site of Thomas Alva Edison's Menlo Park Library.
<urn:uuid:15473389-7ee3-49a5-9d68-0b1d01f61d17>
2013-05-21T17:16:13Z
CC-MAIN-2013-20
[ [ -0.001416552229784429, -0.0034984545782208443, 0.00849931314587593, -0.0008263221243396401, 0.09684065729379654, -0.004335508216172457, 0.006267170421779156, 0.10508241504430771, -0.010903159156441689, -0.05563186854124069, 0.08997252583503723, 0.034684065729379654,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95253
162
http://www.bridgestreet.com/Central_New_Jersey.htm
0.747511
jifel wrote:"Any fool can make something bigger and more dangerous, but it takes an intelligent man to do the opposite." As if we care. More explosives! Warhead wrote:my head burns with War. Tzan wrote:Silverdream wrote:the link for a kingdom in turmoil leads to grave tidings. Are you getting your ideas for posts from fortune cookies? Paco wrote:So one of the greatest forum battles ever has now been lost forever? Lego Company wrote:...At the same time, the purpose is for the LEGO brand not to be associated with issues that glorify conflicts and unethical or harmful behavior... Colette wrote:Paco wrote:So one of the greatest forum battles ever has now been lost forever? Users browsing this forum: No registered users and 2 guests
<urn:uuid:fa6e234d-a1dd-4b0a-94fb-5bd7983629ad>
2013-05-21T17:47:31Z
CC-MAIN-2013-20
[ [ -0.02760416641831398, 0.01909722201526165, 0.01102430559694767, -0.004817708395421505, 0.0972222238779068, -0.1006944477558136, -0.01145833358168602, 0.08958332985639572, 0.003927951212972403, -0.02864583395421505, 0.0763888880610466, 0.04791666567325592, 0.0260...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.929047
169
http://www.brikwars.com/forums/viewtopic.php?p=35990
0.734247
Simply begin typing or use the editing tools above to add to this article. Once you are finished and click submit, your modifications will be sent to our editors for review. features of Mars ...in a drawing of Mars of that date by Christiaan Huygens. It is an extensive regional slope elongated north to south that drops 4 km (2.5 miles) from its western boundary (Aeria) to its eastern edge ( Isidis). Assiduously observed for more than a century because of its seasonal and long-term variability, especially near its eastern boundary, Syrtis Major was first considered a shallow sea. Later... What made you want to look up "Isidis"? Please share what surprised you most...
<urn:uuid:bb8b8a26-5dd6-47c6-b5cf-50b74678a20f>
2013-05-21T17:10:34Z
CC-MAIN-2013-20
[ [ -0.0015413215151056647, 0.024002259597182274, -0.004706325475126505, 0.006400602404028177, 0.004941641353070736, -0.08245482295751572, -0.006588855292648077, 0.11822289228439331, -0.0009706795681267977, -0.013930723071098328, 0.05798192694783211, 0.04198042303323746...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951981
152
http://www.britannica.com/EBchecked/topic/295400/Isidis
0.485007
Thomas ArcherArticle Free Pass Thomas Archer, (born c. 1668—died May 23, 1743, Whitehall, London, Eng.), British architect and practitioner of what was, for England, an extraordinarily extravagant Baroque style, marked by lavish curves, large scale, and bold detail. Archer, the son of a Warwickshire squire, was educated at Trinity College, Oxford, and then spent four years abroad. After receiving several lucrative royal appointments, he bought the manor of Hale, Hampshire, in 1715 and rebuilt the house and church. Archer’s dynamic work borrowed much from the 17th-century Italian architects Gian Lorenzo Bernini and Francesco Borromini. Although he was not as original as some of the prominent English architects of his time, he was considered important. Most of his designs were executed from 1705 to 1715, including the north front of Chatsworth House (c. 1705) in Derbyshire, Heythrop House (1707–10) in Oxfordshire, a garden pavilion at Wrest Park (1709–11) in Bedfordshire, Roehampton House (c. 1712) in Surrey (now in Wandsworth, London), and the churches of St. Philip (c. 1710–15) in Birmingham, St. Paul (1712–30) in Deptford, and St. John (1713–28) in Westminster. The last two resulted from his appointment in 1711 as a commissioner for the building of 50 new churches. What made you want to look up "Thomas Archer"? Please share what surprised you most...
<urn:uuid:7515a6bc-b503-44fc-a06c-244cf98917b0>
2013-05-21T17:11:08Z
CC-MAIN-2013-20
[ [ 0.01030124630779028, 0.020775623619556427, -0.008223684504628181, -0.022074099630117416, 0.07479224354028702, -0.034106649458408356, -0.01688019372522831, 0.07998614758253098, -0.02389196678996086, -0.0820637121796608, 0.04709141328930855, 0.008223684504628181, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973765
339
http://www.britannica.com/EBchecked/topic/32736/Thomas-Archer
0.557827
Gotthold Ephraim LessingArticle Free Pass Gotthold Ephraim Lessing, (born Jan. 22, 1729, Kamenz, Upper Lusatia, Saxony [Germany]—died Feb. 15, 1781, Braunschweig, Brunswick [Germany]), German dramatist, critic, and writer on philosophy and aesthetics. He helped free German drama from the influence of classical and French models and wrote plays of lasting importance. His critical essays greatly stimulated German letters and combated conservative dogmatism and cant while affirming religious and intellectual tolerance and the unbiased search for truth. Education and first dramatic works. Lessing’s father, a highly respected theologian, was hard put to support his large family even though he occupied the position of pastor primarius (chief pastor). At the age of 12, Lessing, even then an avid reader, entered the famous Fürstenschule (“elector’s school”) of St. Afra, in Meissen. A gifted and eager student, Lessing acquired a good knowledge of Greek, Hebrew, and Latin, while his admiration for the plays of the Latin dramatists Plautus and Terence fired him with the ambition to write comedies himself. In the autumn of 1746 Lessing entered the University of Leipzig as a student of theology. His real interests, however, lay toward literature, philosophy, and art. Lessing became fascinated by the theatre in Leipzig, which had recently been revitalized by the work of a talented and energetic actress, Caroline Neuber. Neuber took an interest in the young poet and in 1748 successfully produced his comedy Der junge Gelehrte (“The Young Scholar”). The play is a delightful satire on an arrogant, superficial, vain, and easily offended scholar, a figure through which Lessing mocked his own bookishness. The other comedies belonging to this Leipzig period of 1747–49 (Damon, Die alte Jungfer [“The Old Maid”], Der Misogyn [“The Misogynist”], Die Juden [“The Jews”], Der Freigeist [“The Free Thinker”]) are witty commentaries on human weaknesses—bigotry, prejudice, nagging, fortune hunting, matchmaking, intrigue, hypocrisy, corruption, and frivolity. Set against this background are virtuous men and women who are considerate and selfless, sensitive and helpful, forthright, and faithful in love. In Die Juden Lessing praised unappreciated nobility of mind and thus struck a blow against bigotry toward the Jews at a time when they were still confined to a ghetto life. Lessing had set himself the goal of becoming the German Molière: in these comedies he most interestingly begins to draw his characters as recognizable individuals, breaking away from the traditional dramatic “types.” Early in 1748 Lessing’s parents, who disapproved of his association with the theatre in Leipzig, summoned him home. But he managed to win their consent to begin studying medicine and was soon allowed to return to Leipzig. He quickly found himself in difficulties because he had generously stood surety for some members of the Neuber company—although himself heavily in debt. When the company folded, he fled from Leipzig in order to avoid being arrested for debt. He eventually reached Berlin in 1748, where he hoped to find work as a journalist through his cousin Mylius, who was by this time an established editor. In the next four years he undertook a variety of jobs, mainly translating French and English historical and philosophical works into German. But he also began to make a name for himself through his brilliant and witty criticism for the Berlinische Privilegierte Zeitung, on which he was book review editor. He also launched a periodical of his own, Beiträge zur Historie und Aufnahme des Theaters (“Contributions to the History and Improvement of the Theatre”), which was discontinued in 1750. What made you want to look up "Gotthold Ephraim Lessing"? Please share what surprised you most...
<urn:uuid:2c6ee432-e81f-49f3-9359-7e6469743b95>
2013-05-21T17:32:29Z
CC-MAIN-2013-20
[ [ -0.002838134765625, 0.00127410888671875, -0.01226806640625, 0.0003452301025390625, 0.072265625, -0.04296875, 0.007720947265625, 0.11474609375, -0.027587890625, -0.060302734375, 0.0223388671875, 0.006011962890625, 0.0076904296875, -0.00112152099609375, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965024
885
http://www.britannica.com/EBchecked/topic/337309/Gotthold-Ephraim-Lessing
0.470307
Simply begin typing or use the editing tools above to add to this article. Once you are finished and click submit, your modifications will be sent to our editors for review. rules of ice hockey The game is divided into three periods of 20 minutes playing time each, with a 15-minute intermission between periods. Hockey games may end in a tie unless the rules stipulate an overtime period to serve as a tiebreaker. In the case of a tie in college hockey, one 10-minute sudden-death overtime period is played in regular season play. NHL teams play a five-minute sudden-death overtime period,... What made you want to look up "overtime"? Please share what surprised you most...
<urn:uuid:4acc9aa0-1820-493f-bb5e-537a64cda9c5>
2013-05-21T17:12:08Z
CC-MAIN-2013-20
[ [ -0.020293444395065308, 0.006431021261960268, -0.0010658822720870376, -0.011766387149691582, 0.07393292337656021, -0.046875, 0.019626524299383163, 0.08993902802467346, -0.020293444395065308, -0.02067454345524311, 0.07278963178396225, 0.05525914579629898, -0.06478...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.925547
146
http://www.britannica.com/EBchecked/topic/436014/overtime
0.322915
René Waldeck-RousseauArticle Free Pass René Waldeck-Rousseau, in full Pierre-marie-rené Waldeck-rousseau (born Dec. 2, 1846, Nantes, France—died Aug. 10, 1904, Corbeil), politician who, as premier of France, settled the Dreyfus Affair. He was also responsible for the legalization of trade unions in France (1884). A rising conservative lawyer, known for his eloquence and mastery of legal detail, Waldeck-Rousseau was elected a deputy in 1879. In 1881 he became minister of the interior in the Cabinet of Léon Gambetta, one of the founders of the Third Republic, and he filled the same post, under Jules Ferry, from 1883 to 1885. In 1884 he sponsored the Loi Waldeck-Rousseau, which made trade unions legal, though with important restrictions. After another term as deputy (1885–89), he retired to make his fortune at the bar. In 1894, however, he became a senator. In June 1899, when demonstrations and counterdemonstrations over the Dreyfus Affair threatened public order, Waldeck-Rousseau was asked to form a “government of republican defense.” His Cabinet was based on pro-Dreyfus moderates but included members of both the right and the left, such as Alexandre Millerand, the first Socialist to hold Cabinet office. When a military court persisted in finding Alfred Dreyfus guilty of treason (September 1899), though some of the evidence against him was known to be forged, the government persuaded the president to pardon him in the hope of avoiding further controversy. The most important measure of the later part of Waldeck-Rousseau’s administration was the Associations Act of July 1901, which abolished all restrictions on the right of association for legal purposes. This freedom was withheld from religious associations, however, because they were directed from abroad. Waldeck-Rousseau personally thought the act too severe to the religious congregations. He resigned because of ill health in June 1902 but emerged from retirement to protest against the interpretation of the law by his successor, the militantly anticlerical Émile Combes, who refused to authorize any religious associations and was responsible for the closing of thousands of Roman Catholic schools. What made you want to look up "Rene Waldeck-Rousseau"? Please share what surprised you most...
<urn:uuid:67fd9b15-0044-4be2-a567-5fdb3136fe58>
2013-05-21T17:33:07Z
CC-MAIN-2013-20
[ [ 0.007720947265625, 0.0269775390625, -0.0284423828125, -0.0277099609375, 0.072265625, -0.04736328125, -0.0030517578125, 0.12890625, -0.0245361328125, -0.041015625, 0.09033203125, -0.0001506805419921875, -0.07275390625, -0.0380859375, 0.03955078125, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.979648
528
http://www.britannica.com/EBchecked/topic/634389/Rene-Waldeck-Rousseau
0.647047
Evans CarlsonArticle Free Pass Evans Carlson, in full Evans Fordyce Carlson (born Feb. 26, 1896, Sidney, N.Y., U.S.—died May 27, 1947, Plymouth, Conn.), U.S. Marine officer during World War II who led guerrilla fighters (Carlson’s Raiders) on daring military incursions in the Pacific area. Carlson ran away from home to enlist in the U.S. Army at age 16. During World War I he was made a captain and served as assistant adjutant general on the staff of General John J. Pershing in France and Germany and in the army of occupation (1917–19). He returned to civilian life in 1920 but enlisted as a private in the Marines in 1922, being commissioned a second lieutenant the following year. Carlson first served in China from 1927 to 1929 and returned in 1937 to spend nearly two years as an observer of the Chinese armies, including nearly a year with guerrillas behind Japanese lines. Back in the United States, he wrote and lectured extensively on the peril of Japanese expansionism in Southeast Asia. He warned against sending such war materials as scrap steel to a potential enemy and described the Chinese potential for resisting Japanese attack. In 1941 Carlson became commander of the 2nd Marine Raider Battalion (Carlson’s Raiders) and, using his experience in China to train the group, led it in a surprise attack on Makin Island in the Gilberts (August 1942) as well as in a month-long raid beyond Japanese lines on Guadalcanal (November). His leadership was characterized by extraordinary personal courage and endurance and unusual democratic discussion within the ranks. The morale of his men was among the highest in the armed forces; to friends he referred to his group as the Kung-Ho (“Work Together”), or Gung-Ho, Battalion. Malaria and wounds forced his retirement from active service in 1946, at which time he held the rank of brigadier general. What made you want to look up "Evans Carlson"? Please share what surprised you most...
<urn:uuid:76a153fe-c88d-4112-a500-39f680ab5bc6>
2013-05-21T17:37:35Z
CC-MAIN-2013-20
[ [ -0.01992187462747097, 0.04609375074505806, -0.02994791604578495, 0.01406249962747097, 0.08124999701976776, -0.05859375, -0.02304687537252903, 0.09583333134651184, -0.02304687537252903, -0.08906249701976776, 0.0807291641831398, 0.05286458507180214, -0.03984374925...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974262
431
http://www.britannica.com/EBchecked/topic/96112/Evans-Carlson
0.487282
Hittite, 14th-13th century BC Probably from Anatolia (modern Turkey) This beautiful figurine of a young Hittite girl is made of ivory. Her hair is drawn back and hangs in a pig-tail down her back. She stands in a formal pose with her hands by her sides. The proportions of the figure, lacking curves, show her youth. The treatment is naturalistic except for the stylized ears and the triangles indicating the knees. The pubic triangle was originally inlaid, and other parts of the ivory may have been covered in precious metal. The function of the figurine is unknown, but ivory was widely used in the ancient world to decorate furniture The dowel hole in the square base of the figure suggests it was once attached to something. From around 1650 BC a Hittite king rebuilt Hattusa (modern Bogazköy) and made it his capital. Between about 1400 and 1200 BC the Hittites established one of the great empires of the ancient Near East, extending into western Anatolia and south into Syria. They adopted many of the traditions of Syria and Mesopotamia, including the cuneiform writing system, and vied with the Egyptians for control of the wealthy Canaanite cities on the coast. D. Collon, Ancient Near Eastern art (London, The British Museum Press, 1995)
<urn:uuid:4a91db8b-9052-4762-a3f1-6ccaf27b61e4>
2013-05-21T17:30:36Z
CC-MAIN-2013-20
[ [ -0.0006621275097131729, -0.00948142446577549, 0.0009070240193977952, -0.008272059261798859, 0.06346749514341354, -0.0603715181350708, -0.021478328853845596, 0.05882352963089943, -0.017124613747000694, -0.014512384310364723, 0.04760061949491501, 0.003555533941835165,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949523
282
http://www.britishmuseum.org/explore/highlights/highlight_objects/me/i/ivory_figurine.aspx
0.618323
Mary Chipperfield wearing a swimming costume walks over to a truck where a Bengal tiger called Suki is sat, she gets out and walks round the swimming pool. Jim Chipperfield films them with a cine camera, Mary splashes Suki to encourage her into the pool. A little boy in a cowboy... Queen Mary visits Wandsworth. Princess Mary visits Bristol. Close up shot of Queen Mary. Princess Mary attends wedding. Queen Mary visits Hampstead, London. Shots of the liner ship 'Queen Mary' in dock. Footage of Queen Mary and Princess Mary. Queen Mary visits buildings, possibly at the seaside.
<urn:uuid:4f645654-3a8c-4f33-8c69-4b813d6838f7>
2013-05-21T17:09:57Z
CC-MAIN-2013-20
[ [ -0.01680222526192665, 0.054794520139694214, -0.00130431295838207, 0.0074379281140863895, 0.09888698905706406, -0.01043450366705656, -0.008508133701980114, 0.09803082048892975, -0.0015584867214784026, -0.03638698533177376, 0.05821917951107025, 0.010755565017461777, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.90065
139
http://www.britishpathe.com/video/swimming-tiger/query/Marys
0.325928
Austin is a dazzling city, in which you can listen to a wide range of music. In the summer, you can have a look at all the bats hanging from the bridge on Congress Avenue. Austin, the capital of the State of Texas, is situated on a number of hills along the Colorado River. The city was founded in 1838 and was initially called Waterloo. The main industries of Austin are computers, steel and furniture. Agriculture is also an important source of income for the population of approximately 450,000. The appearance of the city is mainly determined by the Capitol, which is built with pink granite. It was built following the model of the Capitol in Washington, although is about 90 metres higher and somewhat larger. The Governor’s Mansion, a museum of the history of Texas, is also worth a visit. Two important streets in Austin are Congress Avenue, an enjoyable shopping street known for its thousands of bats, and Sixth Street, a mixture of restaurants, shops and clubs.
<urn:uuid:88795814-be5d-44e1-b321-92b2419b6323>
2013-05-21T17:31:04Z
CC-MAIN-2013-20
[ [ -0.01097972970455885, 0.0017859656363725662, -0.0038006757386028767, -0.0020235078409314156, 0.09628378599882126, -0.01942567527294159, 0.002621762454509735, 0.0520833320915699, -0.022663287818431854, -0.012809684500098228, 0.08502252399921417, 0.020551802590489388,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982601
200
http://www.brusselsairlines.com/en_es/look-for/destinations/united_states/austin.aspx
0.802143
Get Ready for Fuel Switching In regions of the country that rely primarily on heating oil or propane for heat, including the Northeast and parts of the Upper Midwest, something pretty surprising has happened over the past six months. The cost of delivered heat from these fuels has risen above that of electricity—even when that electricity is used for electric-resistance heating in baseboard radiators. (For more on comparing fuel costs,.) Electric-resistance heat can sometimes be cheaper than even natural gas, particularly for buildings with old furnaces and leaky, poorly insulated ducts. If a heat pump is used to double or triple the efficiency of electric heating, heating with electricity is almost always cheaper than using natural gas, oil, or propane (though purchasing and installing a heat pump is expensive). Barring a significant price drop for heating oil or propane, and if the price of natural gas keeps rising faster than that of electricity (which is regulated), lots of buildings may be switching from their standard heating fuels to electric heat this coming winter—which could wreak havoc in the utility industry. ...
<urn:uuid:09f62520-5e4c-4ebd-9d83-3ce9fbec9bd5>
2013-05-21T17:44:11Z
CC-MAIN-2013-20
[ [ -0.01672862470149994, 0.002468633931130171, -0.009119424037635326, 0.010513476096093655, 0.07853160053491592, -0.10269516706466675, -0.003514172974973917, 0.08782527595758438, -0.03671003878116608, -0.0296236053109169, 0.06598512828350067, 0.024976765736937523, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947041
222
http://www.buildinggreen.com/auth/article.cfm/2008/6/27/Get-Ready-for-Fuel-Switching/
0.238459
Addressing cadets at South Carolina's Citadel military academy, Romney attacked President Obama for forfeiting U.S. military and economic primacy and promised to restore America's global dominance by increasing defense spending and taking a more aggressive approach toward global threats. Here's an excerpt from his speech: "This century must be an American Century. In an American Century, America has the strongest economy and the strongest military in the world. In an American Century, America leads the free world and the free world leads the entire world. God did not create this country to be a nation of followers. America is not destined to be one of several equally balanced global powers. America must lead the world, or someone else will. Without American leadership, without clarity of American purpose and resolve, the world becomes a far more dangerous place, and liberty and prosperity would surely be among the first casualties.... ...This is very simple: If you do not want America to be the strongest nation on Earth, I am not your President. You have that President today." If that sounds a lot like a page out of the George W. Bush playbook, that's because it basically is. Romney's foreign policy team is stacked deep with former Bush administration officials, and his platform adheres closely to their hardline — and occasionally controversial — view of American exceptionalism. Even the venue of Romney's speech harkens back to the Bush era — George W. Bush rolled out his first foreign policy campaign platform at the Citadel in 2000. The Romney plan lays out eight actions that he will take during his first 100 days in office to roll back Obama's policies and "set a new tone" for America. Here's a rundown: - Build a bigger Navy. Romney also promised to reverse Obama's "massive defense cuts," a reference to the $350 billion spending cuts included in this summer's debt ceiling deal. - "Strengthen and repair relationships with steadfast allies" — namely Israel, the United Kingdom, and Mexico. Romney promises to reduce aid to Palestinians if they keep trying to pursue statehood at the UN. He also says he will enhance military cooperation with Mexico, but it is unclear how a border fence will help "repair" relations. - Take a harder line against Iran. Romney says he will "make clear that the military option is one the table" and step up military aid to Israel. He also rejects diplomatic engagement as an option. - Start building a missile defense system again. - Appoint a "regional director" to deal with the Arab Spring. - Increase trade with Latin America. - Do another review of the situation in Afghanistan. - Formulate a new strategy against cyberthreats.
<urn:uuid:1789bbca-11c9-4bd1-a6ae-d63cd924f49f>
2013-05-21T17:24:43Z
CC-MAIN-2013-20
[ [ -0.012939453125, 0.0380859375, 0.006072998046875, 0.0390625, 0.08935546875, -0.045166015625, -0.00860595703125, 0.1455078125, -0.0361328125, -0.05322265625, 0.06787109375, 0.0255126953125, -0.038330078125, 0.041259765625, 0.060546875, 0.0126953125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946763
550
http://www.businessinsider.com/if-you-liked-george-bush-you-will-love-mitt-romneys-foreign-policy-2011-10
0.158942
The National Journal reports today that TED is refusing to publish a recent talk from megarich venture capitalist Nick Hanauer, which argued that rich people actually don't create jobs, and that cutting their taxes is harmful to the middle class. Obviously, Hanauer's position is anathema to most of his fellow billionaires. Although his talk was well-received, TED officials eventually decided that it was too "politically controversial" to post the presentation on the TED website. In an email to Business Insider this afternoon, Hanauer said that he accepts TED's right not to post his presentation, but that he disagrees with their reasoning: "I got a sensational reaction to the talk at the conference itself, including a big standing ovation. Even the people who I spoke to who disagreed were intrigued and moved by the eco-systemic argument," Hanauer said in the email. "And many of the talks at the conference and on the TED website are similarly controversial. That's what makes them interesting." He added: "Further, if it was too political, why have me do it in the first place? They knew months in advance what I would speak about and I gave the talk word for word. My arguments threaten an economic orthodoxy and political structure that many powerful people have a huge stake in defending. They will not go easily." Hanauer also passed along the slides he used for his presentation, which was based off of his new book with Eric Liu, The Gardens of Democracy, A New American Vision of Citizenship, Economics and the Role of Government. We don't know exactly how the speech went with slides, but you can read the speech here.
<urn:uuid:fc286bbf-4f1a-44d7-ae39-b028e368404b>
2013-05-21T17:16:30Z
CC-MAIN-2013-20
[ [ -0.0392252616584301, 0.02587890625, 0.02042643167078495, -0.00262451171875, 0.0865885391831398, -0.0582682304084301, 0.014322916977107525, 0.0963541641831398, -0.02327474020421505, -0.04052734375, 0.0540364570915699, 0.008992512710392475, -0.02994791604578495, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988442
337
http://www.businessinsider.com/nick-hanauer-ted-presentation-about-why-rich-people-arent-job-creators-2012-5?pundits_only=0&get_all_comments=1&no_reply_filter=1
0.267936
by Michael F. Potter, Extension Entomologist University of Kentucky College of Agriculture Paper wasps, hornets and yellowjackets are a potential health threat to Kentuckians. Hundreds (perhaps thousands) of people in the United States die each year from allergic reactions to the venom of these insects. Wasps, hornets and yellowjackets are more dangerous and unpredictable than honey bees and should be treated with respect; nests should be eliminated with great care and in a specific manner. Paper wasps, hornets and yellowjackets construct nests of a paper-like material which is a mixture of finely chewed wood fragments and salivary secretions of the wasps. Paper wasps typically build their umbrella-shaped nests under eaves and ledges. These wasps are not as aggressive as yellowjackets or hornets, and can be eliminated rather easily with a wasp and hornet spray sold at most grocery and hardware stores. These formulations have an added advantage in that they often spray as far as 20 feet. Treatment of wasps, hornets, and yellowjackets is best performed at night; paper wasps can be eliminated during the daytime provided you do not stand directly below the nest during treatment. Most wasp and hornet sprays cause insects to drop instantly when contacted by the insecticide. Standing directly below a nest increases one's risk of being stung. Following treatment, wait a day to ensure that the colony is destroyed, then scrape or knock down the nest. This will prevent secondary problems from carpet beetles, ants and other scavenging insects. Hornets are far more difficult and dangerous to control than paper wasps. The nests resemble a large, inverted tear-drop shaped ball which typically is attached to a tree, bush or side of a building. Hornet nests may contain thousands of wasps which are extremely aggressive when disturbed. The nests are often located out of reach and removal is best accomplished by a professional pest control firm. A full wasp suit sealed at the wrists, ankles and collar is recommended when disposing of a hornet nest. Treatment can be accomplished by applying a wasp freeze-type, aerosol insecticide or dust formulation (Sevin, or Ficam,) directly into the nest opening. Hornet nests have a single opening, usually toward the bottom, where the wasps enter and exit. It is essential that the paper envelope of the nest not be broken open during treatment or the irritated wasps will scatter in all directions, causing even greater problems. Following treatment, wait at least a day before removing the nest to ensure that all of the wasps are killed. If hornets continue to be observed, the application may need to be repeated. Experienced pest control operators will sometimes remove a hornet nest which is attached to a branch by slipping a plastic garbage bag over the intact nest and clipping it at the point of attachment. This technique should not be attempted by anyone else and should only be done at night with a wasp suit. Yellowjackets are another dangerous wasp encountered around homes and buildings. Nests are often located underground in an old rodent burrow, beneath a landscape timber, or in a rock wall or wall of a building.If the nest can be located, it can usually be eliminated by carefully applying a wasp spray insecticide into the nest opening. Sevin (tm), or Ficam (tm), dust is also very effective provided a handduster or similar type applicator is used to dispense several puffs of the insecticide dust in to the nest opening (an empty, dry liquid detergent bottle, filled no more than halfway with dust and shaken before dispensing works well). Treatment should be performed late at night after all yellowjackets are in the nest and less active. It's best to pinpoint the nest opening during the daytime so you will remember where to direct your treatment after dark. Approach the nest slowly and do not shine the beam of the flashlight directly into the nest entrance as this may startle the wasps; instead, cast the beam to the side to illuminate the nest indirectly and place the light on the ground rather than in your hand. Similar to hornets, yellowjackets are extremely aggressive when the nest is disturbed. It may be prudent to call a professional pest control company, particularly when access to the nest is difficult. An Alternative Solution If the nest is located away from high traffic areas, another option is to wait and do nothing. In Kentucky, wasp, hornet and yellowjacket colonies die off naturally after the weather turns cold, and the paper carton disintegrates over the winter months. People Who Are Allergic to the Venom Wasp, hornet and yellowjacket stings can be life-threatening to persons who are allergic to the venom. People who develop hives, difficulty breathing or swallowing, wheezing or similar symptoms of allergic reaction should seek medical attention immediately. Itching, pain and localized swelling can be somewhat reduced with antihistamines and a cold compress. CAUTION! Pesticide recommendations in this publication are registered for use in Kentucky, USA ONLY! The use of some products may not be legal in your state or country. Please check with your local county agent or regulatory official before using any pesticide mentioned in this publication. Of course, ALWAYS READ AND FOLLOW LABEL DIRECTIONS FOR SAFE USE OF ANY PESTICIDE!
<urn:uuid:2901cc8f-179a-4f0c-8a67-ff4adb28b0db>
2013-05-21T17:43:54Z
CC-MAIN-2013-20
[ [ -0.0137939453125, 0.01373291015625, -0.01141357421875, 0.0284423828125, 0.1279296875, -0.0732421875, -0.001617431640625, 0.1298828125, -0.01446533203125, -0.04931640625, 0.11181640625, 0.0194091796875, -0.007110595703125, 0.00885009765625, 0.03125, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942695
1,112
http://www.ca.uky.edu/entomology/entfacts/ef620.asp
0.187471
Canada and Belgium are two officially multilingual countries with federal political systems. For a great many years, our countries have maintained excellent bilateral relations based on bonds of friendship and trust, as well as the shared values of liberty, democracy, solidarity and tolerance. These bonds were strengthened by Canada’s contribution to the liberation of Belgium in the First and Second World Wars and the major convergences between the foreign policies of our two countries, based on a strong commitment to multilateralism on the basis of international law, the promotion of good governance and the maintenance of strong transatlantic ties. Canada and Belgium have both deployed troops to Afghanistan in order to support that country's security, governance and development. Both countries are also actively seeking solutions to crises and conflicts, notably in Africa, and the fight against arms build-up and the recruitment of child soldiers. We also collaborate on issues of natural resource development in situations of conflict. Canada and Belgium cooperate, in particular, in the context of the United Nations (UN), the North Atlantic Treaty Organisation (NATO), the Organisation internationale de la Francophonie (OIF), the Organization for Security and Cooperation in Europe (OSCE), and the Organisation for Economic Co-operation and Development (OECD). Belgium's role in the European Union is another important aspect of our bilateral political dialogue. In recognition of the importance of strengthening the ties between our two countries and of establishing a "privileged dialogue", the Canadian and Belgian departments of foreign affairs signed a joint declaration on December 16, 1999, concerning the strengthening of bilateral relations. Belgium and Canada also signed bilateral agreements in the areas of taxation, social security, judicial cooperation on crime, air transportation, reciprocal recognition of drivers’ licences, as well as in scientific, industrial and technological cooperation. In 2005, Belgium and Canada signed an agreement on youth mobility. The agreement, which came into force January 1, 2007, allows young Belgians to travel to Canada and young Canadians to Belgium, for no more than a year, in order to visit the country and discover its culture while having the opportunity to work there. The Government of Canada maintains three diplomatic missions in Belgium: the Embassy of Canada to the Kingdom of Belgium and the Grand-Duchy of Luxembourg, the Mission of Canada to the European Union, and the Canadian Joint Delegation to NATO. Canada also has an honorary consul for Flanders. Moreover, the Province of Quebec is represented by the Délégation générale du Québec in Brussels. In Canada, Belgium is represented by its Embassy in Ottawa and its consulates in Montreal and Toronto; it also has a network of honorary consuls in Halifax, Edmonton, Quebec City, Vancouver and Winnipeg. The three Belgian regions (Walloon Region, Brussels-Capital Region and Flemish Region) have separate economic and trade offices in Montreal and a shared office in Toronto. The Walloon Region and the French community of Belgium also have a delegation in Quebec City. Canadian exports to Belgium were close to CAD 2.4 billion in 2011. It is important to note that the port of Antwerp is a major point of entry for Canadian goods in Europe. Belgium also serves as a point of entry to Europe as 70% of Belgium’s trade is conducted with its European Union (EU) partners. In 2011, Canada's imports from Belgium were valued at nearly CAD 1.7 billion. Bilateral investment is very important for both countries. Canadian investments in Belgium totalled nearly CAD 2.75 billion in 2011, ranking 26th among Canadian direct investment destinations globally. The stock of Belgian direct investment in Canada was worth CAD 4 billion in 2011, making Belgium the 14th largest foreign direct investor in Canada on a global basis. There are over 70 Belgian subsidiaries in Canada and about the same number of Canadian subsidiaries in Belgium. Canadian and Belgian institutions and companies enjoy collaborative relations in science and technology, mostly based on similar approaches to development and synergies in a range of sectors, including life sciences, microelectronics, environmental and imaging technologies. Numerous cooperative agreements have been signed in this area between the three Belgian regions and the provinces of Quebec, Ontario and Alberta. For more information on Canada-Belgium trade and investment, please see the following pages. Canadian companies interested in doing business in Belgium should consult the section entitled "Services for Canadian companies.” Belgian companies interested in Canadian business opportunities are invited to consult the section entitled “Services for non-Canadian companies” (information available in French and Dutch). Cultural relations between Canada and Belgium have grown and diversified over the past 30 years. Belgian programmers frequently host Canadian artists, both Anglophone and Francophone, in the areas of theatre, music, cinema and literature, the visual arts, and dance. Every year, there are several dozen cultural events, featuring individual artists or groups of artists, particularly in contemporary arts, new technologies and new media. Conversely, many Belgian artists perform in Canada, whether in the plastic arts, music, children’s theatre, and especially dance, as part of festivals or in art centres in major cities (Montreal, Quebec City, Ottawa, Toronto, Vancouver). Belgian and Canadian universities have been developing cooperative and exchange agreements and relations for many years. About 20 Canadian universities work with Belgian universities in areas as varied as pure sciences, the humanities and social sciences, health, etc. The North American Studies Centre (CENA) at the Université Libre de Bruxelles is a reference not only in Canadian studies, but also for Belgium’s knowledge of Canada. In Flanders, Studiegenootschap Canada (the Flemish association for Canadian studies) supports teaching and research on Canada by organizing and participating in colloquiums, seminars, courses and publications. The Université de Liège has a Centre for Quebec Studies. Belgian research centres also cooperate in bilateral or multilateral programs through framework agreements with the European Union. Occasionally, there are even direct collaborations between Belgian centres and Canadian businesses (ex. the Metallurgy Research Centre at the Université de Liège or IMEC, a microelectronics centre affiliated with the University of Leuven (KUL). * Note: To view the PDF version of a document you may require Acrobat Reader available free of charge from Adobe or other software capable of viewing PDF files. An accessible version of Acrobat Reader, which includes support for screen readers, is also available. Alternatively, you can convert a PDF file to HTML or ASCII text by using one of Adobe’s conversion services.
<urn:uuid:586227b3-3cdb-4d9a-8692-27f6c17bf7ea>
2013-05-21T17:17:29Z
CC-MAIN-2013-20
[ [ -0.0169677734375, 0.0308837890625, 0.000431060791015625, 0.034912109375, 0.13671875, -0.0303955078125, -0.02392578125, 0.10400390625, -0.03125, -0.03369140625, 0.0869140625, -0.0087890625, -0.10986328125, 0.01031494140625, 0.047607421875, 0.013916015...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945362
1,349
http://www.canadainternational.gc.ca/belgium-belgique/bilateral_relations_bilaterales/index.aspx?lang=eng&menu_id=28
0.320766
Posted online October 2, 2006 on www.jco.org . In an analysis of more than 2,500 patient records, Canadian researchers have found that it appears to be safe for women with early-stage breast cancer to wait up to 12 weeks after surgery to begin chemotherapy. However, they also reported for the first time that a delay of more than 12 weeks can increase the risk of breast cancer recurrence and reduce overall survival, compared with starting treatment within 12 weeks of surgery. The researchers reviewed data on 2,594 women receiving chemotherapy (including treatment with the drugs doxorubicin, cyclophosphamide, epirubicin, methotrexate, and/or 5-fluorouracil) after surgery for stage I and II breast cancer between 1989 and 1998 at the British Columbia Cancer Agency. Five years after diagnosis, the likelihood of cancer returning and overall survival were similar among women starting chemotherapy within 12 weeks of surgery, but among those who waited more than 12 weeks, the risk of recurrence increased and survival was significantly reduced. Among women who started chemotherapy between 4 and 12 weeks after surgery, 84-89% were alive 5 years after diagnosis. However, 5-year survival dropped to 78% among women who did not receive chemotherapy until more than 12 weeks following surgery. What Does This Mean for Patients? These findings suggest that women with early-stage breast cancer can take some time before they start chemotherapy to gather information, consider their options, and be actively involved in treatment decision-making. Such steps have been shown to reduce anxiety and depression associated with breast cancer. However, to achieve the full benefit of chemotherapy, patients should not delay further, and should ensure that they start treatment within three months of surgery. Patients should always discuss their best course of action with their doctors.
<urn:uuid:8605ca45-1698-4c6f-9ff9-f2bd60b12a6c>
2013-05-21T17:17:20Z
CC-MAIN-2013-20
[ [ -0.008757716044783592, 0.018672838807106018, 0.004436728544533253, -0.0183641966432333, 0.09814814478158951, -0.09506172686815262, -0.0029706789646297693, 0.05833333358168602, -0.0367283932864666, -0.0466049388051033, 0.056790124624967575, 0.009876543655991554, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970512
370
http://www.cancer.net/print/24811
0.361793
What was the calendar year on June 30 preceding the first season of his first NHL contract? Filling out this field accurately is the most critical step in the waiver calculation. If this is inputted incorrectly, the result will be calculated incorrectly. This field should not be confused with the year the contract was signed. For example, Justin Abdelkader signed his first NHL contract on April 4, 2008, with 2007-08 as the first season of that contract. The calendar year on June 30 preceding the 2007-08 season is 2007, so 2007 would be selected here. Conversely, Colton Gillies signed his first contract on March 31, 2008, with 2008-09 as the first season. The calendar year on June 30 preceding the 2008-09 season is 2008, so 2008 would be selected here. Contracts signed between March 1 and the end of a league year are most problematic for filling out this field because the first season of the contract can either be the current season or the following season. In the event of a contract slide, years that have slid count as the first season of the contract. For example, Thomas Hickey signed his first NHL contract on July 10, 2007, with 2007-08 to be its first season. But his contract slid twice and now runs from 2009-10 to 2011-12. Nonetheless, 2007-08 is counted as his first season for waiver purposes, and the calendar year on June 30 preceding the 2007-08 season is 2007, so 2007 would be selected here. In roughly 80 percent of the cases, this is an easy field to fill out, and the year often ends up aligning with the year the contract was actually signed. If you aren't certain about this field for a specific player, email firstname.lastname@example.org.
<urn:uuid:dbfc9d71-b858-482f-81ce-205e139dd587>
2013-05-21T17:33:17Z
CC-MAIN-2013-20
[ [ -0.014710770919919014, 0.035904254764318466, -0.015375664457678795, 0.006773603614419699, 0.035904254764318466, -0.08477393537759781, -0.004114029463380575, 0.08111701905727386, -0.04488031938672066, -0.0226063821464777, 0.11968085169792175, 0.04787234216928482, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978282
364
http://www.capgeek.com/waiver-calculator/?player_submit=1&player_id=1976
0.973011
upper house of Tennessee's General Assembly is called the Senate. The state is divided into 33 senatorial districts, from each of which one senator is elected. Senators are elected to four-year terms with those from even-numbered districts being elected in the same general election, and those representing odd-numbered districts being elected two years later. Thus, about half of the 33 senators are standing for election at the same time. Re-election to the Senate is constitutionally permissible, as it is in the House, and there is no limit on the number of terms a legislator may serve. To qualify for election to the Senate, one must be 30 years old, a U.S. citizen, a state resident for three years and a resident of the district in which he is elected for one year immediately preceding his election. The leader of the Senate, or speaker, is also the state's lieutenant governor. The speaker of the Senate is elected by the Senate at each organizational session of the General Assembly. The lieutenant governor stands in immediate succession to the governorship if such is necessary. Other leaders in the Senate include the speaker pro tem, deputy speaker and the majority and minority leaders, who are the primary spokesmen for their respective parties concerning Senate matters. Two other key Senate officers are the Democratic and Republican caucus chairmen, who preside over meetings of their political parties to consider and formulate party policy. The Senate has certain powers and obligations that are different from those of the House of Representatives. The Senate is given the power to try impeachment proceedings initiated by the House. Any officer of the state may be impeached, but two-thirds of the Senate must concur before removal from office occurs. Political makeup of the Senate of the 108th General Assembly is 26 Republicans and 7 Democrats. The 108th General Assembly will convene on January 8, 2013.
<urn:uuid:b0878b9e-86bc-404c-829c-7adb810ea43e>
2013-05-21T17:10:09Z
CC-MAIN-2013-20
[ [ -0.013172646053135395, 0.0278867706656456, -0.036715246737003326, 0.0007269478519447148, 0.06558296084403992, 0.004028867930173874, -0.019478699192404747, 0.04988789185881615, -0.015484865754842758, -0.0641816109418869, 0.09809417277574539, 0.017937220633029938, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965138
388
http://www.capitol.tn.gov/senate/
0.399247
This scholarship is for current high school sophomores who reside in or attend school in the Greater Los Angeles area in California. To qualify for this scholarship, applicants must demonstrate academic achievement and potential for post-secondary success; have limited family and/or community support and/or limited income; and demonstrate commitment to their community and/or social justice issues. How easy is it to apply? Not too bad This scholarship's application process may have items such as essays that could take a couple hours. How much competition is there? This scholarship won't have as many applicants as most. The deadline for this scholarship has passed. |Award Range:||$1,000 - $10,000|
<urn:uuid:5613ab52-cf5f-4fee-b1aa-3610a51f14b2>
2013-05-21T17:48:03Z
CC-MAIN-2013-20
[ [ -0.05008012801408768, 0.012770432978868484, 0.018930288031697273, 0.0034304887522011995, 0.037860576063394547, -0.028245192021131516, -0.01252003200352192, 0.06570512801408768, -0.00565905449911952, -0.008012820966541767, 0.04767628386616707, 0.02083333395421505, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955057
147
http://www.cappex.com/scholarship/listings/Beat-the-Odds-Scholarship-Program--Los-Angeles/-s-d-40560/
0.170033
Car Audio Forum - CarAudio.com Car Audio Discussion > ID ctx65cs tweeter's. On-axis or off-axis? View Full Version : ID ctx65cs tweeter's. On-axis or off-axis? 07-11-2012, 08:42 PM Anyone with experience running the Image Dynamics ctx65cs' did you run them on-axis or off-axis? Which did you have better luck with?
<urn:uuid:799280d0-2eaa-40aa-be74-26d832f0b25a>
2013-05-21T17:39:40Z
CC-MAIN-2013-20
[ [ -0.0024701287038624287, 0.02818627469241619, 0.023743873462080956, -0.0036764706019312143, 0.0018478094134479761, -0.034620098769664764, -0.0071614584885537624, 0.10477941483259201, -0.08149509876966476, 0.024203430861234665, 0.09681372344493866, 0.00191482843365520...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.793971
98
http://www.caraudio.com/forums/archive/index.php/t-551134.html?s=aa560374520773c1281c13c1f2e45a1b
0.3045
Campus Placement Questions Of Wipro Below are few sample questions compiled on the basis of latest recruitment papers of the company. These are technical questions and have been solved for you. You can expect questions of similar nature in the placement tests. Expansion of CDMA ? a) Code Division Multiple Access b) Cell Data Multiple Access c) Code Data Multiple Access d) None of the above. The above aptitude question is from communication systems. However this question is a basic one which everyone should remember. The answer is a)Code Division Multiple Access. You could expect similar questions like expansion of GSM, GPS etc in wipro placement papers. Which of the following layers are not in TCP / IP? a) Application Layer b) Network Layer c) Bridging Layer d) Data Link Layer Answer is c) Bridging Layer. You can always expect one or two questions from computer networks in What will printf(++i) in C will do? a) Print i and then increment i by 1 b) Increment i by 1 and then print i c) Print i and then increment i by i d) Increment i by i and then print i This is one common question which you can expect in Wipro Papers. These kinds of questions dealing with basics of C statements are common in other company placemente papers as well. This includes TCS, Accenture, HCL, HP etc. What is the function of assembler? a) Converts assembly to binary code b) Converts high level language code into assembly code c) Interprets and executes assembly code d) Noe of the above Answer a) Assembly to binary code
<urn:uuid:33bd0fc1-9129-4aa2-937c-85511723c6b3>
2013-05-21T17:43:26Z
CC-MAIN-2013-20
[ [ -0.03474025800824165, 0.017938312143087387, 0.015827922150492668, -0.0066558439284563065, 0.09025973826646805, -0.05064935237169266, -0.004707792308181524, 0.0707792192697525, -0.01753246784210205, 0.006128246895968914, 0.13571429252624512, 0.008522727526724339, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.861347
366
http://www.careersvalley.com/campus-placement-papers-wipro-sample-technical-questions
0.321354
The Village of Waterloo, on the Elkhorn and Platte Rivers, was founded by two men: John Logan, who came in 1863 right after his discharge from the Second Nebraska Volunteer Cavalry, and Elias Kelsey, who arrived in 1867. Logan established a post office in 1864, and a school in 1865. Designated a station on the Union Pacific Railroad in 1870, the town's future was assured. Named "Waterloo" [presumably for a battlefield in Belgium], an attempt to incorporate in 1871 failed, as did a second attempt. The third petition in 1883 was successful, by which time an addition had already been made. History notes "a spectacular train wreck" near Waterloo in 1873, when a $30,000 cargo of fish bound for California fell into the Elkhorn River just east of the town. For many years Waterloo was the world's largest producer of vine and seed corn. Coy & Sons, started in 1879, became Cornhusker Seed in the 1950s. Other companies were: Emerson Seed, Omaha Elevator, Hively Seed, Hopper Grain, Waldron Seed, Western Seed & Irrigation, Waterloo Elevator and Stimmel Seed. The J.C.Robinson Seed Company was established in 1888 and is still owned and managed by the family. It became the biggest, most prominent, and is the only one at this location today. The largest single vine seed sale occurred in the 1920s when eight railcar-loads of cucumber seeds were shipped. Some well-known citizens include: -- William Denton, territorial representative in 1866-67, who later opened one of the first stores in town. -- Isaac Noyes, state senator from 1892-1900. -- James Riggs, state senator in 1903. -- Mabel Wilson (known throughout the state for her knowledge of Nebraska Indians and wild flowers) and her husband, Otto, who were awarded second place in the National Yard and Garden Contest in 1931. -- Aunt Eckie Teal, a great Christian woman who had no children of her own, raised 15 orphans. -- An inventor, P.H.Dubois, who patented a horse collar fastener in 1899. -- John Douglas Pederson, with patents in 1905-06 dealt mostly with slide or pump action and repeating shotguns manufactured by Remington Armory. -- Hiland Noyes and Richard Fies who invented a bank coin counter. -- Eugene Jacobson who designed and patented the marsh buggy and muskeg tractor. He also spearheaded research and development of the technology for measuring gasoline and other liquid hydrocarbons for Gulf Oil. -- Dan Shepherd who invented and patented a telescopic gun sight in 1981, sold as the Shepherd Scope. Several shootings in the 1880s, and a promotional fight between a bulldog and bobcat in 1889, brought notoriety to the town. As a recreation area, Waterloo had a small excursion boat called "The Swastika," owned by H.A.Simmons. A humorous note in our history is a 1910 ordinance prohibiting barbers from eating onions. In 1903 the Waterloo Women's Club started our library. Carrie Nation, the Kansas saloon smasher, visited Waterloo in 1908. In 1920 it was reported that 26 women voted. Governor Franklin D.Roosevelt visited the Sumnick family farm south of Waterloo in 1932. They visited him in Washington when he became president. A viaduct built over the Union Pacific mainline near Waterloo in 1936 was often called "Cochran Alps," because of the efforts by Governor Robert L.Cochran to have it constructed. It was replaced by a new one in 1986. Because of its location on two very unpredictable rivers, Waterloo has been ravaged by many floods. A bond issue in 1965 resulted in a levee to help protect the town. Waterloo has a fine fire and rescue department. Chief John Love, after 36 years of service, retired in 1987. The current population of Waterloo is about 450. While we have lost some businesses, we boast of having more celebrities visit our town than any other community this size in Nebraska. We are justly proud of our fine eating establishments. Stop by and check them out. By Ralph C.Wilson, 501 Jefferson Street, Waterloo, NE 68069.
<urn:uuid:47934959-3962-4f3d-80be-8ad4089c2dde>
2013-05-21T17:24:32Z
CC-MAIN-2013-20
[ [ 0.003448486328125, 0.0302734375, -0.022705078125, -0.0022430419921875, 0.07568359375, -0.0537109375, 0.00921630859375, 0.10693359375, -0.0230712890625, -0.0595703125, 0.08349609375, 0.043701171875, 0.0108642578125, -0.0419921875, 0.03271484375, 0.004...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970092
890
http://www.casde.unl.edu/history/counties/douglas/waterloo/
0.416122
Take a look around. The information here will help you make informed financial decisions throughout your college years and into your professional life. Managing your money can be overwhelming. Answer one or more of these questions to find out what areas of this website will be most helpful to you. When it comes to college, it's all about preparation. The information here will help you plan, pay for, and manage your financial life during your college years. What do you need to know about managing money? 10 Tips for Protecting Personal Information 25 Tips to Stretch Your Dollars 40 Money Management Tips
<urn:uuid:916800c7-01e1-4e7b-9a9f-4aaca30582c1>
2013-05-21T17:25:00Z
CC-MAIN-2013-20
[ [ -0.01870078779757023, 0.018085630610585213, 0.007720226421952248, 0.011072834953665733, 0.0974409431219101, -0.030757874250411987, -0.0016378568252548575, 0.054872047156095505, -0.026820866391062737, -0.002183808945119381, 0.01796259917318821, 0.039616141468286514, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.916003
123
http://www.cashcourse.org/alleghenycollege/
0.653227
Jumping out of airplanes is a thrill at any age By Lindsay Reed Several seniors celebrated life with a tandem skydive jump at Freefall Express Skydiving in Mt. Vernon on June 17. "At my age, I still want to have thrills in life, and as long as I can do this, I'm still going to have those thrills," said Skippy Fine, of Monett. "You're never to old to have fun." Fine, who is now 81, took her first skydive jump when she was 75 years old. Since then she has jumped four times. "I always loved flying in airplanes," said Fine. "I would have liked to have been a pilot, but I was a young mother who had to work." Fine spent a large part of her life as a single mother raising three children in Chicago. She supported her family by working in some of the finest restaurants in the Illinois area. "When I was supporting my children, I put everything else on hold," said Fine. "I always wanted to try skydiving. The adventure always appealed to me." Fine took her first jump at 11,000 feet in Arizona four years ago. On June 16, she took her third jump at 14,000 feet in Mt. Vernon. This is the highest jump she has made so far. "I came up to Mt. Vernon to see about the weather, and when I got up here, my buddy said, 'you want to take a test run jump?'" said Fine. Although she was scheduled to make her third jump on Saturday, Fine could not pass up an opportunity to feel the sky passing through her fingertips and the air whipping through her hair. "It's different," said Fine. "When you skydive, you don't see the ground and the sites. It's just beautiful sky and clouds. You are floating like a bird, and you don't comprehend your speed." The biggest thrill of the activity is when the chute is opened, said Fine. "When you open the chute and it pulls you back up, it's like a roller coaster rush," said Fine. Saturday afternoon Fine took her fourth jump with three other seniors, Elmer Lewis, of Springfield, and Helene "Grandma" Kopp and Lynn Goss, both of Illinois. Lewis, who was a member of the United States Air Force in the 1940s, never made a jump during his military career. "I was in the Air Force in the war and flew a lot," said Lewis. "When I got on a bomber, I would look at the parachute and say, 'I hope I don't have to use you.' Well, I guess I got over that." Lewis took his first jump four years ago. "My son always knew I wanted to jump and so he jumped with me for Father's Day," said Lewis. "My wife made me promise that I wouldn't jump again while she was alive. She died three years ago, and I've been jumping every year since." Although Lewis, who will be 90 in November, was nervous the first time he jumped, he said he rarely feels anxious about the activity now. "It's a lot of fun," said Lewis. "It just grabs you. You get addicted to it real easily. I would like to take lessons and make a hobby of it, but it is expensive and dangerous." To celebrate his fourth skydive, Lewis jumped with over 30 other skydivers in September of 2005. "There were four women on that jump," said Lewis. "When they got ready to jump, they each came by and gave me a kiss. That's an extra bonus you get out of this thing." Jumping from at least 14,000 feet each time, Lewis has now completed five skydives. "You freefall for around 9,000 feet and open the chute at 5,000 feet," said Lewis. "When you are falling you are moving around 120 miles an hour, but you just feel like your suspended in air. "You never feel like you are going down," said Lewis. "The earth doesn't come rushing up at you. It just gets bigger. You have no feeling of moving." Kopp, who will be 90 in August, and Goss, who will be 73 next month, traveled to Mt. Vernon to watch a family member jump last June. Since that event, both women have longed for a chance to touch the sky. "It looked like such fun, and we had to try it," said Kopp. The Illinois women completed their first jump with Fine and Lewis on Saturday. "This is my first time jumping with others," said Fine. "I'm really happy about jumping with people that I have so much in common with. It is nice sharing it with someone else, like a team effort." Fine enjoys the energetic atmosphere surrounding mass skydiving events like Saturday's Hillbilly Boogie Skydive. Around 100 individuals enjoyed the freefalling sport in Mt. Vernon this weekend. "The people who skydive are some of the greatest people in the world," said Fine. "They are kind, gentle, great people to be with. It's like a brotherhood. "You get to share your experience with everyone," said Fine. "The response after you jump is fun. People recognize me as the lady that jumps." All four senior skydivers use the tandem jump skydiving style. Skydivers must be trained and certified to make solo jumps. Fine, who is currently employed full-time at the Wal-Mart Supercenter in Monett, also enjoys white water rafting and other sports. She plans to make an annual jump until she is unable to be cleared to skydive. "Anyone can enjoy it if they think about the good and not the scary parts of it," said Fine. "It's the best experience. Good, clean free falling fun."
<urn:uuid:3dbaea8f-034c-45e9-9eba-59c8a61996d5>
2013-05-21T17:16:20Z
CC-MAIN-2013-20
[ [ -0.0242919921875, 0.01123046875, 0.004852294921875, -0.022216796875, 0.05615234375, -0.08203125, 0.00152587890625, 0.08349609375, -0.056640625, -0.051513671875, 0.09619140625, 0.058837890625, 0.05517578125, -0.0306396484375, 0.036865234375, -0.023681...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.989055
1,246
http://www.cassville-democrat.com/story/1392293.html
0.299423
Saint John May Consider "Josh's" Helmet Law For Skateboarders Common council has voted to reassess the city's bylaw on skateboarding, considering mandatory helmets. It's being called "Josh's Law", in honour of Linda Dillon's son who was severely hurt when he fell off his skateboard in August. Reporter John Van Dusen spoke with her. Download Flash Player to view this content.
<urn:uuid:785870a9-e45a-4ee5-8fbc-9148d56357fa>
2013-05-21T17:18:29Z
CC-MAIN-2013-20
[ [ -0.02818627469241619, 0.07475490123033524, 0.012331495061516762, 0.0026041667442768812, 0.10049019753932953, -0.010876225307583809, -0.016850490123033524, 0.08394607901573181, -0.009420955553650856, -0.06525735557079315, 0.027726715430617332, 0.056066177785396576, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953112
85
http://www.cbc.ca/informationmorningsaintjohn/2012/09/27/saint-john-may-consider-joshs-helmet-law-for-skateboarders/
0.350029
"CBO gave an extraordinary show at the National Academy of Arbitrators' annual conference. It's rare that from the start of a band's performance until the very end all the guests are on the dance floor. That's what happened at our event. If you are looking for a band that will create a highly memorable evening for everyone, CBO is it. The plaudits will go on long after the music ends."
<urn:uuid:971eb169-27e7-44d4-aa7a-b3ddba834130>
2013-05-21T17:09:52Z
CC-MAIN-2013-20
[ [ -0.06682180613279343, -0.005402260459959507, 0.009724069386720657, 0.011968085542321205, 0.09375, -0.0814494714140892, -0.01009807176887989, 0.021110372617840767, -0.07247340679168701, -0.11835106462240219, 0.041888296604156494, 0.005776263307780027, -0.07779255...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958758
85
http://www.cbomusic.com/index.asp?pageid=5&guid=D8EE166D-F2B2-429A-9CCD-CB2B65F773E8
0.241055
Orthopedist James Andrews said Wednesday that Griffin "had a direct repair" of the lateral collateral ligament and "a re-do of his previous ACL reconstruction." Andrews says he expects a full recovery because of Griffin's "high motivation." Griffin reinjured his knee in Sunday's playoff loss to the Seattle Seahawks. He previously tore the ACL in the same knee while playing for Baylor in 2009. |More on NFL| RG3's injury could lead to changes on sidelines Now comes RG3's next challenge: a race against time to get healthy before the beginning of next season. Griffin's recovery time will take several months at least but could extend into next season, depending on the extent of the damage. The process could also be speeded up because Griffin is known as a focused, determined competitor who would be expected to take his rehab as seriously as possible. "Thank you for your prayers and support. I love God, my family, my team, the fans, & I love this game. See you guys next season," Griffin tweeted before the surgery began. Athletes generally need nine to 12 months to make a full recovery from a torn ACL, although Minnesota Vikings running back Adrian Peterson made a remarkable return this season about eight months after tearing an ACL -- and nearly broke the NFL's single-season rushing record. Russ Paine, a physical therapist in Houston who worked with Peterson during his rehab, said the running back's timetable for returning to competition was in fact "pretty traditional." "What's non-traditional is him almost breaking the rushing record," Paine said in a phone interview Wednesday. Griffin reinjured his knee at least twice in Sunday's playoff loss to the Seattle Seahawks, prompting a national debate over whether coach Mike Shanahan endangered Griffin's career by not taking the team's franchise player out of the game sooner. The first major injury to the knee came in 2009, when Griffin tore the ACL in the third game of the season while playing for Baylor. Griffin missed the rest of the year but returned in 2010 and won the Heisman Trophy in 2011. Griffin sprained the LCL last month when he was hit by Baltimore Ravens defensive tackle Haloti Ngata at the end of a 13-yard scramble. Griffin missed one game and returned to play three more while wearing a bulky knee brace, his mobility clearly hindered. Then, on Sunday, Griffin hurt the knee again as he fell awkwardly while throwing a pass in the first quarter against the Seahawks. He remained in the game, with Shanahan saying he trusted Griffin's word that all was OK. Griffin finally departed in the fourth quarter, after the knee buckled while he was trying to field a bad shotgun snap. The No. 2 overall pick in last year's draft, Griffin was one of several rookie quarterbacks to make an instant impact on the NFL this season. He set the league record for best season passer rating by a rookie QB and led the Redskins to their first NFC East title in 13 years. But he also had to leave three games early due to injuries -- two because of his knee and one because of a concussion -- and missed a fourth altogether because of the knee.
<urn:uuid:849512f6-0ff1-4a93-8aaf-8653568f66cd>
2013-05-21T17:25:00Z
CC-MAIN-2013-20
[ [ 0.004058837890625, 0.019775390625, -0.0013580322265625, -0.003173828125, 0.08251953125, -0.032470703125, 0.0091552734375, 0.1015625, -0.0128173828125, -0.09326171875, 0.04248046875, 0.06884765625, -0.036865234375, 0.01953125, 0.059326171875, 0.007659...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975633
653
http://www.cbssports.com/nfl/story/21525620/redskins-griffin-iii-has-surgery-on-torn-knee-ligament
0.290574
If someone you love has suffered from a heart related illness, you know how scared and helpless you can feel. When a person is facing any type of injury or disease to the heart, the battle that they face is a difficult one. It may seem like there is very little that you can do to help the one you love. However, that is not true. One of the best ways that you can get involved is to enter a race for heart disease. Every day, races are being held around the world to raise funds for heart disease research. By entering these races you are helping to build funds that will go towards helping people with heart related problems. Not only will you be entering a race and helping to raise money for heart related research but you will also be helping your own health. Many heart related issues are hereditary and therefore if one of your family member has a heart condition, there is a chance that you will develop that condition as well. By running in a race, which requires months of training, you are not only helping to strengthen your cardiovascular health but you are also helping to raise money that may go towards treating an illness that you are predisposed to inherit. Training for race is a great way to get involved in heart disease research. By registering for a race you are committing yourself to a goal. You must be able to run those miles by a certain time. If you struggle with sticking to a training plan but are worried about the health of your heart, entering a race is great way to stay committed. Entering a race for heart disease is a great way to get involved with research while doing something good for your own health.
<urn:uuid:166bdeee-27c5-489b-b8e6-6ae6525cd439>
2013-05-21T17:36:31Z
CC-MAIN-2013-20
[ [ -0.0124822948127985, -0.005046033766120672, 0.0037623937241733074, -0.02372521162033081, 0.1253541111946106, -0.04886685684323311, 0.011685552075505257, 0.06940510123968124, -0.029745042324066162, -0.051699716597795486, 0.04780453443527222, 0.002921388018876314, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974961
333
http://www.ccathnet.org/races-for-heart-disease.htm
0.564837
|« Prev||Chapter XXIV: The Retreat And Death Of…||Next »| Chapter XXIV: The Retreat And Death Of Julian.—Part III. The fields of Assyria were devoted by Julian to the calamities of war; and the philosopher retaliated on a guiltless people the acts of rapine and cruelty which had been committed by their haughty master in the Roman provinces. The trembling Assyrians summoned the rivers to their assistance; and completed, with their own hands, the ruin of their country. The roads were rendered impracticable; a flood of waters was poured into the camp; and, during several days, the troops of Julian were obliged to contend with the most discouraging hardships. But every obstacle was surmounted by the perseverance of the legionaries, who were inured to toil as well as to danger, and who felt themselves animated by the spirit of their leader. The damage was gradually repaired; the waters were restored to their proper channels; whole groves of palm-trees were cut down, and placed along the broken parts of the road; and the army passed over the broad and deeper canals, on bridges of floating rafts, which were supported by the help of bladders. Two cities of Assyria presumed to resist the arms of a Roman emperor: and they both paid the severe penalty of their rashness. At the distance of fifty miles from the royal residence of Ctesiphon, Perisabor,29092909 Libanius says that it was a great city of Assyria, called after the name of the reigning king. The orator of Antioch is not mistaken. The Persians and Syrians called it Fyrouz Schapour or Fyrouz Schahbour; in Persian, the victory of Schahpour. It owed that name to Sapor the First. It was before called Anbar St. Martin, iii. 85.—M. or Anbar, held the second rank in the province; a city, large, populous, and well fortified, surrounded with a double wall, almost encompassed by a branch of the Euphrates, and defended by the valor of a numerous garrison. The exhortations of Hormisdas were repulsed with contempt; and the ears of the Persian prince were wounded by a just reproach, that, unmindful of his royal birth, he conducted an army of strangers against his king and country. The Assyrians maintained their loyalty by a skilful, as well as vigorous, defence; till the lucky stroke of a battering-ram, having opened a large breach, by shattering one of the angles of the wall, they hastily retired into the fortifications of the interior citadel. The soldiers of Julian rushed impetuously into the town, and after the full gratification of every military appetite, Perisabor was reduced to ashes; and the engines which assaulted the citadel were planted on the ruins of the smoking houses. The contest was continued by an incessant and mutual discharge of missile weapons; and the superiority which the Romans might derive from the mechanical powers of their balistae and catapultae was counterbalanced by the advantage of the ground on the side of the besieged. But as soon as an Helepolis had been constructed, which could engage on equal terms with the loftiest ramparts, the tremendous aspect of a moving turret, that would leave no hope of resistance or mercy, terrified the defenders of the citadel into an humble submission; and the place was surrendered only two days after Julian first appeared under the walls of Perisabor. Two thousand five hundred persons, of both sexes, the feeble remnant of a flourishing people, were permitted to retire; the plentiful magazines of corn, of arms, and of splendid furniture, were partly distributed among the troops, and partly reserved for the public service; the useless stores were destroyed by fire or thrown into the stream of the Euphrates; and the fate of Amida was revenged by the total ruin of Perisabor. The city or rather fortress, of Maogamalcha, which was defended by sixteen large towers, a deep ditch, and two strong and solid walls of brick and bitumen, appears to have been constructed at the distance of eleven miles, as the safeguard of the capital of Persia. The emperor, apprehensive of leaving such an important fortress in his rear, immediately formed the siege of Maogamalcha; and the Roman army was distributed, for that purpose, into three divisions. Victor, at the head of the cavalry, and of a detachment of heavy-armed foot, was ordered to clear the country, as far as the banks of the Tigris, and the suburbs of Ctesiphon. The conduct of the attack was assumed by Julian himself, who seemed to place his whole dependence in the military engines which he erected against the walls; while he secretly contrived a more efficacious method of introducing his troops into the heart of the city Under the direction of Nevitta and Dagalaiphus, the trenches were opened at a considerable distance, and gradually prolonged as far as the edge of the ditch. The ditch was speedily filled with earth; and, by the incessant labor of the troops, a mine was carried under the foundations of the walls, and sustained, at sufficient intervals, by props of timber. Three chosen cohorts, advancing in a single file, silently explored the dark and dangerous passage; till their intrepid leader whispered back the intelligence, that he was ready to issue from his confinement into the streets of the hostile city. Julian checked their ardor, that he might insure their success; and immediately diverted the attention of the garrison, by the tumult and clamor of a general assault. The Persians, who, from their walls, contemptuously beheld the progress of an impotent attack, celebrated with songs of triumph the glory of Sapor; and ventured to assure the emperor, that he might ascend the starry mansion of Ormusd, before he could hope to take the impregnable city of Maogamalcha. The city was already taken. History has recorded the name of a private soldier the first who ascended from the mine into a deserted tower. The passage was widened by his companions, who pressed forwards with impatient valor. Fifteen hundred enemies were already in the midst of the city. The astonished garrison abandoned the walls, and their only hope of safety; the gates were instantly burst open; and the revenge of the soldier, unless it were suspended by lust or avarice, was satiated by an undistinguishing massacre. The governor, who had yielded on a promise of mercy, was burnt alive, a few days afterwards, on a charge of having uttered some disrespectful words against the honor of Prince Hormisdas. The fortifications were razed to the ground; and not a vestige was left, that the city of Maogamalcha had ever existed. The neighborhood of the capital of Persia was adorned with three stately palaces, laboriously enriched with every production that could gratify the luxury and pride of an Eastern monarch. The pleasant situation of the gardens along the banks of the Tigris, was improved, according to the Persian taste, by the symmetry of flowers, fountains, and shady walks: and spacious parks were enclosed for the reception of the bears, lions, and wild boars, which were maintained at a considerable expense for the pleasure of the royal chase. The park walls were broken down, the savage game was abandoned to the darts of the soldiers, and the palaces of Sapor were reduced to ashes, by the command of the Roman emperor. Julian, on this occasion, showed himself ignorant, or careless, of the laws of civility, which the prudence and refinement of polished ages have established between hostile princes. Yet these wanton ravages need not excite in our breasts any vehement emotions of pity or resentment. A simple, naked statue, finished by the hand of a Grecian artist, is of more genuine value than all these rude and costly monuments of Barbaric labor; and, if we are more deeply affected by the ruin of a palace than by the conflagration of a cottage, our humanity must have formed a very erroneous estimate of the miseries of human life.29102910 The operations of the Assyrian war are circumstantially related by Ammianus, (xxiv. 2, 3, 4, 5,) Libanius, (Orat. Parent. c. 112-123, p. 335-347,) Zosimus, (l. iii. p. 168-180,) and Gregory Nazianzen, (Orat iv. p. 113, 144.) The military criticisms of the saint are devoutly copied by Tillemont, his faithful slave. Julian was an object of hatred and terror to the Persian and the painters of that nation represented the invader of their country under the emblem of a furious lion, who vomited from his mouth a consuming fire.29112911 Libanius de ulciscenda Juliani nece, c. 13, p. 162. To his friends and soldiers the philosophic hero appeared in a more amiable light; and his virtues were never more conspicuously displayed, than in the last and most active period of his life. He practised, without effort, and almost without merit, the habitual qualities of temperance and sobriety. According to the dictates of that artificial wisdom, which assumes an absolute dominion over the mind and body, he sternly refused himself the indulgence of the most natural appetites.29122912 The famous examples of Cyrus, Alexander, and Scipio, were acts of justice. Julian's chastity was voluntary, and, in his opinion, meritorious. In the warm climate of Assyria, which solicited a luxurious people to the gratification of every sensual desire,29132913 Sallust (ap. Vet. Scholiast. Juvenal. Satir. i. 104) observes, that nihil corruptius moribus. The matrons and virgins of Babylon freely mingled with the men in licentious banquets; and as they felt the intoxication of wine and love, they gradually, and almost completely, threw aside the encumbrance of dress; ad ultimum ima corporum velamenta projiciunt. Q. Curtius, v. 1. a youthful conqueror preserved his chastity pure and inviolate; nor was Julian ever tempted, even by a motive of curiosity, to visit his female captives of exquisite beauty,29142914 Ex virginibus autem quae speciosae sunt captae, et in Perside, ubi faeminarum pulchritudo excellit, nec contrectare aliquam votuit nec videre. Ammian. xxiv. 4. The native race of Persians is small and ugly; but it has been improved by the perpetual mixture of Circassian blood, (Herodot. l. iii. c. 97. Buffon, Hist. Naturelle, tom. iii. p. 420.) who, instead of resisting his power, would have disputed with each other the honor of his embraces. With the same firmness that he resisted the allurements of love, he sustained the hardships of war. When the Romans marched through the flat and flooded country, their sovereign, on foot, at the head of his legions, shared their fatigues and animated their diligence. In every useful labor, the hand of Julian was prompt and strenuous; and the Imperial purple was wet and dirty as the coarse garment of the meanest soldier. The two sieges allowed him some remarkable opportunities of signalizing his personal valor, which, in the improved state of the military art, can seldom be exerted by a prudent general. The emperor stood before the citadel before the citadel of Perisabor, insensible of his extreme danger, and encouraged his troops to burst open the gates of iron, till he was almost overwhelmed under a cloud of missile weapons and huge stones, that were directed against his person. As he examined the exterior fortifications of Maogamalcha, two Persians, devoting themselves for their country, suddenly rushed upon him with drawn cimeters: the emperor dexterously received their blows on his uplifted shield; and, with a steady and well-aimed thrust, laid one of his adversaries dead at his feet. The esteem of a prince who possesses the virtues which he approves, is the noblest recompense of a deserving subject; and the authority which Julian derived from his personal merit, enabled him to revive and enforce the rigor of ancient discipline. He punished with death or ignominy the misbehavior of three troops of horse, who, in a skirmish with the Surenas, had lost their honor and one of their standards: and he distinguished with obsidional29152915 Obsidionalibus coronis donati. Ammian. xxiv. 4. Either Julian or his historian were unskillful antiquaries. He should have given mural crowns. The obsidional were the reward of a general who had delivered a besieged city, (Aulus Gellius, Noct. Attic. v. 6.) crowns the valor of the foremost soldiers, who had ascended into the city of Maogamalcha. After the siege of Perisabor, the firmness of the emperor was exercised by the insolent avarice of the army, who loudly complained, that their services were rewarded by a trifling donative of one hundred pieces of silver. His just indignation was expressed in the grave and manly language of a Roman. "Riches are the object of your desires; those riches are in the hands of the Persians; and the spoils of this fruitful country are proposed as the prize of your valor and discipline. Believe me," added Julian, "the Roman republic, which formerly possessed such immense treasures, is now reduced to want and wretchedness once our princes have been persuaded, by weak and interested ministers, to purchase with gold the tranquillity of the Barbarians. The revenue is exhausted; the cities are ruined; the provinces are dispeopled. For myself, the only inheritance that I have received from my royal ancestors is a soul incapable of fear; and as long as I am convinced that every real advantage is seated in the mind, I shall not blush to acknowledge an honorable poverty, which, in the days of ancient virtue, was considered as the glory of Fabricius. That glory, and that virtue, may be your own, if you will listen to the voice of Heaven and of your leader. But if you will rashly persist, if you are determined to renew the shameful and mischievous examples of old seditions, proceed. As it becomes an emperor who has filled the first rank among men, I am prepared to die, standing; and to despise a precarious life, which, every hour, may depend on an accidental fever. If I have been found unworthy of the command, there are now among you, (I speak it with pride and pleasure,) there are many chiefs whose merit and experience are equal to the conduct of the most important war. Such has been the temper of my reign, that I can retire, without regret, and without apprehension, to the obscurity of a private station"29162916 I give this speech as original and genuine. Ammianus might hear, could transcribe, and was incapable of inventing, it. I have used some slight freedoms, and conclude with the most forcibic sentence. The modest resolution of Julian was answered by the unanimous applause and cheerful obedience of the Romans, who declared their confidence of victory, while they fought under the banners of their heroic prince. Their courage was kindled by his frequent and familiar asseverations, (for such wishes were the oaths of Julian,) "So may I reduce the Persians under the yoke!" "Thus may I restore the strength and splendor of the republic!" The love of fame was the ardent passion of his soul: but it was not before he trampled on the ruins of Maogamalcha, that he allowed himself to say, "We have now provided some materials for the sophist of Antioch."29172917 Ammian. xxiv. 3. Libanius, Orat. Parent. c. 122, p. 346. The successful valor of Julian had triumphed over all the obstacles that opposed his march to the gates of Ctesiphon. But the reduction, or even the siege, of the capital of Persia, was still at a distance: nor can the military conduct of the emperor be clearly apprehended, without a knowledge of the country which was the theatre of his bold and skilful operations.29182918 M. d'Anville, (Mem. de l'Academie des Inscriptions, tom. xxxviii p. 246-259) has ascertained the true position and distance of Babylon, Seleucia, Ctesiphon, Bagdad, &c. The Roman traveller, Pietro della Valle, (tom. i. lett. xvii. p. 650-780,) seems to be the most intelligent spectator of that famous province. He is a gentleman and a scholar, but intolerably vain and prolix. Twenty miles to the south of Bagdad, and on the eastern bank of the Tigris, the curiosity of travellers has observed some ruins of the palaces of Ctesiphon, which, in the time of Julian, was a great and populous city. The name and glory of the adjacent Seleucia were forever extinguished; and the only remaining quarter of that Greek colony had resumed, with the Assyrian language and manners, the primitive appellation of Coche. Coche was situate on the western side of the Tigris; but it was naturally considered as a suburb of Ctesiphon, with which we may suppose it to have been connected by a permanent bridge of boats. The united parts contribute to form the common epithet of Al Modain, the cities, which the Orientals have bestowed on the winter residence of the Sassinadees; and the whole circumference of the Persian capital was strongly fortified by the waters of the river, by lofty walls, and by impracticable morasses. Near the ruins of Seleucia, the camp of Julian was fixed, and secured, by a ditch and rampart, against the sallies of the numerous and enterprising garrison of Coche. In this fruitful and pleasant country, the Romans were plentifully supplied with water and forage: and several forts, which might have embarrassed the motions of the army, submitted, after some resistance, to the efforts of their valor. The fleet passed from the Euphrates into an artificial derivation of that river, which pours a copious and navigable stream into the Tigris, at a small distance below the great city. If they had followed this royal canal, which bore the name of Nahar-Malcha,29192919 The Royal Canal (Nahar-Malcha) might be successively restored, altered, divided, &c., (Cellarius, Geograph. Antiq. tom. ii. p. 453;) and these changes may serve to explain the seeming contradictions of antiquity. In the time of Julian, it must have fallen into the Euphrates below Ctesiphon. the intermediate situation of Coche would have separated the fleet and army of Julian; and the rash attempt of steering against the current of the Tigris, and forcing their way through the midst of a hostile capital, must have been attended with the total destruction of the Roman navy. The prudence of the emperor foresaw the danger, and provided the remedy. As he had minutely studied the operations of Trajan in the same country, he soon recollected that his warlike predecessor had dug a new and navigable canal, which, leaving Coche on the right hand, conveyed the waters of the Nahar-Malcha into the river Tigris, at some distance above the cities. From the information of the peasants, Julian ascertained the vestiges of this ancient work, which were almost obliterated by design or accident. By the indefatigable labor of the soldiers, a broad and deep channel was speedily prepared for the reception of the Euphrates. A strong dike was constructed to interrupt the ordinary current of the Nahar-Malcha: a flood of waters rushed impetuously into their new bed; and the Roman fleet, steering their triumphant course into the Tigris, derided the vain and ineffectual barriers which the Persians of Ctesiphon had erected to oppose their passage. As it became necessary to transport the Roman army over the Tigris, another labor presented itself, of less toil, but of more danger, than the preceding expedition. The stream was broad and rapid; the ascent steep and difficult; and the intrenchments which had been formed on the ridge of the opposite bank, were lined with a numerous army of heavy cuirrasiers, dexterous archers, and huge elephants; who (according to the extravagant hyperbole of Libanius) could trample with the same ease a field of corn, or a legion of Romans.29202920 Rien n'est beau que le vrai; a maxim which should be inscribed on the desk of every rhetorician. In the presence of such an enemy, the construction of a bridge was impracticable; and the intrepid prince, who instantly seized the only possible expedient, concealed his design, till the moment of execution, from the knowledge of the Barbarians, of his own troops, and even of his generals themselves. Under the specious pretence of examining the state of the magazines, fourscore vessels29212921 This is a mistake; each vessel (according to Zosimus two, according to Ammianus five) had eighty men. Amm. xxiv. 6, with Wagner's note. Gibbon must have read octogenas for octogenis. The five vessels selected for this service were remarkably large and strong provision transports. The strength of the fleet remained with Julian to carry over the army—M. were gradually unladen; and a select detachment, apparently destined for some secret expedition, was ordered to stand to their arms on the first signal. Julian disguised the silent anxiety of his own mind with smiles of confidence and joy; and amused the hostile nations with the spectacle of military games, which he insultingly celebrated under the walls of Coche. The day was consecrated to pleasure; but, as soon as the hour of supper was passed, the emperor summoned the generals to his tent, and acquainted them that he had fixed that night for the passage of the Tigris. They stood in silent and respectful astonishment; but, when the venerable Sallust assumed the privilege of his age and experience, the rest of the chiefs supported with freedom the weight of his prudent remonstrances.29222922 Libanius alludes to the most powerful of the generals. I have ventured to name Sallust. Ammianus says, of all the leaders, quod acri metu territ acrimetu territi duces concordi precatu precaut fieri prohibere tentarent. * Note: It is evident that Gibbon has mistaken the sense of Libanius; his words can only apply to a commander of a detachment, not to so eminent a person as the Praefect of the East. St. Martin, iii. 313.—-M. Julian contented himself with observing, that conquest and safety depended on the attempt; that instead of diminishing, the number of their enemies would be increased, by successive reenforcements; and that a longer delay would neither contract the breadth of the stream, nor level the height of the bank. The signal was instantly given, and obeyed; the most impatient of the legionaries leaped into five vessels that lay nearest to the bank; and as they plied their oars with intrepid diligence, they were lost, after a few moments, in the darkness of the night. A flame arose on the opposite side; and Julian, who too clearly understood that his foremost vessels, in attempting to land, had been fired by the enemy, dexterously converted their extreme danger into a presage of victory. "Our fellow-soldiers," he eagerly exclaimed, "are already masters of the bank; see—they make the appointed signal; let us hasten to emulate and assist their courage." The united and rapid motion of a great fleet broke the violence of the current, and they reached the eastern shore of the Tigris with sufficient speed to extinguish the flames, and rescue their adventurous companions. The difficulties of a steep and lofty ascent were increased by the weight of armor, and the darkness of the night. A shower of stones, darts, and fire, was incessantly discharged on the heads of the assailants; who, after an arduous struggle, climbed the bank and stood victorious upon the rampart. As soon as they possessed a more equal field, Julian, who, with his light infantry, had led the attack,29232923 Hinc Imperator.... (says Ammianus) ipse cum levis armaturae auxiliis per prima postremaque discurrens, &c. Yet Zosimus, his friend, does not allow him to pass the river till two days after the battle. darted through the ranks a skilful and experienced eye: his bravest soldiers, according to the precepts of Homer,29242924 Secundum Homericam dispositionem. A similar disposition is ascribed to the wise Nestor, in the fourth book of the Iliad; and Homer was never absent from the mind of Julian. were distributed in the front and rear: and all the trumpets of the Imperial army sounded to battle. The Romans, after sending up a military shout, advanced in measured steps to the animating notes of martial music; launched their formidable javelins; and rushed forwards with drawn swords, to deprive the Barbarians, by a closer onset, of the advantage of their missile weapons. The whole engagement lasted above twelve hours; till the gradual retreat of the Persians was changed into a disorderly flight, of which the shameful example was given by the principal leader, and the Surenas himself. They were pursued to the gates of Ctesiphon; and the conquerors might have entered the dismayed city,29252925 Persas terrore subito miscuerunt, versisque agminibus totius gentis, apertas Ctesiphontis portas victor miles intrasset, ni major praedarum occasio fuisset, quam cura victoriae, (Sextus Rufus de Provinciis c. 28.) Their avarice might dispose them to hear the advice of Victor. if their general, Victor, who was dangerously wounded with an arrow, had not conjured them to desist from a rash attempt, which must be fatal, if it were not successful. On their side, the Romans acknowledged the loss of only seventy-five men; while they affirmed, that the Barbarians had left on the field of battle two thousand five hundred, or even six thousand, of their bravest soldiers. The spoil was such as might be expected from the riches and luxury of an Oriental camp; large quantities of silver and gold, splendid arms and trappings, and beds and tables of massy silver.29262926 The suburbs of Ctesiphon, according to a new fragment of Eunapius, were so full of provisions, that the soldiers were in danger of suffering from excess. Mai, p. 260. Eunapius in Niebuhr. Nov. Byz. Coll. 68. Julian exhibited warlike dances and games in his camp to recreate the soldiers Ibid.—M. The victorious emperor distributed, as the rewards of valor, some honorable gifts, civic, and mural, and naval crowns; which he, and perhaps he alone, esteemed more precious than the wealth of Asia. A solemn sacrifice was offered to the god of war, but the appearances of the victims threatened the most inauspicious events; and Julian soon discovered, by less ambiguous signs, that he had now reached the term of his prosperity. 29272927 The labor of the canal, the passage of the Tigris, and the victory, are described by Ammianus, (xxiv. 5, 6,) Libanius, (Orat. Parent. c. 124-128, p. 347-353,) Greg. Nazianzen, (Orat. iv. p. 115,) Zosimus, (l. iii. p. 181-183,) and Sextus Rufus, (de Provinciis, c. 28.) On the second day after the battle, the domestic guards, the Jovians and Herculians, and the remaining troops, which composed near two thirds of the whole army, were securely wafted over the Tigris.29282928 The fleet and army were formed in three divisions, of which the first only had passed during the night. While the Persians beheld from the walls of Ctesiphon the desolation of the adjacent country, Julian cast many an anxious look towards the North, in full expectation, that as he himself had victoriously penetrated to the capital of Sapor, the march and junction of his lieutenants, Sebastian and Procopius, would be executed with the same courage and diligence. His expectations were disappointed by the treachery of the Armenian king, who permitted, and most probably directed, the desertion of his auxiliary troops from the camp of the Romans;29292929 Moses of Chorene (Hist. Armen. l. iii. c. 15, p. 246) supplies us with a national tradition, and a spurious letter. I have borrowed only the leading circumstance, which is consistent with truth, probability, and Libanius, (Orat. Parent. c. 131, p. 355.) and by the dissensions of the two generals, who were incapable of forming or executing any plan for the public service. When the emperor had relinquished the hope of this important reenforcement, he condescended to hold a council of war, and approved, after a full debate, the sentiment of those generals, who dissuaded the siege of Ctesiphon, as a fruitless and pernicious undertaking. It is not easy for us to conceive, by what arts of fortification a city thrice besieged and taken by the predecessors of Julian could be rendered impregnable against an army of sixty thousand Romans, commanded by a brave and experienced general, and abundantly supplied with ships, provisions, battering engines, and military stores. But we may rest assured, from the love of glory, and contempt of danger, which formed the character of Julian, that he was not discouraged by any trivial or imaginary obstacles.29302930 Civitas inexpugnabilis, facinus audax et importunum. Ammianus, xxiv. 7. His fellow-soldier, Eutropius, turns aside from the difficulty, Assyriamque populatus, castra apud Ctesiphontem stativa aliquandiu habuit: remeansbue victor, &c. x. 16. Zosimus is artful or ignorant, and Socrates inaccurate. At the very time when he declined the siege of Ctesiphon, he rejected, with obstinacy and disdain, the most flattering offers of a negotiation of peace. Sapor, who had been so long accustomed to the tardy ostentation of Constantius, was surprised by the intrepid diligence of his successor. As far as the confines of India and Scythia, the satraps of the distant provinces were ordered to assemble their troops, and to march, without delay, to the assistance of their monarch. But their preparations were dilatory, their motions slow; and before Sapor could lead an army into the field, he received the melancholy intelligence of the devastation of Assyria, the ruin of his palaces, and the slaughter of his bravest troops, who defended the passage of the Tigris. The pride of royalty was humbled in the dust; he took his repasts on the ground; and the disorder of his hair expressed the grief and anxiety of his mind. Perhaps he would not have refused to purchase, with one half of his kingdom, the safety of the remainder; and he would have gladly subscribed himself, in a treaty of peace, the faithful and dependent ally of the Roman conqueror. Under the pretence of private business, a minister of rank and confidence was secretly despatched to embrace the knees of Hormisdas, and to request, in the language of a suppliant, that he might be introduced into the presence of the emperor. The Sassanian prince, whether he listened to the voice of pride or humanity, whether he consulted the sentiments of his birth, or the duties of his situation, was equally inclined to promote a salutary measure, which would terminate the calamities of Persia, and secure the triumph of Rome. He was astonished by the inflexible firmness of a hero, who remembered, most unfortunately for himself and for his country, that Alexander had uniformly rejected the propositions of Darius. But as Julian was sensible, that the hope of a safe and honorable peace might cool the ardor of his troops, he earnestly requested that Hormisdas would privately dismiss the minister of Sapor, and conceal this dangerous temptation from the knowledge of the camp.29312931 Libanius, Orat. Parent. c. 130, p. 354, c. 139, p. 361. Socrates, l. iii. c. 21. The ecclesiastical historian imputes the refusal of peace to the advice of Maximus. Such advice was unworthy of a philosopher; but the philosopher was likewise a magician, who flattered the hopes and passions of his master. |« Prev||Chapter XXIV: The Retreat And Death Of…||Next »| ►Proofing disabled for this book ► Printer-friendly version
<urn:uuid:1929e352-7507-44b6-8ffb-0c14f776fc9d>
2013-05-21T17:25:02Z
CC-MAIN-2013-20
[ [ 0.0203857421875, 0.00168609619140625, -0.0264892578125, -0.00628662109375, 0.1201171875, -0.055908203125, -0.0233154296875, 0.08544921875, -0.01092529296875, -0.027099609375, 0.053466796875, 0.0174560546875, 0.02197265625, 0.0164794921875, 0.03369140625,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972031
7,103
http://www.ccel.org/ccel/gibbon/decline.iv.xlv.html
0.576508
Archive for July, 2010 Thursday, July 29th, 2010 French Ring Sport is a dog sport that originated out of France in the early 1900′s. It shares a common history with Belgian Ring Sport which also originated around the same time, and the two sports are very similar. The purpose of French Ring Sport, like many dog sports that have come out of Europe, was to test dogs for their character and suitability for work and breeding. Since then, the rules have been changed and refined into a proper sport. Dogs competing in the sport perform exercises in front of judges who award them a point total based on their performance. Regardless of which title the dog is competing for, it will be awarded a rank of Non Classe, Bon, Tres Bon or Excellent, corresponding with less than 60%, 60-70%, 70-80% and over 80% point totals. However, only dogs that achieve a score of over 80%, and a rank of Excellent, will qualify for the title and be able to compete for more challenging titles in following years. Before a dog can compete for proper titles, it must pass an introductory test of obedience, intelligence and character known as Brevet. Just as with full titles, a dog must obtain a score of 80% of higher in order to pass and move on to full competition. After the initial introductory tests, there are three levels of French Ring titles simply known as French Ring 1 (FR1), French Ring 2 (FR2), and French Ring 3 (FR3). Each title tests obedience, agility and protection with FR1 offering the least difficult exercises and FR3 being the most challenging. Unlike most dog sports, dogs must compete twice for each level, in front of two different judges. A dog that has passed the first judging in FR1 is considered to be Level 1, while a dog that has passed both is considered to have the full French Ring 1 title. The same is true for both FR2 and FR3. Unfortunately, while French Ring Sport is commendable as a sport, it is a far cry from real-world protection work. Whether you have a German Shepherd, Dutch Shepherd or Belgian Malinois, it is imperative that you train it for the work it will be doing. Training a dog for sport just isn’t good enough for real protection dog or guard dog work. Tuesday, July 27th, 2010 Schutzhund is one of several European dog sports established in the early 1900′s as a way of testing the capabilities of working dogs to ensure that only the best were bred and allowed to work in police and protection dog roles. Having originated in Germany, the German Shepherd dog is the breed of choice for the sport, although other breeds such as the Belgian Malinois or Dutch Shepherd are permitted to compete. In Schutzhund, dogs compete to earn titles which are awarded for sufficient performance various trials and exercises. Based on their score, dogs are given grades of excellent (V), very good (SG), good (G), satisfactory(M), unsatisfactory(U). During the protection exercises, dogs are also graded on their nerves and ability to handle stress. For this, judges award the dogs a grade of insufficient (nicht genugend), present (vorhanden) or pronounced (ausgepraegt). Before a dog and handler may compete for Schutzhund titles, preliminary trials must be passed. Three certificates are offered at this level: Begleithunde (BH), Wachthund (WH) and Ausdauerprufung (AD). However, only a BH certificate enables a dog to participate in more advanced Schutzhund trials. The BH certificate shows basic obedience while WH is intended to test low-level watchdogs, and AD is simply a physical endurance test. Once a dog has obtained the Schutzhund BH certificate, it may compete for proper Schutzhund titles. The basic title is the Schutzhund 1 (SchH1) which tests tracking, obedience and protection. There is also a Schutzhund 2 and 3 title which offer the same basic tests, but with intermediate and advanced levels of difficulty. There also obedience (OB1-3) and tracking(TR1-3) titles, again offered in three levels, which focus purely on either obedience and tracking. Even though Schutzhund was originally intended to train and test dogs for their ability as a working police dog, its adaptation into a sport has made it somewhat ineffective for this purpose. One should always remember that Schutzhund is just a sport. If one wants a true German Shepherd or Belgian Malinois protection dog, one must train for real world scenarios; this includes working in water, and targeting the weapon hand, neither of which are covered by Schutzhund. Thursday, July 22nd, 2010 Koninklijke Nederlandse Politiehond Vereniging (KNPV) is a popular dog-sport based out of the Netherlands. The name literally means “Royal Dutch Police Dog Association”, and it was founded in the early 1900′s as a way of testing the ability of dogs for their suitability for breeding and work as a police dog. As with any sport, the rules and exercises are clearly defined to ensure fairness among competitors. After over a century, the rules and titles involved in KNPV have changed and grown considerably, but the basic concepts remain. In KNPV, a team consisting of a dog and its handler compete to obtain varying levels of certification. Points are awarded or deducted based on performance in various exercises, and certificates are awarded to dogs who are able to obtain a high enough score. The most basic title in KNPV is known as Politiehond 1 (PH1). Competing dogs must first obtain this title before attempting any of the more challenging titles, and in Holland, a dog must have this title before it can work as a police dog. Obtaining this title involves completing exercises in obedience, scent work, water work, and protection. A score between 302 and 347 out of 440 possible points is enough for the dog be awarded Certificaat A, which lasts for one year. A score above 348 awards the dog a full PH1 certificate, and a score above 402 awards the dog a Certificaat Met Lof (certificate with honors). After completing PH1, it is up to the handler to decide whether or not to continue training for a more advanced title. Possible titles are Politiehond 2 (PH2), Object Bewakinghond (ObjBW), Speurhond (SpH), and Reddingshond (RH). PH2 includes the same exercises as PH1, but at a more advanced level. ObjBW is considered a specialised Guard Dog title. It includes many of the same exercises as PH1, but does not include water work, and has a stronger focus on guarding. SpH is a very specialised title that focuses on complex tracking and scent work exercises. The exercises are judged harshly, and only about 20% of dogs attempting this title are able to obtain it each year. Finally, RH is a specialised title that focuses on search and rescue operations with exercises that simulate the rescuing of a drowning person, or a person trapped under rubble. KNPV is both incredibly important in maintaining the quality of working breeds such as the German Shepherd or Belgian Malinois, as well as promoting standards for the training of police dogs, protection dogs, and guard dogs. However, as honorable as the sport is, one should always remember that KNPV is just a sport. A true protection dog should be trained for real world scenarios, and not for sport. Tuesday, July 20th, 2010 The guard dog has a long history of working with humans. In fact, guarding livestock was one of the first working roles given dogs. Since then, the work of a guard dog has expanded to include guarding property, personal belongings and even families. Given the importance of these things, one should always strive to have the best dogs from the best breeds watching over what’s important to them. However, there has always been debate over which dogs are best for the job. Before aeroplanes and automobiles, transportation was limited. This lead to a wide variety of different breeds being developed in many different regions, all for the purpose of creating the best guard dog. Today, the world feels just a little bit smaller, and the same breeds that used to be found only in very specific regions can now be found all over the world. What many people don’t realise is that the breeds themselves have continued to change over the years. In the world of canine breeding, genetics can change dramatically from generation to generation. Many breeds that were once excellent guard dogs have now been given the role of house-pet as they were unable to keep up with the strength, intelligence and nerves of other breeds. The best breeds for use as a guard dog today are the German Shepherd, Belgian Malinois and Dutch Shepherd, in that order. Of course, one cannot assume that any dog of a favorable breed will be suitable for work as a guard dog. Every dog is different, and choosing a suitable guard dog happens on an individual basis. However, the basis of a good guard dog is good genetics, and the German Shepherd, Belgian Malinois and Dutch Shepherd have some of the best bloodlines, which have been fine-tuned for years to be the very best. Thursday, July 15th, 2010 KNPV is a lot closer to real protection work than many other dog sports because it comes the closest to mimicking real scenarios. One scenario seen in KNPV that isn’t seen in other sports is the presence of water in the environment. In the real world, a police protection dog must not only be able to swim, but must be able to do so with speed and efficiency in order to engage a target across a body of water, or to rescue a drowning person from a river with strong current. KNPV uses two exercises to test a dog’s swimming ability. In the first exercise, the dog is instructed to swim across a canal with a minimum distance of 15 meters, wait at the other side, and then return to the handler when instructed. Unfortunately, while it is admirable that KNPV would include water exercises, this exercise does not come close enough to a real scenario to be effective as training for a true protection dog. In the real world, the dog will be sent across a body of water in order to perform a task, such as engaging a target. To have the dog sit and wait for a second command to be given on the other side of a river is absurd, and wastes valuable time. The dog should be trained to swim the distance and engage the target with one command. In the second exercise, the dog is instructed by the handler to retrieve a large object in the water, approximately 7 meters out, and bring it back to shore. Again, it is admirable that KNPV would include this exercise, but it is still not close enough to the real scenario. The most important thing a dog could be bringing back to shore in this instance would be a human life. To depend on a dog that has only been trained to haul an inanimate object in calm waters to save a living human being is simply unacceptable. The bottom line is that KNPV is just a sport. Whether you’re training a Belgian Malinois, a Dutch Shepherd or a German Shepherd as a police protection dog, it must be trained for the real world, using real world scenarios and real danger. There is simply no substitute for true protection dog training. Tuesday, July 13th, 2010 KNPV is a term that comes up often when speaking of working dogs, and with good cause; KNPV is one of the most challenging and well-respected dog sports in the world. Between 800 and 1000 dogs get their KNPV PH1 title each year. Of these, only about 5 will be German Shepherds. KNPV titles can only achieved in Holland, where the sport originates, and the vast majority of competing dogs will be Holland’s favoured breed: the Belgian Malinois. For a German Shepherd to achieve a KNPV title is an extremely difficult task that requires a hard dog with strong nerves. KNPV also requires a dog that is intelligent, loyal and sociable as well. Training a dog for the KNPV PH1 title takes dedication and commitment. Training normally takes been 2-3 years to complete. To train a dog for this long, with the level of intensity required for KNPV takes a true love for dog sport and dog training. Training German Shepherd puppies or Belgian Malinois puppies must begin at a very young age. While KNPV is the closest dog sport to real protection work, one should never forget that it is just a sport. However, KNPV forms the basis of breeding standards in Holland. Only the best dogs make it through to achieve a KNPV title, and the litters bred from KNPV titled dogs are ensured to have the strength and nerves required of true protection dogs. Very few KNPV dogs are female, as the best females are always held back for breeding. Thursday, July 8th, 2010 Despite the best efforts of a handler to keep his or her protection dog clean, infestations of fleas, ticks or lice are sometimes inevitable. Luckily, lice is fairly uncommon among dogs in North America. However, the possibility of infestation still exists, and it is important to know what to look for, and what steps to take in the event that your dog does get lice. While lice is commonly known as a human affliction, the type of lice that affect dogs is different, and cannot live off of humans. Just like fleas and ticks, dog lice can cause intense skin irritation and often carry serious diseases. However, unlike energetic fleas, dog lice move slowly and cannot jump or fly. While dog lice is different from the lice that affects humans, the symptoms and methods of treatment are largely the same. A dog with lice will scratch noticeably often, and will often be distracted by the irritation of its skin. Upon parting the dog’s fur, you may find small white particles attached to the strands. These particles are eggs, and are the tell-tale sign of a lice infestation. Luckily, lice in dogs is fairly easy to treat. An insecticide spray or bath is often enough to rid your protection dog or guard dog of the infestation, although your veterinarian may recommend that you dog have its fur shaved. If you have a German Shepherd puppy, or Belgian Malinois puppy, you should consult your veterinarian for treatment advice before using insecticide sprays or baths. Finally, your dogs bedding and brushes should be replaced in order to prevent risk of reinfection. Tuesday, July 6th, 2010 Despite the name, ringworm is actually caused by a form of fungus. Over 35 different species of this fungus exists, but only about four can cause ringworm in dogs. Of these four, Microsporum Canis is the most common. Ringworm is very contagious, and can be passed from dogs to humans. The risk of catching ringworm is especially high in young children. Infection can be spread by direct contact with an infected animal, or by contact with the spores which can live in sheets and carpeting for several months. Ringworm can take as much as two weeks to develop into visible lesions after initial infection. The fungus grows within hair follicles in the skin, and causes hair in the infected area to break off at the root. As a result, ringworm infections often manifest in dogs as circular patches of missing fur. Many cases of ringworm can be identified by examination under ultra-violet light. However, only two of the four species of fungi that cause ringworm will fluoresce. The most accurate test is to have your veterinarian perform a hair culture on fur from the infected area, although this form of testing can take 2-3 weeks to perform. If left untreated, ringworm will spread and cause painful sores, but once identified, infection can be treated fairly easily through anti-fungal medications. Unfortunately, ringworm is much more difficult to remove from the home, and reinfection will occur until remaining spores are dealt with. After an infection, it is recommended that you destroy and replace your dog’s bedding, brushes, and other objects which frequently come into close contact with your dog’s fur. Items that cannot be destroyed can be soaked in a mixture of hot water and iodine, and rinsed with water and diluted bleach. Clean the house thoroughly, and have carpets and upholstery steam-cleaned. While ringworm is not often a dangerous or life-threatening illness, its persistence can make it difficult to deal with. In a guard dog, the skin irritation caused by ringworm can have a detrimental effect on concentration and overall performance. Weather you have a German Shepherd, Belgian Malinois, or Dutch Shepherd, it is important to check your guard dog regularly for signs of ringworm and other signs of skin irritation. Do not hesitate to contact your veterinarian if you detect any signs illness. Thursday, July 1st, 2010 It is believed by many that a cold and wet nose is a sign of good health in a dog. While this is true to an extent, the health of your dog is not so black and white that it can be determined from a simple touch of the nose. A protection dog cannot speak, so it is up to the handler to look for other signs of good or poor health. Concerning a dog’s nose, it is not necessarily true that a dog with a warm or dry nose will always be sick, nor is it true that a dog with a cool and wet nose will always be healthy. In many mammals, humans included, the purpose of the nose is to help clean and condition the air we breath in order to reduce the stress on our lungs and passageways. To a certain extent, the moisture from a dog’s nose helps humidify the air that they breath in. However, this humidifying effect has much more to do with the inside of your dog’s nose than the outside. Truthfully, the primary reason that a dog’s nose will be wet is because dogs frequently lick their noses.Certain breeds of dog, such as the bulldog, often have dry noses due simply to the fact that the dog’s tongue cannot reach its nose. Similarly, your own dog’s nose may be dry during certain times of the day when less licking occurs, such as while it sleeps. Neither of these cases indicate a dog that is sick or unhealthy. However, many dogs avoid licking their noses when they become ill. While a dry or warm nose by itself is certainly no indication of sickness, it may be one symptom accompanying a number of others, such as lethargy or difficulty breathing. As a general rule, you should always consult your veterinarian if your dog shows any other signs of illness, regardless of whether its nose is wet or dry. In rare cases, your dogs nose may not only become dry, but will begin to crack or produce sores. Excessive dryness lasting more than a day, or the appearance of sores on the nose should both be examined immediately by your veterinarian. Whether you have a German Shepherd, Belgian Malinois, or Dutch Shepherd, knowing the signs and symptoms of sickness in your protection dog is the most important step in ensuring it a long and healthy life. When in doubt, you should never hesitate to seek the advice of a trained and licenced veterinarian. Call Us Toll Free 877.687.CCK9 (2259) / Or Email Us
<urn:uuid:35535deb-c8aa-4dae-9c47-e60332e36769>
2013-05-21T17:23:26Z
CC-MAIN-2013-20
[ [ 0.0036163330078125, 0.0218505859375, -0.00933837890625, 0.005950927734375, 0.06982421875, -0.05224609375, -0.00885009765625, 0.10546875, -0.00494384765625, 0.01287841796875, 0.062255859375, 0.0098876953125, -0.056640625, -0.00933837890625, 0.02490234375,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961442
4,111
http://www.cck9.com/2010/07/
0.173709
More than 1 billion people—one-sixth of the world's population—suffer from one or more Neglected Tropical Diseases (NTDs). NTDs are a group of infectious diseases that are the source of tremendous suffering because of their disfiguring, debilitating, and sometimes deadly impact. They are called neglected because they have been largely wiped out in the more developed parts of the world and persist only in the poorest, most marginalized communities and conflict areas. Social stigma is a major consequence of NTDs. In addition to causing physical and emotional suffering, these devastating diseases hamper a person's ability to work, keep children out of school, and prevent families and communities from thriving. Image: Nigerian children at-risk of infection with NTDs. Credit: CDC photo, Sonia Pelletreau.
<urn:uuid:c3d2bf12-86be-4de4-934d-73cf2bfdeed2>
2013-05-21T17:38:31Z
CC-MAIN-2013-20
[ [ 0.006725193466991186, -0.008577642031013966, 0.006564110983163118, -0.0010269007179886103, 0.13724227249622345, -0.06990979611873627, -0.0038861148059368134, 0.11791237443685532, -0.012403350323438644, -0.07119845598936081, 0.10824742168188095, 0.0012232200242578983...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953333
165
http://www.cdc.gov/globalhealth/ntd/
0.275525
What Can I do to Help Prevent Traumatic Brain Injury? There are many ways to reduce the chances of sustaining a traumatic brain injury, including: - Buckling your child in the car using a child safety seat, booster seat, or seat belt (according to the child's height, weight, and age). - Rear-facing child safety seat. For the best possible protection, infants and children should be kept in a rear-facing child safety seat, in the back seat buckled with the seat’s harness, until they reach the upper weight or height limits of their particular seat. The weight and height limits on rear-facing child safety seats can accommodate most children through age 2, check the seat’s owner’s manual for details. - Forward-facing child safety seat. When children outgrow their rear-facing seats (the weight and height limits on rear-facing car seats can accommodate most children through age 2) they should ride in forward-facing child safety seats, in the back seat buckled with the seat’s harness, until they reach the upper weight or height limit of their particular seat (usually around age 4 and 40 pounds, many newer seats have higher weight limits-check the seat’s owner’s manual for details). - Booster seat. Once children outgrow their forward-facing seats (by reaching the upper height and weight limits of their seat), they should ride in belt positioning booster seats. Remember to keep children in the back seat for the best possible protection. - Seat belts. Children should use booster seats until adult seat belts fit them properly. Seat belts fit properly when the lap belt lays across the upper thighs (not the stomach) and the shoulder belt fits across the chest (not the neck). When adult seat belts fit children properly they can use the adult seat belts without booster seats. For the best possible protection keep children in the back seat and use lap-and-shoulder belts. - All children younger than 13 years should ride in the back seat. Airbags can kill young children riding in the front seat. Never place a rear-facing car seat in the front seat or in front of an air bag. Know the Stages - Wearing a seat belt every time you drive or ride in a motor vehicle. - Never driving while under the influence of alcohol or drugs. - Wearing a helmet and making sure your children wear helmets when: - Riding a bike, motorcycle, snowmobile, scooter, or all-terrain vehicle; - Playing a contact sport, such as football, ice hockey, or boxing; - Using in-line skates or riding a skateboard; - Batting and running bases in baseball or softball; - Riding a horse; or - Skiing or snowboarding. - Making living areas safer for seniors, by: - Removing tripping hazards such as throw rugs and clutter in walkways; - Using nonslip mats in the bathtub and on shower floors; Installing grab bars next to the toilet and in the tub or shower; - Installing handrails on both sides of stairways; - Improving lighting throughout the home; and - Maintaining a regular physical activity program, if your doctor agrees, to improve lower body strength and balance.1,2,3 - Making living areas safer for children, by: - Installing window guards to keep young children from falling out of open windows; and - Using safety gates at the top and bottom of stairs when young children are around. - Making sure the surface on your child's playground is made of shock-absorbing material, such as hardwood mulch or sand.4 - Judge JO, Lindsey C, Underwood M, Winsemius D. Balance improvements in older women: effects of exercise training. Physical Therapy 1993;73(4):254–265. - Lord SR, Caplan GA, Ward JA. Balance, reaction time, and muscle strength in exercising older women: a pilot study. Archives of Physical and Medical Rehabilitation 1993;74(8):837–839. - Campbell AJ, Robertson MC, Gardner MM, Norton RN, Buchner DM. Falls prevention over 2 years: a randomized controlled trial in women 80 years and older. Age and Aging 1999;28:513–518. - Mack MG, Sacks JJ, Thompson D. Testing the impact attenuation of loose fill playground surfaces. Injury Prevention 2000;6:141–144.
<urn:uuid:258dab4c-7749-4e3f-943e-cee27d1e429f>
2013-05-21T17:11:10Z
CC-MAIN-2013-20
[ [ 0.0003757476806640625, 0.032958984375, 0.0079345703125, -0.03466796875, 0.09423828125, -0.07666015625, 0.0038299560546875, 0.08642578125, -0.0228271484375, -0.03271484375, 0.09521484375, 0.0322265625, -0.003631591796875, 0.040771484375, 0.056396484375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.895895
935
http://www.cdc.gov/traumaticbraininjury/prevention.html?s_cid=fb_tbi46
0.159567
Janet Damita Jo Jackson (born May 16, 1966) is an American singer-songwriter, record producer, dancer and actress. Born in Gary, Indiana and raised in Encino, California, she is the youngest member of the Jackson family of musicians. She first performed on stage with her family beginning at the age of seven, and later started her career as an actress with the variety television series The Jacksons. She went on to star in other television shows including Good Times, A New Kind of Family, Diff'rent Strokes, and Fame. Jackson faced initial difficulties after launching her recording career in 1982, often criticized for having a limited vocal range and being yet another child from the Jackson family to become a recording artist. However, with the collaboration of record producers Jimmy Jam and Terry Lewis, Jackson found record-breaking success, producing five consecutive number one studio albums on the Billboard 200; these include Control (1986), Janet Jackson's Rhythm Nation 1814 (1989), janet. (1993), The Velvet Rope (1997), and All for You (2001). Although critics have compared her contemporary work less favorably to that of her initial breakthroughs, the critical and commercial success of her innovative multi-platinum albums, music videos and choreography have contributed to Jackson's successful career as an entertainer. Jackson has been regarded as one of the most influential recording artists in the history of contemporary R&B, as her music has incorporated elements of rap music with sample loop, triple swing and industrial beats, which led to crossover appeal in popular music. She became a pop icon in the late 1980s, and was recognized as a role model for youth, as her music promoted abstinence over promiscuity, self-respect and social consciousness. Jackson’s public image later developed into that of a fully matured adult, as her music began to explore topics such as sexual freedom, domestic violence and sadomasochism. The 1990s established her as one of the highest paid recording artists in contemporary music. She later emerged the second most successful artist of the decade, although her status in popular music has since diminished. Though Jackson is listed by the Recording Industry Association of America as the eleventh best-selling female artist in the United States with 26 million certified albums, Billboard magazine named her one of the top-ten selling artists in the history of contemporary music. She is ranked as the ninth most successful act in the history of rock music and the second most successful female artist in pop music history, having sold over 100 million albums worldwide. Amidst her recording career, Jackson has also starred in feature films since the mid-1990s. Tyler Perry's Why Did I Get Married? (2007), for which Jackson won a NAACP Image Award, became her third consecutive film to open at number one at the box office, following Poetic Justice (1993) and Nutty Professor II: The Klumps (2000). 1966–1982: Early life and career Janet Jackson was born in Gary, Indiana, as the youngest of nine children to Katherine Esther (née Scruse) and Joseph Walter Jackson. The family were lower-middle class and devout Jehovah's Witnesses. By the time she was a toddler, her older brothers—Jackie, Tito, Jermaine, Marlon, and Michael—had begun to perform on stage at nightclubs and theaters as The Jackson 5. In March 1969, the group signed a record deal with Motown, and by the end of the year they had recorded the first of four consecutive number-one singles. The Jackson 5's success allowed the entire family to move to the Encino neighborhood of Los Angeles, California in 1971. The Jacksons settled in a gated mansion that they referred to as "Hayvenhurst." Although born into a family of musical prodigies, Jackson—whose love of horses initially inspired her to become a race-horse jockey—had no aspiration to become an entertainer. Her father, however, planned for her to follow in the family's footsteps. Jackson commented, "No one ever asked me if I wanted to go into show business... it was expected." In 1974, at the age of seven, Jackson appeared on stage in Las Vegas, Nevada alongside her siblings in a routine show at the original MGM Casino. She began her career as an actress with the debut of the CBS variety show The Jacksons (1976), in which she appeared alongside her siblings Tito, Rebbie, Randy, Michael, Marlon, Latoya and Jackie. In 1977, Jackson was selected by producer Norman Lear to play a recurring role in the sitcom Good Times. From 1979 to 1980, Jackson starred in A New Kind of Family, and then joined the cast of Diff'rent Strokes from 1981 to 1982. Jackson played a recurring role during the fourth season of the television series Fame as Cleo Hewitt; Jackson later commented the series was not a project she enjoyed working on. 1982–1985: Early recordings Although Jackson was initially apprehensive about starting a music career, she agreed to participate in recording sessions with her family. Her first recording was a duet with her brother Randy on a song titled "Love Song for Kids" in 1978. At the age of fifteen, her father (and manager) arranged a contract for her with A&M Records. Her debut album Janet Jackson, produced by soul singers Angela Winbush, René Moore and Leon F. Sylvers III, was released in 1982. The album peaked at number six on the Billboard Hot R&B albums chart. The record received poor critical reception, with one critic commenting that Jackson had "no distinctive musical personality of her own". Despite the critical views, Jackson's second album, Dream Street was released two years later. Critical reception was considered favorable to that of Jackson's debut album, as her musical style was described as a "prime [example] of pleasing '80s pop". Dream Street reached number nineteen on the R&B albums chart, however, its sales were less than that of Jackson's debut album. The album's only hit—"Don't Stand Another Chance"—peaked at number nine on Billboard's R&B singles chart. That same year, Jackson eloped with childhood friend and fellow R&B singer James DeBarge; they divorced shortly afterwards and the marriage was subsequently annulled. After the limited successes of her first two albums, Jackson made the decision to separate her business affairs from her father/manager Joesph Jackson and the rest of her family. She later commented "I just wanted to get out of the house, get out from under my father, which was one of the most difficult things that I had to do, telling him that I didn't want to work with him again". A&M Records executive John McClain hired producers Jimmy Jam and Terry Lewis to work with Jackson. Within six weeks, Jackson, Jam, and Lewis crafted Jackson's breakthrough album, Control, which was released in February 1986. It was a concept album based on Jackson's new-found independence. Though producers Jam and Lewis were concerned with achieving cross-over appeal, their primary goal was to create a strong following within the African-American community first. Jam commented, "We wanted to do an album that would be in every black home in America... we were going for the black album of all time." Critics compared Jackson's music favorably to contemporary rivals such as Whitney Houston, Patti LaBelle, and Diana Ross. The album's singles, "What Have You Done for Me Lately," "Nasty," "When I Think of You" (Jackson's first number one single on the Billboard Hot 100), "Control," and "Let's Wait Awhile" each peaked within the Top 5; "The Pleasure Principle" became a Top 20 hit, peaking at number 19. Most of the Control music videos were choreographed by a then unknown-Paula Abdul. "Let's Wait Awhile", which promoted sexual abstinence over promiscuity, earned Jackson a reputation as a role model for young women. Richard J. Ripani, author of The New Blue Music: Changes in Rhythm & Blues, 1950-1999, states the album was one of the first successful records to influence the rise of new jack swing, incorporating R&B, funk, jazz, soul, and various production techniques, which emerged in the mid-1980s. The success of Control, according to Ripani, had bridged the gap between R&B and rap music. The album earned Jackson three Grammy nominations, six Billboard Music Awards, three MTV Video Music Awards, and three Soul Train Awards. Control was nominated for twelve American Music Awards, winning four, a record that has yet to be broken. Control was certified 5× platinum by the Recording Industry Association of America. The album has sold over eight million copies worldwide. 1989–1992: Janet Jackson's Rhythm Nation 1814 In 1989, Jackson began recording her fourth album, Janet Jackson's Rhythm Nation 1814. The release is a concept album based on social injustice. Though executives at A&M wanted an album similar to Control, Jackson was determined to imbue her music with a socially-conscious message that complemented her songs about love and relationships. Unwilling to compromise her artistic integrity, Jackson shifted from "personal freedom to more universal concerns—injustice, illiteracy, crime, drugs—without missing a beat." Much like its predecessor, the album contained heavy styling of new jack swing. While Jackson's small voice was criticized and her social agenda garnered mixed reactions, reviews for Rhythm Nation 1814 were predominately positive; critics commented it was an even greater success than Control. The album eventually became record-setting and record-breaking as the only album in history to score number one hits in three separate calendar years—"Miss You Much" in 1989, "Escapade" and "Black Cat" in 1990, and "Love Will Never Do (Without You)" in 1991. Jackson became the first artist to score a number-one hit simultaneously on the Billboard Hot 100 and Mainstream Rock singles charts with "Black Cat", and the only artist to have seven top-five singles on the Hot 100 from one album. Billboard named Rhythm Nation 1814 the number-one selling album of the year, winning multiple music awards. The Rhythm Nation 1814 Tour—Jackson's first world tour in support of a studio album—which aimed to re-create the award–winning, visually innovative music videos of Rhythm Nation 1814 and Control, was described as "an elaborately choreographed spectacle" by Entertainment Weekly. With an attendance of more than two million patrons, it remains the most successful debut tour by any recording artist. The success of Rhythm Nation 1814 and its predecessor Control, placed Jackson on par with several other globally renowned recording artists, including her older brother Michael Jackson, Madonna, and Tina Turner. With the release of the Rhythm Nation 1814 album, Jackson fulfilled her contract with A&M Records. In 1991, after being approached personally by Virgin Records owner Richard Branson, she signed a highly publicized multi-million dollar contract with the label—estimated between $32-50 million—and became the highest paid female recording artist in contemporary music. That same year, Jackson secretly entered into her second marriage with long-term friend - dancer, songwriter and director René Elizondo, Jr. In May 1992, Jackson recorded a song entitled "The Best Things in Life Are Free" with Luther Vandross, featuring Bell Biv Devoe and Ralph Tresvant, for the Mo' Money film soundtrack. Rhythm Nation 1814 was certified 6× platinum and the album had sold eight million copies worldwide. 1993–1996: janet. and Poetic Justice In May 1993, Jackson's fifth studio album entitled janet. (read "Janet, period."), debuted via Virgin Records, and became the first by a female artist to debut at number one during the Nielsen SoundScan era. Jackson commented, "certain people feel I'm just riding on my last name...That's why I just put my first name on janet. and why I never asked my brothers to write or produce music for me". Critical reception was generally favorable, but janet. was considered to be less innovative than Rhythm Nation 1814 and Control. janet. marked the beginning of Jackson's exploration of sexuality in her music. The album's number one hit single "That's the Way Love Goes" and the top ten singles "If," "Because of Love," "You Want This" and "Any Time, Any Place" all contained themes of sexual freedom and physical intimacy. Craig S. Semon of Telegram & Gazette-Worcester commented " Instead of practicing no sex, like she did on "Let's Wait Awhile," Jackson now practices endless sex all through "janet." In July 1993, Jackson made her big-screen debut in the John Singleton directed, Poetic Justice. Her role received predominately positive reviews, as Rolling Stone regarded Jackson's performance as "a beguiling film debut" despite her inexperience, while the Washington Post considered her "believably eccentric". Jackson's ballad "Again" was featured on the film's soundtrack, and garnered a nomination for the Academy Award for Best Original Song. During this time period, Jackson's brother Michael Jackson was immersed in a highly-publicized child sex abuse scandal, of which he denied any wrongdoing. Jackson lent moral support to her brother, and denied allegations made by her sister La Toya Jackson in her book La Toya: Growing up in the Jackson Family (1991) that their parents had abused her and her siblings as children. In September 1993, Jackson appeared topless on the cover of Rolling Stone magazine with the hands of her then-husband Elizondo Jr. covering her breasts. The photograph is the original full length version of the cropped image used on the cover of the janet. album, shot by Patrick Demarchelier. The cover story, "Janet Jackson: The Joy of Sex" quoted Jackson stating "I love feeling deeply sexual -- and don't mind letting the world know". Jackson's second world tour—the janet. Tour—garnered critical acclaim as Michael Snyder of the San Francisco Chronicle described Jackson's stage performance as what erased the line between "stadium-size pop music concerts and full-scale theatrical extravaganzas", and St. Louis Post-Dispatch's Steve Pick observed Jackson's stage show made the janet. album's numerous hit singles more effective with her "larger-than-life stage persona". janet. was later certified 6× platinum by the RIAA, with worldwide sales exceeding ten million copies. Jackson collaborated with her brother Michael on "Scream," the lead single from his 1995 album HIStory. The song debuted at number five on Billboard's Hot 100 singles chart, becoming the first song ever to debut in the top 5. "Scream" is featured in the Guinness Book of Records as the "Most Expensive Music Video Ever Made" at a cost of $7 million. The single also made the highest debut on the Hot Dance Club Play chart at number twelve. In October 1995, Jackson's first compilation album, Design of a Decade 1986/1996, was released via A&M Records. In January 1996, Jackson renewed her contract with Virgin Records for a reported $80 million dollars. The contract reestablished her as the then-highest paid recording artist in contemporary music, suprassing the recording industry's then-unparalled 60 million dollar contracts earned by her brother, Michael Jackson, and Madonna. 1997–1999: The Velvet Rope During the two year period prior to the recording of her sixth studio album, Jackson reportedly suffered from depression and anxiety. The Velvet Rope (1997) was an introspective look into Jackson's bout with depression, as Michael Saunders of The Boston Globe described it as a "critical self-examination and an audio journal of a woman's road to self-discovery". The album's title is a literal depiction of the velvet ropes commonly used to separate crowds from celebrities, and according to Jackson, the metaphorical velvet rope within every human being which keeps their true feelings separated from those around them. The album also introduced sadomasochism into Jackson's music; Eric Henderson of Slant commented, "The Velvet Rope is a richly dark masterwork that illustrates that, amid the whips and chains, there is nothing sexier than emotional nakedness". Although the album suffered criticism based on Jackson's personal issues with self-esteem, it became one of her most critically acclaimed, as Rolling Stone described The Velvet Rope as "part of a continuum, building from the self-empowering manifesto Control, the skin-deep social consciousness of Rhythm Nation and the hypersexual make-over of Janet". In August 1997, the album's lead single, "Got 'Til It's Gone" was released to radio and was moderately successful. The single sampled the Joni Mitchell song "Big Yellow Taxi" and featured a cameo appearance by rapper Q-Tip. The album's second single "Together Again", topped the charts, becoming Jackson's eighth number one hit on the Hot 100 chart, and placing her on par with Elton John, Diana Ross and The Rolling Stones. The single spent a record 46 weeks on the Hot 100, as well as spending 19 weeks on the UK singles chart. Other songs on the album which dealt with sexual orientation and homophobia, such as her cover version of Rod Stewart's 1976 song "Tonight's the Night (Gonna Be Alright)" and "Free Xone", established Jackson as a gay icon. The Velvet Rope was honored by the National Black Lesbian and Gay Leadership Forum and received the award for Outstanding Music Album at the 9th Annual GLAAD Media Awards. In 1998, Jackson began the The Velvet Rope Tour, an international trek that included Europe, North America, Africa, Asia, New Zealand and Australia. Jackson's HBO special, The Velvet Rope: Live in Madison Square Garden, was watched by more than 15 million viewers. The two-hour concert beat the ratings of all four major networks in homes that were subscribed to HBO. The RIAA certified The Velvet Rope 3× platinum. The following month, Jackson separated from Elizondo Jr. As her world tour came to a close in 1999, Jackson lent guest vocals to a number of songs by other artists, including Shaggy's "Luv Me, Luv Me," for the soundtrack to How Stella Got Her Groove Back, the Grammy-nominated "God's Stepchild" from the Down on the Delta soundtrack, "Girlfriend/Boyfriend" with BLACKstreet, and "What's It Gonna Be?!" with Busta Rhymes. Jackson performed a duet with Elton John for the song "I Know The Truth." As 1999 ended, Billboard Magazine ranked Jackson as the second most successful artist of the decade, behind Mariah Carey. 2000–2003: Nutty Professor II: The Klumps and All for You In July 2000, Jackson returned to the big screen with her second film, Nutty Professor II: The Klumps, as Professor Denise Gaines opposite Eddie Murphy. The film became Jackson's second to open at number one at the box office, grossing an estimated $42.7 million dollars in its opening weekend. Her contribution to the film's soundtrack, "Doesn't Really Matter", became Jackson's ninth number one U.S. Billboard Hot 100 single. That same year, Jackson's husband Elizondo filed for divorce, which did not finalize until October 2003. Jackson's seventh album, All for You, was released in April 2001. The album debuted at number one on the Billboard 200. Selling 605,000 copies, All For You had the highest first-week sales total of Jackson's career. Reviews for the album were predominately positive, as Stephen Thomas Erlewine of Allmusic stated "[Jackson's] created a record that's luxurious and sensual, spreading leisurely over its 70 minutes, luring you in even when you know better", and Jon Pareles of The New York Times commented "As other rhythm and blues strips down to match the angularity of hip-hop, Ms. Jackson luxuriates in textures as dizzying as a new infatuation". "All for You" debuted on the Billboard Hot 100 singles chart at number 14, the highest debut ever for a single that wasn't commercially available.] The single peaked at number one, where it topped the Billboard Hot 100 singles chart for seven weeks. "All For You" made radio airplay history, "[being] added to every pop, rhythmic and urban radio station that reports to the national trade magazine Radio & Records" in its first week. The second single, "Someone to Call My Lover", which contained a heavy guitar loop of America's "Ventura Highway", peaked at number three on the Billboard Hot 100. All For You sold more than three million copies in America, and was certified 2× platinum by the RIAA. In 2002, Jackson collaborated with reggae singer Beenie Man on the song "Feel It Boy," which met moderate success. Jackson later admitted regret over the collaboration after discovering Beenie Man's music often contains homophobic lyrics; Jackson issued an apology to her gay following in an article contained in The Voice. Jackson also began her relationship with record producer Jermaine Dupri that same year. 2004–2005: Super Bowl XXXVIII controversy and Damita Jo Jackson performed alongside Justin Timberlake during the Super Bowl XXXVIII halftime show in February 2004. As Timberlake sang the lyric "gonna have you naked by the end of this song" from his single "Rock Your Body", he tore open Jackson's top, exposing her right breast. Jackson apologized, although not to the network directly, calling it an accident, and said that Timberlake was supposed to pull away the bustier and leave the red-lace bra intact. Timberlake also issued an apology, calling the accident a "wardrobe malfunction". The incident became the most replayed moment in TiVo history and the most-searched event in the history of the Internet—surpassing the total number of searches for the September 11, 2001 attacks. This subsequently earned Jackson a place in the Guinness World Records as "Most Searched in Internet History." CBS, the NFL, and MTV (CBS's sister network that produced the halftime show), denied any knowledge and all responsibility of the incident under a hail of criticism. Still, the FCC continued an investigation. Jackson issued a public apology during a video broadcast, in addition to her initial written statement. I am really sorry if I offended anyone. That was truly not my intention ...MTV, CBS, the NFL had no knowledge of this whatsoever, and unfortunately, the whole thing went wrong in the end. —Janet Jackson, ESPN CBS would only let Jackson and Timberlake appear on the 2004 46th Annual Grammy Awards ceremony if they each made a public apology to the network itself and not under the ruse it was a "wardrobe malfunction"; Timberlake issued an apology, Jackson did not. Jermaine Dupri left his post on the Grammy Awards committee after Jackson refused to apologize again for the Super Bowl incident. The controversy surrounding the incident halted plans for Jackson to star in a made-for-TV biopic on the life on singer Lena Horne for ABC-TV. Though Horne was reportedly displeased with the Super Bowl halftime antics and insisted that ABC pull Jackson from the project, according to Jackson's representatives, she withdrew from the project willingly. In March 2004, Jackson's eighth studio album, Damita Jo—titled after her middle name and said to represent one of the various sides of her personality—was released debuting at number two. Despite the album's strong debut, its three singles all failed to become Top 40 hits. Jackson appeared as a host of Saturday Night Live on April 10, 2004, where she performed a skit that parodied the Super Bowl incident. She also appeared in the popular television sitcom Will & Grace playing herself, interacting with sitcom characters Karen Walker and Jack McFarland as Jack was auditioning to be one of her back-up dancers. By the end of 2004, Damita Jo had sold 942,000 copies in the United States and was later certified platinum by the RIAA, but was considered a commercial disappointment compared to Jackson's previous albums. Lackluster sales of Damita Jo have been speculated to be not only a result of negative publicity from the Super Bowl incident, but also due to MTV's "blacklisting" of Jackson's music videos. Jermaine Dupri, the then-president of the urban music department at Virgin Records, expressed "sentiments of nonsupport from the label." 2006–2007: 20 Y.O. and Why Did I Get Married? To promote her upcoming album, Jackson appeared on the cover of Us Weekly in June 2006, which became the magazine's best-selling issue ever. Virgin Records released Jackson's ninth studio album, 20 Y.O., in September 2006. 20 Years Old, the album title, represents "a celebration of the joyful liberation and history-making musical style of her 1986 breakthrough album, Control." Jackson and producers Jimmy Jam, Terry Lewis and Jermaine Dupri focused the album's production to R&B and dance oriented music—the two genres which made her famous. 20 Y.O. garnered modest critical reception, with many commentators asserting the album did not meet the awe inspiring production of its namesake, Control. The album debuted at number two on the Billboard 200, selling over 296,000 copies in its first week. The album's lead single "Call on Me"—a duet with rapper Nelly—became the only single to peak in the top 40, hitting number 25 on the Billboard Hot 100 singles chart. The album was nominated for a Grammy for Best Contemporary R&B Album, but did not win the award. 20 Y.O. was eventually certified platinum, but sold less than its predecessor Damita Jo. Jermaine Dupri, who co-produced 20 Y.O., left his position as head of urban music at Virgin following the commercial disappointment of Jackson's album. The release of 20 Y.O. satisfied Jackson's contract with Virgin Records. Jackson starred opposite Tyler Perry as a psychotherapist named Patrica in the feature film Why Did I Get Married?. Filming began on March 5, 2007, and the film was released on October 12, 2007. The film opened at number one at the box office, grossing $21.4 million in its first week. In February 2008, Jackson won the NAACP Image Award for Outstanding Supporting Actress in a Motion Picture for her role. In July 2007, Jackson changed labels and signed a record contract with Island Records. Jackson's tenth studio album, Discipline, was released on February 26, 2008 under the supervision of label head Antonio "L.A." Reid. Accompanied by record producer Jermaine Dupri, Discipline was Jackson's first album for the Island Def Jam Music Group. Jackson and Dupri severed as executive producers. Long-term collaborators Jimmy Jam and Terry Lewis did not contribute and Discipline was the first album on which Jackson did not co-write any of the material since 1984's Dream Street. Although sales were less than that of Damita Jo and 20 Y.O., Discipline peaked in America on the Billboard 200 at number one with over 181,000 copies sold during that week, becoming Jackson's first number one album since All For You (2001). Critical reception was generally positive as the album was said to be "as innocent, universal, and inviting as anything else in Janet's past", but other critics referred to the musical and lyrical content as "cheesy" and "bizarre", denouncing the overt sexual theme throughout the album. On December 12, 2007, the first single from the album, "Feedback", was leaked to select radio stations in the United States. On the Billboard Hot 100, the single originally peaked and remained in the top 50 for over six weeks, but after the album's release, it climbed to number 19 on the Hot 100. It became Jackson's biggest hit single since "Someone To Call My Lover" in 2001. Subsequent singles failed to chart on the Hot 100. Though Discipline was widely expected to be Jackson's "comeback" album—similar to Mary J. Blige's The Breakthrough and Mariah Carey's The Emancipation of Mimi—Jackson has asserted that she has never stopped making music, and therefore, talks of a 'comeback' were misguided. Jackson's fifth world tour—the Rock Witchu Tour—is set to begin on September 10, 2008. Despite embarking on a world concert tour, Jackson announced there would be no more singles released off Discipline, as the Island Def Jam label had stopped all promotion of the album as of June 2008. Musical style and performance Jackson's voice has been classified as mezzo-soprano, though the singer has been noted for having a limited vocal range. Critics have caregorized "Jackson's small voice [as] a minor ingredient in a larger sonic blend by masterminds Jam and Lewis," however, other commentators observe this has never hindered Jackson's career. Her wispy voice was a pale echo of Michael's, but on Janet's albums - and in her videos and live performances, which revealed a crisp, athletic dance technique not unlike her brother's - singing wasn't the point. Her slamming beats, infectious hooks, and impeccable production values were perfectly suited to the breezy zeal with which she declared her social and sexual independence. "Rhythm Nation" (1989) One of the most profound examples of new jack swing is found in "Rhythm Nation". The use of sample loop and triple swing are present, while vocals for the song are alternatively sung in octaves or rapped in spoken verse. "Black Cat" (1989) Jackson's self-written rock anthem "Black Cat", featuring guitarist David Barry and produced by Jellybean Johnson. Recorded using a mixture of rockman and Marshall amplifier to give it a heavy metal sound. Jackson's voice has also been praised on occasion. Eric Henderson of Slant claimed critics who judged Jackson harshly for her thin voice "somehow missed the explosive 'gimme a beat' vocal pyrotechnics she unleashes all over "Nasty"...Or that they completely dismissed how perfect her tremulous hesitance fits into the abstinence anthem "Let's Wait Awhile." In 1986, when Jackson, Jam and Lewis crafted the breakthrough album Control, it became Jackson's declaration of independence. In the opening of the album's title-track, Jackson states "This is a story about control", while the lyrical content of the song describes Jackson's personal freedom after a lifetime of obeying the instruction of others. The theme of independence is prevalent throughout the album, as in the singles "Nasty" when Jackson asserts to a male suitor "My name ain't baby" and challenges an inattentive boyfriend in "What Have You Done for Me Lately". Jackson's follow-up album, Rhythm Nation 1814, displayed themes dealing with social injustices—racism, poverty, and crime among others. The 1993 janet. album contained the overt theme of sexual freedom, while The Velvet Rope began to explore S&M among other themes such as domestic abuse, depression, homophobia, and low self-esteem. Jackson's music has encompassed a broad range of genres, including R&B, pop, soul, rap, rock, and dance. Jackson has credited her elder brothers Michael and Jermaine as her primary musical influences. David Ritz of Rolling Stone compares Jackson's musical style to that of Marvin Gaye; Jackson, much like Gaye, has relied heavily on personal experience as the source of her music. Other artists attributed to have influenced Jackson's music are The Ronettes, Dionne Warwick, Tammi Terrell and Diana Ross. When producers Jimmy Jam and Terry Lewis produced Jackson's 1986 album Control, they introduced the emerging style of new jack swing into her music. New jack swing, which incorporates R&B, soul, jazz, and funk, as well as use of sample loop, triple swing and other various musical techniques, was created in part by L.A. Reid, Kenneth "Babyface" Edmonds, and Teddy Riley in the mid 1980s. Described as "the most pop-oriented rhythm-and-blues music since 1960s Motown," the genre was promoted as the "Sound of Young Black America." Jam and Lewis continued to incorporate new jack swing into Jackson's later album's Rhythm Nation 1814 and janet. The Velvet Rope saw Jackson expand into adult contemporary, hip hop, and traditional soul and funk, abandoning new jack swing. All for You, as well as subsequent albums Damita Jo and 20 Y.O., involved numerous dance-pop-oriented songs, while Discipline merged dance-pop with electronic beats, in addition to the familiar R&B style to which Jackson is accustom. As a child, Jackson routinely watched movie musicals with her brother Michael when they were not performing. After Michael Jackson, and subsequently all recording artists began to make music videos in order to promote their albums, Janet Jackson drew her inspiration from the musicals she watched in her youth. Jackson was heavily influenced by the choreography of Fred Astaire and Michael Kidd, among others. Judy Mitoma, author of Envisioning dance on film and video commented, "[n]ot since James Brown, Chubby Checker, and Elvis Presley wove dance and movement into their performances in the 1960s did the pop music world have so many charismatic vocalists who could dance". Eric Henderson regarded Jackson's breakthrough album Control as "the birth of Janet the music video star, as six of the nine tracks were turned into popular videos that all but announced her as queen of the production dance number". Jackson's concert performances have been compared to Broadway productions and have been referred to as "enormous theatrical extravaganza[s]" and the "pop equivalent of a summer blockbuster movie".Throughout her career, Jackson has worked with numerous professional choreographers such as Paula Abdul, Michael Kidd and Tina Landon. Landon also took part in the choreography for Michael and Janet Jackson's music video "Scream". With a career in dance music which spans two decades, Jackson's choreography has been credited for setting the benchmark for a number of contemporary artists. Qadree EI-Amin, Jackson's former personal manager commented artists such as "Britney Spears and Christina Aguilera pattern their performances after Janet's proven dance-diva persona". Jackson has been credited for influencing a number of female R&B music artists, including Ciara, Beyoncé Knowles, Cassie, Aaliyah, Brandy, and Monica. Main articles: List of Janet Jackson awards, Grammy nominations for Janet Jackson, MTV Video Music Award nominations for Janet Jackson, American Music Award nominations for Janet Jackson, and Janet Jackson as gay icon The baby sister of the "precious Jackson clan" and the "King of Pop" —Michael Jackson—Janet Jackson has strived to distance her professional career from that of her older brother and the rest of the Jackson family. Throughout her recording career, one of her common conditions for interviewers has been that there be no mention of Michael. Despite being born into a family of entertainers, Janet Jackson has managed to establish her unique impact on the recording industry—rivaling not only several female entertainers including Madonna, Mariah Carey and Whitney Houston, but also her brother—while "successfully [shifting] her image from a strong, independent young woman to a sexy, mature adult". When the American music industry began its economic recovery in the mid-1980s from the fall of the disco era, Janet Jackson, among other multi-platinum selling music artists, was acknowledged for stimulating the overall increase in consumer purchasing of LPs, cassette tapes and CDs. Though it was Michael Jackson's Thriller that originally synchronized music video with album sales, Janet Jackson saw the visualization of her music elevate her to the status of a pop culture icon. As princess of America's black royal family, everything Janet Jackson does is important. Whether proclaiming herself in charge of her life, as she did on Control (1986), or commander in chief of a rhythm army dancing to fight society's problems (Rhythm Nation 1814, from 1989), she's influential. And when she announces her sexual maturity [janet.]...it's a cultural moment. Since 1986, Jackson has produced thirty-two number-one singles on various Billboard charts. With fourteen number one hits on the Billboard Hot R&B/Hip-Hop Singles & Tracks chart, Jackson stands in second place among female artists with the most R&B/Hip-Hop hit singles, behind Aretha Franklin, who has twenty. Jackson's Control, Rhythm Nation 1814, and janet. made her the only recording artist ever to score five or more top ten singles from three consecutive albums. Rhythm Nation 1814 also enabled Jackson to become the first recording artist to ever achieve seven top five hit singles from a single album. Jackson's tenth studio album Discipline, which became her sixth album to debut at number one, has allowed her to surpass brother Michael's five number one studio albums. At the 1999 World Music Awards, Jackson received the Legend Award alongside Cher for "lifelong contribution to the music industry and outstanding contribution to the pop industry." Recognized as one of the biggest female pop and R&B stars of the 1980s and 1990s, Jackson was awarded a top honor from the American Music Awards—the Award of Merit—in March 2001 for "her finely crafted, critically acclaimed and socially conscious, multi-platinum albums." Jackson became the inaugural honoree of the "mtvICON" award—an annual recognition of artists who have made significant contributions to music, music video, and pop culture while tremendously impacting the MTV generation. Jackson's crossover appeal in both urban and popular music has been well documented as one of her advantages. El-Amin commented "She's bigger than Barbra Streisand because Streisand can't appeal to the street crowd, as Janet does. But Streisand's rich, elite crowd loves Janet Jackson". Although Jackson continues to receive radio airplay, her reception in popular music has diminished, with many critics using the Super Bowl incident as a catalyst to compare her contemporary work to that which was released prior to 2004. In addition to her status as a pop icon, Jackson was named "Best Female Sex Symbol" in 1994 and one of the greatest African-American sex symbols by Ebony in 2005. Jackson has also been recognized as a gay icon, awarded by several LGBT organizations for her contribution to AIDS-related charities as well as being a long-term ally of the gay community. On June 18, 2005, Jackson was awarded a Humanitarian Award by the Human Rights Campaign, a national gay, lesbian, bisexual, and transgender civil rights organization and AIDS Project Los Angeles on behalf of her work and involvement in raising money for AIDS charities. In 2006, it was announced that Jackson was the "Most Searched in Internet History" and the "Most Searched for News Item" by the Guinness World Records as a result of the halftime show controversy of Super Bowl XXXVIII. In addition, Jackson was ranked the 7th richest woman in the entertainment business by Forbes magazine, having amassed a fortune of over $150 million. On April 26, 2008, Jackson received the Vanguard Award—a media award from the Gay & Lesbian Alliance Against Defamation to honor members of the entertainment community who have made a significant difference in promoting equal rights for LGBT people—at the 19th Annual GLAAD Media Awards. 1982: Janet Jackson 1984: Dream Street 1989: Janet Jackson's Rhythm Nation 1814 1997: The Velvet Rope 2001: All for You 2004: Damita Jo 2006: 20 Y.O. 1976-1977: The Jacksons 1977-1979: Good Times 1979-1980: A New Kind of Family 1980-1984: Diff'rent Strokes 1993: Poetic Justice 2000: Nutty Professor II: The Klumps 2007: Why Did I Get Married?
<urn:uuid:03f027fb-7912-491b-81e0-802f6ac5e00e>
2013-05-21T17:16:13Z
CC-MAIN-2013-20
[ [ -0.0177001953125, 0.0191650390625, 0.005767822265625, 0.00946044921875, 0.050537109375, -0.055419921875, 0.0201416015625, 0.1015625, -0.080078125, -0.08203125, 0.06103515625, -0.0125732421875, 0.020263671875, -0.0140380859375, 0.03369140625, -0.01440...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964737
8,302
http://www.celebforyou.com/v/females/american/janet-jackson.html
0.729478
Bing Originals: Wiz Khalifa (VIDEO) Wiz released his debut album, Show and Prove, in 2006. He is best known for his song "Black and Yellow," which was featured on his album Rolling Papers, which was released on March 29, 2011. Get to know the rapper in this Bing original video! She talked about her relationship with the performer -- and making babies!
<urn:uuid:9a8a49e8-86e4-44f5-9930-8571428fa184>
2013-05-21T17:38:17Z
CC-MAIN-2013-20
[ [ -0.009926470927894115, 0.022058824077248573, -0.002228860277682543, 0.03786764666438103, 0.08492647111415863, -0.015441176481544971, -0.011213235557079315, 0.0628676488995552, -0.04779411852359772, -0.08235294371843338, 0.052941177040338516, 0.024080881848931313, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.995394
83
http://www.celebuzz.com/2012-02-13/bing-originals-wiz-khalifa-video/
0.314208
Today 21 May KAMPALA, Uganda (AP) — An army general's concern that officials are at risk of assassination if they oppose President Yoweri Museveni's alleged plan to have his son succeed him has stirred controversy in Uganda because it challenges the popular view of Museveni as a moderate leader, analysts said Tuesday. JOHANNESBURG (AP) — Nelson Mandela, old and frail, lives in seclusion in his Johannesburg home. Beyond the high walls of the house, the fighting over his image and what he stood for has already begun. KAMPALA, Uganda (AP) — Ugandan police disabled an independent newspaper's printing press after forcibly entering its premises to look for evidence against an army general who recently questioned the president's alleged plan to have his son succeed him, witnesses said Monday. KAMPALA, Uganda (AP) — Even before the first drops flow, Uganda's oil sector is beset by bribery allegations against officials, tax-related cases abroad that cost the government millions in legal fees, and the alleged interference of a president whose firm control of the sector worries transparency campaigners. JOHANNESBURG (AP) — Twenty-three youths have died in the past nine days at initiation ceremonies that include circumcisions and survival tests, South African police said Friday.
<urn:uuid:4ecb6b52-8594-4096-90f2-dba16788612b>
2013-05-21T17:24:15Z
CC-MAIN-2013-20
[ [ 0.013335986994206905, 0.03941082954406738, -0.0037072054110467434, 0.025676751509308815, 0.125, -0.04617834463715553, -0.014231688342988491, 0.0728503167629242, -0.002960788318887353, -0.05613057315349579, 0.09593948721885681, 0.034434713423252106, -0.0112460190...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967414
274
http://www.chadphonebook.com/search/en/yellow/seychelles/Hotels/Marchandises+g%C3%A9n%C3%A9rales/Victoria/name/desc/10/0/0
0.227029
A 10-year-old boy in Massachusetts went to extremes to avoid going to bed. The boy dialed 911 just after 8 p.m. and told the dispatcher he was calling to report his mother, who was trying to get him to go to bed, The Enterprise reported. According to police records, an officer did go to the boy's home in Brockton. But he came to explain when it was appropriate to call 911, and when it wasn't, according to The Enterprise. No charges were filed.
<urn:uuid:a56f43d7-396f-4d01-a04c-98217614d29f>
2013-05-21T17:10:50Z
CC-MAIN-2013-20
[ [ 0.0016828264342620969, 0.029296875, 0.012416294775903225, -0.012974330224096775, 0.0803571417927742, -0.0443638376891613, -0.0026157924439758062, 0.0689174085855484, -0.02664620615541935, -0.0368303582072258, 0.0597098208963871, 0.0477120541036129, -0.0892857164...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.992881
108
http://www.channel3000.com/news/Boy-calls-911-to-avoid-bedtime/-/1648/19017700/-/jqaohi/-/index.html
0.66375
Moulin de Parcoul is simply paradise on earth! A former watermill, the property was built on an old archway bridge above the River Dronne and offers spacious, comfortable accommodation for families or groups. The kitchen is well equipped and opens onto a large sitting-dining room with stunning beamed ceiling and feature fireplace. There are five bathrooms and seven bedrooms - four doubles (three en suite), one triple bedroom, one bunk bedded room and one single room - all of which are well appointed and thoughtfully furnished. Outside, the grounds are well maintained and provide an oasis of calm and seclusion. Access to the river is protected on each side, so children can play safely. The lovely courtyard boasts a fabulous dining area, whilst the 12m heated swimming pool offers the perfect opportunity for a cooling dip. The owner provides table tennis, a swing, a petanque ground and a rowing with safety equipment. The nearby village of Parcoul has a wide choice of local shops as well as a fine restaurant. You can reach the busy market towns of Chalais and La Roche Chalais within 10 minutes whilst the pretty village of Aubeterre is a short drive away.
<urn:uuid:e4ebecc0-9d33-45ba-aa1b-976dab594e95>
2013-05-21T17:24:21Z
CC-MAIN-2013-20
[ [ 0.04257246479392052, 0.023550724610686302, -0.00028483071946538985, 0.013134057633578777, 0.09510869532823563, 0.01981431245803833, -0.028872283175587654, 0.06657608598470688, -0.00182574731297791, -0.009114583022892475, 0.0887681171298027, 0.05049818754196167, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957969
247
http://www.checksafetyfirst.com/hotel.php?Id_Hot=246877&Id=&selectCountry=56&selectRegion=341
0.174419
An ambulatory electrocardiogram (EKG or ECG) records the electrical activity of your heart while you do your usual activities. (Ambulatory means that you are able to walk.) Ambulatory monitors are referred to by several names, including ambulatory electrocardiogram, ambulatory EKG, Holter monitoring, 24-hour EKG, or cardiac event monitoring. Many heart problems become noticeable only during activity, such as exercise, eating, sex, stress, bowel movements, or even sleeping. A continuous 24-hour recording is more likely to detect any abnormal heartbeats that occur during these activities. Many people have irregular heartbeats (arrhythmias) from time to time. The importance of irregular heartbeats depends on the type of pattern they produce, how often they occur, how long they last, and whether they occur at the same time you have symptoms. Because arrhythmias can occur off and on, it may be hard to record an arrhythmia while you are in the doctor's office. There are several different types of ambulatory monitors. Your doctor will choose the type that is most appropriate for you and is most likely to help diagnose your heart problem. Why It Is Done Ambulatory EKG monitoring is done to: - Look for and record irregular heartbeats that occur intermittently or during certain activities. - Find out what is causing chest pain, dizziness, or fainting. These are symptoms of possible heart problems. - Look for poor blood flow to your heart muscle (ischemia). - Check to see if treatment for an irregular heartbeat is working. How To Prepare Many medicines may change the results of this test. Be sure to tell your doctor about all the nonprescription and prescription medicines you take. Since an EKG is often used to monitor a preexisting heart condition, such as an irregular heartbeat (arrhythmia), make sure that your doctor has copies of any previous EKG results. Take a shower or bath before the discs are put on. You will not be able to get the discs wet during the test. Wear a loose blouse or shirt. Do not wear jewelry or clothes with metal buttons or buckles, because these can interfere with the recording. Women should not wear an underwire bra for the same reason. If your doctor asks you to keep a symptom and activity diary, be sure you have a method. In this diary, you will record activities and symptoms and the times they occurred. The accuracy and usefulness of your test depend on how carefully you keep this record. If you are getting a monitor implanted under your skin, you will receive instructions on how to prepare for the procedure. Talk to your doctor about any concerns you have regarding the need for the test, its risks, how it will be done, or what the results will mean. To help you understand the importance of this test, fill out the medical test information form(What is a PDF document?). How It Is Done Continuous recorders are the most common type of ambulatory electrocardiogram monitor. This type includes the Holter monitor. A continuous recorder provides a 24- to 72-hour record of the electrical signals from your heart. A standard EKG monitors only 40 to 50 heartbeats during the brief period you are attached to the machine. A continuous recorder monitors about 100,000 heartbeats in 24 hours and is likely to find any heart problems that happen with activity. For this test, you wear a lightweight, battery-operated tape recorder (monitor) on a strap over your shoulder or around your waist. The recorder is connected by wires to small metal discs (electrodes) taped to your chest. The electrodes detect the electrical signals from your heart. A clock is connected to the recorder so you can note what time it is when you have any symptoms. See a picture of a Holter monitor. You will be fitted with the recorder and electrodes by a technician in a doctor's office or hospital room. - Several areas on your chest may be shaved and cleaned, and then a small amount of electrode paste or gel will be applied to those areas. - The electrode pads will then be attached to the skin of your chest, with thin wires connecting the electrodes to the monitor. - You may be hooked up briefly to a standard EKG machine to ensure that the electrodes are working properly. While wearing the continuous recorder, you will also be asked to keep a diary of all your activities and symptoms, including the type of activity you were doing and the time your symptoms started. In the diary, write down the exact times when you exercise, climb stairs, eat, urinate, have a bowel movement, have sex, sleep, get emotionally upset, take medicine, or perform other activities. If you have any symptoms of heart problems, such as dizziness, fainting, chest pain, or palpitations, push the event-marker button on the recorder to mark it and write down the exact time and how long the symptom lasts. For example, you might write: "12:30 p.m. Ate lunch. 1:00 p.m. Argument with boss, had chest tightness for several minutes." When you sleep, try to stay on your back with the recorder carefully positioned at your side so that the electrodes are not pulled off. If one of the electrodes or lead wires comes loose, a light on the monitor will flash. Press on the center of each electrode to see if you can restore the contact. Call your doctor if one of the electrodes comes off and you can't get it to stay on. While you are wearing a monitor, try to stay away from magnets, metal detectors, high-voltage areas, garage door openers, microwave ovens, and electric blankets. Do not use an electric toothbrush or shaver. Signals from these types of electronic equipment can sometimes interfere with the recording. At the end of the recording period (usually 24 to 72 hours), you will return to the doctor's office or hospital to have the electrodes removed, or you may be able to remove the electrodes yourself. You will return the Holter monitor to your doctor's office or hospital. The recorded tape will be read by computer to provide information about your heart rate, the frequency of your heartbeats, and any irregularities. Your doctor will also look at your records of activities and symptoms and times they occurred. Your doctor will compare the timing of your activities and symptoms with the recorded heart pattern. Implantable continuous recorders Another type of continuous recorder can be implanted under the skin of the chest. This recorder can be kept in your chest for more than a year to record the electrical signals from your heart. Another kind of ambulatory EKG monitoring is the intermittent recorder, which is used when symptoms of an abnormal heart rhythm do not occur very often. An intermittent recorder can be used for a longer time than a continuous recorder. The information collected by an intermittent recorder can often be sent over the phone to a doctor's office, clinic, or hospital. You may be instructed to call your doctor, clinic, or hospital while you are having symptoms or soon after you record your heart rhythm so that the information on the monitor can be analyzed right away. The procedure for intermittent recording depends on the type of monitor used. Loop recorder. A loop recorder constantly records your heartbeats. This recorder lets you indicate when you have symptoms. Loop recorders also save a small amount of information about how your heart was beating when you pressed the recording button (presymptom recording). This feature is especially useful for people who lose consciousness when their heart problems occur and can press the button only after they wake up. - Electrodes will be attached to your chest in the same way as a continuous recorder. When you have symptoms, you press a button on the monitor to record your heart rhythm. If you pass out, you should start the recorder as soon as you wake up. Also, be sure a friend or family member knows how to start the recorder if you pass out. - An implantable form of the loop recorder can be worn for several weeks and may be a good choice for people who have symptoms that occur rarely, such as once every 6 months. It is surgically placed under the skin of the chest. The recorder might automatically start recording when it detects an arrhythmia. Or, you might use a handheld device to start the monitor when symptoms occur. Event monitor. This small device records your heartbeats only when symptoms of the heart problem occur. You are not attached to the machine. There are two types of event monitors. - One type is worn on the wrist like a watch. When symptoms occur, you press a button to start the EKG recording. - The other type is a device that you carry where you can reach it easily, such as in your purse or pocket. When symptoms occur, you press the back of the device against your chest and then press a button to start the recording. The back of the device has small metal discs that work like electrodes. These handheld monitors can be very small (some are about the size and shape of a credit card). The event monitor records heart signals only when you are holding it against your chest. How It Feels If you have electrodes placed on your skin, the electrode sites may itch slightly during the ambulatory EKG recording, and the skin on your chest may look or feel irritated when the electrodes are removed. The recording unit is very lightweight, so carrying it usually is not uncomfortable. There is no risk from ambulatory EKG monitoring. The electrodes placed on your skin detect only the electrical signals from your heart. No electricity is sent through your body, and there is no possibility of receiving an electric shock. An ambulatory electrocardiogram (EKG or ECG) is a test that records the electrical signals that control your heartbeat while you do your everyday activities. No abnormal heart rhythms are found in the EKG information collected by the recorder. Your heart rate may go up when you are active and go down when you are sleeping. Many kinds of irregular heartbeats can be detected by ambulatory monitoring. The results of ambulatory heart monitoring are compared with your medical history, symptoms, and other test results. You may need to have the test repeated if the results aren't clear. What Affects the Test You may not be able to have the test or the results may not be helpful if: - You do not keep a detailed diary of your daily activities and symptoms. The intermittent recorder will give accurate results only if you remember to start the recorder when symptoms of possible heart problems occur. - The electrodes are not in the right spot. Ambulatory heart monitoring is most effective when you are able and willing to carefully follow instructions throughout the monitoring period. If you tend to pass out from a heart problem, your doctor will choose a monitor that will record these episodes. The continuous recorder and the loop recorder work best for people who pass out when they have symptoms of a heart problem. The loop recorder is not useful if you lose consciousness for more than a few minutes or if you are so confused when you wake up that you are unable to start the recorder. What To Think About - Many people have irregular heartbeats from time to time. What this means depends on the type of pattern these heartbeats produce, how often they occur, how long they last, and whether they occur at the same time you have symptoms. Irregular heartbeats that occur at the same time you have other symptoms, such as dizziness or chest pain, may mean that the irregular heartbeats are causing your symptoms. - Because a standard 12-lead electrocardiogram (EKG) is safe, inexpensive, and provides valuable information, your doctor will try it first before using an ambulatory monitor to test your heart function. A continuous recorder generally has 5 leads and provides less complete information than a 12-lead EKG. But a continuous recorder is more effective than a standard EKG for evaluating heart symptoms that occur intermittently. For more information, see the topic Electrocardiogram. Other Places To Get Help |American Heart Association (AHA)| |7272 Greenville Avenue| |Dallas, TX 75231| Visit the American Heart Association (AHA) website for information on physical activity, diet, and various heart-related conditions. You can search for information on heart disease and stroke, share information with friends and family, and use tools to help you make heart-healthy goals and plans. Contact the AHA to find your nearest local or state AHA group. The AHA provides brochures and information about support groups and community programs, including Mended Hearts, a nationwide organization whose members visit people with heart problems and provide information and support. |Heart Rhythm Society| |1400 K Street NW| |Washington, DC 20005| The Heart Rhythm Society provides information for patients and the public about heart rhythm problems. The website includes a section that focuses on patient information. This information includes causes, prevention, tests, treatment, and patient stories about heart rhythm problems. You can use the Find a Specialist section of the website to search for a heart rhythm specialist practicing in your area. |National Heart, Lung, and Blood Institute (NHLBI)| |P.O. Box 30105| |Bethesda, MD 20824-0105| The U.S. National Heart, Lung, and Blood Institute (NHLBI) information center offers information and publications about preventing and treating: - Fischbach FT, Dunning MB III, eds. (2009). Manual of Laboratory and Diagnostic Tests, 8th ed. Philadelphia: Lippincott Williams and Wilkins. Other Works Consulted - Chernecky CC, Berger BJ (2008). Laboratory Tests and Diagnostic Procedures, 5th ed. St. Louis: Saunders. - Fischbach FT, Dunning MB III, eds. (2009). Manual of Laboratory and Diagnostic Tests, 8th ed. Philadelphia: Lippincott Williams and Wilkins. - Pagana KD, Pagana TJ (2010). Mosby’s Manual of Diagnostic and Laboratory Tests, 4th ed. St. Louis: Mosby Elsevier. |Primary Medical Reviewer||Rakesh K. Pai, MD, FACC - Cardiology, Electrophysiology| |Specialist Medical Reviewer||George Philippides, MD - Cardiology| |Last Revised||December 9, 2011| Last Revised: December 9, 2011 Author: Healthwise Staff To learn more visit Healthwise.org © 1995-2012 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated.
<urn:uuid:5e26f290-d228-47d0-aa27-1d4b7ba58516>
2013-05-21T17:17:58Z
CC-MAIN-2013-20
[ [ -0.01190185546875, 0.0089111328125, 0.0142822265625, -0.00927734375, 0.1181640625, -0.06787109375, 0.0028228759765625, 0.11669921875, -0.034423828125, 0.027099609375, 0.08544921875, 0.0142822265625, -0.035888671875, -0.0235595703125, 0.06298828125, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.906362
3,105
http://www.cheshire-med.com/health_wellness/health_encyclopedia/aa10253
0.252411
Have you ever thought, what is the hardest kind of ending to play? And what do I do if I ever play it? Well it is right here! Not to long ago I saw an amazing game that ended with a bishops of opposite color ending. You see Bishops of opposite color endings and very drawish as you can see in the position: Even though white is up two pawns there is absolutely no way to win. There is no way to dislodge the black king(it's on a light square) and the black bishop just keeps moving back a forth on the a2-g8 diagonal. White can't make any progress. If you don't believe me then play around with this position and see if white can win. The reason that these endgames are so often drawish is because the defender can set up a blockade, like this position. This kind of position is very hard to win. And it is amazing when a win is accomplished. So Here is how GM Joshua Waitzkin won with the white pieces.(As shown below). Now you might be thinking, what do I do if I am the attacker in a dreaded bishops of opposite color endgame. Well: - If you have the advantage in the middle game and the bishops of opposite color are on the board, avoid the endgame at all cost's because these games are very drawish. 2. In these end games,use the principal of two weaknesses. That is, your opponent has two weaknesses on different sides of the board. So you attack one of them and when he defends, attack the other weakness. In the game we saw, Waitzkin made it so his opponent had to defend weakness one(the queenside pawns, and weakness tow(his passed pawn on the kingside). Because they were on opposite sides of the board, black was unable to defend both weaknesses and lost the game. 3. Provide your opponent with as many problems as possible. I can just see you saying, but what if I am the defender is one of these games? Don't give up! Here's what you do: - If you are loosing in the middle game with the opposite bishops on the board, do your best to simplify the position into and endgame. - Eliminate as many attacking chances for your opponent and build a blockade by putting all your pawns on the same color as your bishop, block the attacker's pawns, and place your king on the opposite color as the enemy bishop. I would love some comments. Your Hot!
<urn:uuid:d540a662-a30c-49d1-947b-dc0daa3eba26>
2013-05-21T17:31:54Z
CC-MAIN-2013-20
[ [ 0.0072021484375, 0.004486083984375, -0.00506591796875, -0.025634765625, 0.10009765625, -0.068359375, 0.00238037109375, 0.08056640625, 0.004486083984375, -0.05322265625, 0.05517578125, 0.032470703125, 0.003143310546875, 0.0458984375, 0.041259765625, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970948
526
http://www.chess.com/blog/Wahotaho/bishops-of-oposite-color-ending?_domain=old_blog_host&_parent=old_frontend_blog_view
0.438622
|Tests and Services Inhalation Therapy Instruction What is a peak flow meter? A peak flow meter (PFM) is a device used to measure how well your child's asthma is under control. The device measures air flowing out of the lungs, called peak expiratory flow rate (PEFR), as a child with asthma forcefully blows into the device. A peak flow meter, when used properly, can reveal narrowing of the airways well in advance of an asthma attack. Used mainly by children with moderate to severe and persistent asthma, peak flow meters can help determine: Why should a peak flow meter be used? - when to seek emergency medical care. - the effectiveness of your child's asthma management and treatment plan. - when to stop or add medication, as directed by your child's physician. - what triggers the asthma attack (such as exercise-induced asthma). The PFM removes a lot of guesswork out of managing your child's asthma. It can provide you, your child's physician, or even the school teachers with information about how open the airways are in your child's lungs. The PFM can detect small changes in the large airways before your child starts to wheeze. Using a PFM every day will let you know when your child's peak flows are starting to drop. This allows you to make early changes in your child's medication or routine to help prevent your child's asthma symptoms from getting worse. The PFM can also identify the value at which you will need to call your child's physician or go to the emergency room. How to use a peak flow meter: What are peak flow zones? - Use the PFM once daily and whenever your child is experiencing early warning signs. Always use the PFM before taking reliever medication. - Hold the PFM by the handle. - Before each use, make sure the pointer is reset to zero. - Have your child stand up straight. Remove chewing gum or any food from your child's mouth. - Have your child take a deep breath and put the mouthpiece in his/her mouth. Seal his/her lips and teeth tightly around the mouthpiece. - Let your child blow out as hard and as fast as he/she can. Remember a fast blast is better than a slow blow. - Note the number where the pointer has stopped on the scale. - Reset the pointer to zero. - Repeat this routine three times. You will know your child has done the technique correctly when the numbers from all three tries are close together. - Record the highest of the three readings on a graph or in a notebook. Do not average these numbers together. This is called your peak flow. - Use the peak flow meter once a day. Measure peak flows about the same time each day. A good time might be when your child first wakes up or at bedtime. Peak flow zones are based on the traffic light concept: red means danger, yellow means caution, and green means safe. These zones are different for each person. Your child's physician will help determine your child's peak flow zones. The three peak flow zones include: The goal of the peak flow zones is to help recognize when the asthma may start to become uncontrolled. - Green: This is the GO zone! This zone is from 80 to 100 percent of your child's highest peak flow reading. This is the zone your child should be in every day. This is a signal that air moves well through the large airways and that your child can do the usual activities and go to sleep without trouble. When the peak flow readings are in this zone, your child should: avoid asthma triggers. - use controller medications every day. - use the reliever medications 15 to 20 minutes before exercise if your child has exercise-induced asthma, as directed by your child's physician. - Yellow: This is the CAUTION or SLOW DOWN zone! This zone is from 50 to 80 percent of your child's highest peak flow reading. This is a clue that the large airways are starting to narrow. Your child may begin to have mild symptoms. Your child may be coughing, feeling tired, feeling short of breath, or feeling like his/her chest is tightening. These symptoms may keep your child from his/her usual activities or from sleeping well. To keep your child's peak flow numbers from getting worse and get your child's asthma back under control, you will need to: continue to use the controller medication as your child's physician has ordered and avoid asthma triggers. - use the reliever medication as ordered by your child's physician. - make sure you are using the proper technique with your child's metered-dose inhaler and spacer. Red: This is the STOP zone! This zone is less than 50 percent of your child's highest peak flow reading. Readings in this zone are a medical emergency and you will need to get help right away. This means severe narrowing of the large airways has occurred. Your child may now be coughing, very short of breath, wheezing both when breathing in and out, or having retractions. Your child may also have problems walking and talking. Have your child take his/her reliever medication now and call your child's physician. How is a personal best peak flow measured? Each child's peak flow zones are based on his/her personal best peak flow number. To establish your child's personal best peak flow, have your child take his/her peak flow measurement each day at the same time for two to three weeks, when the asthma is under control. After recording your child's peak flow measurements for two to three weeks consistently, your child's physician may also measure the optimum lung function with a spirometer (a device that can check lung function by measuring both the amount of air expelled and how quickly the air was expelled). The spirometer measurement may then be compared with the peak flow meter record to help set up an asthma management and treatment plan. Your child's personal best peak flow measurement may change over time. Consult your child's physician as to when to check for a new personal best peak flow measurement. When should a peak flow meter be used? Peak flow meters should be used regularly to check how well the asthma is being controlled. In addition, the peak flow meter may be a valuable tool during an asthma attack, because it can help determine how well the short-term, quick-relief asthma medication is working. The National Heart, Lung, and Blood Institute (NHLBI) recommends measuring lung function during the following times: The peak flow meter is a tool to help collect information. The key to successful asthma management is communicating this information (the peak flow meter recordings, the severity of your child's symptoms, and the effectiveness of your child's medications) to your child's physician. - every morning, before taking asthma medications - during asthma symptoms or an asthma attack - after taking medication for an asthma attack - other times as recommended by your child's physician How can I obtain a peak flow meter? Consult your child's physician about obtaining a peak flow meter and for step-by-step instructions on how to use the device. If you are using more than one peak flow meter, be sure they are the same brand. What are oximeters? An oximeter is a small machine that measures oxygen saturation (the amount of oxygen) in your child's blood. To get this measurement, a small sensor (similar to an adhesive bandage) is taped onto your child's finger or toe. When the oximeter is on, a small red light can be seen in the sensor. The sensor is painless and the red light does not get hot. What is a spirometer? A spirometer is a device used by your child's physician that assesses lung function. Spirometry, the evaluation of lung function with a spirometer, is one of the simplest, most common pulmonary function tests and may be necessary for any of the following reasons: After taking a deep breath, your child forcefully breathes out into the spirometer as completely and forcefully as possible. The spirometer measures both the amount of air expelled and how quickly the air was expelled from the lungs. The measurements are recorded by the spirometer. - to determine how well the lungs receive, hold, and utilize air - to monitor a lung disease - to monitor the effectiveness of treatment - to determine the severity of a lung disease - to determine whether the lung disease is restrictive (decreased airflow) or obstructive (disruption of airflow) The normal, healthy values measured by the spirometer for the amount of air exhaled vary from child to child. Your results are compared to the average expected in someone of the same age, height, sex, and race, according to the National Heart, Lung, and Blood Institute (NHLBI). However, if the values fall below 85 percent of the average, it may indicate a lung disease or other airflow obstruction. If a child has abnormal spirometer measurements, he/she may be referred for other lung tests to establish a diagnosis. Hand-Held Nebulizer Treatments A nebulizer is a type of inhaler that sprays a fine, liquid mist of medication. This is done through a mask, using oxygen or air under pressure, or an ultrasonic machine (often used by persons who cannot use a metered-dose inhaler, such as infants and young children, and persons with severe asthma). A mouthpiece is connected to a machine via plastic tubing to deliver the medication. The medications used in nebulizers help your child by loosening the mucus in the lungs so it can be coughed out more easily, and by relaxing the airway muscles so that more air can move in and out of the lungs. Breathing the medication straight into the lungs works better and faster than taking the medication by mouth. Nebulizer treatments take about 15 to 20 minutes to give the medication. Giving a treatment: The following steps are recommended when giving a treatment to your child. However, always consult your child's physician for specific instructions. After each treatment: Gather supplies needed, including: - medication to be nebulized - nebulizer set (nebulizer cup, mouthpiece or mask, tubing to connect to nebulizer machine) - Find a quiet activity to do while your child sits up for the treatment (i.e., reading a book or playing a quiet game). - Place the nebulizer on a flat surface (i.e., table or the floor). - Plug the unit into a wall outlet. - Connect the air tubing to the nebulizer machine. - Put the medication into the nebulizer cup and screw the cap on securely. - Connect the other end of the air tubing to the nebulizer cup. - Connect the mouthpiece or face mask to the nebulizer cup. - Turn the machine on. - Check to make sure a fine mist of medication is coming through the face mask or mouthpiece. - Place the mouthpiece in the child's mouth with the lips sealed around the mouthpiece. - Encourage your child to take slow deep breaths in and out of their mouth. The mist should disappear with each breath. - Place the mask over your child's mouth and nose. The adjustable elastic band may be used to hold the mask in place. - Encourage your child to take deep breaths in and out for the duration of the treatment. - Encourage your child to continue slow, deep breaths until all the medication in the nebulizer cup is gone. You may need to tap the sides of the nebulizer cup to ensure all medication is given. - Turn the nebulizer off. - If the child's treatment plan orders peak flow measurements, obtain these before the treatment starts and after the treatment is completed. Notes for parents: - Disconnect the nebulizer cup from the tubing. - Open the cup and wash all pieces in a mild dish soap and water. (Do not wash or rinse the tubing.) - Rinse all pieces. - Air dry on a clean towel. - Store the dried nebulizer cup and tubing in a plastic bag. - Once a week rinse the nebulizer cup in a vinegar/water solution, as directed by you physician, after washing. - Stay with your child throughout the nebulizer treatment. - If your child should vomit or have a severe coughing spell during the treatment, stop the treatment, let the child rest for a few minutes, then resume the treatment. - Check the filter on the nebulizer machine once a week. When it becomes discolored, replace with a new filter. - Always keep a spare nebulizer kit at home. When you are down to your last two kits, contact your medical equipment company to deliver more. What medications are commonly used for children with asthma? The use of medications in children is highly individualized, based on the severity of the child's symptoms, the age of the child, and the ability of the child to take inhaled medications. The following are the most commonly used medications: Inhalation Therapy Instruction - Departments & Programs - Children's National Medical Center These medications are used to help open the narrowed lungs and may relieve coughing, wheezing, shortness of breath, or difficulty in breathing. These are usually considered rescue medications for acute attacks of asthma. Types of bronchodilators are beta-agonists, theophylline, and anticholinergics. These medications come inhaled, in pill form, liquid, or injectables. The short-acting bronchodilators are used as needed as symptoms occur. Longer acting bronchodilators may be used for maintenance or on a daily basis to help control flare-ups from occurring. - anti-inflammatory medications These medications help to decrease the inflammation that is happening in the airways with asthma. These include two types of medications: - nonsteroidal anti-inflammatory medications (NSAIDs) Cromolyn and nedocromil are two types of nonsteroidal medications that are usually inhaled by the child. These medications can be given in a variety of ways. Some of them are inhaled, while others may be taken as a pill or liquid, or even as an injection. The steroids taken by mouth can have more side effects than those that are inhaled. Inhaled steroids are safe and effective controller medications and should be taken every day. Consult your child's physician about the best choice for your child. These are a relatively new type of medication being used to help control the symptoms of asthma. These medications help to decrease the narrowing of the lung and to decrease the chance of fluids in the lungs. These are usually given by mouth.
<urn:uuid:efb858fb-b248-45d9-922f-fb16a67c071f>
2013-05-21T17:16:50Z
CC-MAIN-2013-20
[ [ -0.021240234375, 0.03759765625, 0.005279541015625, -0.0032501220703125, 0.0888671875, -0.0732421875, 0.00567626953125, 0.1005859375, -0.036376953125, -0.047119140625, 0.08203125, 0.047119140625, -0.03662109375, -0.009521484375, 0.0615234375, -0.02062...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934938
3,087
http://www.childrensnational.org/DepartmentsAndPrograms/default.aspx?Type=Dept&Id=386&Name=Pulmonary%20Medicine&SubType=TestOrService&SubId=104&subname=Inhalation%20Therapy%20Instruction
0.498884
Indian women carry their children as they march during a protest to mourn the death of a gang rape victim in New Delhi on Wednesday. / Dar Yasin, AP NEW DELHI (AP) - Authorities filed rape and murder charges Thursday against five men accused of the gang rape of a 23-year-old university student on a New Delhi bus, a crime that horrified Indians and provoked a national debate about the treatment of women. Police said they plan to push for the death penalty in the case, as government officials promised new measures to protect women in the nation's capital. Prosecutor Rajiv Mohan filed a case of rape, tampering with evidence, kidnapping, murder and other charges against the men in a new fast-track court in south Delhi inaugurated only the day before to deal specifically with crimes against women. Mohan asked for a closed trial, and a hearing was set for Saturday. The men charged are Ram Singh, 33, the bus driver; his brother Mukesh Singh, 26, who cleans buses for the same company; Pavan Gupta, 19, a fruit vendor; Akshay Singh, 24, a bus washer; and Vinay Sharma, 20, a fitness trainer. They did not appear in court. A sixth suspect was listed as 17 and was expected to be tried in a juvenile court, where the maximum sentence would be three years in a reform facility. Police also detained the owner of the bus on accusations that he used false documents to obtain permits to run the private bus service. Media reports say police have gathered 30 witnesses, and the charges have been detailed in a document running more than 1,000 pages. The document was not released Thursday. The Bar Association said its lawyers would not defend the suspects because of the nature of the crime, but the court is expected to appoint attorneys to defend them. "Strict, strict, strict punishment should be given to them," said Ashima Sharma, an 18-year-old student attending a protest Thursday. "A very strict punishment â?¦ that all men of India should be aware that they are not going to treat the women like the way they treated her." The woman, who died of her injuries in a Singapore hospital Saturday, was attacked Dec. 16 after boarding a bus with a male companion after watching an evening showing of the movie "Life of Pi" at an upscale mall. The vehicle was a charter bus that illegally picked up the two passengers, authorities said. The pair were attacked for hours as the bus drove through the city, even passing through police checkpoints during the assault. They were eventually dumped naked on the side of the road. The woman, whose name was not released, was assaulted with an iron bar and suffered severe internal injuries that eventually proved fatal. The attack caused outrage across India, sparking protests and demands for tough new rape laws, better police protection and a sustained campaign to change society's views about women. The government has set up a series of panels to look into the incident and make reform recommendations, and women's activists hope the assault will mark a turning point for the country. Outside the court, about 50 woman lawyers held a protest, demanding wholesale changes in the criminal justice system to ensure justice for women. "Punish the police, sensitize judiciary, eradicate rape," read one protester's sign. Indian Chief Justice Altamas Kabir said the accused should be tried swiftly, but cautioned that they needed to be given a fair trial and not be subjected to mob justice. "Let us not lose sight of the fact that a person is presumed innocent until proven guilty," he told reporters Wednesday, while inaugurating the new fast-track court. "Let us balance things. Let us not get carried away. Provide justice in a fair but swift manner so that faith of people is once again restored that the judiciary is there behind the common man." The government is to set up four other such courts in the capital to hold timely trials in sexual assault cases, which often get bogged down for years in India's notoriously sluggish court system. The new courts will send the message "that these matters are going to be dealt with seriously," Kabir said. Many cases never even get to court in a country where there is intense social pressure against families reporting sexual assaults and where women are often blamed for the attacks they suffer. When women do report rapes, police often refuse to file charges and pressure the victims to reach a compromise with their attackers. In a sign that attitudes toward such behavior might be changing, and that even powerful men are being held accountable, police in the northeastern state of Assam arrested a leader of the ruling Congress party Thursday on accusations he raped a woman in a village in the early hours of the morning. Footage on Indian television showed the extraordinary scene of local women surrounding the man, ripping off his shirt and repeatedly slapping him across the face. Police said the man, Bikram Singh Brahma, was visiting the village of Santipur on the Bhutan border when he entered a woman's house and raped her at about 2 a.m. Amid the screams, villagers ran to the home and captured the man, said G.P. Singh, a senior police officer in the area. "We are taking this issue very seriously," Singh said. Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. Read the original story: Indian police charge 5 in New Delhi gang rape
<urn:uuid:33509489-ec4b-4d22-9984-c826d491d9e9>
2013-05-21T17:24:17Z
CC-MAIN-2013-20
[ [ -0.015380859375, 0.041259765625, -0.0086669921875, 0.019287109375, 0.150390625, -0.056640625, -0.0177001953125, 0.08935546875, -0.02783203125, -0.0184326171875, 0.051513671875, 0.0255126953125, 0.0019683837890625, -0.048583984375, 0.03369140625, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974356
1,120
http://www.chillicothegazette.com/usatoday/article/1806131
0.168789
ADOLESCENT MEDICINE :: Orthopaedic Problems What is scoliosis? A normal spine, when viewed from behind, appears straight. However, a spine affected by scoliosis shows evidence of a lateral, or sideways, curvature, and a rotation of the back bones (vertebrae), giving the appearance that the person is leaning to one side. The Scoliosis Research Society defines scoliosis as a curvature of the spine measuring 10 degrees or greater on x-ray. Scoliosis is a type of spinal deformity and should not be confused with poor posture. Four common types of curve patterns seen in scoliosis are: What causes scoliosis? In most (80 to 85 percent) cases, the cause of scoliosis is unknown - a condition called idiopathic scoliosis. Scoliosis is more common in females than males. According to the National Institute of Arthritis and Musculoskeletal and Skin Diseases, three to five out of every 1,000 children develop spinal curves that are considered large enough to require treatment. The American Academy of Orthopaedic Surgeons, in cooperation with the Scoliosis Research Society, describe three different types of scoliosis that can occur in children - congenital (present at birth), neuromuscular, or idiopathic. Other causes of scoliosis may include: What are the symptoms of scoliosis? The following are the most common symptoms of scoliosis. However, each adolescent may experience symptoms differently. Symptoms may include: Back pain, leg pain, and changes in bowel and bladder habits are not commonly associated with idiopathic scoliosis. A adolescent experiencing these types of symptoms requires further medical evaluation by a physician. The symptoms of scoliosis may resemble other spinal conditions or deformities, or may be a result of an injury or infection. Always consult your adolescent's physician for a diagnosis. How is scoliosis diagnosed? The physician makes the diagnosis of scoliosis with a complete medical history of the adolescent, physical examination, and diagnostic tests. The physician obtains a complete prenatal and birth history of the adolescent and asks if other family members are known to have scoliosis. The physician will also ask about developmental milestones since some types of scoliosis can be associated with other neuromuscular disorders. Developmental delays may require further medical evaluation. In addition to a complete medical history and physical examination, x-rays (a diagnostic test which uses invisible electromagnetic energy beams to produce images of internal tissues, bones, and organs onto film) are the primary diagnostic tool for scoliosis. In establishing a diagnosis of scoliosis, the physician measures the degree of spinal curvature on the x-ray. The following other diagnostic procedures may be performed for nonidiopathic curvatures, atypical curve patterns, or congenital scoliosis: Early detection of scoliosis is most important for successful treatment. Pediatricians or family physicians, and even some school programs, routinely look for signs that scoliosis may be present. Treatment of scoliosis: Specific treatment of scoliosis will be determined by your adolescent's physician based on: The goal of treatment is to stop the progression of the curve and prevent deformity. Treatment may include: According to the Scoliosis Research Society, there is no scientific evidence to show that other methods for treating scoliosis (i.e., manipulation, electrical stimulation, and corrective exercise) prevent the progression of the disease. Long-term outlook for an adolescent with scoliosis: The management of scoliosis is individualized for each adolescent depending on his/her age, amount of curvature, and amount of time remaining for skeletal growth. Scoliosis will require frequent examinations by your adolescent's physician to monitor the curve as your adolescent grows and develops. Early detection is important. If left untreated, scoliosis can cause problems with heart and lung function. Click here to view the It is important to remember the health information found on this website is for reference only not intended to replace the advice and guidance of your healthcare provider. Always seek the advice of your physician with any questions you may have regarding a medical condition. If you think you may have a medical emergency, call your physician or 911 immediately. © Children's Hospital of Orange County
<urn:uuid:3015d518-b751-47a8-8743-524680dab7ad>
2013-05-21T17:38:23Z
CC-MAIN-2013-20
[ [ 0.00494384765625, -0.0107421875, 0.023193359375, -0.003936767578125, 0.11083984375, -0.0291748046875, -0.00830078125, 0.12353515625, -0.035888671875, -0.0478515625, 0.09228515625, 0.016845703125, -0.043212890625, 0.017822265625, 0.06201171875, -0.007...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933912
912
http://www.choc.org/healthlibrary/print.cfm?PageID=P01648&id=P00761
0.557415
Histone deacetylase inhibitors suppress IL-2–mediated gene expression prior to induction of apoptosis Histone deacetylase (HDAC) inhibitors can induce transcriptional activation of a number of genes and induce cellular differentiation as histone acetylation levels increase. Although these inhibitors induce apoptosis in several cell lines, the precise mechanism by which they do so remains obscure. This study shows that HDAC inhibitors, sodium butyrate and trichostatin A (TSA), abrogate interleukin (IL)-2–mediated gene expression in IL-2–dependent cells. The HDAC inhibitors readily induced apoptosis in IL-2–dependent ILT-Mat cells and BAF-B03 transfectants expressing the IL-2 receptor βc chain, whereas they induced far less apoptosis in cytokine-independent K562 cells. However, these inhibitors similarly increased acetylation levels of histones in both cells. Although histone hyperacetylation is believed to lead to transcriptional activation, the results showed an abrogation of IL-2–mediated induction of c-myc,bag-1, and LC-PTP gene expression. This observed abrogation of gene expression occurred prior to phosphatidylserine externalization, a process that occurs in early apoptotic cells. Considering the biologic role played by IL-2–mediated gene expression in cell survival, these data suggest that its abrogation may contribute to the apoptotic process induced by HDAC inhibitors.
<urn:uuid:087c8d0f-c807-4dce-b435-9def312af289>
2013-05-21T17:16:32Z
CC-MAIN-2013-20
[ [ -0.0010633680503815413, 0.01623263955116272, 0.02777777798473835, -0.00794270820915699, 0.07951389253139496, -0.14097222685813904, -0.00037706163129769266, 0.09861110895872116, -0.03888889029622078, 0.03784722089767456, 0.09166666865348816, 0.006076388992369175, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.909151
311
http://www.citeulike.org/user/ajbattle/article/11195981
0.307111
The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods We are in the midst of a technological revolution whereby, for the first time, researchers can link daily word use to a broad array of real-world behaviors. This article reviews several computerized text analysis methods and describes how Linguistic Inquiry and Word Count (LIWC) was created and validated. LIWC is a transparent text analysis program that counts words in psychologically meaningful categories. Empirical results using LIWC demonstrate its ability to detect meaning in a wide variety of experimental settings, including to show attentional focus, emotionality, social relationships, thinking styles, and individual differences.
<urn:uuid:a57ba38f-4657-4427-be7f-9e545b252154>
2013-05-21T17:24:05Z
CC-MAIN-2013-20
[ [ -0.04212816432118416, 0.017503956332802773, 0.04489715024828911, 0.03303006291389465, 0.0680379718542099, -0.07515823096036911, -0.00801028497517109, 0.12420886009931564, -0.0357990488409996, -0.0042770965956151485, 0.08623417466878891, 0.00721914554014802, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885334
132
http://www.citeulike.org/user/voiklis/article/7896083
0.211136
Katy Perry attended the European Film Premiere of her new film "Katy Perry: Part of Me" at the Empire Cinema in Leicester Square, London on July 3, 2012. Perry posed for photos and signed autographs for her fans. Perry's new 3-D film illustrates the events in the past year of her life, including her break-up with ex-husband Russell Brand. The movie also features concert and backstage clips from Perry's 2011 California Dreams Tour. In addition, the film includes interviews with Perry, providing background information about her upbringing and rise to fame. Perry wrote the song "Wide Awake" for the film. Dan Cutforth and Jane Lipsitz directed "Part of Me." Numerous celebrity guests attended the premiere of the film including Sugababes' Jade Ewen, Dutch singer-songwriter Esmee Denters, English singer-songwriter Katy B, Former X Factor star Misha B and Hollywood Blogger Perez Hilton. "Part of Me" will be released in theaters on July 5. Many more images from this event can be seen at www.piqtured.com
<urn:uuid:df37589a-e0d5-4a41-9d1a-53a8e3f13a9e>
2013-05-21T17:17:07Z
CC-MAIN-2013-20
[ [ -0.00818452425301075, 0.0261656753718853, -0.004185267724096775, 0.0264136902987957, 0.0828372985124588, 0.0282738097012043, -0.0067274305038154125, 0.0416666679084301, -0.0337301604449749, -0.0391865074634552, 0.0476190485060215, -0.0234375, 0.0912698432803154,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940398
232
http://www.citizenside.com/en/photos/sightings/2012-07-03/63331/katy-perry-attends-the-european-premiere-of-her-new-film-katy-perry-part-of-me.html
0.298288
|the Saudi blogger| Saudi Blogger Faces Death Many people are having a lively conversation on that post. Please add your comments. Here's what the post says: Saudi blogger faces death penalty for creating web site where people can have open conversations. The creator of a Saudi Arabian web site called Free Saudi Liberals faces a charge of "apostasy," which comes with an automatic death sentence. The charge stems from comments made on his site by users that criticized senior Saudi religious leaders. He had initially been charged with "insulting Islam through electronic channels," but that charge was upgraded to apostasy by a judge.
<urn:uuid:f65257b3-e062-46c8-8572-fe8bf2f99635>
2013-05-21T17:24:34Z
CC-MAIN-2013-20
[ [ -0.012411347590386868, 0.03922872245311737, -0.014018173329532146, 0.001980828819796443, 0.09086879342794418, -0.06560283899307251, -0.00351839535869658, 0.07402482628822327, -0.007203014101833105, -0.007757092360407114, 0.06072695180773735, 0.05651595816016197, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97461
129
http://www.citizenwarrior.com/2013/01/the-penalty-for-creating-open.html
0.401809
Tbilisi 01/03/08.- The third report of Media Monitoring conducted by PRIMETIME Analytical Consulting Group was published today covering the period from the 23rd to the 29th of December. The report is based on the same parameters used in the previous reports with a view to following the developments of pre electoral campaigning. The report can be divided in two main sections: the first one shows free and paid political advertisements; and the second shows air time on news programmes, which includes interviews, talk shows, etc., as well as number of TV shots and number of times each candidate is mentioned. First Part of Report: Political Advertisements Free and Paid Political Advertisement · All candidates, except for Maisashvili, have advertisements on the air. Compared to previous reports, it can be pointed out that results in the first report showed only four candidates (Gachechiladze, Gamkrelidze, Natelashvili and Saakashvili); results in the second report showed five (previous four plus Patarkatsishvili) and current report shows six (previous five plus Sarishvili). · According to figures shown on slide No. 7, qualified candidates have used their allocation of free air time for advertisements as follows: Gachechiladze is leading with 4:04:42 hours; Gamkrelidze with 3:57:17; Saakashvili with 3:47:58; Natelashvili with 3:33:59. · In addition, Patarkatsishvili and Sarishvili, in spite of being unqualified candidates for the purpose of allocating free air time, have been given 0:40:23 and 0:35:35 free hours respectively. · When it comes to the number of advertisements per candidate, Saakashvili leads with 506 total advertisements, followed by Gamkrelidze with 283; Gachechiladze with 35; Natelashvili with 207; Sarishvili with 142 and Patartasishvili with 87. Time Share of Free and Paid Advertisements: · According to previous figures (slides No. 7 and 8), it can be pointed out that while Saakashvili leads by total amount of advertisements -506-, the total amount of air time -3:47:58 hours- is less than the total amount of air time provided to Gachechiladze, who therefore leads with 4:04:42 but has less advertisements -352-. In other words, Gachechiladze has less amount of advertisements but they run for longer. · Regarding paid advertisements, the trend in the previous report continues: only three candidates have paid advertisements: Saakashvili, Patartasishvili and Gamkrelidze. Time Share of Presidential Candidates Free Advertisements per TV channel · In this third report, it can be pointed out that Imedi stopped broadcasting on the 26th of December. Therefore, data for Imedia covers the period from December 23rd to the 26th (4 days). · Public Brodcaster continues to be the first choice for political advertisements, followed by Rustavi 2, Mze, Imedia and Kavkasia. · It can also be pointed out that all channels subject to monitoring are active in broadcasting political advertisements. Second part of report: News Programmes Number of TV Shots (physical exposure of candidates) on the air · Saakashvili and Gachechiladze lead with exactly the same amount of TV shots on the air: 104 each; followed by Natelashvili with 91; Patarkatsishvili with 90; Gamkrelidze with 65; Sarishvili with 49 and Maisashvili with 47. Total Air Time: · However, when it comes to total air time provided (length of physical exposure), Patarkatsishvili leads with 4:56:12 hours, followed by Saakashvili with 3:59:48; Gachechiladze with 2:45:15, Sarishvili with 2:14:22; Maisashvili with 1:09:46; Gamkrelidze with 1:01:11 and Natelashvili with 0:40:25. · It can be pointed out that compared to previous results, Patarkatsishvili’s exposure has increased considerably in the period covered. (In first report Patarkatsishvili had 0 TV shots; in the second he had 29 with a total air time of 0:35:06 hours and in the third 90 TV shots with a total air time of 4:56:12 hours). · Sarishvili’s exposure also increased considerably compared to previous weeks. In the first report she had 3 TV Shots with a total air time of 0:02:16 hours; in the second report she had 74 TV Shotws with a total air time of 2:15:29 hours; and in the third she had 49 TV Shots with a total air time of 2:14:22 hours. Air Time allocated to Presidential Candidates per Channels: · As in second report, this report includes a breakdown of air time per channel differentiating between talk shows and news programmes (slides 14 to 18). · From these results, it can be pointed out that all candidates appear in news programmes and in talk shows. Compared to last report when Rustavi 2 and Imedi were more active hosting talk shows, this report shows all channels hosted talk shows. · Therefore, all candidates have participated in talk shows, except Natelashvili who has participated in previous weeks quite actively. Number of times mentioned: · Patarkatsishvili leads with 739 times mentioned in the period covered, followed by Saakashvili with 612; Gachechiladze with 351; Natelashvili with 190; Maisashvili with 77 and Sarishvili with 37 times mentioned. · When it comes to giving a positive or negative value to mentioning of candidates, Patarkatsishvili shows to be the most mentioned candidate with a negative connotation -453-; followed by Saakashvili with 295 times, Gachechiladze with 59; Natelashvili with 11; Gamkrelidze with 2 and Sarishvili with 1 (including both negative and indirectly negative number of times mentioned). · However, Saakashvili continues to be the most mentioned candidate with a positive value with 99 times mentioned, followed by Natelashvili with 30; Gachechiladze with 27 and Gamkrelidze with 16 times and Maisashvili with 1 time positively mentioned (all including indirectly postive and positive number of times mentioned). According to the current results, it can be concluded that: 1. Patarkatsishvili’s exposure in media coverage increased significantly. 2. Different presidential candidates are leading according to different parameters; 3. Coverage in channels continues to be diverse. However, pre-election campaign runs in a less competitive media athmosphere than last week taking into account that Imedi stopped broadcasting. 4. All sources of monitoring continue providing the CEC with the information required by law regarding the duration and frequency of political advertisements in a timely manner. 5. The last and final report of media monitoring from December 30 to January 4 will be published after elections.
<urn:uuid:524bc79b-d93a-4828-be09-7035a500354e>
2013-05-21T17:23:52Z
CC-MAIN-2013-20
[ [ 0.027587890625, 0.031005859375, -0.0162353515625, -0.006622314453125, 0.09814453125, -0.0242919921875, -0.0286865234375, 0.08837890625, 0.002197265625, -0.055419921875, 0.06640625, -0.00933837890625, 0.0146484375, 0.04443359375, 0.032958984375, 0.008...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936934
1,568
http://www.civil.ge/eng_old/article.php?id=16684&info=p_cec&infoid=20
0.358541
President: Lailah Washington Vice President: Tenisha Higgins Secretary: June Coffee Advisor: Mr. Rogers Laugand The primary purpose of this organization is to unite diverse students of Clarion University to discuss the social issues of race, gender, and class that we are faced with every day. We encourage partnerships and collaborations that focus on improving mental, physical and spiritual health. We plan to motivate students to go out into our campus and communities and do community service to enhance their awareness of the needs of others and to utilize their academic achievement. We also plan to attend motivational and educational programs and conferences that will give us the knowledge base for diversifying ourselves and learning about students of other cultures and races. WOMEN UNITED CONSTITUTION Article 1 - Name of Organization Section 1: The name of the organization by this constitution shall be Women United. Article II - Purpose Section 1: The primary purpose of this organization is to unite diverse students of Clarion University for discussions of the social issues of race, gender, and class that we are faced with every day in order to encourage partnerships and collaborations that focus on improving mental, physical and spiritual health. We plan to motivate students to go out into our campus and communities and do community service to enhance their awareness of the needs of others and to utilize their academic achievement. We also plan to attend motivational and educational programs and conferences that will give us the knowledge base for diversifying ourselves and learning about students of other cultures and races. Article III - Membership Section 1: Any Clarion University student interested in participating is eligible to join. All majors are welcome as well as all class standings. Members will be expected to attend biweekly meetings and participate in discussions, community service and fundraising events with dedication and commitment. Students will be strongly encouraged to place a high priority on academic achievement and to attend tutorial and study sessions when necessary. Section 2: There will be no membership fees. Section 3: Members will be discontinued if they attend fewer than three meetings. Article IV - Duties and Elections of Officers Section 1: The organization shall have the following officers who must maintin good academic standing to remain in office. They are responsible for: The President will be in charge of reviewing and presenting approval for any decisions made by Women United. The President will be in charge of scheduling any events or inquiring about transportation for the events if necessary. If any other member for some reason cannot complete a task, it is the responsibility of the President to complete the task or see to it that it is completed. B. Vice President The Vice President will be in charge of assisting the President in all of his or her duties. The Secretary will be in charge of typing the agendas, keeping record of the minutes, updating the roster, and setting up a list serve to inform students about any meetings or beneficial opportunities. The Treasurer will be in charge of preparing the budget and keeping record of all funds raised and spent by Women United. Section 2: Elections will be held every two years at the end of the spring semester unless a student wishes to resign his or her position or a unanimous vote of the membership decides to impeach them from their position. Students will be nominated from the floor or may nominate themselves, and a secret ballot will be held to determine the winner. No student may hold the same position for more than one year unless they are reelected. The elections will be conducted by a member assigned by the president. Section 3: A majority vote will determine the outcome of all elections to assure a fair election. Article V - Role of Advisor Section 1: The advisor will be selected and invited by the officers to advise Women United. The role of the advisor is to serve as a networking resource. The advisor will also attend meetings, proofread all materials and give constructive criticism, and participate in activities when possible. Section 2: The advisor serves as guide and has no vote. Article VI - Duties and Elections of Officers Section 1: Meetings will be held bi-weekly. If any business transactions are to be discussed, officers will have a separate committee meeting on Tuesdays prior to the open meeting. Section 2: A quorum of 2/3 total members will be needed for any business to be transacted. Section 3: In any meeting, any motion can pass with majority vote of the members present. Section 4: Each meeting will follow Robert's Rules. Article VII - Finances and Funding Section 1: There will be no dues. Section 2: We will be requesting funds from Student Senate. Section 3: We will work for funds through fund raising which will serve as a bonding resource. Article VIII - Amending, Suspending, and Accepting the Constitution Section 1: Amendments to this constitution shall be submitted to members, in writing, for discussion. After discussion, the amendment shall be tabled for one week. After that week, the amendment will be voted on and passed with a majority vote of all members present. Section 2: Amendments shall take effect after approval by the Student Senate, Vice President of Student Affairs, and the President of Clarion University. Article IX - Ratification Section 1: The affairs of the organization shall be governed as outlined in the above stated Constitution effective upon adoption by the majority of members at the meeting and then approved by the Student Senate, the Vice President for Student Affairs, and the President of Clarion University.
<urn:uuid:1d99f067-05e4-4d1a-94ed-5036ea55d4ca>
2013-05-21T17:09:27Z
CC-MAIN-2013-20
[ [ -0.0361328125, 0.00933837890625, -0.0008087158203125, -0.005584716796875, 0.11962890625, 0.0179443359375, 0.0024261474609375, 0.083984375, -0.0081787109375, -0.04638671875, 0.083984375, 0.00396728515625, -0.0966796875, 0.0693359375, 0.057861328125, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950903
1,117
http://www.clarion.edu/40419/
0.376558
Polonium: Deadly radioactive substance Whether a radioactive substance called polonium-210 was involved in Yasser Arafat's death is under investigation. The body of the former Palestine Liberation Organization leader was exhumed Tuesday for this purpose and reburied. Arafat died in 2004. A murder inquiry into his death was opened this year after high levels of polonium-210 were found on Arafat's toothbrush, clothing and keffiyeh, the black-and-white headscarf he often wore. Tawfiq Tirawi, head of the Palestinian investigation committee, said forensic experts from France, Switzerland and Russia took their own samples for independent analysis. Polonium-210 is not a radioactive substance that emits gamma particles, which can travel through walls at extremely high energies. Instead, as polonium-210 decays, it releases alpha particles, which can't even pass through a piece of paper. But alpha particles are still dangerous. They travel short distances and retain a high amount of energy. In nature, it takes about 138 days for half of a given quantity of polonium-210 to decay. But because biological processes also work to eliminate the substance, it takes about 50 days for half of it to disappear while inside the body, according to the Centers for Disease Control and Prevention (PDF). Polonium-210 is a problem to humans only when it gets into the body. The International Atomic Energy Agency says that careful hand-washing and showering can eliminate most traces of this substance. The radioactive substance can enter body by eating or drinking contaminated things, breathing contaminated air, or inhaling or ingesting bodily fluids from someone contaminated with it. A wound can also become contaminated. "Radiation, just like with any toxic chemical, is related to dose," said Cham Dallas, a professor and toxicologist at the University of Georgia's Institute for Health Management and Mass Destruction Defense. "If you get a big dose, then you'll die sooner." And with polonium-210, a dangerous dose can be a matter of micrograms: smaller than a single speck of pepper, he said. If you ingest polonium-210, about 50% to 90% of the substance will exit the body through feces, according to a fact sheet from Argonne National Laboratory (PDF). What is left will enter the bloodstream. About 45% of polonium ingested gets into the spleen, kidneys and liver, and 10% is deposited in the bone marrow. Radiation poisoning from polonium-210 looks like the end stage of cancer, Dallas said. Liver and kidney damage ensue, along with extreme nausea and severe headaches. Victims often experience vomiting, diarrhea and hair loss. The alpha particles emitted from the decaying substance get absorbed in the body, which is what causes harm. Death may come in a matter of days, sometimes weeks. There is no cure for severe radiation poisoning, Dallas said. A few experimental treatments are in the works for people who are able to stay on the edge of potential survival, but they have not been approved by the U.S. Food and Drug Administration. Arafat died at age 75 at a Paris military hospital after he suffered a brain hemorrhage and slipped into a coma. Palestinian officials said in the days before his death that Arafat had a blood disorder -- though they ruled out leukemia -- and that he had digestive problems. Rumors of poisoning circulated at the time, but Palestinian officials denied them, and then-Foreign Minister Nabil Sha'ath said he "totally" ruled them out. Over the course of a year, through natural sources and medical tests, the average American gets an effective radiation dose of 6.2 millisieverts (mSv). A potentially lethal dose of polonium-210 is 5 sieverts (Sv), Dallas said, which is about 1,000 times more powerful than that average year's worth of exposure. Low concentrations of polonium are all around the environment. Additionally, tobacco contains polonium, and about twice as much of the radioactive substance has been found in the ribs of smokers than non nonsmokers, according to the Argonne report. As for investigating a polonium poisoning, there are instruments that can detect low concentrations of polonium, Dallas said. But there's also a background level of polonium found in nature, so if an alleged poisoning happened many years ago, the remaining quantity in the body may be close to the background level. Another tricky part about investigating a situation like this years after a potential poisoning: It would be relatively easy for someone to contaminate evidence after the fact with a small amount of the substance, Dallas said. So it's possible that someone could have planted small amounts of polonium-210 in Arafat's belongings, Dallas said. High levels were found by a team of Swiss researchers at the Institut de Radiophysique. Even through exhuming the body, it's not clear that detection would be foolproof, Dallas said. As time goes on, there's less and less of the radioactive substance left, so it would be more and more difficult to tell how much polonium-210 Arafat was exposed to, if any. "It's going to be very hard to determine whether polonium was ever introduced there," Dallas said. "There will be a lot of dispute, I guess, depending on who is incriminated by this." Copyright 2012 by CNN NewSource. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:9daa629a-faa8-4b34-883b-603f53af0a95>
2013-05-21T17:17:48Z
CC-MAIN-2013-20
[ [ -0.033447265625, 0.0164794921875, -0.01080322265625, -0.00970458984375, 0.11572265625, -0.0869140625, -0.00738525390625, 0.11669921875, -0.003326416015625, -0.044677734375, 0.078125, 0.00860595703125, 0.0341796875, 0.007659912109375, 0.02978515625, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959404
1,158
http://www.clickondetroit.com/lifestyle/health/Polonium-Deadly-radioactive-substance/-/2300442/17565420/-/format/rss_2.0/view/print/-/13tmmhcz/-/index.html
0.180442
The president of wrestling's international federation has resigned after the Olympics recommended dropping the sport from the 2020 Summer Games, the group said Saturday. Raphael Martinetti's departure was announced in Phuket, Thailand, at a meeting of the International Federation of Associated Wrestling Styles. The official stepped down to give another leader the chance to fight the Olympics' decision, a FILA statement said. Nanad Lalovic, a FILA official, has been chosen as acting president. The executive board of the International Olympic Committee announced its proposal on Tuesday. "Wrestling will now join the seven shortlisted sports -- baseball/softball, karate, roller sports, sport climbing, squash, wakeboarding and wushu (a Chinese martial art) -- vying for inclusion in the 2020 Olympic program as an additional sport," the Olympic committee said in a statement. The move sparked an international outcry and surprise. It prompted a number of the federation's delegates at the Phuket meeting to hold Martinetti responsible for the widely unpopular decision. Martinetti is Swiss. Lalovic is Serbian. At a meeting in Russia in May, representatives from the eight sports will make presentations for inclusion in the 2020 Games. The executive board will recommend one. The final word will come in a vote at the Olympic committee's general session in Argentina in September. The host city for the 2020 Summer Games will be chosen in September. Istanbul, Tokyo and Madrid are the finalists. The sport will be played at the 2016 Summer Olympics in Rio de Janeiro. Wrestling is seen as an iconic Olympic sport with a long tradition. It was an integral part of the ancient Olympics and has been a competition in all but one of the modern Games since their inception in 1896, missing only the 1900 Games in Paris. There are two types of Olympic wrestling competitions -- freestyle and Greco-Roman. The governing body for the sport in the United States was so appalled at the decision that it started a Facebook page, "Keep Wrestling in the Olympics." Opponents of the decision also took to Twitter, posting with the hashtag #SaveOlympicWrestling. Wrestling is a popular high school and college sport in the United States. It is immensely popular in many other countries, such as Russia, Turkey and Iran.
<urn:uuid:740e0d73-92a6-4098-996d-918191464759>
2013-05-21T17:11:29Z
CC-MAIN-2013-20
[ [ -0.00860595703125, 0.038818359375, 0.0035858154296875, -0.006195068359375, 0.1162109375, -0.04296875, -0.015380859375, 0.0986328125, -0.014404296875, -0.0286865234375, 0.0595703125, 0.0228271484375, 0.0181884765625, -0.04443359375, 0.042236328125, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947872
467
http://www.clickorlando.com/sports/Wrestling-chief-steps-down-after-Olympic-move/-/1636890/18578164/-/8ngi5uz/-/index.html
0.34443
Decker Anstrom recently retired as President of Landmark Communications and Chairman of The weather Channel Companies (Cable TV Network, Weather.com, and WSI). He now serves on the Board of Directors of Comcast Corporation and of Island Press. Prior to his positions at Landmark, Anstrom enjoyed a long career in public service an in the communications industry. During the Carter Administration, he served as senior staff member in the White House office of Management and Budget, working on the creation of the US Department of Education, and later in the White House Office of Presidential Personnel. He subsequently joined and became President of Public Strategies, a Washington-based public policy consulting firm, where he directed a broad range of public policy and economic analyses for investment banking, corporate and non-profit clients. In 1987 he joined the National Cable Television Association (NCTA) as Executive Vice President; he became President and CEO in 1994. During his tenure he led the cable industry's efforts that helped result in the Telecommunications Act of 1996. In 1999, Anstrom joined The Weather Channel Companies as President and CEO. In 2002 he became President of Landmark Communications, a privately-held diversified media company that owned newspapers, local television stations, database centers and print and advertising businesses as well as the Weather Channel Companies, at which time he helped introduce new programming regarding climate change. In addition, Anstrom served on numerous community non-profit and cable industry boards, including NCTA, which he chaired for two years. Anstrom retired from Landmark in late 2008 following the completion of Landmark's sale of the Weather Channel Companies to NBC.
<urn:uuid:76f48d6f-da86-4b63-8d74-869d2b949765>
2013-05-21T17:37:14Z
CC-MAIN-2013-20
[ [ -0.0025194783229380846, 0.046070460230112076, 0.0011062414851039648, -0.017445798963308334, 0.05081300809979439, -0.034044716507196426, -0.0019054878503084183, 0.10162601619958878, -0.011178861372172832, -0.061991870403289795, 0.08401083946228027, 0.0272696483880281...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.976316
327
http://www.climatecentral.org/what-we-do/people/decker_anstrom
0.434954
"Do not struggle against your sexual energy "Do not struggle against your sexual energy, because not only will you fail to conquer it, you will be crushed by it. The only way to resolve this problem is to find a powerful ally towards whom you can direct this force, and whose knowledge of alchemy provides you with the means to transform it into light, health, and beauty. And who is this ally? It is a high ideal, a sublime idea that you live by, that you cherish and nourish. This idea alone is capable of transforming this energy: not you. Yes, if you experience a sexual impulse and immediately concentrate on your ideal, this energy returns towards the brain to nourish this ideal and, several minutes later, you are victorious. Not only have you freed yourself, but you feel reinforced and inspired. If you make a habit of directing all your energies toward a divine ideal, these energies, instead of bringing you down, will serve you and will contribute to making your ideal come true." Omraam MikhaŰl A´vanhov
<urn:uuid:8fadff10-93c1-4adf-b045-4158ee04737f>
2013-05-21T17:23:21Z
CC-MAIN-2013-20
[ [ -0.02136075869202614, 0.0003358221147209406, 0.0014174578245729208, 0.024789029732346535, 0.10390295088291168, -0.08597046136856079, 0.004169963300228119, 0.08649788796901703, -0.01793248951435089, -0.05221518874168396, 0.05432489514350891, 0.03085443004965782, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94774
219
http://www.clubconspiracy.com/forum/showthread.php?mode=hybrid&t=14320
0.949455
Warren Buffett: Berkshire Board 'Enthusiastic' About His Publicly Unnamed Successor as CEO Warren Buffett writes in his annual letterto shareholders that the company's board is "enthusiastic" about a person it has chosen to eventually take over as CEO of Berkshire Hathaway. But Buffett does not name that person, saying only that it's "an individual to whom they have had a great deal of exposure and whose managerial and human qualities they admire." There are also "two superb back-up candidates." Previously Buffett has said there were three internal candidates for the job and that the board knew who it would go to if Buffett, 81-years old, suddenly died or became incapacitated. Buffett predicts that "when a transfer of responsibility is required, it will be seamless, and Berkshire's prospects will remain bright." He doesn't expect this to happen soon: "Do not, however, infer from this discussion that Charlie and I are going anywhere; we continue to be in excellent health, and we love what we do." Buffett implies that new portfolio managers Todd Combs and Ted Weschler will eventually take over Buffett's role as chief investment officer, writing that they have "the brains, judgment and character to manage our entire portfolio when Charlie (Munger) and I are no longer running Berkshire." Housing in 'Depression' Warren Buffett says America's housing sector "remains in a depression of its own" but will eventually recover as America continues to create "more households than housing units." In the meantime, however, Buffett writes that the company's housing-related units continue to "sputter." He admits that his prediction a year ago that housing's recovery would probably begin within "a year or so" was "dead wrong." Buffett writes that the housing market's continued weakness is "the major reason a recovery in employment has so severely lagged the steady and substantial comeback we have seen in almost all other sectors of our economy." Admits 'Big' Mistake In his letter, Buffett admits to making a "big mistake" when he spent about $2 billion "a few years back" buying Energy Future Holdings bonds. It's a Texas electric utility with "prospects tied to the price of natural gas, which tanked shortly after our purchase and remains depressed." Berkshire wrote down that investment by $1 billion in 2010 and another $390 million in 2011 and may wind up wiping out almost all of the remaining $878 million in carrying value. Buffett writes that "in tennis parlance, this was a major unforced error by your chairman." Buffett says Berkshire's previously announced share buyback plan resulted in just $67 million of purchases over a few days in September, as the stock price quickly topped its pre-determined upper limit of 110 percent of book value. Buffett writes that "given the opportunity, we will likely repurchase stock aggressively at our price limit or lower" but "we have no interest in supporting the stock and our bids will fade in particularly weak markets." Wants IBM Shares to 'Languish' Buffett devotes several paragraphs to one of his favorite themes: investors who will be buying in the future should be happy, not sad, when stock prices fall. "When Berkshire buys stock in a company that is repurchasing shares, we hope for two events: First, we have the normal hope that earnings of the business will increase at a good clip for a long time to come; and second, we also hope that the stock underperforms in the market for a long time as well. A corollary to this second point: 'Talking our book' about a stock we own — were that to be effective — would actually be harmful to Berkshire, not helpful as commentators customarily assume." Buffett uses Berkshire's stake in IBM as an example. He says the company will probably spend $50 billion or so over five years to repurchase shares. As a result, "We should wish for IBM's stock price to languish" over that time period. "The logic is simple: If you are going to be a net buyer of stocks in the future, either directly with your own money or indirectly (through your ownership of a company that is repurchasing shares), you are hurt when stocks rise. You benefit when stocks swoon. Emotions, however, too often complicate the matter: Most people, including those who will be net buyers in the future, take comfort in seeing stock prices advance. These shareholders resemble a commuter who rejoices after the price of gas increases, simply because his tank contains a day’s supply." He admits, however, that he and Munger "don't expect to win many of you over to our way of thinking — we've observed enough human behavior to know the futility of that." His personal revelation came after reading Chapter Eight of Ben Graham's The Intelligent Investor. "Picking up that book was one of the luckiest moments of my life." Todd and Ted Buffett says new portfolio manager Todd Combs built a $1.75 billion portfolio (at cost) in 2011, and Ted Weschler, who joined Berkshire shortly after the end of the year, will "soon create one of similar size." He apparently wants the two men to work as a team, revealing that each of them "receives 80% of his performance compensation from his own results and 20% from his partner's." Buffett also notes, as he has in the past, that when Berkshire's quarterly portfolio filings show "relatively small holdings, they are not likely to be buys I made (although the media often overlook that point) but rather holdings denoting purchases by Todd or Ted." Buffett reports that Berkshire's per-share book value increased by 4.6 percent in 2011, outperforming the S&P's 2.1 percent gain, including dividends. He uses book value as a "useful, though considerably understated, proxy" for intrinsic business value, his way of measuring his performance. Berkshire's stock price underperformed the S&P's, excluding dividends, with a 4.7 percent drop last year. The benchmark stock index was flat. Current Berkshire stock prices: Email comments to email@example.com
<urn:uuid:8750b0c5-197c-498e-9649-86427411d935>
2013-05-21T17:10:17Z
CC-MAIN-2013-20
[ [ 0.002655029296875, 0.046142578125, 0.0152587890625, 0.01507568359375, 0.10498046875, -0.045166015625, -0.001129150390625, 0.11572265625, -0.00994873046875, -0.059814453125, 0.06884765625, 0.041259765625, -0.080078125, -0.015625, 0.0537109375, -0.0004...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975013
1,307
http://www.cnbc.com/id/46517916?__source=RSS*blog*&par=RSS
0.217662
(CNN) -- At least four people died and 17 others were injured by sniper shots as Syrian army and security forces gathered in the northwestern city of Banias, an eyewitness said Sunday, the same day state news reported an ambush on an armed forces unit that killed nine. The forces were mostly gathered in the northeastern neighborhood of al-Qoz, said the witness, who is also a doctor. Of the four killed and 17 injured, all were Banias residents, he said. Early Sunday, security forces attacked worshippers as they left a mosque in a Sunni area of the city, according to the eyewitness. However, other residents gathered and were able to chase off the forces' seven vehicles. All cellular service and land lines were down Sunday in the city, the eyewitness said. Meanwhile, the state-run Syrian Arab News Agency reported that an armed forces unit was moving in the area when it was ambushed by militants. Nine people died, including two officers, and dozens more were injured, according to the report. Armed groups opened fire on ambulances, preventing them from reaching and aiding the wounded, SANA said. The government in Damascus on Saturday declared its intention to crack down on what it described as unrest in the country provoked by outside instigators. "There's no more room for leniency and tolerance in enforcing law," the interior ministry said. The tough statement came amid report of clashes Saturday in the western coastal city of Latakia. A human rights activist said Saturday that hospital officials told him live ammunition was being used to disperse protesters. Syria issued the statement after widespread protests on Friday, in and near Daraa and in Latakia, Banias, Qamishli, Homs, Douma, Moathamia, Daraya, Tal and Hama. The demonstrations reportedly led to the deaths of more than three dozen protesters. Protesters have been saying that their peaceful demonstrations have been met with force by Syrian security. The National Organization for Human Rights in Syria, an activist group, said there were 37 demonstrators killed across the country on Friday, including 30 in Daraa province, four in Damascus province and three in Homs province. It said security forces used tear gas and live fire against unarmed civilians, made dozens of arrests and raided homes. Wissam Tarif, a human rights activist, cited hospital officials as saying protesters in Latakia were being treated early Saturday for live bullet wounds. He also said funerals were scheduled in Daraa on Saturday for protesters who died Friday and said witnesses told him about arrests in Damascus and Aleppo. But Syria blames instigators and saboteurs for infiltrating peaceful demonstrations and feeding violent confrontations. For example, the government said 19 security forces were killed in Daraa on Friday and dozens of others were injured in violence caused by "armed groups" firing at citizens and "unarmed security forces." The government is aware of the widespread and international condemnation toward Syria. Foreign Minister Walid al-Moallemis explaining the government's position to foreign ambassadors in Damascus, according to the official Syrian Arab News Agency, or SANA. The interior ministry said demonstrators have taken to the streets with demands that were handled by the government, which announced decrees and responses to various grievances. "However, there are some spiteful individuals, outsiders and those who were compelled by known foreign parties, accompanied by blatant instigation by satellite channels and internet sites, that didn't like the initiatives and the responses to the citizens' just demands that are being carried out," the ministry said. The ministry said attackers have torched official establishments and military and security personnel "still committed to not opening fire" have been killed and wounded. It urged citizens to identify the "criminals" responsible and report them to authorities. "It became obvious that these people do not want reform and are not concerned with popular demand or prohibiting the use of weapons, taking advantage of the latter and infiltrating demonstrators or people seeing off martyrs (rallies for people killed). They began to open fire randomly in order to cause a schism between citizens and security personnel," the ministry said. CNN could not independently confirm the accounts. Anti-government protests began in mid-March, with unrest first centering in the Daraa region and later spreading to other parts of the country. Scores of people have died, and President Bashar al-Assad's regime has been criticized for the lethal force used against anti-government protesters. U.N. Secretary-General Ban Ki-moon expressed his concern over the reports of violence against protesters in a phone call Saturday with al-Assad. According to a U.N. release, Ban told al-Assad that "the killing of peaceful demonstrators was unacceptable and should be investigated. He took note of the president's intention to investigate and encouraged early action in this regard." U.S. President Barack Obama said in a statement on Friday that "It is time for the Syrian government to stop repressing its citizens and to listen to the voices of the Syrian people calling for meaningful political and economic reforms." Amnesty International said unarmed people calling "for greater freedoms were reportedly attacked by security forces firing live ammunition." "The alarming reports coming from Syria today show that the authorities have not altered their violent methods for dealing with dissent," said Philip Luther, deputy director of the Middle East and North Africa Program at Amnesty International. Amnesty said on Friday that at least 171 people are believed to have been killed during the past three weeks of protest. Abuses in Syria have long been alleged in the international arena, even before the demonstrations started last month. The U.S. State Department's just-issued 2010 human rights report said Syrian security forces last year committed "unlawful killings, detained political and human rights activists, and tortured and physically abused prisoners and detainees with impunity." Opponents of the government allege massive human rights abuses and are calling for political and economic reform. They also want the release of all political prisoners and an end to emergency law. One demand has been the lifting of the country's 48-year-old emergency law. The emergency law allows the government to make preventive arrests and override constitutional and penal code statutes. In effect since 1963, it also bars detainees who have not been charged from filing court complaints and from having a lawyer present during interrogations. Al-Assad has indicated he is amenable to reforms and has formed a committee to study the lifting of the emergency law. He has also announced Syrian nationality for thousands of people in the country's Kurdish region who had been stripped of their citizenship and classified as "foreigners." CNN's Amir Ahmed and Salma Abdelaziz contributed to this report
<urn:uuid:11e4655d-5589-441c-a175-ab754e59f79d>
2013-05-21T17:45:54Z
CC-MAIN-2013-20
[ [ 0.0133056640625, 0.034912109375, -0.0218505859375, 0.01544189453125, 0.1513671875, -0.054443359375, -0.0294189453125, 0.09033203125, 0.00762939453125, -0.0634765625, 0.095703125, 0.0615234375, 0.006256103515625, -0.0174560546875, 0.03369140625, 0.006...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978898
1,372
http://www.cnn.com/2011/WORLD/meast/04/10/syria.unrest/index.html
0.609411
The success of a concurrent system depends on well designed hardware, flexible software that controls the hardware, and clear marketing vision. To adapt the changing marketing requirement, hardware and software need to have flexible architectures. This article is focused on software development issues, and discusses concurrency design at application layer as opposed to concurrency inside the Operating System. Any multi-threaded system can be considered a concurrent system; for example, a lengthy task can be implemented as a background thread so that it will not block the graphical user interface. Here, we are discussing concurrent systems which can be characterized by the following traits: - System input and output can be clearly identified. - System internal consists of system resources, such as hardware modules, which are used to process system input and generates system output. - One or more execution steps are needed for a system input to be processed by system resources and to become a system output. - The system resources and their relationship are identified by system analysis. The concurrency properties of system resources determine the constraints between execution steps, which ultimately define the system concurrency behavior. The above description can be illustrated in figure 1. The system consists of three resources: 2 inputs and 2 outputs. Each input needs to go through two steps to become output. Resources 1 and 2 are independent and can be parallel. The output of resources 1 and 2 are the input of resource 3, which is independent of 1 and 2. Figure 1. A Sample Concurrent System Most concurrent systems have these design goals: - Have an easy to understand software architecture so that the desired concurrency can be implemented and verified quickly. - Have a solid system concurrency kernel to adapt system environmental changes such as inconsistent hardware responses, and still achieve high system reliability. - Have a good scalable architecture to adapt new requirement changes. - System concurrency and throughput are well understood by all teams involved in the system specification and design, not just by a few key software engineers. Therefore, the concurrent software should expose how the current system internally works with minimum cost, so that the team communications can be conducted effectively. - Different system concurrencies can be achieved with different execution configurations without major interruption to the system reliability. For a complex concurrent system, the design cost to achieve such goals could be very high for inexperienced engineers. Most systems end up with only a few engineers who can understand and maintain the fragile concurrent kernels. What is needed to meet the concurrent system design goal from a management perspective? - To have the capability to quickly understand the marketing or hardware concurrency requirement, and to provide a clear road map on how to achieve the desired software system concurrency at an early stage of development, not when delivering the alpha or beta product. This requires the software engineer to have a clear understanding of the system resource concurrency at the very beginning. - To shorten the cycle of turning the desired concurrency into a real functioning software system. - To communicate the achievable concurrency goal to other teams frequently, and to adjust the concurrency accordingly based on new marketing input, or new resource constraints improvements or limitations, such as hardware. The followings are common issues found in a concurrent software design: - The software team member is not very experienced in concurrency design. Most teams have engineers knowing threads, critical sections, semaphores, and events. But, this usually does not guarantee achieving the design goals listed above. - The understanding of system concurrency is very slow. The software engineer could not present a full picture of how the system concurrency design is going to be working until the alpha or beta stage. Therefore, nobody will question how the system concurrency is designed since there is no good method to communicate the software design. The engineer usually gives you his/her understanding of the system concurrency on small pieces, which is hard to convince the software team manager or other teams that the software team has fully understood the system and will be able to deliver on schedule. - The marketing group has a wrong system throughput assumption and commitment at the beginning of a project, with false understanding of the system resource constraints, or the complexity for available engineers to achieve the desired high throughput without sacrificing software system reliability. The marketing group might assume that software engineers could just achieve it, but have no way to verify it during the process until it is too late. - Almost all designs do not have a clear distinction between the code controlling the system resource operation and the code performing the system resource concurrency. This architecture makes it very hard to enhance upon new concurrency requirements. By simply using a synchronization object, such as a critical section, event, or semaphore from the Operating System, it's almost impossible to perform such a partition without a major investment on the system architecture design. Unfortunately, most applications do not separate the two domains and let one engineer handle all of them, who is already overwhelmed by the concurrency choreography. The software manager usually does not understand the importance of such a design, or they don't have the time to spend on infrastructure building, and just want to see something is beginning to work. The result is that more time will be wasted during debugging and the feature enhancement period. - The fragile concurrency architecture is hard to understand. It is almost impossible for new engineers to take over the design, except to abandon the old one, and then propose a "better architecture" which usually goes through the same design cycle and delays the schedule. The software manager usually is not aware of the engineer's redesign approach except to accept it, since both the engineer and manager have no choice to improve the old architecture. - The manager and software engineer mistakenly think that object oriented analysis of the concurrent hardware modules will guarantee a good concurrent software design which delivers a flexible concurrent software architecture. Most OOA just help engineers to identify objects in a system without concurrency analysis, and engineers have to use a synchronization object in the Operating System to address concurrency. If this approach is used, it will not help achieve the concurrent system design goals listed above. Unfortunately, most systems are designed with such approach. - Engineers begin to experience an unexplained hang, and begin to put a sleep function somewhere to solve weird timing problems, simply because the understanding of system resource concurrency is not complete at the beginning, and the design can not adapt to a different running environment. When switching to different platforms, such as a faster machine, software needs major retest, or a possible overhaul. And the engineer and the manager begin to hide facts from the upper manager. The development cost goes up, and the software always needs major "improvements" to adapt to a new hardware with a newly tuned concurrency, which should not happen if it is well designed at the beginning. - Typically, the design of a system concurrency is architected by a senior person in a team, and it is very hard for other people to challenge the delicate design. System maintenance and enhancement for the concurrency part is a major issue with such a design approach. How to Address Those Issues The cost of making a complex concurrent system flexible and reliable is extremely high for average engineers who simply use the Operating System's critical section, semaphore, event, and thread. To address the above problems, we need to develop a platform to help engineers in modeling a concurrent system with an easily understood object model, communicating the design by a user friendly graphical user interface, and verifying the internal concurrency of the design quickly by simulation. - A simple concurrent object model is needed. An object oriented analysis method based on the model should be easy to perform. - An inter-task communication mechanism is provided based on the object model to allow task synchronization. - A design development toolkit is needed to support the object oriented analysis, and helps software engineers to spend more time on understanding the system concurrency, and system resource controlling during implementation, instead of struggling with multithreaded code that is implemented with Operating System synchronization objects such as critical sections, semaphores, and events. - The design platform provides a graphic presentation of the system concurrent execution status that helps software engineers to present and to validate a design effectively. Eventually, it will help the whole team, even different groups, to understand the system concurrency internals. - The object model and its development toolkit allow separation of the code performing system resource concurrency and the code performing system resource control. In figure 1, the code controlling Resource 1 is a resource control domain. The code controlling independent Resources 1 and 2 to operate in parallel is a system resource concurrency domain. This architecture helps the manager to partition the concurrent system design work into two domains so that it can be assigned to different engineers to improve team productivity and product reliability. Usually, a manager will not offer a resource to implement above the environment to help the design long term, since it is very time consuming and no immediate results can be seen. JEK Platform is designed to address these issues with the above concurrent system design goals, and makes concurrent problems easier to model for software engineers. JEK SDK automatically turns a modeled application job into a concurrent execution engine. The object model also separates the resource synchronization code and the resource control code, so that the engineer can spend more time understanding system concurrency, instead of dealing with Operating System synchronization objects, which is used by most software engineers. It will also help the engineer to spend more time communicating their understanding of the system concurrency within a team, or with other teams. Here, two samples are presented (please go to www.jekplatform.com/CodeProjectSamples.htm to get the source code) to demonstrate how the JEK Platform works: - Sample 1: Philosophers dining problem. - Sample 2: Automated coffee machine. Sample 1. Philosophers Dining Problem The philosophers dining problem is five philosophers sitting around a table doing what they do best: thinking and eating. In the middle of the table is a plate of food, and in between each philosopher is a fork. The philosophers spend most of their time thinking, but when they get hungry, they reach for the two forks next to them and start eating. A philosopher cannot begin eating until he has both forks. When he is done eating, he puts the sticks down and continues thinking. To solve the problem with JEK Platform, five routes are defined to represent the actions of five philosophers. Each route has two tasks: eat and think. Obviously, eat task of each philosopher's route can not be active at the same time because of resource constraints. A Mutex synchronization resource is used to restrict the eat task of each philosopher. The resource allocation scheduling algorithm in the JEK Kernel has an important feature to avoid a deadlock in this sample: if one philosopher gets a fork and finds another is already taken, it will release the one and notify other tasks in other routes so that other philosopher can continue to eat. The following diagram, figure 2, illustrates the philosopher dining job execution engine's timing diagram. The application code is pretty simply since it does not need to handle threads and thread synchronization that is handled in the JEK SDK, but simply describes the resources (forks) and tasks (philosophers' actions). Figure 2. JEK Studio monitors the philosophers dining job execution In figure 2, JEK Studio GUI has four components illustrated by four yellow bubbles: - The task matrix presents the application engine internal structure and the real-time execution activity status. - The task timing diagram presents a more detailed real-time execution status for tasks, which helps developers to understand and to validate concurrent system behavior quickly. - The activity resource matrix presents real-time task activity resource status. - The synchronization resource matrix presents real-time task occupy status. - The task trace window displays log status, which is also saved in a log file. In JEK Studio, five routes are shown in the task matrix. Its execution is shown in the task execution timing diagram. The four blue bubbles are explained as follows: - Blue bubble 1. Job execution engine starts to execute job. Philosophers 1 and 4 start to eat. - Blue bubble 2. Philosophers 3 and 5 start to eat at the same time. Philosophers 1 and 4 start to rest at the same time. The reason that philosopher 3 and 5 can start to eat at the same time is because the application code is configured so that the eat time for all philosophers are the same. The rest times are also the same for all philosophers. - Blue bubble 3. It's interesting to observe the job execution status after a few loops. Philosophers 1, 2, 4 are resting. Philosophers 3 and 5 are eating. If observed carefully, philosophers 3 and 5 are not starting to eat at the exact same time. Philosophers 1, 2, 4 do not rest at the same time. - Blue bubble 4. This is another interesting job execution status. Only one philosopher, #2, is eating at this moment. Philosophers 1, 3, 4, 5 are all resting. The reason, the resting times of all philosophers are longer than eating times. - Another observation is that fairness is not guaranteed for each route. It's unpredictable which philosopher will get a chance to eat next time based on the scheduler used. - Route starvation is possible. In other words, some philosophers might never get a chance to eat. This is not demonstrated in the graph since the result is random. You can try to start the engine a few times and the results could be different each time. If not using simulation, it is very hard for a software engineer to answer: if scenarios marked by the blue bubbles 3 and 4 are possible. Sample 2. Automated Coffee Machine An automated coffee machine mixes milk, sugar, and coffee into a cup, and serves the cup to customer when it is done. Figure 3. Coffee machine model analysis The coffee machine has five robots: - Platform robot. It holds the coffee cup, so that milk, sugar, and coffee can be poured into it and gets mixed. After the coffee is mixed, it moves the cup with the mixed coffee to a customer. - Cup robot. It puts an empty cup onto the platform robot. - Milk robot. It pours milk into the coffee cup on the platform robot. - Sugar robot. It pours sugar into the coffee cup on the platform robot. - Coffee robot. It pours coffee into the coffee cup on the platform robot. Coffee machine operating procedure: - All robots are in initial positions. - Cup robot puts an empty cup onto the platform cup. - Milk robot pours milk into cup. - Sugar robot pours sugar into cup. - Step 3 and step 4 can be parallel. - Coffee robot pours coffee into cup. - Platform robot moves mixed coffee to customer. Important operating requirements of the coffee machine are as follows: - Above operating procedures have to be followed. Otherwise, the robot's positions might be in wrong places, and results in robot damages. - Milk and sugar need to be poured into the cup before coffee, so that the coffee can be mixed properly without requiring adding a coffee stir robot that increases the complexity of the machine. To solve the problem with JEK Platform, two routes are defined. One route is designed to control the cup robot and the platform robots. Another route is designed to control milk, sugar, and coffee robots. The reason to define these routes is that the task steps inside each route are sequential. The synchronization resource between routes is the platform robot. For detailed analysis and code, please go to http://www.jekplatform.com/CodeProjectSamples.htm to download the complete JEK Platform and to look for sample section 7: Machine Control. Figure 4 is the coffee machine execution timing diagram implemented with the JEK SDK and presented with the JEK Studio. X axis is time. Y axis is tasks. A bar is the execution time for a task. Tasks within one route are displayed with one color. Different tasks in one route are displayed with different Y axis values. Multiple bars in the same Y axis represent the same task executed at different times. Route 1 controlling milk, sugar, and coffee robot (orange color) has three tasks from bottom to top: - Task1_1: control milk robot to pour milk. - Task1_2: control sugar robot to pour sugar. - Task1_3: control coffee robot to pour coffee. Route 2 controlling cup robot (blue) has two tasks from bottom to top: - Task2_1: control cup robot to put cup onto platform robot. - Task2_2: control platform robot to serve mixed coffee to customer. The six blue bubbles in figure 4 are explained as follows: - Blue bubble 1. Task2_1 puts a cup onto the platform robot. - Blue bubble 2. Task1_1 and Task1_2 pour milk and sugar into an empty cup at the same time. - Blue bubble 3. Task1_2 finishes pouring sugar and Task1_1 is still pouring milk. - Blue bubble 4. Task1_3 starts pouring coffee. - Blue bubble 5. Task2_2 controls the platform robot to serve mixed coffee. - Blue bubble 6. Repeat the same process. Figure 4. Coffee machine execution status of solution 1 This robot is not very efficient. Route 1 is idle after blue bubble 5. To increase the throughput, another independent platform robot is added to make route 1 as busy as possible. The position of platform robot 1 is different from that of platform robot 2. Therefore, the control code for pouring milk, sugar, and coffee is different in context, but have the same structure. Figure 5 is a new robot diagram. Figure 5. Platform 2 robot is added Route 3 (burgundy red color) is added to serve second cup, which is presented as red in figure 6. It has identical tasks as defined in route 2. Since a new platform robot is added, route 2 and 3 are redefined as follows: Route 2 controlling cup robot (blue) has two tasks: - Task2_1: control cup robot to put cup onto platform robot 1. - Task2_2: control platform robot 1 to serve mixed coffee to customer 1. Route 3 controlling cup robot (burgundy red) has two tasks: - Task3_1: control cup robot to put cup onto platform robot 2. - Task3_2: control platform robot 2 to serve mixed coffee to customer 2. Figure 6. Solution 2 coffee machine has two platform robots The five blue bubbles in figure 6 are explained as follows. - Blue bubble 1. Task3_1 puts the cup onto platform robot 2. Both routes 2 and 3 are started at the same time, but only one route can use the cup robot. It is random that route 2 gets the cup robot. - Blue bubble 2. Task1_1 and Task1_2 pour milk and sugar into an empty cup at the same time after a cup is put on platform robot 2. Note: the execution context of route 2 is platform robot 1 since it has a different location than platform robot 2. In other words, the control code is different when the context is different. - Blue bubble 3. Task2_1 starts to put a cup on platform robot 1. Coffee robot uses task1_3 to pour coffee into the cup on platform robot 1. Both tasks are started at the same time. - Blue bubble 4. Platform robot 2 uses task3_2 to serve mixed coffee to customer 2. Task1_1 and Task1_2 pour milk and sugar into an empty cup on platform robot 1. The route 1 execution context (pouring milk, sugar, and coffee into which platform robot) is not visible from the timing diagram. It is only visible from the trace window or log file. - Blue bubble 5. Task1_3 pours coffee into platform robot 1. Comparing figures 4 and 6, route 1 is almost busy all the time. Therefore, the throughput of the coffee machine with two platform robots is increased. But, if looking carefully, the machine with two platform robots can be even faster. The reason is that the coffee robot can serve another platform robot while milk and sugar robots are serving one platform robot, if the time of putting one cup on the platform is shorter than the time of pouring coffee by the coffee robot. To increase the speed of the coffee machine, an engine design with different route configuration is used. Route 1 represents the actions of serving sugar, milk, and coffee to platform robot 1. Route 2 represents the actions of serving sugar, milk, and coffee to platform robot 2. The design of route 3 and 4 are the same as before. Figure 7 is the timing diagram of a new coffee machine. Figure 7. New concurrency of higher system throughput for the coffee machine with 2 platform robots The five blue bubbles in figure 7 are explained as follows: - Blue bubble 1. Task4_1 puts cup onto platform robot 1. - Blue bubble 2. Task1_1 and Task1_2 pour milk and sugar into empty cup at the same time to the cup platform robot 1. The cut robot starts to put a cup on platform 2 since it is free at this time. - Blue bubble 3. Task2_2 starts to add sugar into cup 2 on platform robot 2. The reason that this action can happen is that the sugar robot just finishes adding sugar for cup 1 on platform robot 1. It is also clear that the milk robot is still busy pouring milk into cup 1. Therefore, cup 2 only has sugar for now. - Blue bubble 4. Task2_1 starts to pour milk into cup 2 since it just finishes pouring milk for cup 1 on platform robot 1. Coffee robot begins to add coffee into cup 1 on platform robot 1. - Blue bubble 5. Cup robot begins to serve cup 1 to customer since coffee is done for cup 1. It is obvious that the choreography of this new coffee machine is different from that of the previous coffee machine. It appears to a user that its robots are smarter and works more intelligently since it starts to do the next job more promptly. The above three samples demonstrate the following: - It is easy to model and to analyze the concurrency of machine control with the JEK Platform. - To adapt to a new hardware configuration, the JEK SDK helps achieve new system concurrency with minimum code changes. - JEK Studio can visually identify system throughput potential quickly so that better throughput can be achieved. - The samples demonstrated in these solutions have a pretty simple architecture (see downloaded code). If not using the JEK Platform, can we solve the problem quickly? A few questions are raised here. - If several teams, such as marketing, hardware, and software, are working on the product, they might stop when solution 2 is working. Do they know that solution 3 is the best solution? Can they figure it out quickly? - Team members might be satisfied when they see that robots are working in parallel. If it is found that improvements can be made, how much code change is needed from solution 2 to solution 3 if implemented with synchronization objects in the Operating System? - How much competitiveness a company would gain to have a more efficient and reliable machine? How to Get the Two Samples Please go to http://www.jekplatform.com/CodeProjectSamples.htm to download the complete JEK Platform which includes the two samples.
<urn:uuid:e284b760-a01f-49e4-8cf1-71388aedbea7>
2013-05-21T17:18:44Z
CC-MAIN-2013-20
[ [ -0.0311279296875, 0.01165771484375, 0.0218505859375, -0.00494384765625, 0.08984375, -0.09619140625, 0.005126953125, 0.1259765625, -0.0084228515625, 0.011962890625, 0.091796875, 0.01025390625, -0.0595703125, 0.07666015625, 0.041259765625, -0.005401611...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927399
4,871
http://www.codeproject.com/Articles/16349/Managing-a-Concurrent-System-Design?fid=358206&df=90&mpp=10&sort=Position&spc=None&select=1852912&tid=1764423
0.820981
Any help with this would be amazing, I've created a simple code below for what I am trying to do, but I can't get it to behave how I wish. - #topmenu and #sidemenu to be fixed when scrolling (which works) - #extracontent to have a fixed width and be floated to the right of the page (which works) - #middlecontent should resize to the width between #sidemenu and #extracontent when the browser is resized horizontally. Is that last point possible? If so does anyone have any advice how I can acheive this? At the moment it pushes down the #extracontent and I'm pretty sure the fixed width will be sitting on top of some of #middlecontent Any help would be great <style type="text/css" media="screen">
<urn:uuid:2be6155a-c070-49dc-8bda-587e438fc26a>
2013-05-21T17:24:15Z
CC-MAIN-2013-20
[ [ -0.040521979331970215, 0.026442307978868484, 0.01416552159935236, -0.008198832161724567, 0.03932005539536476, -0.0892857164144516, -0.010302198119461536, 0.08138736337423325, -0.0033052884973585606, -0.03176511079072952, 0.011675824411213398, 0.030906593427062035, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.665999
177
http://www.codingforums.com/showthread.php?p=1300809
0.744503
NFL suspends Lions RB Leshoure for 2 games Wednesday, June 13, 2012 ALLEN PARK, Mich. (AP) -- Detroit Lions running back Mikel Leshoure has been suspended for two games without pay and will have to give up two more game checks for violating the NFL's substance-abuse policy. The league announced the decision Wednesday. Leshoure pleaded guilty to marijuana possession in May after police discovered him with pot in his mouth during a traffic stop in southwestern Michigan. That happened on March 12, less than a month after police in a different Berrien County community say they caught Leshoure with marijuana. Detroit drafted the former Illinois standout in the second round last year and he missed his rookie season because he tore his left Achilles tendon in training camp. He can participate in training camp and preseason games while suspended.
<urn:uuid:014cd61e-13e4-43dd-8e61-9b3f61f04908>
2013-05-21T17:16:27Z
CC-MAIN-2013-20
[ [ -0.0032689145300537348, 0.032730262726545334, -0.006332236807793379, -0.009539473801851273, 0.07500000298023224, -0.048355262726545334, 0.008675986900925636, 0.084868423640728, 0.004194078966975212, -0.04374999925494194, 0.06348684430122375, 0.07500000298023224, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973514
176
http://www.columbian.com/news/2012/jun/13/nfl-suspends-lions-rb-leshoure-for-2-games/
0.159655
No recent wiki edits to this page. Nugent is a human that resided in the Bradbury Americana Hotel in New York City , home to a multitude of strange and fascinating mystical beings. He was instrumental in the creation of a database comprised of countless arcane lore that he intended Amanda Sefton to use in her new role as Magik , guardian of Limbo . The database, safely housed in Nugent's hotel room, would serve Magik in her battle against the plethora of evil forces vying for control of the Splinter Realms. When The Archenemy , the physical embodiment of the evil knowledge Magik and Nugent had compiled, manifested and threatened to destroy the Splinter Realms, Magik joined forces with Nightcrawler , Nugent, and the Lords Of The Splinter Realms to determine what exactly The Archenemy was, and how it had come into existence. Magik learned that The Archenemy was the offspring of her very own magical database and had evolved, traveling into the past to conquer the Splinter Realms, ensuring it's own birth at the same time. Magik instructed Nightcrawler to teleport to Nugent's hotel room, where he proceeded to destroy the database, effectively weakening The Archenemy long enough for Magik to destroy it with the Soulsword. Powers And Abilities - Nugent was apparently a normal middle-aged human man. He possessed vast knowledge of magic, and had an inhuman ability to create machinery designed to study, track, and compile supernatural data and arcane lore. Whether this ability is mutant, or merely an extension of his genius mind, has yet to be determined.
<urn:uuid:f2cc7434-b0c4-497e-a6b1-678e2be2287c>
2013-05-21T17:47:47Z
CC-MAIN-2013-20
[ [ -0.027073020115494728, -0.00700030941516161, 0.005182549357414246, 0.01090655941516161, 0.0804455429315567, -0.046720296144485474, -0.0134591581299901, 0.09962870925664902, -0.00672957906499505, -0.04764851555228233, 0.06775990128517151, -0.001498684985563159, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946361
342
http://www.comicvine.com/nugent/4005-2633/
0.733469
commandlinefu.com is the place to record those command-line gems that you return to again and again. You can sign-in using OpenID credentials, or register a traditional username and password. Subscribe to the feed for: Instead of looking for the right ip address, just pick whatever address you like and set a static ip mapping. There are 3 alternatives - vote for the best! Connect to a machine running ssh using mac address by using the "arp" command If you can do better, submit your command here. You must be signed in to comment.
<urn:uuid:ebc9412a-edcc-4446-82bf-ffb8129b80c6>
2013-05-21T17:32:22Z
CC-MAIN-2013-20
[ [ -0.04109251871705055, 0.02030019648373127, 0.01833169348537922, 0.012610727921128273, 0.048966534435749054, -0.04183070734143257, 0.003506397595629096, 0.06692913174629211, -0.04429133981466293, -0.05265748128294945, 0.062253937125205994, 0.050196848809719086, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.90344
121
http://www.commandlinefu.com/commands/view/3447/connect-via-ssh-using-mac-address
0.286066
Netgear launches simple-to-use network storage device The firm's new Stora allows users to accumulate media on a central unit and use them on any network device and features a "smooth user interface" to make it simple to use, according to the manufacturer. Netgear adds that it removes the need to undergo the "time consuming process" of uploading pictures to internet sites or sharing them via email. Drew Meyer, director of marketing for Netgear's Network Storage Business Unit, said he feels the Stora "exemplifies the next generation" of network storage devices. He added: "Netgear has already made its mark in the business and prosumer market with our ReadyNAS line, but Stora is most definitely a platform for everyone. "Stora gives users the features they need today with a consumer-friendly user interface and price point, making their media available to them and their designated friends and families anytime, anywhere--even on mobile smartphones." Netgear recently launched a new Ethernet adaptor, the Moca Coaxial Ethernet Adapter Kit, aimed at people who cannot access a Wi-Fi connection. Netgear launches simple-to-use network storage device - Article Discussion Terms & Conditions - This tool is open to everyone. You are responsible for the contents of your comments and any consequences that may arise as a result of them. Comments that contain any of the following will be deleted: terms considered explicit and inappropriate; defamatory, obscene, unlawful, harmful, or offensive.
<urn:uuid:4cabfd9a-266e-4618-951f-073696107c30>
2013-05-21T17:09:00Z
CC-MAIN-2013-20
[ [ -0.016312316060066223, 0.025109970942139626, 0.020344574004411697, -0.013929618522524834, 0.0582844577729702, -0.05608504265546799, -0.00962243415415287, 0.07661290466785431, -0.004994501359760761, -0.035007331520318985, 0.05791788920760155, 0.035007331520318985, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.920708
311
http://www.comms-express.com/news/tools/netgear-launches-simple-to-use-network-storage-device-19370634/
0.15703
A tale of obsession and deceit, Tchaikovsky's penultimate opera is recognised as one of his greatest works. Hermann, a young officer, falls in love with Lisa, a girl he's never spoken to, and who is engaged to the Prince Yeletsky. Hermann uses Lisa to gain access to her grandmother, a Countess, who won a fortune in the casino with the secret of "the three cards". Hermann is determined to discover that secret, but the Countess dies before revealing it. In his obsession to find the winning combination, Hermann loses Lisa, his mind and ultimately his own life. Carl Tanner, who recently received a standing ovation at the Met in Fanciulla, plays the demented Hermann. Sung in Russian with surtitles Tickets available from 14th February.
<urn:uuid:a79e4f40-e453-4dd2-8afb-2bec81bf7f49>
2013-05-21T17:17:58Z
CC-MAIN-2013-20
[ [ 0.0008399449288845062, 0.011496113613247871, -0.020320596173405647, 0.02493523247539997, 0.0887305736541748, -0.024773316457867622, -0.016515543684363365, 0.11204662919044495, -0.0134391188621521, -0.06088082864880562, 0.028983160853385925, -0.0006780278636142612, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973472
172
http://www.concert-diary.com/concert/296419348/Tchaikovsky-s-Queen-of-Spades
0.838636
As liberals lecture about deep-seated American racism, liberal radio host was slamming Justice Clarence Thomas on Wednesday. After playing a soundbite of Anthony Kennedy, she said, "I mean, he's thinking out loud and this what they do right -- except for Clarence Thomas who doesn't think. At all." Thomas, she joked, was just like a dog: "Whatever Scalia does that's what he does. Well, Scalia's got a cashmere scarf....I want a cashmere scarf! Oh, Scalia's going over here, I wanna go, I wanna go, I wanna go! Take me, take me! He's like Alan, he's like the dog. Take me! Oh, you're going out for a walk? I wanna go, I wanna go! Scalia's walking, I want to walk, I want to walk!" Then she compared him to the late Michael Jackson: "Never asked a question -- this is like his trademark now! Do you know what I mean, like Michael Jackson with the one glove, right? It's a trademark, it's a kitschy thing, it's cute, it's adorable. This is a sign of a very incurious mind on our Supreme Court -- a job that only goes to nine people in the entire world, and they pick this one!"
<urn:uuid:d40782dc-31cc-40b0-afe8-67044257796e>
2013-05-21T17:37:35Z
CC-MAIN-2013-20
[ [ -0.016132304444909096, 0.020596591755747795, 0.010805600322782993, 0.006239853799343109, 0.09618506580591202, -0.0625, 0.001357041415758431, 0.06047077849507332, -0.021915584802627563, -0.06615259498357773, 0.048701297491788864, 0.021915584802627563, 0.152597397...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972227
268
http://www.conservativeunderground.com/forum505/showthread.php?48332-Randi-Rhodes-Compares-Clarence-Thomas-to-Scalia-s-Family-Dog&p=494908&viewfull=1
0.973579
For the lamb: Preheat the oven to 275 degrees F. To a small bowl, add the lemon zest, chopped rosemary, kosher salt, to taste, sugar, and stir to combine. Season the racks on both sides with the mixture and set aside. Allow to sit in the refrigerator, covered, for at least 8 to 24 hours before grilling, if possible. This will act as a quick cure, adding more flavor to the lamb when it's cooked. Place an oven-safe saute pan over medium heat and add the blended oil. Add 1 of the seasoned racks to the pan, fat cap-side down and sear until golden brown, about 3 to 5 minutes. Once the fat cap is golden brown, flip and place the whole pan into the oven until an instant-read thermometer inserted into the thickest part of the lamb, not touching the bone reaches 120 to 125 degrees F for medium-rare, about 20 to 25 minutes. Cook's Note: It's best to cook it low and slow at this point to help prevent that "bullet" from forming, where the middle is rare and the outside is well done. When the lamb is done, remove it from the oven and set aside to rest for 5 minutes prior to cutting. For the skordalia: Slice the day old bread into large dice. Cook's Note: if you don't have day old bread, place the cubed bread into a 350 degree F oven to dry out, about 10 minutes. Add the bread to a large bowl and cover with the milk, pressing the bread down to immerse it in milk. Set aside to soak. Place a saute pan over medium-high heat and heat the blended oil. Add the sliced almonds to toast, about 2 minutes. Once slightly toasted, remove about 1/4 cup and set aside for the salad. In the same saute pan add the shallots, sliced garlic, and season with salt. Toss to combine and allow the shallots and garlic to sweat. Once the shallots and garlic are fragrant, remove them from the heat. Add the soaking bread to a blender, allowing any excess milk to drip out. Cover with the extra-virgin olive oil and add the toasted shallots, garlic, almonds, lemon juice, and salt, to taste. Blend the mixture until pureed and smooth like a paste. Taste and re-season, if needed. For the salad: To a bowl, toss the orange supremes and the juice (collected when preparing the orange supremes), toasted almonds, salt, black pepper, and watercress. Drizzle with extra-virgin olive oil and toss to combine. For each serving: Slice the lamb into individual chops. Place a couple of spoonfuls of the skordalia onto a plate. Top with 3 of the chops and season each with sea salt to add a little crunch. Garnish with the salad. Season with freshly ground black pepper and drizzle the plate with extra-virgin olive oil and the orange zest.
<urn:uuid:31549c31-b2af-46b7-88a8-57872c5153c8>
2013-05-21T17:25:10Z
CC-MAIN-2013-20
[ [ -0.01239013671875, 0.01611328125, -0.013671875, 0.0458984375, 0.08349609375, -0.0150146484375, -0.006591796875, 0.0732421875, 0.0159912109375, 0.022216796875, 0.10498046875, 0.055908203125, 0.0341796875, 0.0020904541015625, 0.02734375, 0.006164550781...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.896098
640
http://www.cookingchanneltv.com/recipes/michael-symon/rack-of-lamb-with-oranges-almonds-watercress-skordalia.html
0.19453
At a panel discussion held at the MIT Enterprise Forum of New York City, Stanley Litow, IBM's Vice President, Corporate Affairs and Corporate Responsibility, talked about the Corporate Service Corps program. The presentation made quite an impression on the panel's audience, particularly because it was accompanied by a personal account of a former Corps IBM-er. You can find details and related resources on the program here. The idea of the program is to send teams of IBM's top leaders to developing countries to work with local organizations on specific projects aiming to spur economic development through information technology. The concept brings to mind the US federal Peace Corps program. IBM funds the program and reaps multiple benefits in terms of growing economic talent and building business development opportunities. Employees benefit by aquiring new skills and expanding their network. The partners in the host countries enjoy free real-time skill transfer and stronger communities. In implementing this program and identifying relevant field projects, IBM has teamed up with several specialized non-profits. I think IBM's Corporate Service Corps is a state-of-the-art CSR program. It is embedded in the company' core operations, is multi-dimensional in its impact, simultaneously benefits several groups of stakeholders (employees, communities, governments) and leverages existing resources provided by non-profits. What do you think? Do you think this program has the potential to be taken on by other companies in the IT and other industries?
<urn:uuid:1d79a657-0564-4015-a780-29c6b2394a6a>
2013-05-21T17:38:17Z
CC-MAIN-2013-20
[ [ -0.03677591308951378, 0.0234375, 0.02010289579629898, -0.0005359184578992426, 0.08689024299383163, -0.042301829904317856, 0.013338414952158928, 0.07583841681480408, -0.03296493738889694, -0.05716463550925255, 0.06974085420370102, 0.005311547312885523, -0.0405868...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957102
288
http://www.corporateandresponsible.com/2009/01/corporate-service-corps-advanced-csr.html
0.170909
Jordan Table of Contents Figure 5. Population of the East Bank by Age and Sex, 1987 Source: Based on information from Jordan, Department of Statistics, Statistical Yearbook, 1987, Amman, 1988, 18. Figure 6. United Nations Relief and Works Agency Camps in Jordan, 1989 Source: Based on information from United Nations Relief and Works Agency for Palestine Refugees in the Near East, Jordan. Official Jordanian statistics gave a 1987 population figure of 2,896,800 for the East Bank. A 1982 population of 2,399,300 thus indicated an annual growth rate of between 3.6 and 4 percent. United Nations statistics projected a peak in the annual growth rate at 4.11 percent in the period from 1990 to 1995, followed by a steady decline to 2.88 percent in 2020. Rapid development in the provision of health care services during the 1970s and 1980s led to a decline in the crude death rate from 17 per 1,000 population in 1965 to 7 per 1,000 population by 1986 (see Health and Welfare , this ch.). During the same period, the infant mortality rate, a major indicator of a country's development and health status, dropped from 115 to 46 per 1,000 live births. In 1986 life expectancy at birth was sixty-five years (sixty-three for males and sixty-seven for females). The lowered death rate, a high birth rate, and lowered infant mortality rate combined to generate a major demographic problem in the late 1980s. At the end of the decade, more than half Jordan's population was below fifteen years of age (see fig. 5). This situation strained the country's already limited resources, and employment for the burgeoning group of young people became increasingly difficult to provide. Accurate demographic figures were difficult to compile because of the substantial number of Jordanians residing and working abroad and the continuous flow of West bank Palestinians with Jordanian passports back and forth between the East and West banks. According to the United Nations Relief and Works Agency (UNRWA) for Palestine Refugees in the Near East, about 224,000 people were admitted to UNRWA refugee camps in the East Bank immediately after the June 1967 War. In 1986 UNRWA cited 826,128 registered refugees living on the East Bank, of whom about 205,000 were living in refugee camps. The exact number of Palestinians living on the East Bank was unknown. Estimates usually ranged from 60 to 70 percent of the total population. Official government statistics did not distinguish between East Bank and West Bank Jordanians (see Palestinians , this ch.). The government did not have an officially articulated population policy or birth control program. Rather, in 1979 it adopted a "child spacing program" that was designed to improve the health of mother and child, and not specifically to lower the fertility rate. This noninterventionist approach considered family planning to be one component of an integrated maternal-child health and primary health care program. Government clinics and private medical services delivered family planning services upon request and contraceptives were widely available at low cost. In 1987 there were 116 maternal-child health care centers--up from 93 in 1983-- providing prenatal and postnatal care and a wide range of birth control information. Jordan's high population growth can be attributed primarily to high fertility rates. In 1986 the World Bank (see Glossary) calculated this rate as 6.0 births for each woman over the span of her reproductive years, one of the highest fertility rates in the region. This rate was projected to decline to 4.2 births by the year 2000. The fertility rate varied, however, between women residing in rural and urban areas and according to educational attainment. Educated women tended to marry at a slightly older age than uneducated women, and this delay contributed to a lower fertility rate. Urban women achieved lower fertility rates through modern methods of contraception, particularly the pill. Fertility rates were lowest in Amman, higher in smaller urban areas such as Irbid and Az Zarqa, and highest in rural areas. In rural areas modern contraceptive usage was lower, although breast-feeding, which serves to delay the return of fertility, was extended for a longer period than in the cities. World Bank data indicated that 27 percent of married women of child-bearing age were using contraception in the 1980s. A woman was expected to have to bear five children, including at least two sons, in fairly rapid succession. Women gained status and security in their marital household by bearing children. According to a study conducted in the early 1980s by Jordanian anthropologists Seteney Shami and Lucine Taminian in a poor, squatter area in Amman, reproductive behavior was subject to several factors. If a woman had given birth to two or more sons, she might begin to space her pregnancies or stop bearing children for a while. Household structure--nuclear, extended, or multiple family--also appeared to be a crucial factor in determining fertility. The presence of other women in a household encouraged women to bear more children to improve their relative position in the household. The overall population density for the East Bank in 1987 was established at about thirty persons per square kilometer. There was wide regional variation and the rate of urbanization was high. East of Al Mafraq, in an area encompassing almost two-thirds of the country, no towns had a population of more than 10,000. The bulk of Jordan's population was centered in the governorate of Amman and the smaller urban areas of Irbid, As Salt, and Az Zarqa. The 1987 population totals of the eight governorates ranged from 1,203,000 in Amman to 101,000 in the Maan Governorate. According to World Bank figures, about 70 percent of the population lived in urban areas. The nation's capital, Amman, accounted for more than one- third of the total population. Rapid urbanization appeared to be the result of a high fertility rate and rural-urban migration. If urbanization continued at the high annual rate of 4 to 5 percent, it was estimated that by the year 2000, nearly three-fourths of the population could be living in Amman, Az Zarqa, Irbid, As Salt, and Ar Ramtha. The remainder of the population resided in villages scattered in an uneven pattern throughout Jordan. The nomadic and seminomadic population was very small, at most 2 to 3 percent of the population. The clearest concentrations of villages were in the fertile northwest corner and the Jordan Valley. Village size varied markedly from region to region. At one time, size related to the productive capacity of the surrounding farmland. Larger villages were located in the more fertile, generally irrigated regions where family members could reach their fields with relative ease. While village populations continued to grow, rural-urban migration drained off a steady stream of young men and sometimes whole families. Villages provided little employment for their residents, and agriculture as a way of life had declined precipitously since the 1950s. Camps of nomadic and seminomadic beduins still existed in the late 1980s. Nomadic tribes were found mainly in the desert area east of a line from Al Mafraq to Maan. The area, about 400 kilometers long and 250 kilometers wide, is known as the badiya (pl., bawaadi, meaning desert or semidesert). Seminomadic beduins were located in the Al Ghawr and near Irbid. These seminomads descended to the Jordan Valley in the winter because of its warm climate and grazing ground for their herds. Traditionally, many of these seminomads also farmed plots of land in the valley. In the summer, they moved their herds up into the hills to avoid the intense heat. The native inhabitants of the Jordan Valley are known as Al Ghawarna, or people of Al Ghawr. Prior to the June 1967 War, the valley was home to about 60,000 people engaged in agriculture and pastoralism. In 1971 the population had declined to 5,000 as a result of the June 1967 War and the 1970-71 conflict between the Palestinian guerrillas and the Jordanian armed forces (see The Guerrilla Crisis , ch. 1). By 1979, however, the population had reached 85,000 as a result of government development efforts designed to attract people to settle in this area. Refugee camps emerged in the wake of the Arab-Israeli War of 1948. The original refugee settlements were tent camps, but in most places tents were replaced by rows of galvanized steel, aluminum, and asbestos shelters. There were initially five refugee camps-- Irbid, Az Zarqa, Amman New (Al Wahdat), Al Karamah (later dismantled), and Jabal al Hussein-- but six additional emergency camps were established for refugees from the June 1967 War--Al Hisn, Suf, Jarash, Baqah, Talbiyah, and Marka. Most of the camps were located near major cities in the northwest (see fig. 6). Data as of December 1989 Jordan Table of Contents
<urn:uuid:07e654a2-7222-4d15-a7ec-7de2f36103e4>
2013-05-21T17:44:31Z
CC-MAIN-2013-20
[ [ 0.01556396484375, 0.0255126953125, -0.0224609375, 0.014892578125, 0.1162109375, -0.09375, -0.02783203125, 0.11328125, -0.0052490234375, -0.06103515625, 0.12158203125, 0.0166015625, -0.046630859375, 0.049560546875, 0.0255126953125, -0.0026092529296875...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964925
1,844
http://www.country-data.com/cgi-bin/query/r-7380.html
0.24159
Judicial Workload Assessment The California Judicial Workload Assessment Fact Sheet Review of Statewide Judicial Needs (August 2001) Summary of the judicial workload standards developed from the California Judicial Needs Assessment Project used to conduct a statewide assessment of statewide judicial needs. Statewide Assessment of Judicial Needs (October 2001) Results of the statewide assessment of judicial needs, including a list of recommended new judgeships and plans for obtaining additional judgeships needed statewide, based on judicial workload standards. Update of Judicial Needs Study (August 2004) Proposal updating the October 2001 three-year plan seeking 150 new judgeships. - October 2008: The Judicial Council approved the need for the Legislature to create the remaining 50 judgeships identified in the 2007 update to the workload study; approved a new list of 100 additional judges that are needed to meet the demands of continued workload growth in the trial courts, and; approved a mandated study to the Legislature reporting on the factually determined need for new judgeships in each superior court. - December 2007: approved the allocation methodology for converting eleven Subordinate Judicial Officer positions in FY 2007-2008 and 146 SJO positions eligible for conversion in subsequent years. - October 2007 : approved seven vacant Subordinate Judicial Officer positions for conversion to judgeships based on the recommendations contained in this report. - February 2007 : adopted the criteria for approving trial court requests for changes in the number of authorized Subordinate Judicial Officer positions (SJO). - February 2007 : approved the updated results of the statewide assessment of judicial needs. The 50 judgeships created by the Legislature in AB 159 were allocated to the trial courts on the basis of the recommendations contained in this report. - August 2004 : approved the updated results of the statewide assessment of judicial needs based on more-recent filings data and a minor modification in the assessment methodology. The 50 judgeships created by the Legislature in SB 56 were allocated to the trial courts on the basis of the recommendations contained in this report. SB 56 also adopted the Judicial Workload Assessment methodology approved by the Judicial Council in this report. - October 2001 : approved the results of the statewide assessment of judicial needs including the ranked list of 150 recommended new judgeships. - August 2001 : adopted a set of judicial workload standards that can be used to assess the statewide need for additional judges. California's Statewide Judicial Need (PDF) Assessing Judicial Workload in the Trial Courts from 2004 to 2007. This report was prepared as part of a presentation to the Judicial Council of California by the Administrative Office of the Courts (AOC) Office of Court Research on February 23, 2007. Resource Allocation Study (RAS) The Resource Allocation Study (RAS) established a methodology for measuring court workload. In the last three fiscal years, the RAS methodology has been used to augment the baseline budgets of courts with the most severe resource needs. Fact Sheet: Resource Allocation Study Contact: Dag MacLeod, Office of Court Research, firstname.lastname@example.org Ron Pi, Office of Court Research, email@example.com
<urn:uuid:5858dd25-f8fa-439c-bf6a-184ef520b5e6>
2013-05-21T17:45:27Z
CC-MAIN-2013-20
[ [ -0.00738525390625, 0.0311279296875, -0.0166015625, 0.020751953125, 0.1083984375, 0.043701171875, -0.022216796875, 0.09033203125, -0.0301513671875, 0.044921875, 0.02587890625, 0.038818359375, -0.10888671875, 0.0284423828125, 0.050537109375, -0.0087890...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92183
632
http://www.courts.ca.gov/jc/12922.htm
0.185014
HBO doc on Bill Clinton to be made by Scorsese Filmmaker Martin Scorsese speaks after accepting the Real D Innovation in 3D award during the CinemaCon convention on Wednesday, April 25, 2012, in Las Vegas. (AP Photo/Julie Jacobson) Published Monday, December 17, 2012 4:49PM EST Last Updated Monday, December 17, 2012 4:50PM EST NEW YORK -- Filmmaker Martin Scorsese is making a documentary on Bill Clinton for HBO. HBO announced Monday that Scorsese is producing and directing the film, with Clinton's co-operation. The network did not announce an anticipated air date for the show on the nation's 42nd president, who was in office from 1993 to 2001. Earlier this year HBO aired a documentary on Clinton's immediate predecessor, George H.W. Bush. Scorsese has earlier made the documentaries "Public Speaking" and "George Harrison: Living in the Material World" for HBO.
<urn:uuid:0253c60f-c38a-4cd4-9003-f7aa2c5e1100>
2013-05-21T17:16:26Z
CC-MAIN-2013-20
[ [ 0.01809593103826046, 0.04098837077617645, -0.0023164970334619284, 0.00904796551913023, 0.07267441600561142, -0.04389534890651703, -0.01875000074505806, 0.07063953578472137, -0.03502906858921051, -0.0404069758951664, 0.0625, 0.015697674825787544, 0.05348837375640...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944424
206
http://www.cp24.com/hbo-doc-on-bill-clinton-to-be-made-by-scorsese-1.1082767
0.158945
The Creation Wiki is now operating on a new and improved server. From CreationWiki, the encyclopedia of creation science Ithamar (Hebrew: איתמר, Īthāmār; "coast of palm trees") (b. 2482 AM1521 BC 2482 AM–fl. 1 Zif 2514 AM4 May 1489 BC 2 Sivan 2271 He 1 Zif 2514 AM) was the fourth son of Aaron and progenitor of a line of descent that briefly included some of the high priests of Israel. Ithamar's career began during the first year after the Exodus of Israel. He was treasurer of the massive voluntary offering of the people for the building of the Tabernacle. On 1 Zif 2514 AM4 May 1489 BC 2 Sivan 2271 He 1 Zif 2514 AM he was consecrated as a priest, together with his three brothers Nadab, Abihu, and Eleazar. On the day of the strange-fire incident (10 Zif 2514 AM13 May 1489 BC 11 Sivan 2271 He 10 Zif 2514 AM), all four brothers were performing a daily office in the Holy Place. Nadab and Abihu took censers charged with "strange fire" into the Holy of Holies, and were killed instantly. Moses ordered two other cousins to take the charred bodies away, and also ordered Aaron and his two remaining sons to continue with their duties and not show any outward sign of mourning. On that same occasion, Moses noticed that the meat for the sin offering had been burned entirely on the bronze altar. The priests were supposed to eat from the sin offering in a clean place, but they had not done so. Moses interrogated Eleazar and Ithamar about this neglect of duty, and Aaron defended his sons. Apparently Aaron suggested that to eat any sort of meat when their brothers had recently died, and under such circumstances, might itself not seem pleasing to God. Moses reserved judgment. The Bible gives no indication that Eleazar or Ithamar made a similar mistake again. Thereafter Eleazar and Ithamar were the two senior priests after Aaron. Ithamar, in addition, supervised the Gershonites and the Merarites who were responsible for dismantling and transporting the Tabernacle coverings, hangings, boards, bars, sockets, pillars, and other structural elements. His line of descent (1_Chronicles 24:1-19 ) is most notable for the appearance of Judge Eli, his sons Hophni and Phinehas, his grandson Ichabod, and an apparently disloyal high priest named Abiathar whom Solomon removed from office during his reign and replaced with Zadok, an Eleazarite. That Eli and his son and grandson descend from Ithamar follows logically from the absence of their names in the line of descent from Eleazar given in 1_Chronicles 6:1-15 . - ↑ 1.0 1.1 1.2 Konig, George, "Ithamar," AboutBibleProphecy.com, 2001. Accessed December 10, 2008. - ↑ 2.0 2.1 "Ithamar," Easton's Bible Dictionary, July 13, 2005. Accessed December 10, 2008. - ↑ 3.0 3.1 Blank, Wayne, "The Lines of Eleazar and Ithamar," Daily Bible Study, n.d. Accessed December 10, 2008. - ↑ 4.0 4.1 4.2 4.3 Hirsch EG and Seligsohn M, "Ithamar," The Jewish Encyclopedia, n.d. Accessed December 10, 2008. - ↑ 5.0 5.1 5.2 Maxey A, "Eleazar and Ithamar," Reflections, no. 270, October 18, 2006. Accessed December 10, 2008.
<urn:uuid:82f54320-db09-4826-8ba0-27bd9db9683a>
2013-05-21T17:38:51Z
CC-MAIN-2013-20
[ [ -0.00063323974609375, -0.0027618408203125, -0.0361328125, -0.015625, 0.11376953125, -0.0203857421875, -0.0179443359375, 0.099609375, -0.0087890625, -0.04345703125, 0.07080078125, 0.019287109375, -0.000637054443359375, 0.00390625, 0.0419921875, -0.004...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958432
813
http://www.creationwiki.org/Ithamar
0.164864
Drew Major, a founder and distinguished engineer at Novell, officially retired from the company at the end of March, a company spokesman confirmed. Major, considered to be the father of NetWare, retired his Novell shirt to focus his full attention on several startups launched in Utah, including Move Networks, the spokesman said. That South Jordan, Utah-based content distribution company focuses on distributing large objects and files over the Internet. Major is also working with the CTO of 3Com on a next-generation video server, the spokesman said. Major began his career with Novell 20 years ago and is widely credited with creating the LAN and fathering Novell's flagship network operating system (NOS), NetWare, with other members of the original Novell "Superset" development team, which included Dale Niebaur and Kyle Powell. The engineer served as a full-time contractor to Novell for many years and then as an employee from 1993 to 2003, during which he held the title of chief scientist and vice president of advanced development. Most recently, Major served as CTO of Novell spin-off Volera, which was folded back into the company at the end of 2002. Drew Major was inducted into CRN's Industry Hall of Fame in 1999 (see linked story).
<urn:uuid:cb052ae2-9702-482e-99b9-b5eafd778edb>
2013-05-21T17:25:36Z
CC-MAIN-2013-20
[ [ -0.028609154745936394, 0.04599471762776375, 0.014304577372968197, -0.016065141186118126, 0.06470070779323578, -0.0025170554872602224, 0.007757482584565878, 0.0561179593205452, -0.02794894389808178, -0.06558098644018173, 0.01336927805095911, 0.05237676203250885, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.984609
276
http://www.crn.com/news/channel-programs/18830010/netware-father-drew-major-retires-after-20-year-career-with-novell.htm
0.564002
In April 2003, Crossing Vineyards and Winery utilized the latest laser technology to plant ten acres of Vinifera winegrapes. A laser siting device was used in conjunction with a grape vine planter to design perfectly straight vineyard rows. This ensures uniform spacing, which allows for optimal vine development. The planting time is also reduced from several weeks to a few days, thus reducing stress on the young vines and giving them a greater probability of survival.
<urn:uuid:a38f39aa-d8a9-48c9-abf8-7070c6a9b77e>
2013-05-21T17:31:35Z
CC-MAIN-2013-20
[ [ -0.00505303917452693, 0.008851777762174606, 0.004873853176832199, 0.013833141885697842, 0.09919724613428116, -0.04443807154893875, 0.019495412707328796, 0.13130733370780945, -0.012471330352127552, -0.051318805664777756, 0.04128440469503403, 0.019782109186053276, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.913035
102
http://www.crossingvineyards.com/vineyard/laser-planting.html
0.461563
You must already have registered for an account before you can log in. If you do not have an account, you may click here to register If you have not activated your account, you may click here to activate your account If you would like to delete cookie, you may click here to delete your cookie I've forgotten my password! Click here!
<urn:uuid:c5813f7b-b283-411e-9db1-733c75ae1685>
2013-05-21T17:09:55Z
CC-MAIN-2013-20
[ [ -0.03800675645470619, -0.001398859778419137, 0.013619087636470795, 0.011349240317940712, 0.10599662363529205, -0.05342060700058937, -0.00519953528419137, 0.019953547045588493, -0.05616553872823715, 0.010874154977500439, 0.10472972691059113, 0.029138512909412384, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963695
73
http://www.crosswire.org/forums/mvnforum/addpost?parent=1747&quote=yes
0.265746
- Enter a word for the dictionary definition. From The Collaborative International Dictionary of English v.0.48: Nectarine \Nec`tar*ine"\ (n[e^]k`t[~e]r*[=e]n"), n. [Cf. F. nectarine. See Nectar.] (Bot.) A smooth-skinned variety of peach. [1913 Webster] Spanish nectarine, the plumlike fruit of the West Indian tree Chrysobalanus Icaco; -- also called cocoa plum. It is made into a sweet conserve which is largely exported from Cuba. [1913 Webster]
<urn:uuid:8026eb8e-2045-4425-bfb5-1eb355f7472a>
2013-05-21T17:24:15Z
CC-MAIN-2013-20
[ [ -0.027960525825619698, 0.019325658679008484, -0.010125410743057728, 0.012284127995371819, 0.05037006735801697, -0.00439453125, -0.006938733626157045, 0.04872532933950424, -0.026007400825619698, -0.03659539297223091, 0.09950657933950424, 0.04728618264198303, 0.01...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.782571
137
http://www.crosswordpuzzlehelp.net/old/dictionary.php?q=Spanish%20nectarine
0.262991
Parkrun celebrates eighth birthday in style in Bushy Park Daniel Cheeseman romped home to win the Bushy Park parkrun as it marked its eighth anniversary on Saturday. The 19-year-old St Mary's University student clocked 15 minutes, 57 seconds to secure back-to-back parkrun wins. Stragglers Running Club's Justin West came in second 34 seconds behind the winner, while Darren Tanner finished a further 11 seconds back. The first female finisher was Lisa Harris who stopped the clock at 19:29 on her Bushy Park parkrun debut having made 17 parkrun appearances at other courses. The first Bushy Park parkrun 5km race, founded by Ranelagh Harriers athlete Paul Sinton-Hewitt, featured 13 athletes and took place on October 2, 2004. The concept has since grown to include 176 such races in eight countries across the globe with more than 23,000 athletes taking part each work. Saturday marked the Bushy Park event's eighth birthday and was officially International parkrun Day.
<urn:uuid:f0bb4daa-4cae-44fd-aa56-4b30df20d587>
2013-05-21T17:39:20Z
CC-MAIN-2013-20
[ [ -0.010326086543500423, 0.03451086953282356, 0.005400815047323704, 0.007982336916029453, 0.03614130616188049, -0.06304347515106201, -0.037771739065647125, 0.055978260934352875, -0.010529891587793827, -0.07391304522752762, 0.04945652186870575, 0.015760868787765503, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957885
218
http://www.croydonguardian.co.uk/sport/9971526.Parkrun_celebrates_eighth_birthday_in_style_in_Bushy_Park/
0.195514
Hi kands1960, welcome to Cruise-Chat. Congratulations on your upcoming cruise, sounds fantastic. This might help, you can download maps. This might help to show you the sites available. Did you google Tenerife? I had over 34 millions hits through google. Wish I could give you a first hand account, but haven't had the privilege of being there. I'm sure one of our members has, and hopefully they'll see your post. Best wishes for a fantastic cruise, and once again, welcome aboard.
<urn:uuid:7eca9220-027f-46cf-9b63-ba5c89d88274>
2013-05-21T17:11:17Z
CC-MAIN-2013-20
[ [ -0.005495232995599508, 0.049523305147886276, 0.008606991730630398, 0.045286018401384354, 0.04157838970422745, -0.035222455859184265, -0.023967161774635315, 0.09163135290145874, -0.04051906615495682, -0.017081568017601967, 0.021451272070407867, 0.014300847426056862, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95179
108
http://www.cruisereviews.com/forum/1427-post2.html
0.216424
Modern programming languages have little support for writing secure software, making it all too easy to write programs with exploitable vulnerabilities. In these lectures, we explore a general technique based on type qualifiers that allows programmers to write down, in their souce code, their intentions with respect to security. We will describe how to mechanically verify that annotated code adheres to the policy. We will discuss the theoretical foundations and practical implementation issues. As a particular example, we show how to use type qualifiers to find format-string vulnerabilities in widely-deployed C programs and to find other security vulnerabilites in the Linux kernel. we will also look at alias analysis, another important program analysis problem, and show how a must-alias analysis system corresponds to a system for statically checking access control. This series of lectures will discuss the requirements, protocols, and components of network security software on the Internet. Topics will include secure tunnels, security for web services, privacy constraints, design features that create or address DoS threats, and the use of programmable security tokens in network protocols. The primary emphasis will be the relationship between models and design, including topics like the quantification of DoS threats, models for code security in programmable tokens, strategies for composition and interoperation, and practical strategies for formal analysis of network protocol designs and software. In these lectures, we will analyze the security infrastructure in current, main-stream programming systems and platforms such as the Java Virtual Machine and Common Language Runtime. We will explain how byte code verification collaborates with the class loader and security manager to provide a secure run-time environment. We will also use theoretical tools to determine what properties current security systems based on stack inspection have and provide concrete proposals for improving the infrastructure for next-generation programming languages and systems.
<urn:uuid:c22fb70a-8efe-41d8-8a5e-de429096e99f>
2013-05-21T17:11:10Z
CC-MAIN-2013-20
[ [ -0.047776442021131516, -0.007361778989434242, 0.04657451808452606, 0.017127403989434242, 0.08894230425357819, -0.07271634787321091, 0.020733173936605453, 0.11358173191547394, -0.02944711595773697, 0.005859375, 0.053485576063394547, 0.02524038404226303, -0.035456...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.850077
396
http://www.cs.uoregon.edu/research/summerschool/summer04/practical.html
0.805372
drop top-level hypotheses Major Section: PROOF-CHECKER-COMMANDS Examples: (drop 2 3) -- drop the second and third hypotheses drop -- drop all top-level hypotheses General Forms: (drop n1 n2 ...) -- Drop the hypotheses with the indicated indices. drop -- Drop all the top-level hypotheses.Remark: If there are no top-level hypotheses, then the instruction dropwill fail. If any of the indices is out of range, i.e. is not an integer between one and the number of top-level hypotheses (drop n1 n2 ...)will fail.
<urn:uuid:ab9e384e-0ef3-4216-9e3f-d131809e89b3>
2013-05-21T17:17:47Z
CC-MAIN-2013-20
[ [ -0.012237762100994587, -0.008741258643567562, -0.007156905718147755, 0.0001792640978237614, 0.033435314893722534, -0.06687062978744507, -0.010544143617153168, 0.0839160829782486, -0.008249563165009022, 0.03321678191423416, 0.07255245000123978, 0.02163461595773697, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.784378
132
http://www.cs.utexas.edu/users/moore/acl2/current/ACL2-PC_colon__colon_DROP.html
0.51624
Two recent NAC and NACC Ministerials in Berlin and Brussels made very important decisions on how to carry out the ongoing adaptation of the North Atlantic Alliance and the development of the NACC/PFP processes. It is very symbolic that one of these Foreign Ministers meetings took place in the capital of the reunited Germany. The unification of Germany, along with the dissolution of the former Soviet Union and the emergence of a number of newly independent states, including Ukraine, are among the most remarkable events of 20th century history. These transformations started radical geopolitical change throughout the world, creating the conditions for a unified Europe. The Warsaw NATO Workshop is just as symbolic. The disappearance of such geopolitical realities as the Warsaw Pact and the USSR has removed the old totalitarian pressure from over half the European continent, giving many nations the chance to integrate with Western society. But it has also created a "security vacuum" in this part of Europe, where ethnic tensions, border disputes, and difficult economic and social situations have actually lowered the general level of stability from that of the Cold War period. While it will take some time to complete the ambitious transformation process now taking place in Central and Eastern Europe, it is necessary to deal immediately with present instabilities and to prevent additional instabilities from developing. This requires the creation of a new reliable and flexible cooperative security system-which will secure the lasting peace and stability that the transformation process needs in order to succeed. The idea of a comprehensive all-European security system is not a new one; it has reappeared often in the international politics of the 20th century. However, it is only now, when the principles of openness and cooperation are gaining practical ground, that a European security system seems to have a chance for success. The complexities of developing modern international security, even when compared with the periods of the Yalta Conference and the Cold War, make it impossible, from a practical point of view, to design a fixed security scheme for Europe. The emergence of a dozen newly independent states, striving for democratic development, will easily break any rigid model. The national identities, cultural and historical experiences, and interests of these new post-communist democracies, including Ukraine, must continually be taken into account. And I do not even mention the implications of the disappearance of the bipolar system in world affairs. Europe, as well as the rest of the world, is now multipolar. We must avoid the worst possible development: a new division of the European continent. While multipolar, Europe is also united, indivisible, and our only "common house." We must comprehend this reality that both multipolarity and unity can now be seen in all the complex integration processes ongoing in Europe today-within the EU, WEU, and NATO. We Europeans have already come to accept this wisdom not only on a practical level-of economic and political integration-but on a philosophical level as well-in a common recognition of the need for a broad and comprehensive approach to European security. For this reason, Ukraine believes that international institutions capable of contributing to regional security, such as OSCE, NATO, NACC, PFP, WEU, EU, and the Council of Europe, should become the pillars of the new European security architecture. The task is now to coordinate these organizations' activities and to divide the responsibilities equally and fairly, according to the principle of complementarity. With many years of experience establishing norms of behavior, and with a fundamental value system in place, the OSCE and the Council of Europe are already playing important roles in promoting peace, democracy, and respect for human rights across the continent. OSCE preventive diplomacy mechanisms such as activities undertaken by the High Commissioner for National Minorities and by OSCE field missions and groups, as well as experience implementing civilian aspects of the Peace Agreement in Bosnia and Herzegovina, prove the ability of this organization to become an essential element in a future European security system. However, the lack of enforcement mechanisms in the OSCE framework, which makes its effectiveness completely dependent upon the political will of conflicting parties, proves that OSCE can operate successfully only by working with other security structures, such as NATO or WEU as we see now in Bosnia-Herzegovina. NATO's recent development has proven its effectiveness, vitality, and strategic vision. This new effectiveness brings with it the need for the Alliance, along with other security organizations, to take on a major part of the responsibility for the future of Europe. For at least the first period of post-Cold War development, NATO has successfully coped with the challenges of the changing security environment. NACC and PFP, developed under the principles of openness and inclusiveness, have also started a process of post-Cold War unification of Europe. These organizations have already become permanent determining elements of the Euro-Atlantic security architecture. The last decisions of the Berlin Ministerial on further development of the CJTF concept in its WEU and PFP implications have shown us that the Alliance's adaptation to the new European security environment has moved forward. We especially appreciate the Council's decision to increase Partners' involvement in NATO efforts to promote security through regional cooperation, including facilitating participation in CJTF at an early stage. This is a great step in transforming and widening NATO's collective defense profile toward collective security and cooperative security. The recent success of the IFOR operation-the largest and most ambitious military operation in the Alliance's history-proves the importance of such transformation. The IFOR mission has been the first multilateral arrangement among European security structures to demonstrate the possibility of achieving interoperability on a complementary and supportive basis. The Berlin Ministerial also reconfirmed NATO's decision to open its membership to Central and Eastern European countries, as well as to "further enhance its strong relationship with Ukraine." Ukraine regards NATO enlargement as part of a broad and comprehensive process of building up a new European security architecture, which itself represents part of an overall European integration process that includes EU enlargement as well as regional European cooperation development. Standing firmly against the creation of new dividing lines in Europe, Ukraine is convinced that with enough political will, it is possible to find appropriate, mutually advantageous modalities of European integration, including different levels of integration for new European democracies into such basic structures as EU, WEU, and NATO. The strategic aim of Ukraine, as President Leonid Kuchma stated recently in Paris, is full-fledged integration into European and Euro-Atlantic institutions. This aim, as President Kuchma said, is not political romanticism, but a very pragmatic decision. On the one hand, our desire for integration is based on our deep feeling that Ukraine is a natural historical and cultural part of Europe and on a strong wish for historical justice-Ukraine's return to the European fold and to former ties and unity with the rest of the continent. On the other hand, our wish for integration is also based on very objective reasons and very urgent needs-security concerns as well as the need for economic transformation. Because of our sensitive geopolitical position, stability and security have very special value for Ukraine. They are an indispensable basis for radical economic and social transformation. And with the growing uncertainty in the East, including further political development of Russia and the CIS on the one hand and the development of European integration processes in the West on the other hand, Ukraine must have stability and security to ensure that it does not become a buffer zone between the two communities. This will only happen by activating its relationship with the European structures, including NATO. We expect our position and our interests to be understood. Ukraine is completely convinced that the enlargement of the Alliance would play a positive role in extending the Western zone of security and stability to the East and in enhancing security for all countries of the region. To ensure this stability and to avoid creation of new dividing lines in Europe, NATO's enlargement should be in line with the economic integration processes that are part of the EU framework of enlargement as well as the widening and deepening security cooperation the Alliance has with all interested parties in the region. This course would decrease the possibility for security competition among more and less successful applicants and non-applicant countries. NATO's arithmetical enlargement based on collective defense and without special assurances will inevitably lead to misunderstandings. It is not a problem of the enlargement, it is a problem of the nature of the Alliance itself. The formula is simple: the more countries that join the collective defense, the wider will be the internal sphere of security and stability. If only a few countries are left out of the collective defense system, they will have great discomfort. This is not a unique view on the problem. For example, a package solution to the NATO enlargement issue has been put forward, which includes formal arrangements with the Alliance for a number of countries in the region, applicants and non-applicants alike. To achieve success, which is unity and stability in Europe, any solution should include such an arrangement for Ukraine and Russia. The formal NATO partnership arrangement with Russia should certainly become part of the new European security package solution. As for Ukraine, which is moving toward NATO as an international organization but not joining it during the NATO enlargement transition period, we have proposed a Special Partnership Agreement. While I do not want to get into its specific provisions and it is understood that there is no associate status membership in NATO, in concentrated form this Special Partnership could be described as a sort of associated status for Ukraine within NATO. That does not mean that Ukraine is putting in an application for membership. But such a strong, intensive, bilateral relationship between Ukraine and the Alliance could neutralize possible and, to some extent, negative effects of its limited enlargement on geopolitical stability in the region. This proposal should supplement the development of the NACC/PFP multilateral process, which seems to remain an important stabilization factor in modern Europe. The special Partnership agreement should also include an Agreement on a Nuclear Free Zone in Central and Eastern Europe. We believe that the creation of a nuclear free zone in Central and Eastern Europe can definitively improve confidence and stability in the region. In this regard, I would like to point out that Ukraine will never agree to the possibility or even the hypothetical presumption of discussing the problem of nuclear weapons deployment on the territory of new members. This issue has special significance for the Ukraine since it only recently completed the process of eliminating its nuclear potential, which had been the third greatest in the world. We are convinced that a nuclear-free Central and Eastern Europe could soften the impact of enlargement on the situation in the whole region. The creation of such a nuclear free zone in Central and Eastern Europe would be in line with the general direction of world policy to decrease the overall nuclear threat throughout the world and would correspond with NATO policy on denuclearizing Europe. With the end of the Cold War, the cessation of the great ideological and political confrontation between the East and the West, and the disintegration of the former Soviet Union has come a unique opportunity to overcome the artificial divisions of Europe and to build prosperity, stability, and security throughout the continent. Working together we can build up the new undivided Europe and lay down a solid foundation for long-term peace and stability. We, in Ukraine, believe we can attain this long-hoped-for dream, and feel that we must not miss this historic chance. Perhaps because of our geopolitical situation, we feel it more distinctly than others. Go to top of page Return to Warsaw '96 Return to Home Page
<urn:uuid:0061fc62-53b3-4bd9-9977-9b1d79c12738>
2013-05-21T17:44:02Z
CC-MAIN-2013-20
[ [ 0.0059814453125, 0.0269775390625, 0.0078125, 0.043701171875, 0.10595703125, -0.054443359375, -0.03515625, 0.1484375, -0.0213623046875, -0.0078125, 0.040771484375, -0.00604248046875, -0.06884765625, 0.052001953125, 0.05810546875, 0.025634765625, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951549
2,334
http://www.csdr.org/96Book/Udovenko.htm
0.395645
Kurds quietly angle for independence Oil revenue could give Iraq's Kurds greater economic distance from Baghdad, experts say. As Iraq's government takes shape after months of political deadlock, the country's leading Kurdish politicians have promised to work toward a cohesive and peaceful Iraq.Skip to next paragraph Subscribe Today to the Monitor "If [Prime Minister Jawad] al-Maliki quickly establishes a powerful government that includes all groups, he will be an asset for the Iraqi people," said Jalal Talabani, the Kurdish president of Iraq, after Iraq's Parliament approved his second term and named Shiite politician Mr. Maliki to replace the embattled Ibrahim al-Jaafari. The Kurdish desire for independence, however, still runs deep. And with parts of Iraq increasingly unstable and growing more Islamic, experts say the Kurds, who are relatively secular, are working quietly to consolidate and extend the autonomy they have enjoyed since 1991. The Kurdish Regional Government, which has run the Kurd's autonomous zone in northern Iraq since the early 1990s, recently has signed contracts with foreign oil companies to explore for new oil fields in Kurdish-ruled areas of Iraq. Experts say they hope the revenue generated from these deals could provide greater economic, and thus political, independence from Baghdad. "The Kurds are offering attractive terms to companies that are willing to take a gamble on the legal situation," says Rafiq Latta, a Middle East editor of the Argus Oil and Gas report in London. "And some small oil companies are prepared to take the bait." The Norwegian oil firm DNO has been quickest off the mark, followed by Canadian firm Western Oil Sands. DNO began exploration in northern Iraq in 2004. But two weeks ago it announced that it would be able to begin pumping oil from one newly discovered field near the city of Zakho in early 2007. At present Kurdistan's annual budget comes from its share of Iraq's overall oil revenues, which are distributed according to population. As a result, the Kurds receive 17 percent of Iraq's overall $30 billion annual oil revenues. Iraq's oil exports, however, are mainly from the Shiite-dominated south - meaning that Iraq's Shiite rulers, theoretically at least, could shut down Kurdish northern Iraq's economy at will. Kurdish oil aspirations are also challenged by poor security and the Constitution, which states that, unlike oil exploration, contracts to repair existing oil fields must be negotiated by the Oil Ministry in Baghdad. Last week, Shamkhi Faraj, head of marketing and economics at the Ministry of Oil in Baghdad, estimated that Iraq's oil industry needed $25 billion to repair war damage and replace old equipment and infrastructure. So far the Shiite-controlled Ministry of Oil has been largely unsuccessful in signing contracts to repair the oil fields. Experts say that foreign companies are worried by possible insurgent attacks, but also by the political uncertainty of Baghdad. Consequently, the Kurds have been unable to fully repair the oil fields around Kirkuk, largely under Kurdish control since 2003. This is a source of frustration for the Kurds, as the fields contain around 15 percent of Iraq's oil wealth. But even if the Kurds could fund the reconstruction of oil facilities in Kirkuk themselves - as some are now suggesting - this would mark only a start. The Kurds would also have to build new pipelines to export their oil.
<urn:uuid:f7590dc0-91a1-4492-a1d2-c5f5ead9bab8>
2013-05-21T17:45:17Z
CC-MAIN-2013-20
[ [ 0.0201416015625, 0.04248046875, -0.01519775390625, 0.031494140625, 0.103515625, -0.047119140625, -0.028564453125, 0.10546875, 0.00640869140625, -0.07177734375, 0.029541015625, 0.04296875, -0.017333984375, -0.003997802734375, 0.052490234375, 0.0029754...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973927
683
http://www.csmonitor.com/2006/0426/p07s02-woiq.html
0.31809
NEWTOWN -- State Police updated the families of the Sandy Hook shooting on the status of its investigation this week, but one parent expressed dismay afterward that authorities have declined to share information about what they know about the mental state of gunman Adam Lanza. In the meantime, investigators have found it difficult to track down people who knew Lanza and could have insight into what provoked his murderous rampage, one law enforcement source said. The 20-year-old has been depicted as painfully shy and socially awkward by classmates and others who said they knew him. "This individual was extremely isolated," said the official, who asked not to be identified because of the sensitive nature of the investigation. The briefing at Edmond Town Hall on Tuesday night lasted for about three hours. State Police and command staff were there, as well as mental health professionals. Some of the update focused on what authorities now believe happened at Sandy Hook Elementary School the morning of Dec. 14. Veronique Pozner, whose 6-year-old son Noah was among the 20 students killed at the elementary school, declined to comment about what was said during the meeting but said she was concerned about what authorities didn't tell the families about Lanza's mental state at the time of the shootings. Pozner said that because of state law, investigators couldn't share information about whether the gunman was being treated by a mental health professional, whether he was taking any medications or what his school records may or may not show about his mental state. "It would benefit society to know what his mental health, or lack thereof, was at the time of the crime and leading up to it," she said. "We should be able to conduct a psychological autopsy of this individual with the focus of preventing something like this from happening again." Pozner said she also wanted to know if Lanza was being treated by a mental health care professional, if the individual treating him was aware that he had access to guns and that he was being taken to shooting ranges by his parents. "In all the other mass murder cases I've heard about, there were always warning signs," Pozner said. State Police spokesman Lt. Paul Vance said that state law prevents authorities from releasing information about Lanza's mental state. "A medical history doesn't die with an individual and there was some discussion about that," he said. "It's our responsibility to abide by state law even when conducting an investigation." Vance said Tuesday's meeting was the first of many to be held in the future, adding, "We are doing everything we can to answer questions from the victims' families and we will continue to do so." Early in their investigation, State Police found a wealth of gaming material at the home Lanza shared with his mother, Nancy. Investigators have focused much of their probe on this area. Records of the Internet service provider for the Lanza home on Yogananda Street have been subpoenaed, as authorities attempt to backtrack and find gaming websites or chatrooms visited by Adam Lanza. Authorities also are attempting to reconstruct computer hard drives that Lanza attempted to destroy before or on the day of the shootings. That effort is proving arduous and may take months if not longer, the law enforcement source said.
<urn:uuid:8f7709a1-4aad-47c9-9e44-7b3426eb7e4c>
2013-05-21T17:30:36Z
CC-MAIN-2013-20
[ [ -0.031005859375, 0.017822265625, 0.01019287109375, 0.00994873046875, 0.12255859375, -0.06982421875, -0.007232666015625, 0.09130859375, -0.017578125, -0.048095703125, 0.0791015625, 0.042236328125, -0.03857421875, -0.01318359375, 0.042724609375, -0.035...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.986651
667
http://www.ctpost.com/newtownshooting/article/Families-briefed-on-Sandy-Hook-shootings-probe-4204171.php
0.288148
(BPT) - The start of the school year is a time of great anticipation for parents and kids alike. New teachers. New classes. New and old friends. It's a time for fun and learning. Parents expect schools to be safe havens, but the reality is that children face a host of dangers all day long. Bullying, taunting and teasing are only some of the hazards that kids must deal with it every day at even the best schools in America. About 30 percent of middle and high school students say they've been bullied. Among high school students, one out of nine teens reported they had been pushed, shoved, tripped or spit upon during the last school year, according to a National Institute of Child Health and Human Development research study. FindLaw.com, the nation's leading website for free legal information, offers the following tips on how to keep your children safe at school: * Talk to your kids about school safety. Talk about bullying and make sure your child understands what is and is not acceptable behavior. Also discuss when and how to report bullying. * Go to the bus stop. If your schedule allows, go to the bus stop with your child and get to know the other kids and parents, along with the bus driver. * Get to know your kids' teachers. Send your child's teacher an email to introduce yourself and regularly check in on your child's academic and social progress. Learn how his or her teacher approaches bullying and other issues that may distract from the school's learning environment, such as the use of cell phones and iPods. * Read the school's policy on bullying. Become familiar with school policies about bullying - particularly the protocols for identifying and reporting bullying behavior. Pay careful attention to policies regarding cyberbullying, which can take place outside of school. * Watch and listen for the cues. Many kids don't want to reveal to their parents that they're being bullied, taunted or teased by other kids. If your child is withdrawn, not doing homework, sick more often than normal or demonstrating other out-of-the-ordinary behavior, talk about what seems to be bothering him or her. * Know where your kids are at. Sometimes bullying and other unsafe situations take place outside of school grounds, such as at other students' houses. Telling your kids that you want to know where they are and that they need permission to visit a friend's house shows them you care. It also reassures them that they can contact you if they need help. * Monitor Internet use and texting. Put the home computer in a public place and don't allow your kids to use a computer in their bedroom by themselves. * Talk to other parents. You may learn that their children also have been bullied or have been involved in activities on and off school grounds that you should be concerned about. You stand a much better chance of obtaining changes and creating a safer environment for your student by acting together rather than alone. * Put it in writing. If you suspect your child is being bullied or sexually harassed by another student (or a teacher or staff member), ask for a face-to-face meeting with the school's principal. If the principal does not act, hire an attorney and escalate your complaint to the superintendent and school board. Putting your complaint in writing about the specific types of negative behavior affecting your child is necessary if you need to litigate the complaint in court. * Take appropriate action when bullying becomes assault. If your child is physically assaulted on the bus, in school or on school grounds, contact the local police department, particularly if there is a school liaison officer assigned to the school, about whether a police report or assault charges should be filed. Do not wait to let the school handle the situation. For more information about how to keep your kids safe at school, visit FindLaw.com.
<urn:uuid:be252f6c-849c-43a6-a09e-a67e38971d3f>
2013-05-21T17:38:12Z
CC-MAIN-2013-20
[ [ -0.00933837890625, 0.01708984375, 0.01226806640625, 0.0093994140625, 0.1064453125, -0.0625, 0.0179443359375, 0.0791015625, -0.0172119140625, -0.049560546875, 0.09228515625, 0.02734375, 0.00244140625, -0.0125732421875, 0.0634765625, -0.0250244140625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968937
786
http://www.cw15.com/ara/education/story/Keeping-your-kids-safe-at-school/9Mj26bIJeEm07R11wJrHbQ.cspx
0.157953
Twelve Alternatives to Lashing Out at Your Child The next time everyday pressure builds up to the point where you feel like lashing out – STOP! Try any of these simple alternatives. You’ll feel better…and so will your child. - Take a deep breath ... and another. Then remember you are the adult. - Close your eyes and imagine you’re hearing what your child is about to hear. - Press your lips together and count to 10 … or better yet, to 20. - Put your child in a time-out (remember this rule: one time-out minute for each year of age.) - Put yourself in a time-out. Think about why you are angry: is it your child, or is your child simply a convenient target for your anger? - Phone a friend. - If someone can watch the children, go outside and take a walk. - Take a hot bath or splash cold water on your face. - Exercise. Do some pushups or jumping jacks. - Turn on some relaxing music. - Pick up a pencil and write down as many helpful words as you can think of. Save the list. - Call for prevention information: 1-800-CHILDREN
<urn:uuid:2bb2b383-3471-4004-982f-14196f9f0156>
2013-05-21T17:43:58Z
CC-MAIN-2013-20
[ [ 0.005558894015848637, 0.018149038776755333, 0.014483173377811909, -0.01394230779260397, 0.11249999701976776, -0.0024939903523772955, 0.01117788441479206, 0.07019230723381042, -0.024038461968302727, 0.0033052884973585606, 0.03197115287184715, 0.029326923191547394, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.866029
262
http://www.cyfd.org/content/twelve-alternatives-lashing-out-your-child
0.235192
When the process commenced in 1973, negotiations were conducted between the Department of Indian Affairs and the Council for Yukon Indians. The presence of the Government of Yukon was seen as redundant as they had not yet achieved 'responsible' or representative government and were considered an extension of the Department of Indian and Northern Affairs. By 1979, this had changed, and the Territorial Government had joined the process as a third party. Soon after, the Council for Yukon Indians, the Yukon Association of Non-Status Indians and the Yukon Native Brotherhood amalgamated to form the Council for Yukon Indians. The CYI continued to represent Yukon First Nations in the negotiations process as well as taking on the programs and services delivery, and the political representational role of the two parent organizations. The process was to take up much of the next 20 years until the Umbrella Final Agreement was signed in 1993.
<urn:uuid:b04d94c8-75fd-4393-aa0a-95bf333b85b3>
2013-05-21T17:38:40Z
CC-MAIN-2013-20
[ [ -0.007851175963878632, 0.027073020115494728, -0.003983601462095976, 0.03155940771102905, 0.1070544570684433, -0.05074257403612137, -0.023978959769010544, 0.05167079344391823, 0.00396426348015666, -0.06373762339353561, 0.060334157198667526, 0.008586014620959759, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985434
180
http://www.cyfn.ca/historylandclaims14?noCache=966:1339977768
0.334037
Radio ad concern dropped by ethics commission AUGUSTA - Characterizing it as "presenting some unusual legal issues," the state's ethics commission staff decided against pursuing a matter in which republican congressional candidate John Frary of Farmington, paid for a radio ad that mentioned a Maine Clean Election Act candidate running in another race. According to state law, those involved in state campaign races need to report any money spent on either side that identifies a clean election candidate 35 days before a general election. The radio ad, which linked democrats, state Rep. John Martin, U.S. Rep. Mike Michaud and Gov. John Baldacci as "the three amigos of the north woods" with a final message of "throw the bums out!" ran in October as part of Frary's failed campaign effort to unseat incumbent Michaud for Maine's 2nd congressional seat. Former state Sen. John Martin of Eagle Lake, running unopposed as a candidate for the state House of Representatives in the Nov. 4, 2008 election, notified the Maine's Commission on Governmental Ethics and Election Practices of Frary's radio ad. According to Jonathan Wayne, the executive director of the ethics commission, Martin questioned his ability to respond to Frary's attack given that he wasn't receiving state money as a clean election candidate running unopposed. This week, Wayne asked Frary to submit an explanation of his radio ad's intent and cost. In his response letter sent to Wayne, Frary admitted he mentioned Martin in the ad and that it was aired and paid for within the 35 days of the election. But, he said, the ad was not meant to influence Martin's campaign, adding, "I don't see how that is applicable to a contest where a candidate is running unopposed." What makes this case unique, Wayne said, is that Frary, running as a federal candidate, paid for the ad which mentions a candidate running in a state race. "This matter presents some unusual legal issues for the commission in administering" the law, Wayne said in his letter to Frary today. "Until this year, the commission has never had occasion to decide whether the Legislature intended 21-A M.R.S.A. 1019-B (1)(B) to apply to communications mentioning candidates in one election race that are paid for by candidates in another race." Wayne added that after consulting with the commission's legal counsel, he does not intend to bring the matter up during the commission's public meeting. He said the major reason is the difficulty in determining if the law that seeks to require independent campaign expenditures having to do with state clean election candidates, would also pertain to a federal candidate, as Frary was. "Please do not take this decision by the commission staff as agreement with the proposition that federal candidates and political action committees may never be regulated by state election law due to federal preemption.," Wayne said. For Frary, all this has been "interesting," he said today. "Oh, it's just another tempest in the chamber pot," he added.
<urn:uuid:06465b21-18db-4013-abf2-6df909c05cb8>
2013-05-21T17:17:19Z
CC-MAIN-2013-20
[ [ -0.0206298828125, 0.039306640625, -0.005828857421875, 0.0208740234375, 0.0478515625, -0.05078125, -0.00958251953125, 0.10205078125, -0.0250244140625, -0.072265625, 0.072265625, 0.048095703125, -0.06201171875, -0.006256103515625, 0.043212890625, -0.01...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.977107
638
http://www.dailybulldog.com/db/features/radio-ad-question-dropped-by-ethics-commission/
0.342063