Datasets:

text
stringlengths
130
541k
id
stringlengths
47
47
date
stringdate
2013-05-18 04:54:19
2013-06-20 13:35:46
dump
stringclasses
1 value
embeddings
listlengths
1
351
file_path
stringclasses
916 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
30
166k
url
stringlengths
14
835
quality_score
float64
0.16
1
On September 9, 2010, an explosion of an 30-inch natural gas pipeline rocked a residential neighborhood in San Bruno, California. The tremendous blast and following blaze killed at least seven people and destroyed 53 homes. Firefighters overwhelmed by the intense heat from the 60-foot inferno could only try to keep flames from spreading to other homes until utility workers managed to shut down the gas main an hour and a half later. It is unclear what caused the explosion, although residents reported smelling gas prior to the blast. An investigation into the cause of the explosion may take up to a year. Natural gas is an important part of America’s energy infrastructure, and deadly explosions such as this are uncommon. In this week’s online current events activity you will learn more about natural gas, how we collect and distribute it, and how we use it. All About Natural Gas It’s easy to confuse the term “natural gas” with our short form of the word gasoline. In fact, they are very different. To learn what natural gas is, where it comes from, and how we use it, visit NaturalGas.org, an educational web site covering a variety of topics about the natural gas industry. The best place to begin any learning activity is usually the overview. First, read the Background section of the site, which explains what natural gas is, gives its chemical composition, and explains how natural gas is formed. What are some of the characteristics of natural gas? What is the primary component in natural gas? Why is mercaptan added to natural gas? What is the difference between “dry” and “wet” natural gas? Where is natural gas typically found in the earth? Next, learn about the History of natural gas as a fuel source. How did ancient civilizations discover natural gas, and what did they do with it? What was the first country to use natural gas commercially, and how did they produce it? Who was the first American to dig a natural gas well? Who was Robert Bunsen and what did he invent? Natural gas is a fossil fuel, not a renewable energy resource. How much natural gas is left in North America? Find out by reading the Resources section. Why is it difficult to estimate the amount of natural gas in the ground? Give one estimate for the total number of cubic feet available. In what areas of the United States is natural gas plentiful? Finally, learn about the Uses of Natural Gas which, according to the Energy Information Administration, accounts for 24 percent of total energy consumed in the United States. Read about Residential and Commercial uses of natural gas, such as water heating, space heating, and cooking. Learn how natural gas is increasingly used in the Transportation industry, and it is a cleaner burning fuel than gasoline or diesel. Also read how natural gas is used for Electric Generation. For which of these uses do you think natural gas utilization is likely to increase in the near future? Natural Gas Distribution Let us focus now on the distribution of natural gas—how it gets from the well to our homes and businesses. For that, visit California’s Energy Story web site and read Chapter 9: Natural Gas Distribution System. This page describes a network of pipes, from larger pipes (like the one that exploded in San Bruno, California) to smaller pipes that reach residential homes. What do people use for gas who live in rural areas outside the gas pipe networks? How many miles of pipeline are there in America? Find out at Pipeline101. What is the difference between a gathering line and a transmission line? Are gathering lines used offshore, or only on land? Natural gas pipelines are part of America’s energy infrastructure in populated areas. The nation’s electric grid, the highway system, fiber optic data, wireless telephone networks, water pipelines, and even local sewage pipes are other examples of the infrastructure that delivers a high standard of living. It is easy to take these services for granted. In a current or recent issue of the e-edition, look for stories and articles about local utilities and infrastructure. You may find notices about maintenance and repair work, or you may find news about infrastructure failures of one kind or another. Collect several of these stories over the course of a week, then write an essay explaining what your life would be like if water, electricity, mobile communications, natural gas, or any other type of utility or service because unavailable for a whole month. What aspects of your daily routine would change?
<urn:uuid:328e060b-ab72-423c-a579-1b42fa7dc8d4>
2013-05-24T01:30:11Z
CC-MAIN-2013-20
[ [ -0.0311279296875, 0.006988525390625, -0.0211181640625, -0.0034942626953125, 0.08984375, -0.06640625, 0.0162353515625, 0.126953125, -0.029541015625, -0.01300048828125, 0.08056640625, 0.017333984375, 0.000621795654296875, 0.023193359375, 0.0283203125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936648
916
http://cincinnati.com/niecincy/archive/2010/09/13/
0.808944
His take on Kelo is among the most ill-informed of any I have run across: Yes, this is a bad decision, but we must think of what the alternative might have been. I don't know what was in the hearts of the justices who ruled the way did, they may be fully on board this apparent belief in the unlimited power of eminent domain. This is not something I support. However, the alternative could've been a conservative written opinion severely limiting the power of eminent domain and the concept of public use, which would've eviscerated a truly necessary government power. The "alternative" could've been bad. Sure. the alternative could have still allowed eminent domain but simply raised the burden of proof on local government when there is contemplation of property transfer to a third party. The long and short is that this sort of eminent domain is simply not needed from a planning perspective. Get it, Atrios? It's not needed.
<urn:uuid:e47b23d9-a0d7-4ea5-9c26-98e8cac6260b>
2013-05-24T01:51:26Z
CC-MAIN-2013-20
[ [ -0.02738095261156559, 0.02113095298409462, 0.02395833283662796, 0.0068452381528913975, 0.04285714402794838, -0.06666667014360428, -0.013616071082651615, 0.09583333134651184, -0.02142857201397419, -0.02782738022506237, 0.01629464328289032, 0.04672618955373764, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969378
195
http://citycomfortsblog.typepad.com/cities/2005/06/eschaton_ought_.html
0.279429
Arlington County has the most expensive housing market in Virginia, and one of the most expensive in the country, according to a new report released by Coldwell Banker Real Estate. Of the 48 markets surveyed in Virginia, Arlington topped the list. Here, the average price of a four-bedroom, two-bathroom home was $678,486. Northern Virginia certainly isn't a stranger to high home prices. Vienna, Alexandria, Ashburn and Fairfax rounded out the top five in the Coldwell Banker report. The 2012 Home Listing Report compares the average home listing price of more than 72,000 four-bedroom, two-bathroom properties listed on coldwellbanker.com between January and June 2012. On the other end of the spectrum, Danville was ranked most affordable. There, the average price of a comparable home was $153,957. Nationally, the five most expensive markets were all in California — four in the San Francisco Bay area. Los Altos, Calif., is the most expensive market in the country, according to the report. The average listing there? $1,706,688. Of 2,479 markets surveyed nationally, Arlington ranked 85th most expensive. The most affordable market in the country is Redford, Mich., where a comparable piece of property goes for $60,490. The average listing price of a four-bedroom, two-bathroom home in the United States is $292,152, according to the report. Coastal states are home to the majority of the country’s most expensive markets, the report states.
<urn:uuid:bf3cbaf4-cbd2-4d87-aa34-fb0111a317c2>
2013-05-24T01:57:15Z
CC-MAIN-2013-20
[ [ 0.033913351595401764, 0.0146484375, -0.009055397473275661, -0.00557084521278739, 0.035866476595401764, -0.057883523404598236, -0.022727273404598236, 0.026811080053448677, -0.04865056648850441, -0.03870738670229912, 0.11505682021379471, 0.030894886702299118, 0.04...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954669
331
http://clarendon.patch.com/articles/arlington-most-expensive-real-estate-market-in-virginia-report-states
0.39576
Please take care when buying and selling animals. To avoid buying a sick pet or dealing with unscrupulous pet dealers, be sure to meet any animal and owner in person. Do not buy unless you can ensure that the animals are kept in sanitary and humane conditions. Learn more about responsible pet acquisition, ownership and adoption. eBay Classifieds does not offer any transaction or payment services. Stay safe - read our safety tips. eBay Classifieds hosts a large selection of listings for bird advertisements, such as parrots, budgies and canaries. Ads for bird accessories include cages, bird food, bird toys, bird carriers and bird feeders. Maybe you are looking to adopt a parrot for your home but you don't know of anywhere that sells parrots in your local area. Perhaps you need a bird accessory such as a mirror for your birdcage, or an automatic bird feeder. You might be looking for specific bird species on the internet as well. Using eBay Classifieds means searching for bird-related ads in Clarksville is easy. No matter your pet preference, please be sure to read our tips on how to responsibly buy or sell pets, and how to avoid scams and puppy mills.
<urn:uuid:7efa71c3-3ced-4490-aed5-eae80bf56848>
2013-05-24T01:29:49Z
CC-MAIN-2013-20
[ [ -0.012902874499559402, 0.02199477329850197, 0.002150479005649686, 0.016659406945109367, 0.11236933618783951, -0.036367595195770264, 0.012848432175815105, 0.048998259007930756, -0.03549651429057121, -0.02177700400352478, 0.09146341681480408, 0.023845817893743515, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940818
255
http://clarksville.ebayclassifieds.com/birds/?catId=100135&output=gallery
0.186243
Analyzing and Interpreting Literature Description of the Examination The Analyzing and Interpreting Literature examination covers material usually taught in a general two-semester undergraduate course in literature. Although the examination does not require familiarity with specific works, it does assume that candidates have read widely and perceptively in poetry, drama, fiction, and nonfiction. The questions are based on passages supplied in the test. These passages have been selected so that no previous experience with them is required to answer the questions. The passages are taken primarily from American and British literature. The examination contains approximately 80 multiple-choice questions to be answered in 90 minutes. Some of these are pretest questions that will not be scored. Any time candidates spend taking tutorials and providing personal information is additional to actual testing time. Because writing about literary texts is central to the study of literature, some colleges may require candidates to take an optional essay section in addition to the multiple-choice section. The essay section is 90 minutes long and is made up of two 45-minute questions. One question asks candidates to analyze a short poem, the other asks them to apply a given generalization about literature (such as the function of a theme or a technique) to a novel, short story, or play that they have read. The essay section is still administered in a paper-and-pencil format; the essay responses are graded by the institution, not by the College Board. Knowledge and Skills Required Questions on the Analyzing and Interpreting Literature examination require candidates to demonstrate the following abilities. - Ability to read prose, poetry, and drama with understanding - Ability to analyze the elements of a literary passage and to respond to nuances of meaning, tone, imagery, and style - Ability to interpret metaphors, to recognize rhetorical and stylistic devices, to perceive relationships between parts and wholes, and to grasp a speaker's or author's attitudes - Knowledge of the means by which literary effects are achieved - Familiarity with the basic terminology used to discuss literary texts The examination emphasizes comprehension, interpretation, and analysis of literary works. A specific knowledge of historical context (authors and movements) is not required, but a broad knowledge of literature gained through reading widely and a familiarity with basic literary terminology is assumed. The following outline indicates the relative emphasis given to the various types of literature and the periods from which the passages are taken. The approximate percentage of exam questions per classification is noted within each main category. 35%–45% Prose (fiction and nonfiction) 50%–65% British Literature 30%–45% American Literature 5%–15% Works in translation 3%–7% Classical and pre-Renaissance 20%–30% Renaissance and 17th Century 35%–45% 18th and 19th Centuries 25%–35% 20th and 21st Centuries CLEP® Analyzing and Interpreting Literature Examination Guide [PDF Download] The Analyzing and Interpreting Literature exam includes questions on passages taken from American and British literature. Want to get a feel for the tests? Try out sample questions from actual CLEP exams in the subject of your choice. Find out if your institution accepts CLEP.
<urn:uuid:bd7d99e2-36f6-4928-a0e9-0d82947794a0>
2013-05-24T01:45:39Z
CC-MAIN-2013-20
[ [ -0.027587890625, 0.00640869140625, 0.003173828125, 0.004730224609375, 0.050048828125, -0.0223388671875, 0.003326416015625, 0.10693359375, -0.0155029296875, 0.0294189453125, 0.0859375, 0.008544921875, -0.080078125, -0.01068115234375, 0.060302734375, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.917157
665
http://clep.collegeboard.org/exam/literature
0.382704
McCoy spoke to the media for the first time since the injury occurred, responding to concerns over how the team trainers handled it initially: "Our medical staff does an outstanding job and that should never be in question," said McCoy, speaking for the first time since he was diagnosed with the concussion. [...] "I just don't want to go there guys," McCoy said. "I really don't want to recreate anything. I don't even want to think about it. I can tell you that I'm feeling a lot better, especially of late. I really feel like I'm coming out of this, and I hope to at least be able to be out there this weekend and help my team." Of course, McCoy isn't going to throw his team or its trainers under the bus, but it sounds like he has no hard feelings and respects that they're doing everything they can to keep potential risks at bay.
<urn:uuid:f5c18cbd-4d27-411f-86a1-4cdcf7d204b6>
2013-05-24T02:05:37Z
CC-MAIN-2013-20
[ [ -0.011935763992369175, -0.0009087456855922937, 0.010778356343507767, 0.002712673507630825, 0.08391203731298447, -0.03197338059544563, 0.011791087687015533, 0.0329861119389534, -0.012514467351138592, -0.10648148506879807, 0.03313078731298447, 0.05671296268701553, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.993532
186
http://cleveland.sbnation.com/cleveland-browns/2011/12/29/2669406/colt-mccoy-injury-update-interview-concussion-steelers-browns-2011/in/2387833
0.26955
Are you making a resolution in Cleveland Heights this year? Do you want to lose weight, gain a new skill or organize your house? Whatever your resolution is, here are some tips to help you stick to it throughout the year. 1. Make it attainable. Be sure that your resolution is attainable. Sticking to your monthly budget is attainable—making a million dollars may not be. 2. Tell everyone. If you tell everyone about your resolution, you are more likely to keep it. If you want to quit smoking, you can even go as far as telling your friends that you'll give them $50 if they catch you lighting up. 3. Be specific. If you want to get fit in the new year, set a specific goal. For example, instead of saying you want to get fit, say you want to lose 10 pounds and tone your arms and legs. 4. Start small. Create small goals for yourself. If you want to organize your house, assign one room to each month. In January, organize your kitchen. In February, organize your bedroom. In March, your organize your office. In April, you organize your garage, and so on. 5. Write it down. It's important to motivate yourself throughout the year. Write your resolution down on every month in your calendar. Don't let yourself forget about your resolution as the year goes on. TELL US: What are your New Year's Resolutions? Which ones did you make (and keep) last year? Share in the comments below.
<urn:uuid:e51f0590-0a61-4281-822b-740fddee08f6>
2013-05-24T01:37:40Z
CC-MAIN-2013-20
[ [ -0.03068181872367859, 0.03295454382896423, 0.020549243316054344, 0.001455965917557478, 0.06704545766115189, -0.008049242198467255, 0.013920454308390617, 0.04015151411294937, -0.035227272659540176, -0.04753787815570831, 0.06666667014360428, 0.01884469762444496, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959647
317
http://clevelandheights.patch.com/articles/how-to-keep-your-new-years-resolutions-72abc922
0.943901
Not everyone is getting the fitness message - possibly because the message isn't appropriate. WASHINGTON - Researchers from American University believe that recommendations for physical activity may be missing homemakers, blue-collar workers and minorities. The researchers studied data on the physical activity habits of more than 18,000 adults who took part in the federal government's third National Health and Nutrition Examination Survey (NHANES III). The survey revealed that exercise is most common among educated white males with comparatively high salaries. According to the survey, 47 percent of participants who didn't graduate high school were inactive, compared with 26 percent of college graduates. Forty-seven percent of those earning under $10,000 a year reported they were inactive, while only 32 percent of those earning $35,000 or more didn't exercise. Furthermore, 47 percent of homemakers claimed that they didn't take part in regular physical activity, compared with 40 percent of blue-collar workers and 29 percent of white-collar professionals. Carlos J. Crespo, one of the American University researchers, noted that economics might explain the differences in activity level found in the NHANES III. Those with higher incomes have the money for health club dues, and, furthermore, they can hire people to do chores and free up more time to exercise. In contrast, people with lower incomes may not have the money to join a club, and if they live in unsafe neighborhoods, they may not feel comfortable taking walks or doing other outdoor activities. Education and money weren't the only factors that affected physical activity. The study also showed a connection between ethnic status and exercise. Specifically, 40 percent of Mexican Americans, 35 percent of blacks and 18 percent of whites did not exercise in their free time. Even when income and education were the same, blacks and Mexican Americans still reported less activity than whites. Crespo could only speculate reasons for the cultural differences. He theorized that perhaps messages promoting exercise have not been put into a proper cultural context, showing people of all races taking part in exercises that appeal to them. For example, brisk walking, a common form of exercise that experts frequently recommend, may not be the preferred physical activity for nonwhites. Citing his own childhood in Puerto Rico, Crespo pointed out that dancing was the physical activity of choice. Source: The Associated Press
<urn:uuid:650f24e2-d8ae-45c1-b4a4-cc60db6a1ed7>
2013-05-24T01:37:19Z
CC-MAIN-2013-20
[ [ -0.0224609375, 0.030517578125, 0.0047607421875, -0.012939453125, 0.0732421875, -0.064453125, 0.0034332275390625, 0.11083984375, -0.0274658203125, -0.0228271484375, 0.1337890625, 0.043701171875, -0.01080322265625, 0.0072021484375, 0.046630859375, -0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967987
475
http://clubindustry.com/print/mag/physical-activity-too-exclusive
0.177509
Guidance for Employees If you are experiencing flu symptoms—fever, cough, sneezing, chills, aches, and sometimes diarrhea or vomiting, do not come to work, teach class, or attend public events. You should avoid others as much as possible until you have had no fever without using a fever-lowering medication for 24 hours. Consider purchasing a thermometer to check your temperature. If you must be around others, wear a surgical mask or some kind of fabric over your mouth and nose. At this time, the university has not altered paid time off or sick leave policies. Employees are encouraged to manage their paid time off and sick leave in anticipation of the possibility of contracting flu.
<urn:uuid:06b15f9c-f9dd-458f-9e73-d3e5df24e144>
2013-05-24T01:52:16Z
CC-MAIN-2013-20
[ [ -0.03841911628842354, 0.015165440738201141, 0.01617647148668766, -0.019577205181121826, 0.12205882370471954, -0.06875000149011612, -0.00019962085934821516, 0.09227941185235977, -0.013419117778539658, -0.06323529779911041, 0.056985292583703995, 0.016452206298708916, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956397
145
http://cms.bsu.edu/externallinklibrary/~/link.aspx?_id=AEE2363F361D44BF9F07EDF35772BE02&_z=z
0.463226
2 oz Russian Standard Vodka 5 oz premium ginger beer In a tall glass filled with ice pour ginger beer about 3/4 full. Add squeeze of lime and top with vodka. Serve with stirrer and lime wedge garnish. This drink was renamed in honor of the 2010 Emmy Award nominated show The Good Wife.
<urn:uuid:fa2ac49a-990c-4b60-849a-8014f95f35b2>
2013-05-24T01:29:29Z
CC-MAIN-2013-20
[ [ -0.018541665747761726, 0.042500000447034836, -0.014270833693444729, 0.015729166567325592, 0.0637499988079071, 0.017812499776482582, -0.025624999776482582, 0.05416666716337204, -0.010625000111758709, -0.0073958332650363445, -0.004140624776482582, 0.07333333045244217,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.852032
66
http://cocktail.com/2010/08/27/good-wife-mule/
0.196336
(A) In case of accident to or collision with persons or property upon any of the public roads or highways, due to the driving or operation thereon of any motor vehicle, the person driving or operating the motor vehicle, having knowledge of the accident or collision, immediately shall stop the driver's or operator's motor vehicle at the scene of the accident or collision and shall remain at the scene of the accident or collision until the driver or operator has given the driver's or operator's name and address and, if the driver or operator is not the owner, the name and address of the owner of that motor vehicle, together with the registered number of that motor vehicle, to any person injured in the accident or collision or to the operator, occupant, owner, or attendant of any motor vehicle damaged in the accident or collision, or to any police officer at the scene of the accident or collision. In the event the injured person is unable to comprehend and record the information required to be given by this section, the other driver involved in the accident or collision forthwith shall notify the nearest police authority concerning the location of the accident or collision, and the driver's name, address, and the registered number of the motor vehicle the driver was operating, and then remain at the scene of the accident or collision until a police officer arrives, unless removed from the scene by an emergency vehicle operated by a political subdivision or an ambulance. If the accident or collision is with an unoccupied or unattended motor vehicle, the operator who collides with the motor vehicle shall securely attach the information required to be given in this section, in writing, to a conspicuous place in or on the unoccupied or unattended motor vehicle. (B) Whoever violates division (A) of this section is guilty of failure to stop after an accident, a misdemeanor of the first degree. If the accident or collision results in serious physical harm to a person, failure to stop after an accident is a felony of the fifth degree. If the accident or collision results in the death of a person, failure to stop after an accident is a felony of the third degree. The court, in addition to any other penalties provided by law, shall impose upon the offender a class five suspension of the offender's driver's license, commercial driver's license, temporary instruction permit, probationary license, or nonresident operating privilege from the range specified in division (A)(5) of section 4510.02 of the Revised Code. No judge shall suspend the first six months of suspension of an offender's license, permit, or privilege required by this division. The offender shall provide the court with proof of financial responsibility as defined in section 4509.01 of the Revised Code. If the offender fails to provide that proof of financial responsibility, then, in addition to any other penalties provided by law, the court may order restitution pursuant to section 2929.18 or 2929.28 of the Revised Code in an amount not exceeding five thousand dollars for any economic loss arising from an accident or collision that was the direct and proximate result of the offender's operation of the motor vehicle before, during, or after committing the offense charged under this section. Amended by 129th General AssemblyFile No.25,HB 5, §1, eff. 9/23/2011. Amended by 128th General AssemblyFile No.52,HB 338, §1, eff. 9/17/2010. Effective Date: 2004 SB123 01-01-2004; 2004 HB50 01-01-2004
<urn:uuid:d3fed408-4a90-44e4-adb1-a3085a0983a0>
2013-05-24T02:05:11Z
CC-MAIN-2013-20
[ [ -0.0177001953125, 0.02734375, -0.0189208984375, -0.0185546875, 0.177734375, -0.08642578125, -0.035888671875, 0.09765625, -0.050048828125, -0.0830078125, 0.07421875, 0.0281982421875, -0.07958984375, -0.035888671875, 0.068359375, 0.007476806640625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918708
715
http://codes.ohio.gov/orc/4549.02
0.572592
“Let me summarise my proposed course of action. Soon after the end of this broadcast, and of those transmitted to other countries, I shall be vacating my position as overseer of the world, indeed of the universe. I shall be going you-know-not-where, never to return. It will be as if I had never existed, a state of affairs which correlates quite closely with the views held by a significant proportion of you.You can discuss the story there as well. Is it true, for instance, that free will requires the exisitence of God? Free will is, for example, foundational to Buddhism, but God is not. “The result of this action will be to render some specific questions irrelevant: Did the universe have a creator? Does mankind have free will? What is the meaning of life? Also, Rennie is look for Sydneyside actors to help produce Steve Fuller's play about the day Lincoln and Darwin appear on a talk show. Go here for more details.
<urn:uuid:203aeea6-d2a3-430b-9ec5-a49d1276f2b7>
2013-05-24T01:30:03Z
CC-MAIN-2013-20
[ [ -0.02571902610361576, 0.009471791796386242, -0.0006395187810994685, 0.014726216904819012, 0.08960177004337311, -0.06332964450120926, -0.012168142013251781, 0.06554203480482101, -0.024751106277108192, -0.018252212554216385, 0.04563052952289581, -0.007605088409036398,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95113
211
http://collidinguniverses.blogspot.com/2009/01/science-fiction-what-if-god-resigned.html
0.85364
Get More out of Colon Cleanse Many people admit that a colon cleansing program is highly beneficial to get rid of toxins in the body and feel energized. Having said that, most people also admit that a colon cleansing program is not easy. It requires determination, endurance and time. So, isn’t it logical that you should try to get the best out of the program while you are at it? There are ways to get more out of a colon cleansing program by following a few simple tips and this article will tell you how. Natural colon cleansing boosters Virgin olive oil, walnuts and raw apple cider vinegar are all excellent colon cleansing boosters. You can have a few walnuts or two tablespoons of raw apple cider vinegar mixed with a glass of water twice or thrice a day to get rid of parasites in your body more efficiently during the colon cleanse. You can also have a tablespoon of Virgin Olive Oil in the night as it aids in lubrication of the bowel and helps to soften the stool. All these help in easy disposal of the body waste brought about by the colon cleansing program. Irrespective of the colon cleansing program you have chosen, it is a good idea to avoid or reduce the intake of dairy products and processed foods to reduce acidity. Also, bleached flour bread, pasta, white rice and excessive amounts of sugar should be avoided as a rule. Try to include only natural food items in your diet and take a good colon cleansing supplement every day. Ideally, the only thing that you should be drinking during a colon cleansing program is pure, unadulterated water. If that is not possible, at least try to reduce the consumption of caffeine and carbonated drinks as much as you can. Drink fresh fruit and vegetable juices to boost the body’s immunity and provide the required energy to it. Last but not the least, do not forget to limit your alcohol intake.
<urn:uuid:02499097-a0dc-4a1d-9c46-a1eec55d02e0>
2013-05-24T01:51:46Z
CC-MAIN-2013-20
[ [ -0.01630125194787979, 0.015945330262184143, -0.011318337172269821, -0.010321754030883312, 0.1019362211227417, -0.018792711198329926, 0.002233413979411125, 0.09339407831430435, -0.011674259789288044, -0.07232346385717392, 0.08029612898826599, 0.0091116176918149, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954456
389
http://coloncleansingworks.net/get-more-out-of-colon-cleanse/
0.478971
Register now for free, or sign in with any of these services: Want to set your local edition? Select your location for more focused local news coverage when you visit NOLA.com. Don't worry. You can change this setting at any time to another local edition. There's a good chance that this imported socialist kenyan anti-American creep will be impeached and charged with the following: 923 18 U.S.C. § 371—Conspiracy to Defraud the United States, along with charges of espionage. Just letting you know. I don't blame this imported freak socialist anti-American kenyan creep for anything. He is the enemy of America, an Enemy of the State. Therefore he simply does what he does. I blame the majority of America who put this kenyan/indonesian in office to begin with. What does the "future" of children have do do with this imported freak socialist, anti-American kenyan acting as "president", unless it's some sort of bleak perverted future? Stay away from kids. With that in mind, per the parameters you've outlined, why is this imported socialist anti-American kenyan creep actually President of the United States to begin with? This imported socialist anti-American kenyan isn't just worthless for any office, much less President, he is an Enemy of the State. You people worry about the economy, gas prices, which is ironic since you have an enemy of the United States running the country. His entire goal, along with his other anti-American cohorts is to bring this country, hence you also unless you're one of the many immigrants here for what you can get , down to its knees. This guy needs to be impeached, imprisoned, and interrogated as to the situation of the $2 trillion dollars$ his party has stolen, along with Beranke, Geitner, etc. The fact that this creep who espouses some freak form of socialism, forms coalitions with enemies of America, is even in office, is much more distubing than the state of the union. You're already in a sad state. Jeff Beck of course. However I wish he was playing at the Vogue theatre or convention center in Indianapolis where I'm from and I was also there instead of this nasty who dat swamp. Hopefully, Indy is on Jeff's tour after he wades through this place. I don't know if Vinnie Colaiuta will be on drums. There's a good chance that Ron Paul or Mike Pence from Indiana will be on the Republican ticket for President. Jeff Landry is the only good politician you have in this state, but he is needed in the Senate. Otherwise, be sure to keep the rest of your Looserana politicians like Jindal, and the rest, down here in the swamp and out of the way. If I wanted to compromise with a lib-dem then I would have voted for a lib-dem. If I vote against you, that means you are my enemy. Why on earth would Republicans compromise with the enemy who continuously trash and mock the U.S. Constitution and who are themselves anti-American? Here's the compromise: Barry obaama Soetoro agrees to step down from the position as president that he assumes, admits to thecrimes of his administration, and simply leaves. That's what a freakin' liberal does. The categorize people and have the gall to make some sort of analysis to prompte their perverted agendas. People suck it up and fail to see through it. Otherwise, liberalism would be dead, but it continues to speak like the plague. A female person is called a heroine, not a hero. I don't care if she is supposed tobe a lez, that still doesn't mean she's a dude. Learn English. I just have one question. How would anyone at school actually know that you are a lesbian ? Is there like, some kind of name tag you wear that says LEZBO ? I don't get it. I thought you guys said that people are born homosexuals. Please don't abuse, or use a perverted connotation of the word gay either, unless you are actually happy when you are born. Maybe people are happy when they are born. That would be a good thing. I mispell alot of stuff sometimes just because I don't go back over words such as ameliorate or extracorporeal. I'll send my stuff to you to proofread before I post it on a blog. Thanks. Typical dem-lib spiel. Always the misunderstood sel proclaimed pariah that right wing consrvatives "can't" understand. Newsflash: we are already and always have been "enlightened" and have had your number for quite awhile. We suggest you change the tune, cause your song Prima Donna wasn't worth listening to when you first played it. Now, it's downright cacophonous. That's the best comment I've seen in a long time, Apock. Not only in regards to this New Orleans based newspaper but alot of internet message boards and opinion boards in general. You would think that the Katrina episode would have been enough warning, but apparently not. Bingo. That's exactly who they are and what they do. That is what liberalism has always been about. It doesn't matter if it's schools, government, or the church. They have to get their ACLU hands into everything and I mean everything. For example, how long have the Boy Scouts organization been around? What kind of weirdos would want to interject some freak philosophy into the Boy Scouts of America? Liberals can't seem to keep their noses or their filthy hands out of anything. I'm sure they've probably crept their way into the Girls Scouts as well, I don't know. Sometimes I don't wanna know.
<urn:uuid:9298b99d-7971-48fb-bc00-37f5f77b9169>
2013-05-24T01:44:50Z
CC-MAIN-2013-20
[ [ -0.020751953125, 0.0150146484375, -0.006195068359375, 0.028564453125, 0.07666015625, -0.0556640625, -0.005157470703125, 0.09716796875, -0.0089111328125, -0.06591796875, 0.08837890625, 0.0284423828125, -0.03466796875, 0.0277099609375, 0.036865234375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975638
1,214
http://connect.nola.com/user/rockominal/index.html
0.180049
LATH FROM UTAH—PROCLAMATION OF GOV. YOUNG AGAINST THE MEXICANS. Advices from Salt Lake to the 30th of April have been received. Governor Brigham Young has issued a proclamation ordering out an armed, force to reconnoitre "a horde of Mexicans," who had entered Utah territory for the purpose of in-citing the Indians to make aggression on the in-habitants. The Governor is also down in a sav-age manner upon apostates. The Governor bursts out in indignant denunciation of the apostates, and relates one of his dreams as follows:— "Who broke the road to these valleys? Did this nasty Smith and his wife? No, they staid in St. Louis while we did it. peddling ribbons and kissing the gentiles. I know what they have done here; they have asked exhorbitant prices for their nasty stinking ribbons, (voices, "that's true.")—We broke the roads to this country. Now you Gladdenites keep your tongues still, lest sadden destruction come upon you. I will tell yon a dream I had last night. I dreamed that I was in the midst of a people who were dressed in rags and tatters ; they had turbans upon their heads, and these also were hanging in tatters. The rags were of many colors, and when the people moved they were all in motion; their object in this ap-peared to be to attract attention; said they to me "we are Mormons. Brother Brigham." "No, you are not,” I replied. "But we have been." said, they, and began to jump and caper about and dance, and their rags of many colors were all in motion to attract the attention of the people I said, you are no Saints, you are a disgrace to them. Said they "we have been Mormons"—By and by along came some mobocrats, and they greeted them with "how do you do, sir I am happy to see you." They kept on that way for an hour—I felt ashamed of them, for they were in my eyes, a disgrace to Mormonism. "Then I saw two ruffians, whom I knew to be robbers and murderers, and they crept into abed where one of my wives and children we're. I said, you that call yourselves brethren, tell me, is this the fashion among you? They said, O, they are good men, they are gentlemen. With that I took my large bowie knife that I used to wear as a bosom pin in Nauvoo, and cut one of their throats from ear to ear, saying. "go to hell across lots." The other one said, "you dare not serve me so." I instantly sprang at him and seized him by the hair of his head, and bringing him down, cut his throat and sent him after his comrade; then told them both, if they would be-have themselves they should yet live, but if they did not I would unjoint their necks. At this I awoke. I say rather than that apostates shall flourish here I will unsheath my bowie knife and conquer or die. (Great commotion in the con-gregation, and a simultaneous burst of feeling, assenting to the declaration.) Now, you nasty apostates, clear out, or judgment will be put to the line, and righteousness to the plummet.—(Voices generally, "go it, go it.") If you say it is right, raise your hands. (All hands up.) Let me call upon the Lord to assist us in this, and every good work." Click tabs to swap between content that is broken into logical sections.
<urn:uuid:5946135b-b91f-4440-b8a4-424ce9839cb0>
2013-05-24T02:08:48Z
CC-MAIN-2013-20
[ [ -0.0167236328125, -0.00738525390625, -0.0240478515625, 0.00921630859375, 0.1513671875, -0.0262451171875, -0.0142822265625, 0.07421875, -0.0169677734375, -0.054443359375, 0.08740234375, 0.00640869140625, 0.0064697265625, -0.006317138671875, 0.033203125, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.98867
778
http://contentdm.lib.byu.edu/cdm/singleitem/collection/19CMNI/id/13159/rec/15
0.1995
Extract NCL 33 21/3/39 It was reported that a new illustrated 8 pp leaflet had been prepared with a view to reporting the activities of the International Solidarity Fund during the Spanish Civil War, and at the same time appealing for further support in aid of the Relief of Spanish Refugees (See Appendix II.) - Approved. At a later stage it was stated that the Mexican Government were prepared to absorb 25,000 of the Spanish Refugees at present in France, but that the necessary finance and transport would need to be found elsewhere. The Spain Committee of the Labour Party which had had the matter under consideration urged that the National Council of Labour should make representations to the British and French Governments to combine in providing the necessary finance and transport facilities. RESOLVED: "That representations accordingly be made on behalf of the National Council of Labour." It was also reported that requests had been made for the assistance of some 360 Spanish sailors and others who found themselves in British ports and unable safely to return to Spain in existing circumstances. British Transport Unions had contributed £1,000 to the International Solidarity Fund for this purpose, but this sum was insufficient, and, while local Labour Organisations in the ports concerned were rendering assistance, representations would probably have to be made to one or other of the existing Committees concerned with Spanish Relief. The Spain Committee of the Labour Party also desired that the National Council of Labour should consider as to the extent to which employment could be found for Spanish Refugees in this country, and it was RESOLVED: "That the matter should be the subject of enquiry and report to a further meeting of the Council." Click tabs to swap between content that is broken into logical sections.
<urn:uuid:adf59d0b-8cbc-44c0-80c5-644cf525329d>
2013-05-24T01:37:17Z
CC-MAIN-2013-20
[ [ -0.020048702135682106, 0.027759740129113197, 0.0013697240501642227, 0.013636363670229912, 0.13181817531585693, -0.026623375713825226, -0.03149350732564926, 0.05097402632236481, 0.009618506766855717, -0.023376623168587685, 0.0542207807302475, 0.01282467506825924, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980834
352
http://contentdm.warwick.ac.uk/cdm/singleitem/collection/scw/id/2060/rec/11
0.553714
Geoffrey has made many television roles his own over the years, such as the lazy Onslow in the BBC sitcom Keeping Up Appearances, and the dodgy Twiggy in The Royle Family. His other television credits include Doctor Who andHeartbeat, and earlier in his career he voiced Paul McCartney in the 1968 animated Beatles movie Yellow Submarine. He had a guest role in an episode of Randall & Hopkirk (Deceased) called Somebody Just Walked Over My Grave. Unfortunately, in August 2010 it was reported that Geoffrey was seriously ill and battling prostate cancer. He passed away from the illness in July 2012.
<urn:uuid:79148583-b15c-44f0-8a6c-db61aaeef011>
2013-05-24T01:32:11Z
CC-MAIN-2013-20
[ [ 0.012093322351574898, 0.007277397438883781, -0.011076626367866993, 0.008401112630963326, 0.07020547986030579, -0.0033443921711295843, -0.020761987194418907, 0.09332191944122314, -0.018728595227003098, -0.07534246891736984, 0.05993150547146797, 0.00882919505238533, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988958
129
http://coronationstreet.wikia.com/wiki/Geoffrey_Hughes
0.179491
We know what the maniac wants to use Any gun based on current military design is an assault weapon: They are solely meant to kill human beings as fast as they can. Yeah, they can kill a prairie dog too, for 60 cents a pop. The problem is not guns; it is finding those who would use them in a maniacal manner. It is not in a name "assault weapon." It is why maniacs may be drawn to them. It is not how many murders in the United States are carried out by the use of these assault weapons. It is the bias towards the use of an assault weapon in the carrying out of mass killings that is the issue. Look, anyone with a small amount of experience with firearms logically concludes they could use many types of guns to fire the exact amount of rounds in the exact amount of time as with an assault weapon. The question, then, is why do a significant amount of violently deranged individuals use only assault weapons? We know the military uses them because they are a bit lighter and easy to clean. I imagine this is not a big draw for a nut job on a one-way trip. Mass shootings between 1982 and 2012 number 142. In those 20 years, 35 of them used assault weapons, and 68, semi-automatic handguns, (frankly I'd include them as they are based on a current military design). Meaning 24 percent or 72 percent of mass killings utilized assault weapons. That is statistically significant either way you cut it. Any parent with school age children, any well-meaning, peace-loving individual has the gut instinct to ban the damn assault weapons right? Sounds like I'd like to too, right? Wrong. I'm not into feel good solutions. I want results. We know what the maniac wants to use. Let's use that knowledge to socially profile the anti-social, failed joiner, with an assault weapon fetish, and allow law-abiding citizens to exercise their Second Amendment rights. We can do this together. If we don't, every one of us loses something. Richard M. Feit
<urn:uuid:a54a7219-fac2-4b11-a8e2-f4c94f1ada6a>
2013-05-24T01:58:20Z
CC-MAIN-2013-20
[ [ -0.02431955561041832, 0.00721396179869771, 0.000795425905380398, 0.009513609111309052, 0.09173387289047241, -0.06653226166963577, -0.010143648833036423, 0.11542338877916336, -0.02104334719479084, -0.01247479859739542, 0.060483869165182114, 0.044606853276491165, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96892
434
http://cortezjournal.com/article/20130215/Opinion02/130219866/0/opinion02/We-know-what-the-maniac-wants-to-use
0.270778
There was also a very interesting "Mysteries of the Bible" episode I watched a long time ago that talked about the subject of Lot, and it spoke of the culture of the time, where the safety of one's guest and the hospitality towards them was extremely important. Life was very difficult back in those times and survival in the harsh desert climates demanded a cultural system in which a man showed hospitality towards travelers and was responsible for their safety while they stayed in his household, as he might need to rely upon the same hospitality later. Thus, the real sin that the denizens of the city practiced in was the disregard for their fellow man. Everyone was out for himself, and the reason why they came upon Lot's house and demanded he give them his guests were because they wanted to rob and rape them. Lot's offering of his daughters instead was his attempt to protect his guests, which was more important than the safety of his own family (plus in ancient times most women were treated like commodities. By today's standards, Lot'd get his daughters taken away by protective custody, but I digress). I've never thought that the main sin was homosexuality, as being gay does not mean one is going to force themselves upon another person. I think there is a better correlation between the men who demanded Lot hand over his guests and prison rape. Rape is about imposing one's dominance over another, and that's what the men in Sodom were after. They were threatened by the holiness of Lot's guests, and when an insecure person feels threatened, they tend to strike out at what they fear. I believe the sins of Sodom were more complex than what Fundamentalists like to claim. I believe it was considered evil because there was no respect and brotherly love extended towards thy neighbor, which was a HUGE biggie in the culture of that world during that time. It was a dangerous place where crime was rampant and no one cared for one another, to the point where they openly tried to attack Lot because he showed kindness and hospitality toward guests. That's why God burned the city to the ground. Not because of butt sex, but because it was a city full of Assholes, aka Detroit (if any of you are actually from Detroit, I swear I'm just joking and I'm sure there are more than 10 decent people out there. But seriously, that town has gone down the tubes in later years).
<urn:uuid:db9a17ba-fe11-4987-a039-c83ae5ebf90a>
2013-05-24T01:29:36Z
CC-MAIN-2013-20
[ [ -0.0213623046875, 0.000705718994140625, -0.00148773193359375, 0.00225830078125, 0.0966796875, -0.0908203125, -0.01177978515625, 0.109375, -0.0238037109375, -0.03515625, 0.064453125, 0.0189208984375, -0.01007080078125, -0.002044677734375, 0.04150390625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.994064
488
http://corvusonline.net/corvuschatter/viewtopic.php?p=132233
0.230714
Originally Posted by stasheroo While I wouldn't be against the idea, I think the team would be reluctant to trade him away for what is likely to be a late round draft choice. At this point, I can't see a team offering better than a 5th round pick for him and I don't think the egos at Valley Ranch could deal with the sting of letting a former 1st round pick go for so little. That's pretty much how I look at that type of deal. No team is giving up more than a 4th for Felix at this point. Nor should they. But a trade is possible. Make it conditional.
<urn:uuid:6a11eeb5-b719-463b-83d3-498be794689c>
2013-05-24T01:38:17Z
CC-MAIN-2013-20
[ [ -0.024867957457900047, 0.01507482398301363, 0.019476233050227165, 0.019146127626299858, 0.05347711220383644, -0.0358714796602726, -0.0033148108050227165, 0.06558098644018173, 0.004318882245570421, -0.028609154745936394, 0.04269366338849068, 0.05941901355981827, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988798
135
http://cowboyszone.com/forums/showpost.php?p=4775001&postcount=3
0.298793
Family owned and operated by the Callahan family, Bellwether Farms is located in the rolling hills of Sonoma County, about an hour north of San Francisco and a few miles from the Pacific Ocean. Having raised a family and had a career as a nurse, in the early 1990's Cindy Callahan made the decision to change direction, starting a sheep farm. After initially focusing on lamb production, the Callahans were encouraged to develop their sheep into a milking herd. This, combined with a trip to Italy where they had the opportunity to taste many local sheep's milk cheeses inspired them to start to experiment with cheesemaking. The sheep at Bellwether Farm consist mainly of East Friesian ewes. The ewes give birth to between one and three lambs each year and the lambs stay with their mother for 45 days before the ewe joins the milking line. Each ewe gives, on average, slightly less than one gallon a day and they are milked for eight months before the cycle begins again. The sheep graze freely year round in addition to being given grain and alfalfa as necessary. Cindy's Callahan son Liam oversees cheese production while his wife Diana manages the office and Cindy focuses on taking care of the sheep. In addition to making a range of sheep's milk cheeses, the Callahans also buy in local Jersey cow's milk in order to make a range of cow's milk cheeses. Renowned for its rich, buttery characteristics, Jersey milk has a higher fat and protein content than most milks, which gives the cheeses a wonderfully rich, balanced flavor and creamy mouthfeel. Although Bellwether make a couple of varieties of whey based ricottas, these are only sold locally. In order to fulfill national demand, Liam has developed a whole cow's milk ricotta, made using cultured milk that has been allowed to acidify naturally for many hours until its ready to begin the heating process. Making ricotta this way requires constant attention. Once heating begins, Liam stands at the vat watching for just the right moment to stop stirring, letting the curds form. The curds are then hand scooped into small ricotta baskets and allowed to drain naturally under their own weight. In keeping with Italian tradition, the ricotta is sold in the same basket, resulting in the minimum of disturbance of the curd and the maximum retention of moisture. This gives the finished ricotta a remarkably delicate, soft texture and lactic flavors of cream and butter with a clean finish that leaves you longing for more.
<urn:uuid:6db67402-ab48-4c47-ab46-51548870f9ff>
2013-05-24T01:37:10Z
CC-MAIN-2013-20
[ [ 0.0033416748046875, 0.01129150390625, -0.003082275390625, 0.0299072265625, 0.07763671875, -0.0301513671875, 0.00494384765625, 0.1083984375, -0.002288818359375, -0.0213623046875, 0.06982421875, 0.032958984375, -0.00860595703125, 0.0037689208984375, 0.0349...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966269
534
http://culturecheesemag.com/node/1254
0.238028
The National Rifle Association (NRA) has released a "Practice Range" Shooting App for iOS, according to Apple's App Store description. The app combines the NRA's facts and educational materials with a 3-D shooting game, which, according to the description, "instills safe and responsible ownership through fun challenges and realistic simulations." The game was first released in the App Store on Sunday, Jan. 13 for children ages 4 and up; the description of the app was updated on Tuesday, Jan. 15 to reflect that it was rated for ages 12 and up. The game includes nine firearms and three different shooting ranges, though you have to pay 99 cents to unlock some of weapons, including a Beretta, MK11 and a Colt pistol. The game is rated for children ages four and up, and says it "strikes the right balance of gaming and safety education, allowing you to enjoy the most authentic experience possible." keyboard shortcuts: V vote up article J next comment K previous comment
<urn:uuid:b31bb277-c09a-468b-acfa-4f0e8158997a>
2013-05-24T01:45:19Z
CC-MAIN-2013-20
[ [ -0.00041397757013328373, 0.02975543402135372, 0.010529891587793827, 0.02391304261982441, 0.050815217196941376, -0.06304347515106201, 0.00029509171145036817, 0.05353260785341263, -0.014538043178617954, -0.027445651590824127, 0.05978260934352875, 0.055434782058000565,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957743
204
http://curiousg.newsvine.com/_news/2013/01/15/16532444-nra-practice-range-app-released-for-ages-12-and-up
0.169891
The struggle for emancipation in the Civil War produced some memorable cartoons. One such example appeared in Harper’s Weekly in its issue of August 16, 1862. The caption for the cartoon reads, “DROWNING GENTLEMAN. ‘Take that Rope away, you darned Nigger! What decent White Man, do you suppose, is going to allow himself to be saved by a confounded Nig — ‘ (Goes down, consistent to the last.)” Of course, the point of the cartoon was to criticize people in the North that opposed letting African Americans get more directly involved in the war, especially as soldiers. By late summer 1862, it was increasingly clear that the Union could not win the war if it did make war on slavery and enlist the slaves themselves in the fight. While this idea still faced considerable opposition, its opponents increasingly looked as ridiculous as the drowning man in this cartoon.
<urn:uuid:8159c3fd-ade9-4fb6-bdfb-846df0505728>
2013-05-24T02:06:01Z
CC-MAIN-2013-20
[ [ -0.007552083116024733, 0.01964285783469677, 0.0011393228778615594, 0.01436011865735054, 0.10238095372915268, -0.0535714291036129, -0.01889880932867527, 0.0982142835855484, -0.01703868992626667, -0.0505952388048172, 0.0833333358168602, 0.02767857164144516, -0.012...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973874
189
http://cwemancipation.wordpress.com/2012/08/29/a-consistent-negrophobist/?like=1&source=post_flair&_wpnonce=1a35c759c1
0.555411
Societetshuset is something really special. It was built in the 1880's in a Moorish style, today it houses a café, restaurant, pub and night-club. From the stage in the green park, Societetsparken, can music be heard during the summer evenings. Here is also a play-ground, tennis courts and a miniature golf course. Why not just sit down and enjoy a pic-nic in the grass?
<urn:uuid:0ff4c3d5-43c8-478c-82f9-50ed78781c86>
2013-05-24T01:44:59Z
CC-MAIN-2013-20
[ [ -0.02077963948249817, 0.012322809547185898, -0.00045052755740471184, 0.021262886002659798, 0.10889175534248352, -0.04671391844749451, 0.015463917516171932, 0.0824742242693901, -0.018363401293754578, -0.03253865987062454, 0.10889175534248352, 0.0579896904528141, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948
92
http://databas.halland.se/databas/Product.aspx?city=1383&TLl=en&TLdb=375,374,373,372,371,370,151&TLco=SE&TLm=1383&TLcat=69__&TLtf=1&TLll=25&TLp=365743
0.846848
Dwayne Geyer is given superpowers during the Bloodlines crossover. After being bitten by the alien Pritor, Geist is able to become invisible. He beomes completely invisible in bright lights and less visible in dim lighting. This is useful in fighting crime but makes it impossible for him to hold down a job. Using his newfound powers he helps Batman (Jean Paul Valley) defeat one of the spine-sucking aliens attacking Gotham City. He also helps fight the spawn of the Bloodlines monsters. Geist next joins the Blood Pack and fights valiantly helping them defeat the Quorum. Geist leaves the team after finding out he is only a member due to a clerical error. After leaving the Blood Pack, Geist largely retires from super-heroics until he is contacted by the Oracle while drinking in a bar. Informed the Society is attacking Metropolis, Geist suits up to defend the city. He joins with other former members of the Blood Pack, along with dozens of other heroes, in a defense line outside the city. Together, the Blood Pack fights Solomon Grundy. Geist is killed during the battle. While fighting Grundy, Superboy-Prime fires a blast of heat vision at members of the Blood Pack. Geist, Grundy, and those members of the Blood Pack present at that time are apparently killed. Powers and AbilitiesEdit Invisibility: After receiving a bite from the alien Pritor, Geist gains the ability to become completely invisible in bright light. By concentrating extremely hard, he can cause objects he is touching to become invisible as well. Geist has the strength of the average man. Sensitivity to Light: A negative side affect of his new power is that he is very sensitive to light, and can be blinded by very bright lights (even when his eyes are closed). - 13 Appearances of Dwayne Geyer (New Earth) - 9 Images featuring Dwayne Geyer (New Earth) - Quotations by or about Dwayne Geyer (New Earth) - Character Gallery: Dwayne Geyer (New Earth) Discover and Discuss - Search this site for: - Search the Forums for: This character was one of the many superpowered individuals introduced during the "Bloodlines" crossover event, where a number of Alien Parasites invaded the Earth and inadvertently activated the Metagene in a number of people. While not necessarily all members of the "Blood Pack", this group of people has come to be known as the "New Bloods". This template will automatically categorize articles that include it into the "New Bloods" category.
<urn:uuid:446f9f19-595b-40bc-8274-844439778462>
2013-05-24T02:06:00Z
CC-MAIN-2013-20
[ [ -0.01409912109375, -0.0103759765625, -0.0115966796875, 0.00113677978515625, 0.12158203125, -0.02880859375, -0.01263427734375, 0.1123046875, 0.02490234375, -0.03759765625, 0.0419921875, 0.039794921875, 0.0390625, 0.026123046875, 0.044677734375, -0.015...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953364
545
http://dc.wikia.com/wiki/Dwayne_Geyer_(New_Earth)
0.179967
This is a challenge emailed to me from Johnny Pearce. It's interesting: I think it helps contextualize how impossible reliability must have been for the Gospel writers. Some of the premises are rough around the edges, and need tweaking, or may be fallacious (eg time frame of 70 years), but the gist is there. I get frustrated that apologists seem to think the speeches that Jesus made were accurate, and that his actions were accurately reported, when constrained by those sorts of criteria. I challenge you to write an accurate history of Karl Dane, a 20th century Danish man. This person spoke a different language than you, and never wrote anything down, and lived in a different country to you. you are writing about him some 70 years after his death. you cannot use the internet. you cannot use the library. you cannot use any book, since no other book has ever been written about him. you cannot use the telephone. you might be able to write some letters, but the reliability of them and time taken for delivery is highly suspect, plus knowing where the people live you need to speak to are is also a problem. there may be some people alive who knew him, but they live in denmark, and contacting them is nigh on impossible as you don't know who they are or where they live, and transportation must be done by boat or donkey. you have no idea of exactly what he said, other than by (possibly, if you could meet any contemporaries) asking people for oral recollections. you speak a different language than any of his contemporaries, even if you could meet them. traveling for any research purposes would require donkey / sail boat. any information you get from others must come from people that haven't used the internet, books, libraries etc. do you think you could write an accurate biography of this man now? could you accurately find out exactly what Karl Dane said when he said those things 70 years ago? Just thought this might be an interesting line to take with some theists.
<urn:uuid:641d47ee-8a33-4327-9a29-b044e675c82e>
2013-05-24T01:50:14Z
CC-MAIN-2013-20
[ [ -0.03661894425749779, 0.009361233562231064, 0.0014110682532191277, -0.01390418503433466, 0.07984581589698792, -0.042951542884111404, -0.002013353630900383, 0.08535242080688477, -0.015969162806868553, -0.027120044454932213, 0.07929515093564987, 0.01273403037339449, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981755
424
http://debunkingchristianity.blogspot.com/2010/01/on-how-to-write-gospel-account.html?showComment=1262444581103
0.440119
| Roasted Red Pepper and Pomegranate Sauce over Pan-Seared Tofu | Serves 6 / Serving tip: To make a thicker dipping sauce for toasted pita bread or chips, eliminate the vegetable stock. Ingredient tips: Use bottled roasted peppers for convenience. Look for pomegranate molasses at Middle Eastern markets, or use pomegranate concentrate, available at health food stores. Roasted Red Pepper and Pomegranate Sauce (makes about 1 2/3 cups) 3 tablespoons sunflower oil 1 small onion, finely chopped (about 1 cup) 1 teaspoon minced garlic 1 tablespoon ground cumin 1/8 teaspoon cayenne pepper 1/2-3/4 cup low-sodium vegetable broth 1 teaspoon ground coriander 2 tablespoons pomegranate molasses 1 cup coarsely chopped roasted red peppers 2 tablespoons chopped fresh parsley 2 tablespoons fresh lemon juice 1/4 cup slivered almonds, toasted Salt and freshly ground black pepper 1 19-ounce package extra-firm (not silken) tofu, drained 1 1/2 tablespoons canola oil Minced parsley, for garnish 1. To make the sauce: Heat oil over medium-high heat in a large saucepan. Add onion and cook until translucent, about 4 minutes. Add garlic, cumin, and cayenne; cook, stirring frequently, for 1 minute. Add next 7 ingredients (broth through almonds) and cook for another 2 minutes. Transfer to a food processor and process until very smooth, 1–2 minutes. Season to taste with salt and pepper. Thin with a little more broth if necessary. 2. Wrap tofu in paper towels and press gently to absorb water. Slice tofu in half lengthwise, then cut crosswise into 1/2-inch-thick slices. Heat canola oil over medium-high heat in a large sauté pan. Add tofu and brown well on both sides. Transfer to a platter. Drizzle with sauce and garnish with minced parsley. PER SERVING: 247 cal, 65% fat cal, 18g fat, 2g sat fat, 0mg chol, 11g protein, 11g carb, 2g fiber, 45mg sodium
<urn:uuid:9754cb53-8a5f-4abf-a9b0-4bc46b960e85>
2013-05-24T02:06:07Z
CC-MAIN-2013-20
[ [ 0.00089263916015625, 0.03173828125, -0.02734375, 0.0206298828125, 0.05615234375, 0.009033203125, -0.004974365234375, 0.072265625, 0.032470703125, 0.01904296875, 0.07568359375, 0.0439453125, 0.0322265625, 0.031005859375, 0.040771484375, 0.001304626464...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.81444
479
http://deliciousliving.com/food/roasted-red-pepper-and-pomegranate-sauce-over-pan-seared-tofu
0.186635
- active driver A device driver that implements advanced power management tasks, such as determining device idleness and performing pre-shutdown tasks. See also passive driver - base class In C++, the class from which another class (a subclass) inherits. It can also be used to specify a class from which all classes in a hierarchy ultimately derive (also known as a root class). Berkeley Software Distribution. Formerly known as the Berkeley version of UNIX, BSD is now simply called the BSD operating system. The BSD portion of Darwin is based on 4.4BSD Lite 2 and FreeBSD, a flavor of 4.4BSD. A directory in the file system that typically stores executable code and the software resources related to that code. (A bundle can store only resources.) Applications, plug-ins, frameworks, and kernel extensions are types of bundles. Except for frameworks, bundles are file packages, presented by the Finder as a single file instead of a folder. See also kernel extension A transmission path on which signals can be dropped off or picked up by devices attached to it. Only devices addressed by the signals pay attention to them; the others discard the signals. Buses both exist within the CPU and connect it to physical memory and peripheral devices. Examples of I/O buses on Darwin are PCI, SCSI, USB, and FireWire. - bus master A program, usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths. The bus master actually controls the bus paths on which the address and control signals flow. DMA is a simple form of bus mastering where the bus master controls I/O transfers between a device and system memory and then signals to the CPU when it has done so. See also DMA A driver object that consumes services of some kind supplied by its provider. In a driver stack, the client in a provider/client relationship is farther away from the Platform Expert. See also provider - command gate A mechanism that controls access to the lock of a work loop, thereby serializing access to the data involved in I/O requests. A command gate does not require a thread context switch to ensure single-threaded access. IOCommandGate event-source objects represent command gates in the I/O Kit. Another name for the OS X core operating system, or kernel environment. The Darwin kernel environment is equivalent to the OS X kernel plus the BSD libraries and commands essential to the BSD Commands environment. Darwin is Open Source technology. (Direct Memory Access) A capability of some bus architectures that enables a bus controller to transfer data directly between a device (such as a disk drive) and a device with physically addressable memory, such as that on a computer's motherboard. The microprocessor is freed from involvement with the data transfer, thus speeding up overall computer operation. See also bus master Computer hardware, typically excluding the CPU and system memory, which can be controlled and can send and receive data. Examples of devices include monitors, disk drives, buses, and keyboards. - device driver A component of an operating system that deals with getting data to and from a device, as well as the control of that device. A driver written with the I/O Kit is an object that implements the appropriate I/O Kit abstractions for controlling hardware. - device file In BSD, a device file is a special file located in /devthat represents a block or character device such as a terminal, disk drive, or printer. If a program knows the name of a device file, it can use POSIX functions to access and control the associated device. The program can obtain the device name (which is not persistent across reboots or device removal) from the I/O Kit. - device interface In the I/O Kit, a mechanism that uses a plug-in architecture to allow a program in user space to communicate with a nub in the kernel that is appropriate to the type of device the program wishes to control. Through the nub the program gains access to I/O Kit services and to the device itself. From the perspective of the kernel, the device interface appears as a driver object called a user client. - device matching In the I/O Kit, a process by which an application finds an appropriate device interface to load. The application calls a special I/O Kit function that uses a “matching dictionary” to search the I/O Registry. The function returns one or more matching driver objects that the application can then use to load an appropriate device interface. Also referred to as device discovery. See device driver - driver matching In the I/O Kit, a process in which a nub, after discovering a specific hardware device, searches for the driver or drivers most suited to drive that device. Matching requires that a driver have one or more personalities that specify whether it is a candidate for a particular device. Driver matching is a subtractive process involving three phases: class matching, passive matching, and active matching. See also personality - driver stack In an I/O connection, the series of driver objects (drivers and nubs) in client/provider relationships with each other. A driver stack often refers to the entire collection of software between a device and its client application (or applications). - event source An I/O object that corresponds to a type of event that a device driver can be expected to handle; there are currently event sources for hardware interrupts, timer events, and I/O commands. The I/O Kit defines a class for each of these event types, respectively IOInterruptEventSource, IOTimerEventSource, and IOCommandGate. A collection of software abstractions that are common to all devices of a particular category. Families provide functionality and services to drivers. Examples of families include protocol families (such as SCSI, USB, and Firewire), storage families (disk drives), network families, and families that describe human interface devices (mouse and keyboard). In the virtual-memory system, faults are the mechanism for initiating page-in activity. They are interrupts that occur when code tries to access data at a virtual address that is not mapped to physical memory. See also page; virtual memory A type of bundle that packages a dynamic shared library with the resources that the library requires, including header files and reference documentation. Note that the Kernel framework (which contains the I/O Kit headers) contains no dynamic shared library. All library-type linking for the Kernel framework is done using the mach_kernelfile itself and kernel extensions. This linking is actually static (with vtable patch-ups) in implementation - idle sleep A sleep state that occurs when there has been no device or system activity for the period of time the user specifies in the Energy Saver pane of System Preferences. See also system sleep - information property list A property list that contains essential configuration information for bundles such as kernel extensions. A file named Info.plist(or a platform-specific variant of that filename) contains the information property list and is packaged inside the bundle. An asynchronous event that suspends the currently scheduled process and temporarily diverts the flow of control through an interrupt handler routine. Interrupts can be caused by both hardware (I/O, timer, machine check) and software (supervisor, system call, or trap instruction). - interrupt handler A routine executed when an interrupt occurs. Interrupt handlers typically deal with low-level events in the hardware of a computer system, such as a character arriving at a serial port or a tick of a real-time clock. - I/O Catalog A dynamic database that maintains entries for all available drivers on a Darwin system. Driver matching searches the I/O Catalog to produce an initial list of candidate drivers. - I/O Kit A kernel-resident, object-oriented environment in Darwin that provides a model of system hardware. Each type of service or device is represented by one or more C++ classes in a family; each available service or device is represented by an instance (object) of that class. - I/O Kit framework The framework that includes IOKitLib and makes the I/O Registry, user client plug-ins, and other I/O Kit services available from user space. It lets applications and other user processes access common I/O Kit object types and services. See also framework - I/O Registry A dynamic database that describes a collection of driver objects, each of which represents an I/O Kit entity. As hardware is added to or removed from the system, the I/O Registry changes to accommodate the addition or removal. The complete OS X core operating-system environment, which includes Mach, BSD, the I/O Kit, drivers, file systems, and networking components. The kernel resides in its own protected memory partition. The kernel includes all code executed in the kernel task, which consists of the file mach_kernel(at file-system root) and all loaded kernel extensions. Also called the kernel environment. - kernel extension (KEXT) A dynamically loaded bundle that extends the functionality of the kernel. A KEXT can contain zero or one kernel modules as well as other (sub) KEXTs, each of which can contain zero or one kernel modules. The I/O Kit, file system, and networking components of Darwin can be extended by KEXTs. See also kernel module - kernel module (KMOD) A binary in Mach-O format that is packaged in a kernel extension. A KMOD is the minimum unit of code that can be loaded into the kernel. See also kernel extension A data structure used to synchronize access to a shared resource. The most common use for a lock is in multithreaded programs where multiple threads need access to global data. Only one thread can hold the lock at a time; by convention, this thread is the only one that can modify the data during this period. See also mutex A central component of the kernel that provides such basic services and abstractions as threads, tasks, ports, interprocess communication (IPC), scheduling, physical and virtual address space management, virtual memory, and timers. To translate a range of memory in one address space (physical or virtual) to a range in another address space. The virtual-memory manager accomplishes this by adjusting its VM tables for the kernel and user processes. - memory cursor An object that lays out the buffer ranges in a memory descriptor in physical memory, generating a scatter/gather list suitable for a particular device or DMA engine. The object is derived from the IOMemoryCursor class. See also DMA; memory descriptor - memory descriptor An object that describes how a stream of data, depending on direction, should either be laid into memory or extracted from memory. It represents a segment of memory holding the data involved in an I/O transfer and is specified as one or more physical or virtual address ranges. The object is derived from the IOMemoryDescriptor class. See also DMA; memory cursor - memory protection A system of memory management in which programs are prevented from being able to modify or corrupt the memory partition of another program. Although OS X has memory protection, Mac OS 8 and 9 do not. A mutual-exclusion locking object that allows multiple threads to synchronize access to shared resources. A mutex has two states: locked and unlocked. Once a mutex has been locked by a thread, other threads attempting to lock it will block. When the locking thread unlocks (releases) the mutex, one of the blocked threads (if any) acquires (locks) it and uses the resource. The thread that locks the mutex must be the one that unlocks it. The work-loop lock (which is used by a command gate) is based on a mutex. See also lock; work loop A programmatic mechanism for alerting interested recipients (sometimes called observers) that an event has occurred. An I/O Kit object that represents a detected, controllable entity such as a device or logical service. A nub may represent a bus, disk, graphics adaptor, or any number of similar entities. A nub supports dynamic configuration by providing a bridge between two drivers (and, by extension, between two families). See also device; driver (1) The smallest unit (in bytes) of information that the virtual memory system can transfer between physical memory and backing store. In Darwin, a page is currently 4 kilobytes. (2) As a verb, page refers to the transfer of pages between physical memory and backing store. Refer to Kernel.framework/Headers/mach/machine/vm_params.hfor specifics. See also fault; virtual memory - passive driver A device driver that performs only basic power-management tasks, such as joining the power plane and changing the device’s power state. See also active driver A set of properties specifying the kinds of devices a driver can support. This information is stored in an XML matching dictionary defined in the information property list ( Info.plist) file in the driver’s KEXT bundle. A single driver may present one or more personalities for matching; each personality specifies a class to instantiate. Such instances are passed a reference to the personality dictionary at initialization. - physical memory Electronic circuitry contained in random-access memory (RAM) chips, used to temporarily hold information at execution time. Addresses in a process’s virtual memory are mapped to addresses in physical memory. See also virtual memory (Programmed Input/Output) A way to move data between a device and system memory in which each byte is transferred under control of the host processor. See also DMA A subset of driver (or service) objects in the I/O Registry that have a certain type of provider/client relationship connecting them. The most general plane is the Service plane, which displays the objects in the same hierarchy in which they are attached during Registry construction. There are also the Audio, Power, Device Tree, FireWire, and USB planes. - Platform Expert A driver object for a particular motherboard that knows the type of platform the system is running on. The Platform Expert serves as the root of the I/O Registry tree. A module that can be dynamically added to a running system or application. Core Foundation Plug-in Services uses the basic code-loading facility of Core Foundation Bundle Services to provide a standard plug-in architecture, known as the CFPlugIn architecture, for Mac apps. A kernel extension is a type of kernel plug-in. A heavily overloaded term which in Darwin has two particular meanings: (1) In Mach, a secure unidirectional channel for communication between tasks running on a single system; (2) In IP transport protocols, an integer identifier used to select a receiver for an incoming packet or to specify the sender of an outgoing packet. The Portable Operating System Interface. An operating-system interface standardization effort supported by ISO/IEC, IEEE, and The Open Group. - power child - power parent - preemptive multitasking A type of multitasking in which the operating system can interrupt a currently running program in order to run another program, as needed. A phase of active matching in which a candidate driver communicates with a device and verifies whether it can drive it. The driver’s probemember function is invoked to kick off this phase. The driver returns a probe score that reflects its ability to drive the device. See also driver matching A BSD abstraction for a running program. A process’ resources include a virtual address space, threads, and file descriptors. In OS X, a process is based on one Mach task and one or more Mach threads. A driver object that provides services of some kind to its client. In a driver stack, the provider in a provider/client relationship is closer to the Platform Expert. See also client Decrementing the reference count of an object. When an object’s reference count reaches zero, it is freed. When your code no longer needs to reference a retained object, it should release it. Some APIs automatically execute a release on the caller’s behalf, particularly in cases where the object in question is being “handed off.” Retains and releases must be carefully balanced; too many releases can cause panics and other unexpected failures due to accesses of freed memory. See also retain Incrementing the reference count of an object. An object with a positive reference count is not freed. (A newly created object has a reference count of one.) Drivers can ensure the persistence of an object beyond the present scope by retaining it. Many APIs automatically execute a retain on the caller’s behalf, particularly APIs used to create or gain access to objects. Retains and releases must be carefully balanced; too many retains will result in wired memory leak. See also release A service is an I/O Kit entity, based on a subclass of IOService, that has been published with the registerServicemethod and provides certain capabilities to other I/O Kit objects. In the I/O Kit’s layered architecture, each layer is a client of the layer below it and a provider of services to the layer above it. A service type is identified by a matching dictionary that describes properties of the service. A nub or driver can provide services to other I/O Kit objects. In BSD-derived systems such as Darwin, a socket refers to different entities in user and kernel operations. For a user process, a socket is a file descriptor that has been allocated using socket(2). For the kernel, a socket is the data structure that is allocated when the kernel’s implementation of the socket(2)call is made. - system sleep A sleep state that occurs when the user chooses Sleep from the Apple menu or closes the lid of a laptop computer. See also idle sleep In Mach, the unit of CPU utilization. A thread consists of a program counter, a set of registers, and a stack pointer. See also task A kernel resource that triggers an event at a specified interval. The event can occur only once or can be recurring. Timers are one of the event sources for work loops. - user client An interface provided by an I/O Kit family, that enables a user process (which can’t call a kernel-resident driver or other service directly) to access hardware. In the kernel, this interface appears as a driver object called a user client; in user space, it is called a device interface and is implemented as a Core Foundation Plug-in Services (CFPlugin) object. See also device interface - user space Virtual memory outside the protected partition in which the kernel resides. Applications, plug-ins, and other types of modules typically run in user space. - virtual address A memory address that is usable by software. Each task has its own range of virtual addresses, which begins at address zero. The Mach operating system makes the CPU hardware map these addresses onto physical memory only when necessary, using disk memory at other times. - virtual memory The use of a disk partition or a file on disk to provide the same facilities usually provided by RAM. The virtual-memory manager in OS X provides 32-bit (minimum) protected address space for each task and facilitates efficient sharing of that address space. - wired memory A range of memory that the virtual-memory system will not page out or move. The memory involved in an I/O transfer must be wired down to prevent the physical relocation of data being accessed by hardware. In the I/O Kit memory is wired when the memory descriptor describing the memory prepares the memory for I/O (which happens when its preparemethod is invoked). - work loop A gating mechanism that ensures single-threaded access to the data structures and hardware registers used by a driver. Specifically, it is a mutex lock associated with a thread. A work loop typically has several event sources attached to it; they use the work loop to ensure a protected, gated context for processing events. See also event source © 2001, 2007 Apple Inc. All Rights Reserved. (Last updated: 2007-05-17)
<urn:uuid:623d2e8d-3749-4e06-86a1-86049d5916e7>
2013-05-24T02:05:47Z
CC-MAIN-2013-20
[ [ -0.03125, 0.003448486328125, 0.027587890625, -0.019287109375, 0.030029296875, -0.0693359375, 0.0159912109375, 0.126953125, -0.021728515625, -0.0166015625, 0.047607421875, 0.04052734375, -0.06591796875, 0.042724609375, 0.0140380859375, -0.026611328125...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918961
4,217
http://developer.apple.com/library/mac/documentation/DeviceDrivers/Conceptual/IOKitFundamentals/Glossary/Glossary.html
0.478936
|leading light (ˈliːdɪŋ)| |1.||an important or outstanding person, esp in an organization or cause| |2.||nautical a less common term for range light| |a scrap or morsel of food left at a meal.| |an arrangement of five objects, as trees, in a square or rectangle, one at each corner and one in the middle.| An important or influential individual, as in Jim was a leading light in his community. This expression, alluding to moral guidance, dates from about 1870, but terms such as a shining light have been used for an outstanding person since the first half of the 1500s.
<urn:uuid:5368b248-4ad1-41d3-adc2-d0069a812054>
2013-05-24T01:52:33Z
CC-MAIN-2013-20
[ [ -0.02217741869390011, 0.004385080654174089, -0.030645161867141724, -0.019455645233392715, 0.08467742055654526, -0.09233871102333069, -0.012651209719479084, 0.06088709831237793, -0.005216734018176794, -0.06854838877916336, 0.07016129046678543, 0.04213709756731987, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952136
145
http://dictionary.reference.com/browse/leading%20light
0.324687
|World Series or World's Series| |baseball (in the US and Canada) a best-of-seven playoff for the world championship between the two winning teams in the major leagues at the end of the season| |World's Series or World's Series| |a stew of meat, vegetables, potatoes, etc.| |an arrangement of five objects, as trees, in a square or rectangle, one at each corner and one in the middle.| A series of baseball games held each October between the champions of the two major baseball leagues, the American League and the National League.
<urn:uuid:8698517a-0ad6-48d6-9db0-c62083a009d7>
2013-05-24T01:59:50Z
CC-MAIN-2013-20
[ [ 0.016056034713983536, 0.02392241358757019, -0.023383621126413345, -0.016918104141950607, 0.07112068682909012, -0.028448276221752167, -0.017133621498942375, 0.04267241433262825, -0.0031384697649627924, -0.04590517282485962, 0.137068971991539, 0.001245959079824388, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94456
125
http://dictionary.reference.com/browse/world+series?qsrc=2446
0.990612
Hey I'm Amanda. I wear my heart on my sleeve. I give my all in everything I do, yet expect nothing in return. I'm Pansexual, Single, and waiting for somebody to sweep me off my feet. don’t be a puss.
<urn:uuid:57da20ee-7572-47aa-a0d6-f3d2bb6608b4>
2013-05-24T01:36:56Z
CC-MAIN-2013-20
[ [ -0.003698130138218403, 0.025102458894252777, 0.005154969170689583, 0.0014968621544539928, 0.04482581838965416, -0.02651127055287361, -0.012743339873850346, 0.030993852764368057, 0.0015769082820042968, -0.1075819656252861, 0.047387294471263885, 0.03137807548046112, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.830819
57
http://dierealswag.tumblr.com/ask
0.369204
Capital punishment has been the law in Oklahoma since 1804 when Congress made the criminal laws of the United States applicable in the Louisiana Purchase, which included present Oklahoma. These legal codes included the crime of "willful murder," carrying the death penalty. Through the years Congress found other offenses, including rape, that merited capital punishment as well. Until Oklahoma 1907 statehood, capital crimes committed in Indian Territory were tried in the federal courts for Arkansas, Kansas, and Texas. However, the U.S. Federal District Court for the Western District of Arkansas, presided over by notorious Judge Isaac C. Parker, was Indian Territory's most famous criminal venue, with seventy-nine men going to the gallows under sentence of his court. In 1889 Congress established a U.S. district court at Muskogee, the first federal court resident in Indian Territory. However, the court did not have jurisdiction of capital offenses, which continued to be tried in the federal courts for Arkansas, Kansas, and Texas. In 1890 aterritorial government, with its own judicial structure, was established for Oklahoma Territory. Until statehood, capital crimes committed in Oklahoma Territory were prosecuted in the territorial courts. In 1895 Congress gave the Muskogee court, as of September 1, 1896, exclusive jurisdiction of all offenses committed against the laws of the United States in Indian Territory and repealed the jurisdiction of the Arkansas, Kansas, and Texas federal courts. One man was hanged under sentence of the Oklahoma Territory courts, and nine men and one woman went to the gallows under sentence of the Indian Territory court. From statehood until 19l5 executions were by hanging in the county of conviction. The records are not perfect, but the number of people hanged between statehood and 1915 is probably six, all men accused of murder. The fact that the number was not higher is because of Lee Cruce, Oklahoma's second governor. Cruce was an inveterate foe of the death penalty. The best information is that only one person was executed during his term in office (1911-15), while at least twenty-two murderers escaped the hangman's noose. Cruce's successor, Robert L. Williams, did not share Cruce's view on capital punishment, and executions began again when Williams took office. The first year of Williams's term also saw Oklahoma change from hanging to electrocution as a method of execution. In 1915 Henry Bookman, convicted in McIntosh County for murder, was the first person to be electrocuted in Oklahoma. The first execution for an offense other than homicide occurred in 1930. James Edward Forrest was put to death for rape, and subsequently there were executions for robbery with firearms and for kidnapping. In the late 1920s and during the 1930s there were as many as three on the same day. In 1972, when the U.S. Supreme Court declared the death penalty, as then administered, unconstitutional, eighty-two persons, all male, had died in Oklahoma's electric chair. After the Supreme Court's ruling, states began attempting to enact constitutional death penalty statutes. Gov. David Boren convened a special session of the legislature in July 1976 to restore the capital punishment in Oklahoma. The legislators overwhelmingly voted in favor, 45 to1 in the senate, and 93 to 5 in the house. The first execution under the new law occurred in 1990. From 1915 to March 2004, Oklahoma had executed 156 individuals, including three women. Between 1915 and 1966 eighty-two died by electrocution, and one was hanged. Seventy-three died from lethal injection between September 1990 and March 2004. BIBLIOGRAPHY: Ruth Fisk Bowman, "Death By Hanging: The Crimes and Execution of Arthur Gooch," The Chronicles of Oklahoma 62 (Summer 1984). "Capital Punishment," Vertical File, Oklahoma Room, Oklahoma Department of Libraries, Oklahoma City, Oklahoma. "Capital Punishment, Oklahoma," Vertical File, Jan Eric Cartwright Memorial Library, Capitol Building, Oklahoma City, Oklahoma. Louis Coleman, "'We Are Making History': The Execution of William Going," The Chronicles of Oklahoma 76 (1998). Von Russell Creel, "Capital Punishment and the United States Court for the Indian Territory," The Chronicles of Oklahoma 81 (Summer 2003). Bob Gregory, "They Died For Their Sins," Oklahoma Monthly (December 1976). Von Russell Creel © Oklahoma Historical Society
<urn:uuid:c07aac65-75d2-4240-9751-39d4f164db72>
2013-05-24T01:30:48Z
CC-MAIN-2013-20
[ [ -0.01544189453125, 0.0240478515625, -0.026123046875, -0.0018157958984375, 0.06640625, -0.072265625, 0.0000171661376953125, 0.09033203125, -0.038330078125, -0.029541015625, 0.09375, 0.0306396484375, 0.0211181640625, 0.0101318359375, 0.04443359375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96969
893
http://digital.library.okstate.edu/encyclopedia/entries/C/CA052.html
0.394387
Daniel Brodhead Papers Brodhead, Daniel, 1736-1809 Gibson, John, 1740-1822 Pennsylvania. Militia. Pennsylvania Regiment, 4th. Pennsylvania. Militia. Pennsylvania Regiment, 8th. Washington, George, 1732-1799 0.21 linear feet (1 box) Born in 1736 in Marblehead, New York, Daniel Brodhead served as a colonel in the Revolutionary War, commanding the Western Department from his headquarters at Fort Pitt from 1779 to 1781. The collection contains copies of orders sent by Brodhead to various military officers, including those stationed at Forts Armstrong, Wheeling, Tuscarora, and Laurens. The letters reveal the recurring difficulties posed by food shortages, lack of money, uncooperative officers, and raids conducted by hostile Indian tribes, which contributed to settlers abandoning their property. Digital reproductions of the collection are available electronically by following the respective "Digitized Folder Contents" links within the finding aid.
<urn:uuid:55752707-9890-4095-b3a4-3e235c8aca7c>
2013-05-24T01:33:52Z
CC-MAIN-2013-20
[ [ -0.018777411431074142, 0.04139254242181778, -0.018914474174380302, 0.007846765220165253, 0.08497807383537292, -0.05674342066049576, 0.003323738928884268, 0.060855261981487274, -0.009183114394545555, -0.06688596308231354, 0.10197368264198303, 0.04084429889917374, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.909822
211
http://digital.library.pitt.edu/cgi-bin/f/findaid/findaid-idx?c=ascead;cc=ascead;type=simple;rgn=Collection%20Number;q1=DAR*;view=reslist;subview=standard;sort=occur;didno=US-PPiU-dar192504;idno=US-PPiU-dar192504;byte=42700417;focusrgn=summaryinfo
0.564561
Date of Award Doctor of Philosophy (PhD) Measurements by dielectric spectroscopy, ultrasonics and calorimetry ofseveral low viscosity monomeric liquids undergoing spontaneous chemical reaction, to form three new, linear chain polymers under isothermal conditions, have been used to determine how the number ofcovalent bonds formed during the growth of a linear chain affects the dielectric and ultrasonic properties, their respective relaxation times, and their spectral shape. The dielectric properties changed in the following manner. During this reaction, the static permittivity decreased and the relaxation time increased towards limiting values. As the number of covalent bonds increased towards the Avogadro number, the change in the complex permittivity as measured for a fixed frequency was phenomenologically similar to that observed on varying the frequency, although the exact formalisms in both cases differed. In both cases the relaxation function could be well described by a stretched exponential or sum ofexponentials, characterized by a temperature and system dependent exponent that decreased as the state of the system changed from a monomeric liquid to a fully reacted polymer. At later stages of chemical reaction a second relaxation process at higher frequencies is revealed. The dielectric manifestation of the irreversible process of covalent bond formation is remarkably similar to that observed on supercooling a molecular or polymeric liquid. Longitudinal velocity and attenuation of ultrasonic waves travelling through the three molecular liquids at different temperatures have been measured as its molecules combine irreversibly to form large entities and thereby decrease the diffusivity and increase the configurational restrictions to their dynamics. From these data, the longitudinal modulus and compliance are calculated, and the molecular relaxation time and related properties are deduced and interpreted in terms ofthe number of covalent bonds formed, by a formalism that connects the size ofthe molecules in the liquid with its elastic behaviour. This relaxation time increases monotonically with increase in the molecule's size, tending to infinity as the number ofcovalent bonds formed approaches Avogadro's number. The complex plane plots ofthe modulus and compliance have a shape which is described by a skewed arc function, with a temperature dependent exponent ϒ, that ranges in values from 0.33- 0.31 for modulus and 0.39-0.45 for compliance. Departure from this shape is shown to be due to contributions from non-zero shear viscosity for relatively small size of molecules, and contributions from a faster, or sub Tg-relaxation process when the molecular size is large, which is similar to the behaviour for the dielectric properties. Simulation of the data suggests that this sub Tg-relaxation process, which is progressively more separated from the main relaxation process as the molecular size increases, contributes significantly to the high frequency elastic properties. The measured longitudinal modulus has been deconvoluted to show that the increase in the bulk modulus, and not the shear modulus, dominates the elastic properties when the molecular size increases. Comparison ofthe calculated relaxation times for the longitudinal modulus and compliance with the dielectric relaxation time show that the compliance and dielectric data change in a remarkably similar manner with increasing time of chemical reaction, which is unexpected owing to their different mechanisms. In the last part of this work, the dipolar diffusion in the glassy and supercooled liquid states of 9 additional molecular liquids and oftheir linear chain or network polymerized states formed by condensation-polymerization at different temperatures and times have been studied by measuring the dielectric properties for a fixed ac frequency of 1 kHz. The study showed that as the extent of polymerization increased with increasing isothermal temperature of polymerization, the sub-Tg relaxation peak due to localized molecular motions in the molecular state became gradually extinct, and a corresponding peak at a higher temperature evolved and reached its maximum height. The temperature of the sub-Tg relaxation peak in the polymerized state differed from that of the α-relaxation peak of the supercooled molecular liquid by as much as 70K, but, in several cases, the two temperatures were similar. Reasons for the latter occurrence are given in phenomenogical terms. It is concluded that the localized relaxation modes of the polar segments of the macromolecule are not related to the modes of molecular diffusion in the monomeric liquid state above its Tg. The localized relaxation characteristic of the glassy molecular state persists in the incompletely polymerized state, where it is seen as a ϒ-relaxation. Parthun, Matthew Giles, "Dielectric and Ultrasonic Studies of Macromolecular Growth During Polymerization" (1997). Open Access Dissertations and Theses. Paper 3988.
<urn:uuid:69354dfe-2db1-466b-b58e-8a21563dcdfd>
2013-05-24T01:30:49Z
CC-MAIN-2013-20
[ [ -0.027587890625, 0.005889892578125, 0.001983642578125, -0.002349853515625, 0.072265625, -0.0888671875, 0.0025482177734375, 0.1220703125, -0.0306396484375, -0.016357421875, 0.07763671875, -0.000438690185546875, -0.06884765625, 0.072265625, 0.0277099609375...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.929271
980
http://digitalcommons.mcmaster.ca/opendissertations/3988/
0.192008
Setting up your workstation for Joomla development |This article or section is in the process of an expansion or major restructuring. You are welcome to assist in its construction by editing it as well. If this article or section has not been edited in several days, please remove this template.| This is a trial to better structure all the wiki pages around developing on and with joomla. Such as: - Setting up your workstation for PHP development. A step-by-step guide to configure a PHP development environment. - Setting up your workstation for Joomla! development. A step-by-step guide to installing the Eclipse IDE on your local workstation for Joomla! (itself) development. - Setting up your workstation for extension development A guide to Joomla Extension development Installing a web server - WAMP, LAMP, wikipedia: MAMP , ... Installing an IDE / Editor (and debugging) - Eclipse IDE - Komodo Edit - UltraEdit, Notepad++, ... Installing a version control If you like to contribute to the actual Joomla! code, SVN is what is used there. Installing a build mechanism - Setting up your workstation for extension development (build with Phing) - Extension development using eclipse and phing This article explains one way in which you can set up your workstation for writing Joomla! extensions. It assumes that you are using Eclipse and that you are familiar with using Eclipse for working with Joomla! and Subversion. For more information about the basics of getting started with Eclipse for Joomla! development. Help is appreciated finding related pages and making these pages less redundant.
<urn:uuid:0cc39e87-7efa-4078-8dd0-5e5576d6d8ee>
2013-05-24T02:01:21Z
CC-MAIN-2013-20
[ [ -0.03133753687143326, 0.017331933602690697, 0.028011204674839973, 0.015318627469241619, 0.08088235557079315, -0.009628851898014545, 0.003545168088749051, 0.07528011500835419, -0.019695378839969635, 0.012605042196810246, 0.01864495873451233, 0.06582633405923843, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.844138
361
http://docs.joomla.org/index.php?title=Setting_up_your_workstation_for_Joomla_development&oldid=71186
0.271787
In her article "Visions of Catastrophe in the Poetry of Miklós Radnóti" Zsuzsanna Ozsváth proposes that the poet's work shows an evolution of a set of visionary images auguring the Holocaust. This development followed on the heels of the poet's earlier interest in the socialist, populist, and left-oriented movements and ideas that drove a number of Hungarian artists and young intellectuals of the time. Immersed in social-cultural activities during his university years in Szeged (1930-35), Radnóti underwent a significant change when he moved back to Budapest. He recognized the threat posed by the Third Reich and watched with great consternation the involvement of a number of Hungarian intellectuals and politicians in rightist and anti-Semitic activities and propaganda. Responding to this development, he started to warn of the impending catastrophe and suggest the breakthrough of previously unimaginable forces in the world. Ozsváth's study of Radnóti's work reveals a frequency and intensity of these visions, connoting more than the poet's disagreement with contemporary political developments and his foresight of destruction and mass murder. "Visions of Catastrophe in the Poetry of Miklós Radnóti." CLCWeb: Comparative Literature and Culture This text has been blind peer reviewed by 2+1 experts in the field. The above text, published by Purdue University Press ©Purdue University, has been downloaded 458 times as of 05/12/13. CLCWeb: Comparative Literature and Culture is published by Purdue University Press ©Purdue University in open access. Please support the journal: Click here for more information and to make your donation online.
<urn:uuid:b8fc3fea-ad64-4c93-83c6-0722e3f4c509>
2013-05-24T01:31:12Z
CC-MAIN-2013-20
[ [ -0.009750326164066792, 0.009995104745030403, 0.015013054944574833, 0.008852806873619556, 0.09986945241689682, -0.047650132328271866, -0.004365209024399519, 0.1070496067404747, -0.015502611175179482, -0.05483028665184975, 0.05580940097570419, 0.003651272738352418, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.917105
354
http://docs.lib.purdue.edu/clcweb/vol11/iss1/2/
0.330593
We investigated the properties of the distribution of human solution times for Traveling Salesperson Problems (TSPs) with increasing numbers of nodes. New experimental data are presented that measure solution times for carefully chosen representative problems with 10, 20, . . . 120 nodes. We compared the solution times predicted by the convex hull procedure proposed by MacGregor and Ormerod (1996), the hierarchical approach of Graham, Joshi, and Pizlo (2000), and by five algorithms drawn from the artificial intelligence and operations research literature. The most likely polynomial model for describing the relationship between mean solution time and the size of a TSP is linear or near-linear over the range of problem sizes tested, supporting the earlier finding of Graham et al. (2000). We argue the properties of the solution time distributions place strong constraints on the development of detailed models of human performance for TSPs, and provide some evaluation of previously proposed models in light of our findings. Dry, Matthew; Lee, Michael D.; Vickers, Douglas; and Hughes, Peter "Human Performance on Visually Presented Traveling Salesperson Problems with Varying Numbers of Nodes," The Journal of Problem Solving: 1, Article 4.
<urn:uuid:cb53d159-5840-4133-9b61-0b2d1ca8b9bd>
2013-05-24T01:51:47Z
CC-MAIN-2013-20
[ [ -0.01774553582072258, 0.0014997209655120969, 0.01662946492433548, 0.0068917409516870975, 0.09330356866121292, -0.05892857164144516, 0.00454799085855484, 0.07500000298023224, -0.01618303544819355, -0.04933035746216774, 0.06607142835855484, 0.00853794626891613, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.875253
252
http://docs.lib.purdue.edu/jps/vol1/iss1/4/
0.184029
Simple wrapper for api objects Define _attrs on the child class and pass in the api object as the only argument to the constructor Simple wrapper for api dictionaries Some api calls return dictionaries. This class provides identical behavior as APIResourceWrapper, except that it will also behave as a dictionary, in addition to attribute accesses. Attribute access is the preferred method of access, to be consistent with api resource objects from novclient.
<urn:uuid:36491599-5009-4636-9b4b-7ed2c8d4798a>
2013-05-24T01:38:09Z
CC-MAIN-2013-20
[ [ -0.07024082541465759, -0.03526376187801361, 0.04873853176832199, 0.019782109186053276, 0.01619839482009411, -0.06536697596311569, 0.04931192845106125, 0.0986238569021225, -0.037270642817020416, -0.0009765625, 0.05848623812198639, 0.05705275386571884, -0.05819953...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.815923
95
http://docs.openstack.org/developer/horizon/sourcecode/horizon/horizon.api.base.html
0.277595
You use the Overview tab to view a quick picture of the health of your grid. This tab displays the Monitoring Overview page which shows three tables that have Summary status, Cluster queue information, and aggregated Alerts for Queues, Hosts, and Jobs. You should reload this page to get the freshest data. The Summary Status table shows the total number of jobs in the grid in various states: pending, running, suspended, and so forth). It also shows the load averaged across all compute hosts and the total amount of used and installed memory summed over all compute hosts. Running Jobs – The number of all the jobs currently running in the grid. Pending Jobs – The number of jobs waiting to be dispatched by the scheduler. Suspended Jobs – The number of jobs that are temporarily suspended. Held Jobs – The number of jobs explicitly held in the pending state. Requeued Jobs – The number of jobs that were formerly running but that have been placed back in the pending state. Error Jobs – The number of jobs no longer running or that never were run due to error conditions like invalid requests. Avg Load – The amount of CPU cycles being used by all the running jobs divided by the number of compute hosts being used by the grid. Total Used Memory – The amount of total memory being used by all the running jobs in the grid. Total Memory – The total amount of memory available across all compute hosts. Total Number of Compute Hosts – The number of hosts available to execute job tasks. Throughout its duration, a running job is associated with its queue. Queues provide a way to define various job execution parameters that apply to multiple hosts. You can think of an N1GE queue as a container, or description, for a class of jobs. Queues that span multiple execution hosts are sometimes referred to as cluster queues. The Cluster Queues table shows a summary of the state of all the cluster queues configured on the grid. The slots are indicative of general performance. The states indicate which queues are running various potential error states. The fields include: Cluster Queue — The name given to a queue. Used — The number of total slots currently being used by the queue. Queues should be using all of the total slots, although in some cases, enough free resources might not be available to accommodate every slot. Alarm — When present, indicates that at least one of the load thresholds defined in the load_thresholds list of the queue configuration is currently exceeded. This state prevents N1GE from scheduling further jobs to that queue. For more information, see the queue_conf(5)) man page. Disabled — The number of slots that are not running because the queue or host has been disabled either manually or automatically. All jobs associated with that queue are also disabled. You assign and release this state to a queues using the qmod(1) command. New jobs are also not accepted by these slots, although jobs running continue to run. Suspended — The number of slots that are not running because the queue or host has been suspended either manually or automatically. All jobs associated with these slots are also suspended, and no new jobs are accepted by these slots. Error/Unknown — the number of slots that are in the error state, due either to a problem experienced by a previous job in this slot or else due to a host being unreachable. For information on cluster queues, see the Monitoring and Controlling Queues section in the N1GE 6 User's Guide and the qmon man page. For more information on queue states see the Queue Alerts. The Alerts table displays a quick look at potential or actual problems with the grid. You receive alerts when any of these categories generates a warning, an error, or becomes disabled. Clicking on a category displays the Alert page for that category which contains a table of alerts with additional information. Categories include: Items display ten rows at a time. You can see the entire list by using the pagination controls at the bottom of the table. By default, rows are displayed numerically by job ID, but you can use any column to change the ordering of the rows. Clicking on a column header sorts the rows according to the values in that column. Clicking on the column header again reverses the sort. The sorting is preserved across pages if you click on a pagination button.
<urn:uuid:b100f985-9d9a-41fa-a6aa-7d4ada863bc6>
2013-05-24T01:39:46Z
CC-MAIN-2013-20
[ [ -0.003021240234375, -0.01171875, -0.0022735595703125, -0.016357421875, 0.078125, -0.06298828125, -0.0033721923828125, 0.09716796875, -0.018310546875, -0.00787353515625, 0.1142578125, 0.00933837890625, -0.05859375, 0.0286865234375, 0.038818359375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.914909
908
http://docs.oracle.com/cd/E19089-01/n1.sysmgr13/819-5138/gcgcy/index.html
0.166049
Become superuser or assume a role that provides solaris.cluster.modify RBAC authorization. Immediately quiesce the resource group. # clresourcegroup quiesce -k resource-group The Prenet_start, Start, Monitor_start, Monitor_stop, Stop, and Postnet_stop methods that are associated with the resource group are killed immediately. The resource group is brought to a quiescent state. The clresourcegroup quiesce -k command blocks until the specified resource group has reached a quiescent state.
<urn:uuid:589bcafa-6743-4fb3-ab63-caf23d04f6d5>
2013-05-24T02:01:52Z
CC-MAIN-2013-20
[ [ -0.02401859499514103, -0.01859504170715809, 0.009232954122126102, 0.01924070157110691, 0.058109503239393234, -0.06973140686750412, 0.01859504170715809, 0.06973140686750412, 0.001581869786605239, 0.03215392678976059, 0.03719008341431618, 0.05113636329770088, -0.1...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.804322
119
http://docs.oracle.com/cd/E19787-01/820-4682/gbwmw/index.html
0.300828
To remove the power board, you must remove the following components as part of preparing the server for power board replacement: Memory mezzanine (see Remove the Memory Mezzanine Assembly) PCI mezzanine (see Remove the PCI Mezzanine Assembly) System Fan 0 (see Remove the System Fan Assembly (Fan Tray 0)) Optical media drive (see Remove the Optical Media Drive) Motherboard (see Remove the Motherboard Assembly) Figure 5-11 Removing the Power Board Screws Note - After replacing the power distribution board and powering on the system, you must run the ALOM CMT setcsn and setcpn commands to set the electronically readable chassis serial number and server part number. Caution - When performing the following steps, use special care to enter the correct numbers. Once the power distribution board has been programmed with a chassis serial number or server part number, the number cannot be changed. sc> setsc sc_servicemode true Warning: misuse of this mode may invalidate your warranty. sc> setcsn -c chassis_serial_number Are you sure you want to permanently set the Chassis Serial Number to chassis_serial_number [y/n]? y setcsn: Chassis serial number recorded. sc> setcpn -p chassis_part_number Are you sure you want to permanently set the Chassis Part Number to chassis_part_number [y/n]? y setcpn: Chassis part number recorded. sc> showplatform Sun-Netra-T5440 Chassis Serial Number: chassis_serial_number Domain Status ------ ------ SO Running sc> setsc sc_servicemode false
<urn:uuid:8f385a73-8916-44db-b042-184aaa2c53bc>
2013-05-24T01:46:07Z
CC-MAIN-2013-20
[ [ -0.014366882853209972, 0.01550324633717537, 0.0017654220573604107, -0.008766233921051025, 0.10324675589799881, -0.02321428619325161, -0.005316558293998241, 0.09090909361839294, -0.05000000074505806, 0.005641233641654253, 0.06461039185523987, 0.013555195182561874, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.796557
356
http://docs.oracle.com/cd/E19874-01/E27132/z40000831031610.html
0.371027
Exceptions are a means of breaking out of the normal flow of control of a code block in order to handle errors or other exceptional conditions. An exception is The Python interpreter raises an exception when it detects a run-time error (such as division by zero). A Python program can also explicitly raise an exception with the raise statement. Exception handlers are specified with the try ... except statement. The try ... finally statement specifies cleanup code which does not handle the exception, but is executed whether an exception occurred or not in the preceding code. Python uses the ``termination'' When an exception is not handled at all, the interpreter terminates execution of the program, or returns to its interactive main loop. In either case, it prints a stack backtrace, except when the exception is Exceptions are identified by string objects or class instances. Selection of a matching except clause is based on object identity (i.e., two different string objects with the same value represent different exceptions!) For string exceptions, the except clause must reference the same string object. For class exceptions, the except clause must reference the same class or a base class of it. When an exception is raised, an object (maybe None) is passed as the exception's ``parameter'' or ``value''; this object does not affect the selection of an exception handler, but is passed to the selected exception handler as additional information. For class exceptions, this object must be an instance of the exception class See also the description of the try statement in section 7.4 and raise statement in section 6.8.
<urn:uuid:369dd57f-25d9-44e6-832c-29ed8d0645d2>
2013-05-24T01:31:02Z
CC-MAIN-2013-20
[ [ -0.05662393197417259, 0.0033164173364639282, 0.030626781284809113, -0.008992165327072144, 0.012731481343507767, -0.10754986107349396, 0.02599715068936348, 0.11538461595773697, -0.040242165327072144, -0.03418803587555885, 0.12393162399530411, 0.02599715068936348, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.819068
331
http://docs.python.org/release/1.6/ref/exceptions.html
0.831943
Reading this tutorial has probably reinforced your interest in using Python -- you should be eager to apply Python to solve your real-world problems. Now what should you do? You should read, or at least page through, the Python Library Reference, which gives complete (though terse) reference material about types, functions, and modules that can save you a lot of time when writing Python programs. The standard Python distribution includes a lot of code in both C and Python; there are modules to read Unix mailboxes, retrieve documents via HTTP, generate random numbers, parse command-line options, write CGI programs, compress data, and a lot more; skimming through the Library Reference will give you an idea of what's available. The major Python Web site is http://www.python.org/; it contains code, documentation, and pointers to Python-related pages around the Web. This Web site is mirrored in various places around the world, such as Europe, Japan, and Australia; a mirror may be faster than the main site, depending on your geographical location. A more informal site is http://starship.python.net/, which contains a bunch of Python-related personal home pages; many people have downloadable software there. Many more user-created Python modules can be found in the Python Package Index (PyPI). For Python-related questions and problem reports, you can post to the newsgroup comp.lang.python, or send them to the mailing list at firstname.lastname@example.org. The newsgroup and mailing list are gatewayed, so messages posted to one will automatically be forwarded to the other. There are around 120 postings a day (with peaks up to several hundred), asking (and answering) questions, suggesting new features, and announcing new modules. Before posting, be sure to check the list of Frequently Asked Questions (also called the FAQ), or look for it in the Misc/ directory of the Python source distribution. Mailing list archives are available at http://www.python.org/pipermail/. The FAQ answers many of the questions that come up again and again, and may already contain the solution for your problem. See About this document... for information on suggesting changes.
<urn:uuid:38f062ba-9102-4f56-a7fd-1c3d0fed3eab>
2013-05-24T01:58:09Z
CC-MAIN-2013-20
[ [ -0.024257425218820572, 0.017450494691729546, 0.019801979884505272, 0.01955445483326912, 0.04282178357243538, -0.023638613522052765, 0.023762376978993416, 0.09504950791597366, -0.011448020115494728, 0.019925743341445923, 0.05915841460227966, 0.038118813186883926, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.895496
451
http://docs.python.org/release/2.3.4/tut/node13.html
0.222327
The cerebrum, the largest part of the brain, is separated into the right and left hemispheres. The right hemisphere is in charge of the functions on the left-side of the body, as well as many cognitive functions. A right-side stroke happens when the brain’s blood supply is interrupted in this area. Without oxygen and nutrients from blood, the brain tissue quickly dies. A stroke is a serious condition. It requires emergency care. There are two main types of stroke: An ischemic stroke (the more common form) is caused by a sudden decrease in blood flow to a region of the brain, which may be due to: - A clot that forms in another part of the body (eg, heart or neck) breaking off and blocking the flow in a blood vessel supplying the brain (embolus) - A clot that forms in an artery that supplies blood to the brain (thrombus) - A tear in an artery supplying blood to the brain (arterial dissection) A hemorrhagic stroke is caused by a burst blood vessel that results in bleeding in the brain. Examples of risk factors that you can control or treat include: Certain conditions, such as: - High blood pressure - High cholesterol - High levels of the amino acid homocysteine (may result in the formation of blood clots) - Atherosclerosis (narrowing of the arteries due to build-up of plaque) - Atrial fibrillation (abnormal heart rhythm) - Metabolic syndrome - Type 2 diabetes - Alcohol or drug abuse - Medicines (eg, long-term use of birth control pills ) - Lifestyle factors (eg, smoking , physical inactivity, diet) Risk factors that you cannot control include: - History of having a stroke, heart attack , or other type of cardiovascular disease - History of having a transient ischemic attack (TIA)—With a TIA, stroke-like symptoms often resolve within minutes (always in 24 hours). They may signal a very high risk of having a stroke in the future. - Age: 60 or older - Family members who have had a stroke - Gender: males - Race: Black, Asian, Hispanic - Blood disorder that increases clotting - Heart valve disease (eg, mitral stenosis ) The immediate symptoms of a right-side stroke come on suddenly and may include: - Weakness or numbness of face, arm, or leg, especially on the left side of the body - Loss of balance, coordination problems - Vision problems, especially on the left-side of vision in both eyes - Difficulty swallowing If you or someone you know has any of these symptoms, call 911 right away. A stroke needs to be treated as soon as possible. Longer-lasting effects of the stroke may include problems with: - Left-sided weakness and/or sensory problems - Speaking and swallowing - Vision (eg, inability for the brain to take in information from the left visual field) - Perception and spatial relations - Attention span, comprehension, problem solving, judgment - Interactions with other people - Activities of daily living (eg, going to the bathroom) - Mental health (eg, depression , frustration, impulsivity) The doctor will make a diagnosis as quickly as possible. Tests may include: - Exam of nervous system - Computed tomography (CT) scan —a type of x-ray that uses a computer to make pictures of the brain - CT angiogram—a type of CT scan which evaluates the blood vessels in the brain and/or neck - Magnetic resonance imaging (MRI) scan —a test that uses magnetic waves to make pictures of the brain - Magnetic resonance angiography (MRA) scan —a type of MRI scan which evaluates the blood vessels in the brain and/or neck - Angiogram —a test that uses a catheter (tube) and x-ray machine to assess the heart and its blood supply - Heart function tests (eg, electrocardiogram , echocardiogram ) - Doppler ultrasound —a test that uses sound waves to examine the blood vessels - Blood tests - Tests to check the level of oxygen in the blood - Kidney function tests - Tests to evaluate the ability to swallow Immediate treatment is needed to potentially: - Dissolve a clot causing an ischemic stroke - Stop the bleeding during a hemorrhagic stroke In some cases, oxygen therapy is needed. Medicines may be given right away for an ischemic stroke to: - Dissolve clots and prevent new ones from forming - Thin blood - Control blood pressure - Reduce brain swelling - Treat an irregular heart rate Cholesterol medicines called statins may also be given. For a hemorrhagic stroke, the doctor may give medicines to: - Work against any blood-thinning drugs that you may regularly take - Reduce how your brain reacts to bleeding - Control blood pressure - Prevent seizures For an ischemic stroke, procedures may be done to: - Reroute blood supply around a blocked artery - Remove the clot or deliver clot-dissolving medicine (embolectomy) - Remove fatty deposits from a carotid artery (major arteries in the neck that lead to the brain) ( carotid artery endarterectomy ) - Widen carotid artery and add a mesh tube to keep it open ( angioplasty and stenting ) For a hemorrhagic stroke, the doctor may: - Remove a piece of the skull ( craniotomy ) to relieve pressure on the brain and remove blood clot - Place a clip on or a tiny coil in the aneurysm to stop it from bleeding A rehabilitation program focuses on: - Physical therapy—to regain as much movement as possible - Occupational therapy—to assist in everyday tasks and self-care - Speech therapy—to improve swallowing and speech challenges - Psychological therapy—to help adjust to life after the stroke To help reduce your chance of having a stroke, take the following steps: - Exercise regularly . - Eat a healthy diet that includes fruit, vegetables, whole grains, and fish. - Maintain a healthy weight. - If you drink alcohol , drink only in moderation (1-2 drinks per day). - If you smoke, quit . - If you have a chronic condition, like high blood pressure or diabetes, get proper treatment. - If recommended by your doctor, take a low-dose aspirin every day. - If you are at risk for having a stroke, talk to your doctor about taking statin medicines . - Reviewer: Rimas Lukas, MD - Review Date: 06/2012 - - Update Date: 00/61/2012 -
<urn:uuid:6f093826-dc99-4b9c-9f16-033ec6f1ac6f>
2013-05-24T01:37:52Z
CC-MAIN-2013-20
[ [ 0.0242919921875, 0.00008869171142578125, 0.01104736328125, -0.01507568359375, 0.130859375, -0.0654296875, -0.0224609375, 0.146484375, -0.01361083984375, -0.03271484375, 0.083984375, 0.0181884765625, -0.01031494140625, 0.043212890625, 0.051025390625, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885188
1,443
http://doctors-hospital.net/your-health/?/645168/Right-hemisphere-stroke
0.275659
Dragons are creatures with nearly unlimited life spans. They can survive for long periods of time, and no one has found a dragon that has died of old age. Adolescence is usually marked by the growth of a hatchling’s wings, although not all breeds of dragons grow wings and some breeds have other traits that indicate the beginning of maturation. Once they hit adolescence, hatchlings change quickly, maturing to their full forms in only 2 years. Dragons don’t communicate with each other verbally, but they will growl to scare off predators and frighten prey. Young dragons will emit an extremely high-pitched squeal when they are frightened. To communicate, they use telepathy with each other and to speak to other creatures. Striped dragons come in a dazzling array of colors complemented by an intricate pattern of stripes. These bright colors and patterns help attract their favorite food, insects. Because their prey is so tiny, striped dragons must spend a large portion of their day eating. The color of the offspring is usually determined by the dragon’s mate.
<urn:uuid:cc0031f0-f607-4c57-989a-b3a50ed01f7b>
2013-05-24T02:04:24Z
CC-MAIN-2013-20
[ [ -0.03815542906522751, 0.008602527901530266, 0.01024110522121191, 0.0230571161955595, 0.10908239334821701, -0.05945692956447601, 0.0015215355670079589, 0.08239700645208359, 0.0013240285916253924, -0.04517790302634239, 0.10674156993627548, 0.009714419022202492, 0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9561
224
http://dragcave.net/view/LRbp
0.158384
As a graduate student working for LIGO (the Laser Interferometer Gravitational wave Observatory), one of my responsibilities was maintaining date-time code, including accounting for leap seconds, and calculating dates and time thousands of years in the past. What is a leap second? Well, the Earth's rotation rate is slowing down. So, as time goes on the length of the day is longer. This rate is very slow. Every few years, the added length must be taken into account, much like the leap day takes into account that the orbital period of the Earth around the Sun is not exactly 365 days. When a leap second must be inserted is not predictable. The International Earth Rotation and Reference Systems Service is tasked with making observations of the Earth, and producing a twice-yearly report on whether a leap second is due to be added. This comes out by email, and on their website. The report gives a 6-month or so lead time before the leap second is inserted, at midnight on Jan 1 and on Jul 1. So, apparently, a leap second was inserted last night: all standard atomic clocks around the world paused for a second. This caused all sorts of havoc with computers and networking devices, causing lots of sites to go down. Notably, Google was prepared.
<urn:uuid:4eaa9fc8-8c68-4ecb-87a7-c58a5ccddbef>
2013-05-24T01:37:10Z
CC-MAIN-2013-20
[ [ -0.06271331012248993, 0.02559726871550083, -0.011678754352033138, 0.002559727057814598, 0.04372866824269295, -0.05759385600686073, 0.00310633541084826, 0.06015358492732048, -0.003626279765740037, 0.007785836234688759, 0.09684300422668457, -0.014291808940470219, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959025
262
http://drauh.typepad.com/blog/2012/07/index.html
0.345851
Friday, we at Studio "Deep Hypothetics," did Wonder Woman sketches to donate to an auction to benefit domestic violence programs. And today we decided to follow through with geeky "create your own Green Lantern sketches. I felt in a bit of a silly mood I guess as I give you: "Soylent Green Lantern:"
<urn:uuid:31084835-a60e-47a0-959a-71b1a17007c6>
2013-05-24T01:36:52Z
CC-MAIN-2013-20
[ [ -0.04511718824505806, -0.0015380859840661287, 0.0027343749534338713, 0.012011718936264515, 0.02871093712747097, 0.0166015625, -0.01010742224752903, 0.037109375, -0.01279296912252903, 0.01406249962747097, 0.06132812425494194, 0.01640624925494194, 0.07187499850988...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946791
77
http://draw-bridge.blogspot.com/2010/09/green-lantern.html
0.225965
Here is a recent illustration I did for Intelligent Life about quasicrystals. The AD was the ever awesome Martin Lovelock. Do you know what they are? I didn't! According to Wikipedia: "A quasiperiodic crystal, or, in short, quasicrystal, is a structure that is ordered but not periodic. A quasicrystalline pattern can continuously fill all available space, but it lacks translational symmetry. While crystals, according to the classical crystallographic restriction theorem, can possess only two, three, four, and six-fold rotational symmetries, the Bragg diffraction pattern of quasicrystals shows sharp peaks with other symmetry orders, for instance five-fold." Not only that, they're really beautiful patterns. I'd like to use more of them in my work, I think I just may.
<urn:uuid:f8b1e83d-92fc-4ef0-85c5-0a64782dc8f7>
2013-05-24T01:38:39Z
CC-MAIN-2013-20
[ [ -0.0628272220492363, 0.0039471532218158245, 0.0017077061347663403, 0.021760471165180206, 0.01783376932144165, -0.053010471165180206, 0.01153468620032072, 0.11321989446878433, -0.043193716555833817, -0.05988219752907753, 0.07395287603139877, 0.004356184508651495, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.93954
183
http://drawger.com/taxman/index.php?section=comments&article_id=13674
0.620765
I'm continually amazed at how powerful drupal can be. Im using Drupal 7 and right now I am curious to see if its possible to create a field for a custom content type where I enter text that becomes links via an unordered list. I would love if I could enter this into the CMS without having to go into the code. I managed to find a way of creating the unordered list by customizing the field template file (field.tpl.php) which is great, but curious if there is a way to wrap the text items in an href. <li><a href="link1.com">Link 1</a></li> <li><a href="link2.com">Link 2</a></li> <li><a href="link3.com">Link 3</a></li> I tried to add the links in drupal and then have it show up in the front end, but the code was output in the browser. <a href="link1.com">Link 1</a> <a href="link2.com">Link 2</a> <a href="link3.com">Link 3</a> It would be nice to have it be with no code in case anyone without knowing how to do that could enter it at a later date.
<urn:uuid:fb911569-c1e9-494f-9807-1db2636f84bc>
2013-05-24T01:55:32Z
CC-MAIN-2013-20
[ [ -0.043218083679676056, 0.030141843482851982, 0.013464096002280712, -0.013907358050346375, 0.04587765783071518, -0.035904254764318466, 0.0009904144098982215, 0.06870567053556442, -0.007978723384439945, 0.0025487588718533516, 0.01025044359266758, 0.05939716473221779, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.877449
277
http://drupal.org/node/1863926
0.765916
Environmental Economics & Policies; Economic Theory & Research; Banks & Banking Reform; National Governance; Health Monitoring & Evaluation; Municipal Financial Management; Public Health Promotion Summary: The authors present a political economy model in which policy is the outcome of an interaction between three actors: government (G), managers and workers (W), and transfer recipients (P). The government's objective is to stay in power, for which it needs the support of either P or W. It can choose slow privatization with little asset stripping and significant taxation, thus protecting the fiscal base out of which it pays pensioners relatively well (as in Poland). Or it can give away assets and tax exemptions to managers and workers, who then bankroll it and deliver the vote, but it thereby loses taxes and pays little to pensioners (as in Russia). The authors apply this model to Russia for the period 1992-96. An empirical analysis of electoral behavior in the 1996 presidential election shows that the likelihood of someone voting for Yeltsin did not depend on that person's socioeconomic group per se. Those who tended to vote for Yeltsin were richer, younger, and better educated and had more favorable expectations for the future. Entrepreneurs, who had more of these characteristics, tended to vote for Yeltsin as a result, while pensioners, who had almost none, tended to vote against Yeltsin. Unlike Poland, Russia failed to create pluralist politics in the early years of the transition, so no effective counterbalance emerged to offset managerial rent-seeking and the state was easily captured by well-organized industrial interests. The political elite were reelected because industrial interests bankrolled their campaign in return for promises that government largesse would continue to flow. Russia shows vividly how political economy affects policymaking, because of how openly and flagrantly government granted favors in return for electoral support. Bur special interests, venal bureaucrats, and the exchange of favors tend to be the rule, not the exemption, elsewhere as well. Official, scanned versions of documents (may include signatures, etc.)
<urn:uuid:0b659e71-5feb-428a-817a-58a81ac25797>
2013-05-24T01:38:41Z
CC-MAIN-2013-20
[ [ 0.024766597896814346, 0.035269711166620255, 0.001961229369044304, 0.007455912884324789, 0.0695020779967308, -0.09336099773645401, -0.018931536003947258, 0.15041494369506836, -0.010178942233324051, -0.017505187541246414, 0.06275933980941772, 0.017245851457118988, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952666
413
http://econ.worldbank.org/external/default/main?ImgPagePK=64202990&entityID=000094946_00022905315633&menuPK=64168175&pagePK=64210502&theSitePK=477894&piPK=64210520
0.408986
Editor's note: Peter Bergen, CNN's national security analyst, is director of the national security studies program at the New America Foundation, a Washington-based think tank that seeks innovative solutions across the ideological spectrum, and the author of the new book "Manhunt: The Ten-Year Search for Bin Laden -- From 9/11 to Abbottabad." Jennifer Rowland is a program associate at the New America Foundation Washington (CNN) -- A decade ago, the United States had a virtual monopoly on drones. Not anymore. According to data compiled by the New America Foundation, more than 70 countries now own some type of drone, though just a small number of those nations possess armed drone aircraft. The explosion in drone technology promises to change the way nations conduct war and threatens to begin a new arms race as governments scramble to counterbalance their adversaries. Late last month, China announced that it would use surveillance drones to monitor a group of uninhabited islands in the South China Sea that are controlled by Japan but claimed by China and Taiwan. In August 2010, Iran unveiled what it claimed was its first armed drone. And on Tuesday, the country's military chief, Gen. Amir Ali Hajizadeh, disclosed details of a new long-range drone that he said can fly 2,000 kilometers (1,250 miles), which puts Tel Aviv easily in range. But without an international framework governing the use of drone attacks, the United States is setting a dangerous precedent for other nations with its aggressive and secretive drone programs in Pakistan and Yemen, which are aimed at suspected members of al Qaeda and their allies. Just as the U.S. government justifies its drone strikes with the argument that it is at war with al Qaeda and its affiliates, one could imagine that India in the not too distant future might launch such attacks against suspected terrorists in Kashmir, or China might strike Uighur separatists in western China, or Iran might attack Baluchi nationalists along its border with Pakistan. This moment may almost be here. China took the United States by surprise in November 2010 at the Zhuhai Air Show, where it unveiled 25 drone models, some of which were outfitted with the capability to fire missiles. It remains unclear just how many of China's drones are operational and how many of them are still in development, but China is intent on catching up with the United States' rapidly expanding drone arsenal. When President George W. Bush declared a "War on Terror" 11 years ago, the Pentagon had fewer than 50 drones. Now, it has around 7,500. As Bush embarked on that war, the United States had never used armed drones in combat. The first U.S. armed drone attack, which appears to be the first such strike ever, took place in mid-November 2001 and killed the military commander of al Qaeda, Mohammed Atef, in Afghanistan. Since then, the CIA has used drones equipped with bombs and missiles hundreds of times to target suspected militants in Pakistan and Yemen. Only the United States, United Kingdom and Israel are known to have launched drone strikes against their adversaries, although other members of the International Security Assistance Force in Afghanistan, such as Australia, have "borrowed" drones from Israel for use in the war there. Drone technology is proliferating rapidly. A 2011 study estimated that there were around 680 active drone development programs run by governments, companies and research institutes around the world, compared with just 195 in 2005. In 2010, U.S.-based General Atomics received export licenses to sell unarmed versions of the Predator drone to Saudi Arabia, Egypt, Morocco and the United Arab Emirates. And in March, the U.S. government agreed to arm Italy's six Reaper drones but rejected a request from Turkey to purchase armed Predator drones. An official in Turkey's Defense Ministry said in July that Turkey planned to arm its own domestically produced drone, the Anka. Israel is the world's largest exporter of drones and drone technology, and the state-owned Israeli Aerospace Industries has sold to countries as varied as Nigeria, Russia and Mexico. Building drones, particularly armed drones, takes sophisticated technology and specific weaponry, but governments are increasingly willing to invest the necessary time and money to either buy or develop them, as armed drones are increasingly seen as an integral part of modern warfare. Sweden, Greece, Switzerland, Spain, Italy and France are working on a joint project through state-owned aeronautical companies and are in the final stages of developing an advanced armed drone prototype called the Dassault nEURon, from which the France plans to derive armed drones for its air force. And Pakistani authorities have long tried to persuade the United States to give them armed Predator drones, while India owns an armed Israeli drone designed to detect and destroy enemy radar, though it does not yet have drones capable of striking other targets. The Teal Group, a defense consulting firm in Virginia, estimated in June that the global market for the research, development and procurement of armed drones will just about double in the next decade, from $6.6 billion to $11.4 billion. States are not alone in their quest for drones. Insurgent groups, too, are moving to acquire this technology. Last year, Libyan opposition forces trying to overthrow the dictator Moammar Gadhafi bought a sophisticated surveillance drone from a Canadian company for which they paid in the low six figures. You can even buy your own tiny drone on Amazon for $250. (And for an extra $3.99, you can get next-day shipping.) As drone technology becomes more widely accessible, it is only a matter of time before well-financed drug cartels acquire them. And you can imagine a day in the not too distant future where armed drones are used to settle personal vendettas. Given the relatively low costs of drones -- already far cheaper than the costs of a fighter jet and of training a fighter jet pilot -- armed drones will play a key role in future conflicts. While the drone industry thrives and more companies, research institutes and nations jump on board the drone bandwagon, the United States is setting a powerful international norm about the use of armed drones, which it uses for pre-emptive attacks against presumed terrorists in Pakistan and Yemen. It is these kinds of drone strikes that are controversial; the use of drones in a conventional war is not much different than a manned aircraft that drops bombs or fires missiles. According to figures compiled by the New America Foundation, drone attacks aimed at suspected militants are estimated to have killed between 1,900 and 3,200 people in Pakistan over the past eight years. While there has been considerable discussion of the legality of such strikes in a number of U.S. law schools, there has been almost no substantive public discussion about drone attacks among policymakers at the international level. The time has come for some kind of international convention on the legal framework surrounding the uses of such weapons, which promise to shape the warfare of the future as much as tanks and bombers did during the 20th century. (Fatima Mustafa and Farhad Peikar contributed to the research for this article.) Follow @CNNOpinion on Twitter Join us at Facebook/CNNOpinion
<urn:uuid:9a843e71-eb7b-4fa0-ae2c-122d84a26c16>
2013-05-24T01:38:13Z
CC-MAIN-2013-20
[ [ -0.0255126953125, 0.05224609375, -0.0014495849609375, 0.033935546875, 0.10400390625, -0.078125, -0.0230712890625, 0.12890625, -0.03515625, -0.0361328125, 0.05908203125, 0.022216796875, -0.005859375, -0.00164031982421875, 0.038818359375, 0.0126953125,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954151
1,481
http://edition.cnn.com/2012/10/01/opinion/bergen-world-of-drones/index.html?hpt=hp_c1
0.274739
Thursday, September 15, 2011 Some varieties of atheism A religion typically has both practical and theoretical aspects. The former concern its moral teachings and rituals, the latter its metaphysical commitments and the way in which its practical teachings are systematically articulated. An atheist will naturally reject not only the theoretical aspects, but also the practical ones, at least to the extent that they presuppose the theoretical aspects. But different atheists will take different attitudes to each of the two aspects, ranging from respectful or even regretful disagreement to extreme hostility. And distinguishing these various possible attitudes can help us to understand how the New Atheism differs from earlier varieties. Consider first the different attitudes an atheist might take to the theoretical side of a religion. There are at least three such attitudes, which, going from the most hostile to the least hostile, could be summarized as follows: 1. Religious belief has no serious intellectual content at all. It is and always has been little more than superstition, the arguments offered in its defense have always been feeble rationalizations, and its claims are easily refuted. 2. Religious belief does have serious intellectual content, has been developed in interesting and sophisticated ways by philosophers and theologians, and was defensible given the scientific and philosophical knowledge available to previous generations. But advances in science and philosophy have now more or less decisively refuted it. Though we can respect the intelligence of an Aquinas or a Maimonides, we can no longer take their views seriously as live options. 3. Religious belief is still intellectually defensible today, but not as defensible as atheism. An intelligent and well-informed person could be persuaded by the arguments presented by the most sophisticated contemporary proponents of a religion, but the arguments of atheists are at the end of the day more plausible. Obviously one could take one of these attitudes towards some religions, and another of them towards other religions. For example, a given atheist might take a type 1 atheist position with respect to Christianity and a type 2 atheist position with respect to Buddhism (or whatever). Or he might take a type 1 attitude towards some versions of Christianity but a type 2 or type 3 attitude towards other versions of Christianity. Now, among well-known atheists, it seems to me that Quentin Smith is plausibly to be regarded as taking a type 3 attitude toward Christianity, at least as Christianity is represented by prominent philosophers of religion like William Lane Craig or Alvin Plantinga. Keith Parsons, by contrast, seems to take at best a type 2 attitude towards Christianity and maybe even a type 1 attitude. And Jerry Coyne seems almost certainly to take a type 1 attitude, though perhaps on a good day and with respect to at least some varieties of religious belief he’d move up to type 2. (I’m happy to be corrected by Smith, Parsons, or Coyne if I’ve got any of them pegged wrong.) Now let’s consider three different attitudes an atheist could take toward the practical side of a religion, going again from the most hostile to the least hostile: A. Religious practice is mostly or entirely contemptible and something we would all be well rid of. The ritual side of religion is just crude and pointless superstition. Religious morality, where it differs from secular morality, is sheer bigotry. Even where certain moral principles associated with a particular religion have value, their association with the religion is merely an accident of history. Moreover, such principles tend to be distorted by the religious context. They certainly do not in any way depend on religion for their justification. B. Religious practice has a certain admirable gravitas and it is possible that its ritual and moral aspects fulfill a real human need for some people. We can treat it respectfully, the way an anthropologist might treat the practices of a culture he is studying. But it does not fulfill any universal human need, and the most intelligent, well educated, and morally sophisticated human beings certainly have no need for it. C. Religious practice fulfills a truly universal or nearly universal human need, but unfortunately it has no rational foundation and its metaphysical presuppositions are probably false. This is a tragedy, for the loss of religious belief will make human life shallower and in other ways leave a gaping void in our lives which cannot plausibly be filled by anything else. It may even have grave social consequences. But it is something we must find a way to live with, for atheism is intellectually unavoidable. Here too a given atheist might of course take attitude A towards some religions or some forms of a particular religion, while taking attitude B or C towards others. Once again, Jerry Coyne seems to be an example of an atheist whose attitude toward religion lays more or less at the most negative end (A). Perhaps Stephen Jay Gould took something like attitude B. Atheists of a politically or morally conservative bent typically take either attitude B or attitude C (though I know at least one prominent conservative who is probably closer to attitude A). Walter Kaufmann is another good example of an atheist (or at least an agnostic) who took something like attitude B towards at least some forms of religion. Indeed, he seemed to regard religion as something that speaks to deep human needs and whose moral aspects are of great and abiding philosophical interest. Now these two sets of possible attitudes can obviously be mixed in a number of ways. That is to say, a given atheist might take a more negative attitude towards the theoretical side of a given religion and a more positive attitude towards its practical side, or vice versa. And he might take different mixtures of attitudes towards different religions or forms of religion. For instance, he might take attitudes 2 and C towards some kinds of religious belief, and 1 and A towards other kinds. Thus we could classify atheists according to their combinations of attitudes towards the practical and theoretical sides of religion or of a particular religion -- A1, B3, C2, and so forth. An A1 atheist, then, would be the most negative sort, especially if he took an A1 attitude towards most or all forms of religion. A C3 atheist would be the most positive. At different times during my own years as an atheist, I would say that I tended to take either a B or C attitude towards the practical side of religion, and perhaps attitude 2 towards the theoretical side (at least until the latter part of my atheist years, when I started to move to 3 before finally giving up atheism). No doubt I had moments when I probably came across as more of an attitude 1 and/or attitude A type atheist with respect to at least some forms of religious belief -- it’s easier to remember specific arguments with people than what one’s general attitude was during a given year, say -- but overall I’d say that I probably hovered around B2 territory for at least much of my time as an atheist. (Walter Kaufmann was one of my heroes in those days. Indeed, Kaufmann’s attitude towards Christianity -- which was more negative than his attitude towards other religions -- influenced my own, and no doubt helped delay my eventual return to the Church.) I find that atheists who fall on the most negative ends of these scales -- A1 territory -- are invariably the ones who are the least well-informed about what the religions they criticize actually believe, and the least rational when one tries to discuss the subject with them. And when you think about it, even before one gets into the specifics it is pretty clear that A1 is prima facie simply not a very reasonable attitude to take about at least the great world religions. To think that it is reasonable, you have to think it plausible that the greatest minds of entire civilizations -- Augustine, Aquinas, Maimonides, Avicenna, Averroes, Lao Tzu, Confucius, Mencius, Buddha, Adi Shankara, Ramanuja, et al. -- had for millennia been defending theoretical and practical positions that were not merely mistaken but were in fact nothing more than sheer bigotry and superstition, more or less rationally groundless and morally out of sync with the deepest human needs. And that simply isn’t plausible. Indeed, it’s pretty obviously ridiculous. Even if all religious belief turned out to be wrong, it simply is not at all likely that its key aspects -- and especially those aspects that recur in most or all religions -- could have survived for so long across so many cultures and attracted the respect of so many intelligent minds unless they had some significant appeal both to our intellectual and moral natures. Hence a reasonable atheist should acknowledge that it is likely that attitudes 2 or 3 and B or C are the more defensible attitudes to take towards at least the ideas of the greatest religious thinkers and the most highly developed systems of religious thought and practice. When one considers the prima facie implausibility of the A1 attitude together with the ill-informed smugness and irrationality of those who approximate it, it is pretty clear that its roots are not intellectual but emotional -- that it affords those beholden to it a sense of superiority over others, an enemy on which to direct their hatreds and resentments, a way to rationalize their rejection of certain moral restraints they dislike, and so forth. In other words, A1 atheism is pretty much exactly the sort of ill-informed bigotry and wish-fulfillment A1 atheists like to attribute to religious believers. And here’s the thing: If there is anything new about the New Atheism, it is the greater prominence of atheists who at least approximate the A1 stripe. In Walter Kaufmann’s day, A1 atheism was represented by marginal, vulgar cranks like Madalyn Murray O’Hair. Now, equally vulgar cranks like Dawkins, Harris, Hitchens, Myers, and Coyne are by no means marginal, but widely regarded as Serious Thinkers. This is the reverse of intellectual progress. And we know what Walter Kaufmann would have thought of it.
<urn:uuid:292ecef5-08e3-47a7-8c6c-2a6636c50012>
2013-05-24T01:50:40Z
CC-MAIN-2013-20
[ [ -0.0303955078125, -0.01708984375, 0.02099609375, -0.01043701171875, 0.0361328125, -0.064453125, -0.01141357421875, 0.138671875, -0.0224609375, -0.0034942626953125, 0.0712890625, 0.0031585693359375, -0.099609375, 0.04296875, 0.03564453125, -0.01782226...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96193
2,039
http://edwardfeser.blogspot.com/2011/09/some-varieties-of-atheism.html?showComment=1316111284479
0.500014
People invest an enormous amount of identity and personal energy into their own names. Names are our unique identifiers, defining us as separate to others - even for people with common names. So when organisations make rules about the names people can use online it can create signficant distress and dislocation for people. It also raises questions over who can decide your identity. Can corporations deny people the use of their legal names online simply because they don't fit a narrow model of what the corporation regards as 'appropriate naming'? A recent example I've been following is Stilgherrian's battle with Google over the use of his legal name for Google Plus. You can follow it at his blog (strong language) or read about it at The Register. Stilgherrian changed his name over thirty years ago to a mononym - a single name. His passport and official records all reflect this and those of us who know Stilgherrian personally have never experienced any dislocation or issue with engaging with him as an individual with one name. However Google's Plus service has defined rules for allowable names. Firstly it requires that you use your legal name (although Google is apparently not requiring evidence or checking with authorities in most cases to verify). Secondly, it requires that you have a first name and a last name and that there's no spaces or characters like an apostrophe in your name. Now while this might fit a certain segment of the population, there's a number of people who have either only one name (as is common in a number of countries), have spaces in their names such as "Dick Van Dyke", or use apostrophes and other non-standard characters. The net result is that Google is blocking people with names that don't match its view of what is a legal name - and requiring that people provide documented proof of their 'anomalous' legal names. I have another friend who changed her legal name to a mononym (which includes an apostrophe) over ten years ago. About two weeks ago she announced that she was changing her name to add a 'first' name, so that she could use Facebook and other social media channels to communicate with people. She had finally reached the point where her single name was excluding her from legitimate social interactions due to the naming policies of (mainly) US companies. I have a real problem with this situation, for Stilgherrian, for my friend and for the millions of other people around the world who have names that don't fit Google or Facebook's views of a legal name. Firstly, 'legal' names should be defined by governments, not corporations. Australia's governments, and many governments around the world, support a much wider variety of legal naming conventions than social networks appear to allow. Secondly, isn't it discrimination when corporations deny you access to their service due to the format of your legal name? Denying a service to an individual just because their name is structured differently to their business rules might be legally actionable. Finally, what right do corporations have to your legal name anyway - particularly if they make it public. Many people have good reasons for not revealing their legal name publicly. Those in witness protection programs, minors, people with embarrassing 'real' names and those who are widely publicly known by a name other than their legal name, are all candidates for using a different name to their legal name online for legitimate reasons. It is fair to deny people access to online services, particularly when these services are in such widespread use, just because they can't publicly disclose their legal name? All of the examples above relate to corporations. However there are examples which may also refer to government as well. There have been calls from a number of quarters in various Australian government to restrict people to the use of their legal name when commenting online. The purported reason is that people are less likely to behave inappropriately if they can be held accountable for what they say. The subtext is that people become easier to monitor and track. I am not a fan of this approach for governments either. Like above, there are legitimate reasons why people might choose to not use their legal name in online discussions. It can also be very hard to identify many people from their legal name alone, given the number of duplicates that may exist. Any step taken to require legal name use would have to attach address and proof of identity in order to identify specific individuals. Even then, identity theft would lead to many misrepresented identities. Also there are other ways authorities can identify individuals if there are legitimate reasons to do so (such as discussion of committing a crime) - using IP addresses and various analysis techniques. What is useful for government, is being able to identify consistent identities online - whether individuals choose to use their legal names or not. Consistent identities allow organisations to build user cases based on profiling views across different topics, supporting policy development and decision-making without compromising personal privacy or security and while allowing people to define themselves online as they choose. Wednesday, August 31, 2011 People invest an enormous amount of identity and personal energy into their own names. Tuesday, August 30, 2011 The ACT is holding its second Virtual Community Cabinet tonight from 7pm to 8pm, so I have again set up a livefeed to capture the tweets for the record, and to allow analysis afterwards. I am only capturing tweets including the hashtag for the event (#actvcc), so if you are participating, but don't include the hastag, your tweet will not appear below. Also note that CoverItLive, the tool I am using, doesn't necessarily capture every tweet due to the way Twitter's API works, so this may not be a complete record of the discussion. I hope that the ACT government will record it and provide an official 'transcript' after the event (although I am not aware of them doing so for the last virtual community cabinet) UPDATE: Unfortunately there was an issue with my CoverItLive, which did not start last night as scheduled, and I wasn't near a computer to check :( Therefore I didn't record the session and at this stage are not able to report on it. I'll look at alternatives through other tools to see if I can get a record of the event. A basic analysis is available from the Archivist here and a record at Twapper here. There is also a good analysis at the blog Keikaku Doori While comparatively weak compared to quakes experienced elsewhere in the world in the last year, the event was powerful in one sense. It demonstrated the speed of social media. People in New York learnt of the quake before it actually hit, by reading the tweets of people experiencing the quake in Washington. Yep that's right - news about the quake travelled faster through social media than the actual quake travelled through the ground. Here's a comic from xkcd (found via Wired) illustrating the point. Note this was written before the quake! Socialnomics reported that there were 40,000 quake-related tweets within 60 seconds. It also reported that "Facebook said it had some 3 million U.S. users updating others about the event." This included more than tweets from the public. The Socialnomics post also reported that a proportion of messages came from government agencies, According to a FEMA spokesperson, the agency put Twitter to use to alert people impacted by the quake not to use cell phones unless absolutely necessary, thereby freeing up some of the lines for emergency calls. Among the tweets was this one from the Department of Justice – “Quake: Tell friends/family you are OK via text, email and social media (@twitter & facebook.com). Avoid calls.” Meantime, New York City Mayor Michael Bloomberg tweeted – “I’ve spoken w/ our Police and Fire Commissioners & we’ve activated the Emergency Management Situation Room. Thankfully, there are no reports of significant damage or injuries in NYC at this time.” Twitter also thought it worth releasing a short 'boast' video about its speed, as republished in Mashable: The earthquake's impact on Twitter was even presented at the G-Force conference in Melbourne the same (US) day - via this video recorded and presented by Charlie Isaacs, eServices and Social Media Engineering, Alcatel Lucent. Back to the Socialnomics article, social media is becoming a critical important channel for emergency management, According to a pair of June Red Cross surveys from more than 2,000 people combined: “Social media is becoming an integral part of disaster response,” Wendy Harman, director of social strategy for the American Red Cross, said in a statement. “During the record-breaking 2011 spring storm season, people across America alerted the Red Cross to their needs via Facebook. We also used Twitter to connect to thousands of people seeking comfort, and safety information to help get them through the darkest hours of storms.” - After television and local radio, the Internet ranks the third most popular way for people to obtain emergency information with 18 percent of both the general and the online population directly using Facebook; - Nearly one fourth (24 percent) of the general population and a third (31 percent) of the online population would turn to social media to alert loved ones they are safe; - Four of five (80 percent) of the general and 69 percent of the online populations surveyed think that national emergency response organizations should regularly monitor social media sites in order to respond quickly. Now to spoil a good story, the Wired article in which I found the xkcd comic, Tweet Waves vs. Seismic Waves, did an analysis of the effectiveness of Twitter in warning people about this particular quake so that they could take action to protect themselves from its effects. The analysis, while limited in scope to this one quake, indicated that barely anyone would have had the time between receiving information via Twitter and taking an action to seek safety. Of course, social media isn't only useful for earthquakes - fires, floods and many other disasters spread at a slower rate conducive to social media warnings. Also larger earthquakes may have bigger radii, meaning there's greater prospect of people catching news via social media and having time to take action. There's also still plenty of value in getting news about a disaster as, or just after it happens, elsewhere in the world, This allows emergency management mechanisms to swing into action - in this case every minute saved can preserve lives. So I'm definitely of the view that social media has important uses in disaster and emergency situations. It can save lives directly and indirectly and help management teams do their job. Organisations just need to ensure that social media is thoroughly integrated into official disaster management plans and appropriate channels are in place before emergencies occur. After all, might it not be considered negligence if governments and organisations ignored social media in emergencies when it could save lives? Monday, August 29, 2011 I've commented before that it isn't a sound strategy for organisations to entrust their social media strategy to graduates, simply because they are young and "must understand social media". I've also commented on the need to expand social media engagement beyond the communication team to entire organisations, within designated policies. This is because communication professionals see the world through a particular set of filters that can restrict an organisation's capability to gain many of the broader benefits from social media tools. The following video does a great job of summing up my views in a single two minute long discussion, courtesy of Socialnomics author Eric Qualman (via the Digitalbuzz blog) And to throw in another video from Socialnomics...worth a look. Thursday, August 25, 2011 In what I believe might be a first in Australia, the ACT Government has released the requirements and wireframes for its upcoming open government website for public scrutiny and comment at its Time to Talk website. Essentially the ACT government has decided to allow the community to give feedback on the upcoming website's proposed functionality and design before they spend the resources to actually build it. This step could help reduce site costs and improve community satisfaction by ensuring the site is build to a specification tested to meet public needs. Of course, as this is the first time the ACT government has taken this kind of step, it may take time for people to become aware of the consultation, to consider the material and to comment. Also, many people are unfamiliar with specifications or web design processes, so it could be a challenge for them to understand and provide constructive advice. Hopefully a number of the web-savvy people in Canberra will step up, take a look and provide comment (as I intend to do). Otherwise this might be a very quiet consultation and not deliver an outcome that encourages others to take similar steps in the future. You may still have time to consider attending the Media, Entertainment & Arts Alliance and the Walkley Foundation's Public Affairs Conference in Canberra from 5-6 September this year. The conference has a significant Government 2.0 and open government flavour, looking at the new toolkit of digital communication and engagement options available to public relations professionals and the effects of the FOI reforms on public relations. There is also what looks to be a very interesting case study on the Clean Energy Future digital campaign including its social media and web engagement. I'll be presenting a keynote (on Government 2.0) at the event and participating in one of the panels. Other speakers specifically in the Gov 2.0/Open Government area will include Professor John McMillan, Australian Information Commissioner; Hank Jongon from DHS; Sandi Logan from Immigration; Tom Burton from ACMA; Kylie Johnson, University of Canberra journalism academic Julie Posetti; and Greg Jericho, known for his blog Grogsgamut. if you can't attend, keep an eye on Twitter - there should be plenty of interesting titbits from the day. Wednesday, August 24, 2011 One of the largest challenges for all forms of online use by government is how, as a late addition to the communications, engagement and policy stable of tools, web initiatives often get added to the end of processes rather than the beginning. A good example is in content development of all kinds. Often officers across agencies use desktop publishing packages to create communications materials, briefs, papers and reports, finalise them via publications teams and printers, then send the final 'web-ready' PDF to the online team, to be loaded online - usually within a few hours. This poses challenges and risks throughout. The documents may be initially created without effective use of word processor standard styles (with format issues such as the use of spaces or tabs instead of tables or paragraph marks, and poor use of nested lists), the print design process loads them up with print-quality (sometimes inaccessible) images, adds charts and tables without appropriately text alternatives and incorporates formatting that requires substantial time to replicate online or simply doesn't suit screen viewing. The final PDF may have 'printer's edits' (last minute changes at the printer) which are not replicated in the original final word processor document. This requires the online team to convert the PDF, rather than the faster and easier final word processor document, into the web version. Often the background information for charts or descriptive text for images is unavailable. Images may also not be available as separate files to the document to make them easier to embed online. Finally, due to approval timeframes or last minute edits to reflect changing events, the online team may receive the final document too close to the go live deadline to do justice to the web publishing. This often results in the PDF version being uploaded with an apology stating that the agency will convert the document to an accessible HTML web page as soon as possible. Depending on priorities this may take months, disadvantaging people who cannot access the printed or online PDF versions. As sometimes all the budgeted funds for the document are spent on the physical print process, online teams may be left without sufficient budget to do the document justice, time or dollars to convert the document into a fully web-enabled deliverable, which could be higher quality and far more usable and useful than a printable PDF. A combination of some of all of these issues adds to the cost and stress of government documents. They can put pressure on agency timelines and result in lower community satisfaction and understanding of communicated material. They may also create greater legal risks due to accessibility considerations. These potential costs could be avoided by embedding an online-first philosophy, policies and mandate throughout an agency. This would recognise at the beginning of document creation processes that content will need to be delivered online and, indeed, this might be the only, or most important, distribution channel. This approach would, after initial training and support costs, save significant expense and human effort, freeing up agency staff for higher value activities while delivering more effective, and timely, public outcomes. The shift could begin with appropriate training, support and mandates for public servants creating material which will need to go online. Including websites and intranets this reflects the majority of documentation now created by government agencies. Online teams would be engaged at the start of document creation processes, advising other staff on how specific materials can be best designed for online representation, whether as 'traditional' documents or as web services, apps, interactive modules, data feeds or in some other format. Every document would then be created using appropriate formatting in word processing tools or the appropriate alternative, with an express goal of being able to be quickly and easily placed online in an effective manner. The created documents may be structured and laid out quite differently depending on the eventual form they will take online - representing the range of variation we already see between a video script, report and brochure. The document creation process would include the steps necessary to deliver a quality accessible product, identifying the text behind every chart and appropriate explanations for every image and diagram. As documents were created, graphic templates would also be created by graphic designers, both online and print templates which can be executed through online style sheets. Using this approach documents would appear in a web browser as native webpages but, when printed, be automatically reformatted for A4 paper. This means agencies can deliver online and print versions from a single version of the content, a 'single point of truth' that removes the need to manage multiple versions, such as HTML, RTF and PDF copies. A print-quality template would also be developed at this stage as a shell for any printed copies needed. The document would be directed loaded into the web template with the metadata and alt tags required and viewed and edited online, or printed in the print template and hand edited, to finalise the document. Once approved the 'document' can be simultaneously released online and in print format, appropriately formatted for the different mediums, maximising its impact. There would be no time lag for an accessible version. Sounds too easy? Well yes, there are a number of changes that agencies need to make to implement an online-first philosophy. The most significant and influential change in agency policies. They would need to be redeveloped for the modern age, a business process improvement step to integrate web as a core platform rather than an afterthought. While significant, changing these processes is technically quite simple, it just involves adjusting a few words on (ahem) 'paper'. The most difficult change is related to people - changing culture and retraining staff responsible for producing documents (public or internal) to reflect the new capabilities and skills required of a public servant. I believe it is inevitable that agencies will gradually move in the direction of online-first publishing, for cost and efficiency reasons if not due to legislative and high-level policies (such as the recent FOI changes). However the speed and difficulty of this transition can be influenced by staff. Senior staff can set policy in their areas and embody the behaviours they support, while middle management can build their own understanding and support and encourage their teams. Those teams responsible for agency document outputs can seek out new skills through training and lobby their management to make their jobs easier, allowing them to be more productive and satisfied with their jobs. Online teams have a large central role to play, by demonstrating and modelling the behaviour themselves, identifying processes where documents are only published as web pages and piloting improved processes which lead to efficiencies (helping themselves as well as the teams responsible for the content). Online teams may also to lobby for improved training, so that officials across an agency understand how to use the word processors and other document creation tools they use daily more effectively - this knowledge by itself improves efficiency. Having a given level of skills with document creation tools, or developing it once in the job, could become a requirement of recruitment processes and performance reporting. It has often surprised me how otherwise highly intelligent and capable people may simply never have had the opportunity to learn how to most effectively use the tools of their 'trade' - document and presentation creation programs - at school, university or in the workforce. An online-first philosophy isn't native to government agencies, and it will take conscious and directed effort to make it the default approach. However in today's world, with online increasingly the first and sometimes the only distribution platform for government information, the rising cost of print, falling budgets and the legislative requirements to deliver government content online - shouldn't we be putting in active efforts to change our philosophy and make it so? Monday, August 22, 2011 Launched under the oversight of a multi-stakeholder International Steering Committee including representatives of eight governments and nine civil society representatives, and initially co-chaired by Brazil and the USA, the OGP has broad ambitions to promote open government around the globe. The OGP has already launched a networking mechanism to "help participating governments identify and connect with one another (peer to peer) and other relevant expertise and service providers (NGO and private sector) as they develop their OGP commitments and action plans. This mechanism is a partnership of Global Integrity and the World Bank Institute." The OGP will formally launch in New York City on September 20 this year when the governments on the steering committee will embrace an Open Government Declaration, announce their country action plans to promote OGP principles, and welcome the commitment of additional countries to join the Partnership. I wonder if Australia will take this opportunity to become involved. Australia is already listed as being eligible (DOC), due to our activities in the open government area and meeting the other eligibility criteria (DOC). The process for actually joining (DOC) is reasonably simple, although there are some actions the Australian Government would need to take to participate in the formal launch in September 2011 and to meet the March 2012 Open Government Action Plan So which governments and organisations are already involved? The US government, together with the governments of Brazil, Indonesia, Mexico, Norway, Philippines, South Africa and the United Kingdom, and leading civil society representatives, Africa Center for Open Governance (Kenya), Instituto de Estudos Socioeconômicos (Brazil), Instituto Mexicano para la Competitividad (Mexico), International Budget Partnership (Intl), MKSS (India), National Security Archives (US), Revenue Watch Institute (Intl), Transparency and Accountability Initiative (Intl), Twaweza (Tanzania). An interesting group, and one that Australia has much to learn from and share with. Sunday, August 21, 2011 The Chief Minister of the ACT has announced via Twitter that the next Virtual Community Cabinet (on Twitter) will be held on 30 August at 7pm AEST. As last time it will include all four ACT Cabinet Ministers, @KatyGMLA, @ABarrMLA, @SimonCorbell and @JoyBurchMLA. It will use the same hashtag, #actvcc. Participants do not require a Twitter account to watch, but will to participate. The Chief Minister also commented that further Virtual Community Cabinets would be single topic focused. I'm waiting for a copy of the transcript of the last Virtual Community Cabinet to be published (As Tom Worthington comments a record is required by law) to analyse any tweets missed in my analysis of the first event and compare the claims of 700+ Tweets with the 299 I recorded via CoverItLive. I aim to repeat my analysis for this community cabinet. Friday, August 19, 2011 If you're in town, or can make it there, I recommend that you consider attending. The event is organised by the Institute of Public Administration WA (@ipaawa) and the event hashtag is #rightClick More details below: Transform the Way You Communicate - RigthtClick 2011 Conference Attend RightClick 2011 and find out how you and your organisation can effectively use social media and new technologies in the workplace both safely and securely. Hear case studies from the public and private sector and the challenges and opportunities technology has provided. Discussions will include: - Why should government adopt digital media? - Benefits of social networking services. - Implications for policy makers and those employing young people in the workplace. - Expanding young people’s digital citizenship. - Communicating and engaging internal & external stakeholders. - Security and privacy issues. - The role of a Government 2.0 Advocate. Who should attend? Any professional interested in developing and using technology more effectively in the workplace. Tell your colleagues: We encourage you to tell interested colleagues about the conference. 9:00am - 4:30pm Hyatt Regency Perth Thursday, August 18, 2011 While the more negative views are beginning to shift, due to the active role Twitter played in the Brisbane floods, Australians still largely consider microblogs as a tool for emergency and breaking news, rather than as a tool for democracy, government engagement and accountability. In China, in dramatic contrast to Australia, government officials have been waking to the potential of microblogging services for reconnecting with the public - and to the shock of being held accountable at a speed that outraces the fastest censor. China's first microblogging services were introduced in 2009 and have grown in popularity extremely quickly. Today there are reportedly more than 195 million users of the leading microblogging services, almost ten times the population of Australia and approximately 15 percent of the Chinese population. Interestingly about the same proportion, 15 percent, of Australians use Twitter, our most popular microblog service. A Global Times study in March-April this year found that "71 percent of Chinese Web users attribute their growing interest in politics to microblogging". Of the respondents, 59.3 percent said "they had become more inclined to express their political views on microblogs" and 23.1 percent chose politics as their favourite topic of discussion via microblog (with 36.6 percent citing social news and 19.6 percent daily-life topics, such as fashion and heath). The respondents were highly in favour of politicians using microblogs, with 72.1 percent backing the idea. However two thirds (65.6 percent) complained that most government microblogs were merely publicity stunts. Microblogs have also become a major source of news in China, with the Communication University of China in Beijing reporting in their Internet Real-time Public Opinion Index Annual Report 2010 that within 20 months of being allowed into China, microblogs had become the third-favorite online source of information, after news portals and online forums. The report highlighted land acquisition and official corruption scandals as being hot on microblogging sites - both highly sensitive and politicised topics that rarely are discussed in mainstream Chinese news channels. A separate report in 2010 was reported to state that more than 20 percent of the 50 most-discussed public events in China through 2010 were first reported on by microbloggers. Government in China has increasingly recognising the potential uses and risks of microblogging. It has become increasing difficult for the Chinese government to control sensitive discussions online due to the speed and reach of microblogs. Equally the size of the main microblogging networks makes it dangerous for the Chinese government to simply close down them down. Therefore government officials are increasingly actively engaging via microblogs in order to influence conversations. In fact, "How to open a microblog" has become a training course for high-level Beijing government officials. Accordingly, in March 2011 Sina, one of the leading microblogging services, reported that there were over 3,000 official government microblog accounts on their service, spread between agencies and high-level officials. In July it was reported that 4,920 government departments and 3,949 government officials had opened microblog accounts at weibo.com. The same report indicated that the ten government microblogs in China had a total of 5.08 million followers in the first half of 2011. It has also been reported that more than 1,200 microblogs have been opened by police authorities throughout China, resulting in a number of high-profile successful convictions. For example, police in Xiamen, reported that they were able to solve the murder of a three-year-old girl in six days by releasing details of the murder via their microblog, together with a reward offer for further information. The message was forwarded more than 10,000 times and, according to a report by China Daily, led to the collection of more than 100 pieces of information used to solve the case. The highest ranking individual official microblogging in China is Zhang Chunxian, the party chief of Xinjiang province. He took over in Xinjiang in April 2010, about nine months after ethnic riots led authorities to shut down mobile and internet services across the province. Zhang has more than 148,000 followers for his microblog and has told the China Daily that microblogging can "be used to promote the government's efforts in Xinjiang's development." Given there are over 450 million internet users and 900 million mobile phone users (those on smartphones can microblog), there is enormous potential for the sustained growth of microblogging in China. With microblogging able to circumvent many censorship barriers, China's government is being forced to choose between closing down entire services, potentially facing extreme public backlash, or embracing increased openness and engagement with the public, dealing actively with charges of corruption, inappropriate conduct by officials and allowing citizens to share news before government communications channels can present official viewpoints. If microblogging has the potential to have this impact in China, it is a channel that cannot be ignored or given lip service by governments in Australia or other nations. Perhaps the two statements below best sums up the potential of microblogging for the Chinese government - and other governments around the world. From the People's Daily of 2 August 2011: Mastering the use of the internet shows a leader’s quality and ability. We hope that more and more leaders show their capacity for speech on the internet and on microblogs, and find popularity. We hope even more that more and more leaders address the conditions of the people in the real world, through real actions.From the China Daily of 2 July 2011: If governments can correctly and properly guide public opinions, use microblogging as a good platform to learn about public opinions and the wisdom of the people, and find and solve problems as soon as possible, forming a widely-participated, orderly and interactive microblogging public opinion environment is completely possible. Microblogging will also become a "release valve" of social emotions and the "lubricant" of government-public relations.References China’s microbloggers unafraid to rattle the censor’s cage 15/8/2011 - Business World Online Politics in the age of the microblog 2/8/2011 - Chinese Media Project China tackles the messy world of microblogs 1/8/2011 - Chinese Media Project Microblogs a Threat to China's National Security: Official Report 14/7/2011 - The Epoch Times China's government offcials open up to microblogs 14/7/2011 - Want China Times How microblogging power shakes reality in China 2/7/2011 - China Daily Xinhua Insight: Communist Party microblogs to reach out to public 24/6/2011 - English.news.cn Must Officials Microblog? 6/5/2011 - Beijing Review University names top ten official microblogs 25/4/2011 - Want China Times Microblogging to improve governance 6/4/2011 - Global Times Microblogs in China government's fight to win public approval 9/3/2011 - Reuters Government Gets Big Into Microblogging 14/1/2011 - China Realtime Report Police microblog helps catch murderers in East China 1/12/2010 - China Daily Wednesday, August 17, 2011 A Govcamp is an unconference specifically for government people, discussing government-related topics (usually, but not always related to community engagement, IT, the internet and Gov 2.0 topics). They've become a regular feature of the landscape in the UK, US, Canada and even New Zealand, however there's been less interest in Australia for running one - despite our successes in holding similar unconferences such as BarCamps and PubCamps. Now, however, Australia is going to get its very first GovCamp, being organised by Pia Waugh and held at NICTA's offices in Canberra with support by AGIMO. The (free) event is being held on 10 September from 10am - 4pm, and only has 100 spots for attendees (many of which have already been snapped up). If you are interested and want to learn more, or want to RSVP right now, go to the GovCampAU homepage. Tuesday, August 16, 2011 While I am a big fan of Luke's and agree with his view that transferring government websites to Facebook, granting partial control over them to a foreign-jurisdiction company, is not a good idea, I find it harder to agree with Luke's point on centralising government websites and employing a common look and feel. I've never been a fan of the 'one site fits all' approach of the UK Government's attempted Directgov website - or a supporter of the view that all government sites should have a common look and feel. Because websites need to be designed to meet their specific set of goals within the constraints of the needs and preferences of their key audiences. Where the goals and audiences are different, the websites need to be designed and operate differently. Even when the goals and audience of two separate websites are similar, there can be good reasons to solve the 'problem' of usability and quick access to key information in different ways. Web design is an art as well as a science. There's often multiple ways to achieve a good outcome, not one single approach that is best. This means that a government that did lock itself into a single 'right' website look and feel may find itself in a blind alley over time, requiring a huge shift in design to jump onto a more future-proof track. When I commented on Twitter about my views I was told that a common look and feel made citizens more comfortable that a website was 'official'. This is quite a useful technique in the real world, where standard uniforms are used in a number of government professions to convey officialness and trust (such as police forces). However online governments cannot trademark a given 'uniform' design for their websites, leaving it open for others to employ a similar or identical layout in order to mislead people into believing they are official websites. The best safeguards of 'officialness' are those we already use - a common crest (where legal action can be taken to protect it from fraudulent duplication) and the use of a common domain '.gov' which is unavailable to anyone other than government agencies. These two safeguards ensure that anyone visiting a government website can be assured that it is owned and maintained by the government in a way that a common look and feel cannot. I always try to keep in mind that government websites are not common places for citizens to visit. Citizens only go to government sites for specific purposes - to find information on a given topic, to access a service or to report an occurrence. Meanwhile government web staff visit government websites all the time, particularly their own. I've generally found that while government web teams can point out all the flaws in their sites, visitors (who may go to the site once a year) don't notice them and often have a much more positive view towards government sites than do the internal experts. I've yet to see evidence that citizens want a single website for government, at any level. What they do want is to find the information or service they are seeking quickly and easily. Google has become the front door into many websites - including government sites - because it meets this need. Why should government invest a cent into replicating what search engines already do well? We could better invest our money into ensuring that when people get to our sites that the content is current, relevant, written in plain English and fully accessible. Touching a little further on the concept of a single central government site, often the structure of government works against this approach anyway. Agencies are funded separately, managed under different laws and often have restrictions on how and when they can share information. They have widely different needs to engage the public and generally need to control their own web presences in order to maximise their flexibility when the environment changes. Moving to a single content management system and single website poses a number of challenges for operational management structures, flexibility and funding. Do all agencies forgo some funding for websites to fund a central agency web unit? How does an urgent ministerial need (which requires the equivalent of a website today) get fulfilled in a timely manner? How does the central team prioritise development work, and who has access to content - and at what level. There's just so many questions as yet unconsidered - even in the UK's Directgov model. While I hate the proliferation of web sites across government, where every policy or program area, government directive and new initiative often 'requires' a new and discreet website, I think we'd be better placed putting a common framework around when and how government websites are built, and developing a central public list of these sites, than attempting to fit all these diverse properties into a single content management solution, central site and common look and feel. By all means recommend a standard approach (always put the About link at far right, include a Contact, Privacy, Terms and Copyright page, organise content in relation to the audience, not the Department's structure), but don't compel a standard look and feel or central site. I predict that many agencies would work around a centralised model, simply to meet the government's explicit policy requirements. Monday, August 15, 2011 There seems to be a consistent supply of people new to Government 2.0 filtering through the various events I track around Australia. Whether commercial conferences, 'Masterclasses', government-supported events or university courses - many (though not all) now providing decent '101' or introductory information and case studies on social media use for government and even on open Public Sector Information. However for people who already employ Government 2.0 techniques, have been involved in designing and implementing social media initiatives and channels, there's really no 'step-up' courses available in Australia to provide the greater depth and expertise these people are looking for. Essentially, Australia is well supplied with '101' introductory courses to Government 2.0, but there's no '202' or '303' courses - intermediate and advanced training to help people build on their experience. These more advanced courses would help improve government's effectiveness in social media by moving us to more complex and strategic use of digital channels to meet citizen needs. There's certainly people around with the experience to run such courses, both from a strategic and implementation perspective. Many are presenting actively at the various '101' events. I'd welcome any ideas on how to move us forward, keep the introductory courses for those still new to the area, but provided advanced training for those who now need it (at an appropriate cost). Sunday, August 14, 2011 I'd like to apologise to those reading my blog for effectively taking two weeks off from blogging (although I've been tweeting actively). Essentially life got in the way, with some tight work deadlines, a death in the family, wedding preparations and a range of other factors. I am now rebuilding my blogging habit and will keep to my 3-5 posts per week target for the next few months - then take a break during my honeymoon. Monday, August 01, 2011 The Queensland Police Service Media group has released a report on their use of social media in managing disaster situations. It's a good read, though only scratches the surface of what they achieved or what is possible. As the document was released only as PDF, I've converted it to HTML 5.0 via Scribd for more widespread access as embedded below. It will be very interesting to see which government agencies continue to resist the use of social media in future disaster situations. It will provide insights into their cultures and is likely to reflect on them publicly. It may even be fair to say that it would be courageous of senior public servants in any government across Australia to forbid the use of social media for disaster management in the future. The original PDF, Queensland Police Service: Disaster management and social media - a case study, is available here. QPS Social Media Case Study
<urn:uuid:9b73a6be-6590-4ea2-ae0d-05b248db0b2e>
2013-05-24T01:36:35Z
CC-MAIN-2013-20
[ [ -0.0311279296875, 0.0208740234375, 0.0081787109375, -0.00738525390625, 0.06591796875, -0.05322265625, -0.01019287109375, 0.1259765625, -0.01275634765625, -0.0238037109375, 0.0478515625, 0.033447265625, -0.0186767578125, -0.007354736328125, 0.04052734375,...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947963
8,556
http://egovau.blogspot.com.au/2011_08_01_archive.html?m=0
0.21462
Palestinian leader Marwan Barghouti has been severely punished by the Israeli Prison Service (IPS) for launching a statement from his cell last week. He called for the launch of large-scale popular resistance and urged people to stop marketing the illusion that there is a possibility of ending the occupation and achieving a state through negotiations. Maan News Agency reported that, according to Fadwa Barghouti, the IPS responded to her husband’s statement by placing him in solitary confinement for three weeks and denying him the right to see visitors for two months. IPS spokeswoman Sivan Weizman told the press that Barghouti “has been placed in isolation for a week and denied visits and access to the inmates’ canteen for a month” as punishment for his statement. Solitary confinement should be banned In my blog “Israel’s cruel practice of isolation of prisoners should be banned”, I reported that Juan Méndez, UN Special Rapporteur on torture and other cruel, inhuman or degrading treatment or punishment, had called for an end to the use of solitary confinement as a means of punishment or extortion. Meanwhile, Israel continues to punish Palestinian political prisoners by keeping them in solitary confinement and isolation. Marwan Barghouti has been placed in solitary confinement 21 times during the ten years he has spent in Israeli jails and he has spent four consecutive years in isolation, according to Fadwa Barghouti. Deplorable conditions in Section 4 of Nafha Prison Israel detains Palestinian political prisoners in Section 4 of Nafha prison in the Naqab (Negev). The Haifa-based human rights organization Adalah has demanded the closure of the prison wing. In a letter to the IPS and the Minister of Public Security, Adalah argues that the conditions endanger prisoners’ health and constitute cruel, inhumane, and degrading treatment: The walls in the wing are covered with wet patches and mold, with windows that do not permit sunlight or the circulation of air. The rooms are infested with cockroaches and insects, to the point that the mattresses that the prisoners sleep on are full of bugs and stink putridly. In addition, the prison is unbearably overcrowded, with ten prisoners in a room that does not exceed 25 square meters, or 2.5 square meters per prisoner, far below internationally accepted standards. Closet space is insufficient, forcing prisoners to keep their clothing and belongings on the floor, further decreasing the available space. Toilets are not separate from the rest of the bathroom, making their use embarrassing and awkward. As the prisoners in Section 4 are classified as ‘security prisoners’, they are only permitted short recreation breaks in a small courtyard, which itself is not large enough for exercise. The conditions worsened when Israeli prison guards wounded 61 Palestinian prisoners when they stormed Nafha prison on 1 April. According to a press statement by the Palestinian Ministry of the Interior in Gaza, the prisoners leaked a message which said that the guards stormed the prison’s various wards and assaulted prisoners. The attack followed the prisoners’ refusal to undergo DNA tests. Call from Gilboa prison to stop the transfer of prisoners to Nafha prison In my blog post “Israel punishes hunger striking prisoners by transferring them to other end of country”, I reported on the transfer of prisoners from Gilboa prison to the horrific Section 4 of Nafha prison. Meanwhile, I have received a message from Palestinian leader Ameer Makhoul who is held in Gilboa prison. He writes: Over the last two days - 4 and 5 March – department 4 in Gilboa jail has been evacuated. 110 political prisoners were transferred by the prison authorities to Nafha jail in the Naqab. All of them are from the Galilee (in the North), Jerusalem and the occupied Golan. For those whose families live in the North, the families should travel more than 500 kilometers every two weeks in order to visit their son, brother or father. [All prisoners in Gilboa are men.] Families from the occupied Golan have to travel more than 600 kilometers. Many families will get no access to visit their beloved relatives in prison. The plan is not clear yet; prisoners actually feel confronted with a systematic policy of camouflage aimed at preventing them from challenging any act of evacuation to another prison. According to what prisoners heard, all political prisoners will be evacuated to the Naqab in two to three months. It is crucial to urge the European Union, the European Parliament as well as national ministries of foreign affairs to raise their voices and request the Israeli Prime Minister, the Minister of Internal Security and the Prison Commissioner to stop evacuations which make family visits impossible. The call for intervention can be integrated in the activities that will be undertaken on 17 April 2012, a Day of International Action in support of the Palestinian political prisoners.
<urn:uuid:34c7aff5-943b-4016-bd00-9d0d748ccf5e>
2013-05-24T01:44:01Z
CC-MAIN-2013-20
[ [ -0.021728515625, -0.001495361328125, -0.021240234375, 0.00787353515625, 0.13671875, -0.0262451171875, -0.01287841796875, 0.08544921875, 0.002777099609375, -0.030029296875, 0.087890625, 0.019287109375, -0.0703125, 0.0269775390625, 0.03173828125, -0.00...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953139
1,009
http://electronicintifada.net/blogs/adri-nieuwhof/marwan-barghouti-placed-isolation-punishment-call-popular-resistance
0.16819
- This has led some fans to believe that galley on board Voyager has led to the creation of galleys on other Intrepid-class vessels or that the captain's dining room was always capable of being reconfigured into a galley and is a subject of captain's prerogative. If something like this needs to be justified with the "some fans" rationalization, then it is speculation and doesn't belong here. --Alan del Beccio 07:40, 16 February 2008 (UTC) Launched in 2371?Edit Was it established in the episode that the Bellerophon was launched in 2371? 18.104.22.168 05:38, November 7, 2009 (UTC) - During the Battle of Cardassia, USS Bellerophon led the Starfleet wing of the assault fleet (DS9: "What You Leave Behind"). As far as I know, this Bellerophon was referenced only in "Inter Arma Enim Silent Leges". If I'm wrong, please provide a screencap, timecode of its appearance or other evidence. Setacourse 00:57, December 25, 2009 (UTC)
<urn:uuid:2bee08b8-be41-4693-adfc-87b7bbada8ca>
2013-05-24T02:02:11Z
CC-MAIN-2013-20
[ [ -0.014950980432331562, 0.03382353112101555, 0.0017693014815449715, 0.025857843458652496, 0.04852941259741783, -0.05147058889269829, -0.018137255683541298, 0.06519608199596405, -0.0062806373462080956, -0.02806372568011284, 0.027450980618596077, 0.04779411852359772, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967214
239
http://en.memory-alpha.org/wiki/Talk:USS_Bellerophon_(NCC-74705)
0.884327
Top Secret Laboratory The Top Secret Laboratory is a Top Secret Laboratory that appears in the Episode Boating Buddies. There you can work on new formula's to new chemicals. In that Episode the professor makes a new potion that will shrink any ordinary mail man to the size of a grain of sand. - The Professor says, that his new formula will shrink any ordinary mail man into a grain of sand. But still, the boat, Squidward, SpongeBob and Mrs. Puff are shrunk. - How is it top secret if it has Top Secret Laboratory written in big and bold letters?
<urn:uuid:8e4fdd6a-e0d3-4211-ad44-ff05e17f9005>
2013-05-24T01:31:51Z
CC-MAIN-2013-20
[ [ -0.0546875, 0.0284598208963871, -0.005970982369035482, 0.0075892857275903225, 0.07767856866121292, -0.03883928433060646, -0.00006713867333019152, 0.08839285373687744, -0.0005998883862048388, -0.03102678619325161, 0.04285714402794838, 0.01785714365541935, 0.00325...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936
121
http://en.spongepedia.org/index.php?title=Top_Secret_Laboratory
0.193997
Azerbaijan, Baku, July 9 / Trend M. Aliyev / The next negotiations on the Caspian Sea status will be held in Ashgabat in the five-sided format until September, Azerbaijani Deputy Foreign Minister Khalaf Khalafov told media on Monday. "The potential of the negotiations on the Caspian Sea status has not been exhausted yet and will be used to resolve this issue," he added. Khalafov added that general issues on the Caspian Sea status are being discussed in the five-sided format. The work over a draft Convention relating to the Caspian Sea status is also underway. "Moreover discussions are still in force in a bilateral format with Turkmenistan and Iran. Delegations are working on this matter," he added. The littoral states (Azerbaijan, Kazakhstan, Russia, Turkmenistan and Iran) signed the Framework Convention for the Protection of the Marine Environment of the Caspian Sea in November 2003. In July 1998, Russia and Kazakhstan signed an agreement on the delimitation of the northern part of the Caspian Sea in order to exercise sovereign rights for subsoil use. On Nov. 29, 2001 and Feb. 27, 2003, Kazakhstan and Azerbaijan signed an agreement on the delimitation of the Caspian Sea. Kazakhstan, Azerbaijan and Russia signed an agreement on the delimitation of adjacent sections of the Caspian Sea on May 14, 2003. Do you have any feedback? Contact our journalist at firstname.lastname@example.org
<urn:uuid:1efa5b71-61a3-45a9-ad94-f260b150ce64>
2013-05-24T01:30:42Z
CC-MAIN-2013-20
[ [ -0.0014663279289379716, 0.04331307113170624, -0.023176291957497597, 0.008358662948012352, 0.11626140028238297, -0.020896656438708305, -0.0351443774998188, 0.058510638773441315, -0.002920782659202814, -0.00612651975825429, 0.06838905811309814, 0.0223214291036129, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938588
325
http://en.trend.az/news/politics/2044901.html
0.333651
|This article does not cite its references or sources. You can help WikiFur by references.| For specifics, check the and talk page. Consult the Furry Book of Style for editing help. Fandom involvement Tundra discovered his love of furry while watching the infamous furry CSI episode. Finding the website yiffstar after googling "yiff", he joining yiffchat as a female fox named Tundra Fox, but after a short time changed to a male husky, keeping the name "Tundra". After two years on yiffstar, Tundra got banned for being underage. He moved on to Second Life, playing for two years and getting banned (once again) for being underage. Tundra can be found on a few websites, such as 4chan, lulz, and a few others. Tundra was a camwhore for 4chan, 7chan, and 12chan, but has recently stopped taking pictures. Tundra is a male black-and-white siberian husky with a feminine shape and blue skin. (His inner ears, paw pads, tongue, and nose are blue.) He also has blue hair and eyes that match his skin, a small white heart just above his head, and a large fluffy tail that resembles a heart. Tundra and roleplaying When he was new to the fandom, Tundra used to roleplay all the time, though now he does incredibly rarely, and only with a handful of people. |This person is a WikiFur user:|
<urn:uuid:4403b7e4-c7aa-483d-85be-aca8d3e9c8c9>
2013-05-24T01:37:56Z
CC-MAIN-2013-20
[ [ -0.018607549369335175, 0.010550213977694511, 0.00004764567711390555, 0.008235398679971695, 0.0683760717511177, -0.08511395752429962, -0.007167022675275803, 0.06018518656492233, -0.007077991496771574, -0.024038461968302727, 0.08119658380746841, 0.030092593282461166, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962056
328
http://en.wikifur.com/wiki/Tundra
0.618397
The Fahai Temple (Chinese: 法海寺; pinyin: Fǎhǎi Sì) is Ming Dynasty Buddhist temple located at the foot of Cuiwei Mountain, about two kilometers to the north-east of Moshikou, Shijingshan District, Beijing, China. Construction of the Fahai Temple started in the 4th year of reign of the Ming Emperor Zhengtong (1439 A.D.) and was completed in the 8th year of his reign (1443). The most distinguishing part of Fahai Temple is the Ming Dynasty frescoes. The total area of the frescoes is 236.7 square meters. Comparing with other famous frescoes in China, such as the Yongle Palace frescoes and the Dunhuang frescoes, Fahai Temple's well-preserved frescoes are also notable in the depiction of figures, subtlety of patterns and the craft methods. Cultural Relics - Bronze Bell |Wikimedia Commons has media related to: Fahai Temple|
<urn:uuid:293aa6ca-6081-421f-88f8-06e0b9742ac1>
2013-05-24T02:00:57Z
CC-MAIN-2013-20
[ [ -0.019157608970999718, 0.02024456486105919, -0.014130434952676296, -0.00004007090683444403, 0.09293477982282639, -0.04782608523964882, -0.001893682056106627, 0.07010869681835175, -0.014741848222911358, -0.054891303181648254, 0.028940217569470406, 0.02894021756947040...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934146
227
http://en.wikipedia.org/wiki/Fahai_Temple
0.551869
Before her enlistment as an SS auxiliary, she worked at an office in Berlin. On January 31, 1941, Margot Dreschel arrived at Ravensbrück concentration camp to receive guard training. At first she was an Aufseherin, a lower-ranking female guard at Ravensbrück camp in charge of interned women. She trained under Oberaufseherin (Senior Overseer) Johanna Langefeld in 1941, and quickly became an SS-Rapportführerin (Report Overseer), a higher-ranked guard. On April 27, 1942, Dreschel was selected for transfer to the newly opened Auschwitz II – Birkenau concentration camp in occupied Poland. Dreschel began her duties at Birkenau in August 1942 as soon as the women's camp was established there, with women transferred from Auschwitz to Birkenau during expansion. She served under Maria Mandel and worked as an associate of Dr Mengele. Dreschel was also head of all camp offices in Auschwitz. Dreschel's appearance was reportedly repellent, as one female Auschwitz prisoner recounted: "camp leader Dreschel was there, her buck teeth sticking out, even when her mouth is closed." Inmates described her as vulgar, thin and ugly. After the war, many survivors testified of her notoriously brutal beatings. She carried out indoor selections wearing a white coat and white gloves, disguised as a doctor. Once Mrs Drechaler [Dreschler] came, with her huge bloodhound, undressed everybody, took away even our shoes, and we had to stand for hours completely naked, none of us were thinking of life any more, the gas chamber seemed unavoidable.—War Crimes Trials. Protocol 3309, SS Female Overseers in Auschwitz She regularly moved between the Auschwitz I camp and Birkenau, and involved herself in selections of women and children to be sent to the gas chambers. On November 1, 1944, she went to Flossenbürg concentration camp as an Oberaufseherin-and as trainer of enlisted overseers. In January 1945, she was moved back to the Ravensbruck subcamp at Neustadt-Glewe, and fled from there in April 1945 as Nazi Germany surrendered. In May 1945, several former Auschwitz prisoners recognized her on a road from Pirna to Bautzen in the Russian zone, and took her to the Russian Military Police. The Soviets condemned her to death and executed her in May or June 1945 by hanging in Bautzen. - "SS Female Overseers in Auschwitz". Recollections on the Holocaust. National Committee for Attending Deportees DEGOB (Hungarian Jewish relief). Retrieved August 10, 2012. - "Margot Dreschel". Notorious Female SS Nazi Guards. Sadako Review. Retrieved August 10, 2012. - "Auschwitz Concentration Camp". Female Nazi war criminals. Capital Punishment UK.org. Retrieved August 10, 2012. - Margot Drexler (1908-1945) Bio-sketch (German). - Brown, D. P.: The Camp Women: The Female Auxiliaries Who Assisted the SS in Running the Nazi Concentration Camp System; Schiffer Publishing 2002; ISBN 0-7643-1444-0. - Matthaus, Juergen. Approaching an Auschwitz Survivor: Holocaust History and its Transformations Oxford University Press, 2009; ISBN 0-19-538915-8.
<urn:uuid:9b20f3ba-c178-41a1-a77f-e163e5d2479a>
2013-05-24T01:44:57Z
CC-MAIN-2013-20
[ [ -0.01300048828125, 0.010498046875, -0.0262451171875, 0.00927734375, 0.0849609375, -0.025634765625, -0.009033203125, 0.11962890625, 0.0032958984375, -0.050048828125, 0.0751953125, 0.0194091796875, -0.061767578125, 0.030517578125, 0.0380859375, 0.00909...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942353
718
http://en.wikipedia.org/wiki/Margot_Dreschel
0.220045
Novgorod First Chronicle ||This article relies largely or entirely upon a single source. (September 2011)| The Novgorod First Chronicle (Russian: Новгородская первая летопись) or The Chronicle of Novgorod, 1016-1471 is the most ancient extant chronicle of the Novgorod Republic. It reflects a tradition different from the Kievan Primary Chronicle. As was first demonstrated by Aleksey Shakhmatov, the later editions of the chronicle reflect the lost Primary Kievan Code (Начальный Киевский свод) of the late 11th century, which contained much valuable data suppressed in the later Primary Chronicle. The earliest extant copy of the chronicle is the so-called Synod Scroll, dated to the second half of the 13th century, first printed in 1841 and currently preserved in the State Historical Museum. It is the earliest known manuscript of a major East Slavic chronicle, predating the Laurentian Codex of the Primary Chronicle by almost a century. In the 14th century, the Synod Scroll was continued by the monks of the Yuriev Monastery in Novgorod. Other important copies of the Novgorod First Chronicle include the Academic Scroll (241 lists, 1444), Commission Scroll (320 lists, mid-15th century), Trinity Scroll (1563), and Tolstoy Scroll (208 lists, 1720s).
<urn:uuid:907acf4a-3779-4758-af91-d5895bd6b8cb>
2013-05-24T01:32:45Z
CC-MAIN-2013-20
[ [ 0.009306426160037518, -0.024882445111870766, -0.007494122255593538, -0.001689851051196456, 0.054467085748910904, -0.04427899792790413, -0.0095023512840271, 0.05329153686761856, -0.02605799399316311, -0.04917711764574051, 0.030564263463020325, 0.022629309445619583, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.899569
332
http://en.wikipedia.org/wiki/Novgorod_First_Chronicle
0.382339
||This article needs additional citations for verification. (March 2011)| Nuclear meltdown is an informal term for a severe nuclear reactor accident that results in core damage from overheating. The term is not officially defined by the International Atomic Energy Agency or by the U.S. Nuclear Regulatory Commission. However, it has been defined to mean the accidental melting of the core of a nuclear reactor, and is in common usage a reference to the core's either complete or partial collapse. "Core melt accident" and "partial core melt" are the analogous technical terms for a meltdown. A core melt accident occurs when the heat generated by a nuclear reactor exceeds the heat removed by the cooling systems to the point where at least one nuclear fuel element exceeds its melting point. This differs from a fuel element failure, which is not caused by high temperatures. A meltdown may be caused by a loss of coolant, loss of coolant pressure, or low coolant flow rate or be the result of a criticality excursion in which the reactor is operated at a power level that exceeds its design limits. Alternately, in a reactor plant such as the RBMK-1000, an external fire may endanger the core, leading to a meltdown. Once the fuel elements of a reactor begin to melt, the fuel cladding has been breached, and the nuclear fuel (such as uranium, plutonium, or thorium) and fission products (such as cesium-137, krypton-88, or iodine-131) within the fuel elements can leach out into the coolant. Subsequent failures can permit these radioisotopes to breach further layers of containment. Superheated steam and hot metal inside the core can lead to fuel-coolant interactions, hydrogen explosions, or water hammer, any of which could destroy parts of the containment. A meltdown is considered very serious because of the potential, however remote, that radioactive materials could breach all containment and escape (or be released) into the environment, resulting in radioactive contamination and fallout, and potentially leading to radiation poisoning of people and animals nearby. Nuclear power plants generate electricity by heating fluid via a nuclear reaction to run a generator. If the heat from that reaction is not removed adequately, the fuel assemblies in a reactor core can melt. A core damage incident can occur even after a reactor is shut down because the fuel continues to produce decay heat. A core damage accident is caused by the loss of sufficient cooling for the nuclear fuel within the reactor core. The reason may be one of several factors, including a loss-of-pressure-control accident, a loss-of-coolant accident (LOCA), an uncontrolled power excursion or, in reactors without a pressure vessel, a fire within the reactor core. Failures in control systems may cause a series of events resulting in loss of cooling. Contemporary safety principles of defense in depth ensure that multiple layers of safety systems are always present to make such accidents unlikely. The containment building is the last of several safeguards that prevent the release of radioactivity to the environment. Many commercial reactors are contained within a 1.2-to-2.4-metre (3.9 to 7.9 ft) thick pre-stressed, steel-reinforced, air-tight concrete structure that can withstand hurricane-force winds and severe earthquakes. - In a loss-of-coolant accident, either the physical loss of coolant (which is typically deionized water, an inert gas, NaK, or liquid sodium) or the loss of a method to ensure a sufficient flow rate of the coolant occurs. A loss-of-coolant accident and a loss-of-pressure-control accident are closely related in some reactors. In a pressurized water reactor, a LOCA can also cause a "steam bubble" to form in the core due to excessive heating of stalled coolant or by the subsequent loss-of-pressure-control accident caused by a rapid loss of coolant. In a loss-of-forced-circulation accident, a gas cooled reactor's circulators (generally motor or steam driven turbines) fail to circulate the gas coolant within the core, and heat transfer is impeded by this loss of forced circulation, though natural circulation through convection will keep the fuel cool as long as the reactor is not depressurized. - In a loss-of-pressure-control accident, the pressure of the confined coolant falls below specification without the means to restore it. In some cases this may reduce the heat transfer efficiency (when using an inert gas as a coolant) and in others may form an insulating "bubble" of steam surrounding the fuel assemblies (for pressurized water reactors). In the latter case, due to localized heating of the "steam bubble" due to decay heat, the pressure required to collapse the "steam bubble" may exceed reactor design specifications until the reactor has had time to cool down. (This event is less likely to occur in boiling water reactors, where the core may be deliberately depressurized so that the Emergency Core Cooling System may be turned on). In a depressurization fault, a gas-cooled reactor loses gas pressure within the core, reducing heat transfer efficiency and posing a challenge to the cooling of fuel; however, as long as at least one gas circulator is available, the fuel will be kept cool. - In an uncontrolled power excursion accident, a sudden power spike in the reactor exceeds reactor design specifications due to a sudden increase in reactor reactivity. An uncontrolled power excursion occurs due to significantly altering a parameter that affects the neutron multiplication rate of a chain reaction (examples include ejecting a control rod or significantly altering the nuclear characteristics of the moderator, such as by rapid cooling). In extreme cases the reactor may proceed to a condition known as prompt critical. This is especially a problem in reactors that have a positive void coefficient of reactivity, a positive temperature coefficient, are overmoderated, or can trap excess quantities of deleterious fission products within their fuel or moderators. Many of these characteristics are present in the RBMK design, and the Chernobyl disaster was caused by such deficiencies as well as by severe operator negligence. Western light water reactors are not subject to very large uncontrolled power excursions because loss of coolant decreases, rather than increases, core reactivity (a negative void coefficient of reactivity); "transients," as the minor power fluctuations within Western light water reactors are called, are limited to momentary increases in reactivity that will rapidly decrease with time (approximately 200% - 250% of maximum neutronic power for a few seconds in the event of a complete rapid shutdown failure combined with a transient). - Core-based fires endanger the core and can cause the fuel assemblies to melt. A fire may be caused by air entering a graphite moderated reactor, or a liquid-sodium cooled reactor. Graphite is also subject to accumulation of Wigner energy, which can overheat the graphite (as happened at the Windscale fire). Light water reactors do not have flammable cores or moderators and are not subject to core fires. Gas-cooled civilian reactors, such as the Magnox, UNGG, and AGCR type reactors, keep their cores blanketed with non reactive carbon dioxide gas, which cannot support a fire. Modern gas-cooled civilian reactors use helium, which cannot burn, and have fuel that can withstand high temperatures without melting (such as the High Temperature Gas Cooled Reactor and the Pebble Bed Modular Reactor). - Byzantine faults and cascading failures within instrumentation and control systems may cause severe problems in reactor operation, potentially leading to core damage if not mitigated. For example, the Browns Ferry fire damaged control cables and required the plant operators to manually activate cooling systems. The Three Mile Island accident was caused by a stuck-open pilot-operated pressure relief valve combined with a deceptive water level gauge that misled reactor operators, which resulted in core damage. Light water reactors (LWRs) Before the core of a light water nuclear reactor can be damaged, two precursor events must have already occurred: - A limiting fault (or a set of compounded emergency conditions) that leads to the failure of heat removal within the core (the loss of cooling). Low water level uncovers the core, allowing it to heat up. - Failure of the Emergency Core Cooling System (ECCS). The ECCS is designed to rapidly cool the core and make it safe in the event of the maximum fault (the design basis accident) that nuclear regulators and plant engineers could imagine. There are at least two copies of the ECCS built for every reactor. Each division (copy) of the ECCS is capable, by itself, of responding to the design basis accident. The latest reactors have as many as four divisions of the ECCS. This is the principle of redundancy, or duplication. As long as at least one ECCS division functions, no core damage can occur. Each of the several divisions of the ECCS has several internal "trains" of components. Thus the ECCS divisions themselves have internal redundancy – and can withstand failures of components within them. The Three Mile Island accident was a compounded group of emergencies that led to core damage. What led to this was an erroneous decision by operators to shut down the ECCS during an emergency condition due to gauge readings that were either incorrect or misinterpreted; this caused another emergency condition that, several hours after the fact, led to core exposure and a core damage incident. If the ECCS had been allowed to function, it would have prevented both exposure and core damage. During the Fukushima incident the emergency cooling system had also been manually shut down several minutes after it started. If such a limiting fault were to occur, and a complete failure of all ECCS divisions were to occur, both Kuan, et al and Haskin, et al describe six stages between the start of the limiting fault (the loss of cooling) and the potential escape of molten corium into the containment (a so-called "full meltdown"): - Uncovering of the Core – In the event of a transient, upset, emergency, or limiting fault, LWRs are designed to automatically SCRAM (a SCRAM being the immediate and full insertion of all control rods) and spin up the ECCS. This greatly reduces reactor thermal power (but does not remove it completely); this delays core becoming uncovered, which is defined as the point when the fuel rods are no longer covered by coolant and can begin to heat up. As Kuan states: "In a small-break LOCA with no emergency core coolant injection, core uncovery [sic] generally begins approximately an hour after the initiation of the break. If the reactor coolant pumps are not running, the upper part of the core will be exposed to a steam environment and heatup of the core will begin. However, if the coolant pumps are running, the core will be cooled by a two-phase mixture of steam and water, and heatup of the fuel rods will be delayed until almost all of the water in the two-phase mixture is vaporized. The TMI-2 accident showed that operation of reactor coolant pumps may be sustained for up to approximately two hours to deliver a two phase mixture that can prevent core heatup." - Pre-damage heat up – "In the absence of a two-phase mixture going through the core or of water addition to the core to compensate water boiloff, the fuel rods in a steam environment will heat up at a rate between 0.3 °C/s (0.5 °F/s) and 1 °C/s (1.8 °F/s) (3)." - Fuel ballooning and bursting – "In less than half an hour, the peak core temperature would reach 1,100 K (1,520 °F). At this temperature the zircaloy cladding of the fuel rods may balloon and burst. This is the first stage of core damage. Cladding ballooning may block a substantial portion of the flow area of the core and restrict the flow of coolant. However complete blockage of the core is unlikely because not all fuel rods balloon at the same axial location. In this case, sufficient water addition can cool the core and stop core damage progression." - Rapid oxidation – "The next stage of core damage, beginning at approximately 1,500 K (2,240 °F), is the rapid oxidation of the Zircaloy by steam. In the oxidation process, hydrogen is produced and a large amount of heat is released. Above 1,500 K (2,240 °F), the power from oxidation exceeds that from decay heat (4,5) unless the oxidation rate is limited by the supply of either zircaloy or steam." - Debris bed formation – "When the temperature in the core reaches about 1,700 K (2,600 °F), molten control materials [1,6] will flow to and solidify in the space between the lower parts of the fuel rods where the temperature is comparatively low. Above 1,700 K (2,600 °F), the core temperature may escalate in a few minutes to the melting point of zircaloy [2,150 K (3,410 °F)] due to increased oxidation rate. When the oxidized cladding breaks, the molten zircaloy, along with dissolved UO2 [1,7] would flow downward and freeze in the cooler, lower region of the core. Together with solidified control materials from earlier down-flows, the relocated zircaloy and UO2 would form the lower crust of a developing cohesive debris bed." - (Corium) Relocation to the lower plenum – "In scenarios of small-break LOCAs, there is generally a pool of water in the lower plenum of the vessel at the time of core relocation. Release of molten core materials into water always generates large amounts of steam. If the molten stream of core materials breaks up rapidly in water, there is also a possibility of a steam explosion. During relocation, any unoxidized zirconium in the molten material may also be oxidized by steam, and in the process hydrogen is produced. Recriticality also may be a concern if the control materials are left behind in the core and the relocated material breaks up in unborated water in the lower plenum." At the point at which the corium relocates to the lower plenum, Haskin, et al relate that the possibility exists for an incident called a fuel-coolant interaction (FCI) to substantially stress or breach the primary pressure boundary when the corium relocates to the lower plenum of the reactor pressure vessel ("RPV"). This is because the lower plenum of the RPV may have a substantial quantity of water - the reactor coolant - in it, and, assuming the primary system has not been depressurized, the water will likely be in the liquid phase, and consequently dense, and at a vastly lower temperature than the corium. Since corium is a liquid metal-ceramic eutectic at temperatures of 2,200 to 3,200 K (3,500 to 5,300 °F), its fall into liquid water at 550 to 600 K (530 to 620 °F) may cause an extremely rapid evolution of steam that could cause a sudden extreme overpressure and consequent gross structural failure of the primary system or RPV. Though most modern studies hold that it is physically infeasible, or at least extraordinarily unlikely, Haskin, et al state that that there exists a remote possibility of an extremely violent FCI leading to something referred to as an alpha-mode failure, or the gross failure of the RPV itself, and subsequent ejection of the upper plenum of the RPV as a missile against the inside of the containment, which would likely lead to the failure of the containment and release of the fission products of the core to the outside environment without any substantial decay having taken place. Breach of the Primary Pressure Boundary There are several possibilities as to how the primary pressure boundary could be breached by corium. - Steam Explosion As previously described, FCI could lead to an overpressure event leading to RPV fail, and thus, primary pressure boundary fail. Haskin, et al. report that in the event of a steam explosion, failure of the lower plenum is far more likely than ejection of the upper plenum in the alpha-mode. In the even of lower plenum failure, debris at varied temperatures can be expected to be projected into the cavity below the core. The containment may be subject to overpressure, though this is not likely to fail the containment. The alpha-mode failure will lead to the consequences previously discussed. - Pressurized Melt Ejection (PME) It is quite possible, especially in pressurized water reactors, that the primary loop will remain pressurized following corium relocation to the lower plenum. As such, pressure stresses on the RPV will be present in addition to the weight stress that the molten corium places on the lower plenum of the RPV; when the metal of the RPV weakens sufficiently due to the heat of the molten corium, it is likely that the liquid corium will be discharged under pressure out of the bottom of the RPV in a pressurized stream, together with entrained gases. This mode of corium ejection may lead to direct containment heating (DCH). Severe Accident Ex-Vessel Interactions and Challenges to Containment Haskin, et al identify six modes by which the containment could be credibly challenged; some of these modes are not applicable to core melt accidents. - Dynamic pressure (shockwaves) - Internal missiles - External missiles (not applicable to core melt accidents) Standard failure modes If the melted core penetrates the pressure vessel, there are theories and speculations as to what may then occur. In modern Russian plants, there is a "core catching device" in the bottom of the containment building, the melted core is supposed to hit a thick layer of a "sacrificial metal" which would melt, dilute the core and increase the heat conductivity, and finally the diluted core can be cooled down by water circulating in the floor. However there has never been any full-scale testing of this device. In Western plants there is an airtight containment building. Though radiation would be at a high level within the containment, doses outside of it would be lower. Containment buildings are designed for the orderly release of pressure without releasing radionuclides, through a pressure release valve and filters. Hydrogen/oxygen recombiners also are installed within the containment to prevent gas explosions. In a melting event, one spot or area on the RPV will become hotter than other areas, and will eventually melt. When it melts, corium will pour into the cavity under the reactor. Though the cavity is designed to remain dry, several NUREG-class documents advise operators to flood the cavity in the event of a fuel melt incident. This water will become steam and pressurize the containment. Automatic water sprays will pump large quantities of water into the steamy environment to keep the pressure down. Catalytic recombiners will rapidly convert the hydrogen and oxygen back into water. One positive effect of the corium falling into water is that it is cooled and returns to a solid state. Extensive water spray systems within the containment along with the ECCS, when it is reactivated, will allow operators to spray water within the containment to cool the core on the floor and reduce it to a low temperature. These procedures are intended to prevent release of radiation. In the Three Mile Island event in 1979, a theoretical person standing at the plant property line during the entire event would have received a dose of approximately 2 millisieverts (200 millirem), between a chest X-ray's and a CT scan's worth of radiation. This was due to outgassing by an uncontrolled system that, today, would have been backfitted with activated carbon and HEPA filters to prevent radionuclide release. However in case of Fukushima incident this design also at least partially failed: large amounts of highly radioactive water were produced and nuclear fuel has possibly melted through the base of the pressure vessels. Cooling will take quite a while, until the natural decay heat of the corium reduces to the point where natural convection and conduction of heat to the containment walls and re-radiation of heat from the containment allows for water spray systems to be shut down and the reactor put into safe storage. The containment can be sealed with release of extremely limited offsite radioactivity and release of pressure within the containment. After a number of years for fission products to decay - probably around a decade - the containment can be reopened for decontamination and demolition. Unexpected failure modes Another scenario sees a buildup of hydrogen, which may lead to a detonation event, as happened for three reactors during Fukushima incident. Catalytic hydrogen recombiners located within containment are designed to prevent this from occurring; however, prior to the installation of these recombiners in the 1980s, the Three Mile Island containment (in 1979) suffered a massive hydrogen explosion event in the accident there. The containment withstood the pressure and no radioactivity was released. However, in Fukushima recombiners did not work due the absence of power and hydrogen detonation breached the containment. Speculative failure modes One scenario consists of the reactor pressure vessel failing all at once, with the entire mass of corium dropping into a pool of water (for example, coolant or moderator) and causing extremely rapid generation of steam. The pressure rise within the containment could threaten integrity if rupture disks could not relieve the stress. Exposed flammable substances could burn, but there are few, if any, flammable substances within the containment. Another theory called an 'alpha mode' failure by the 1975 Rasmussen (WASH-1400) study asserted steam could produce enough pressure to blow the head off the reactor pressure vessel (RPV). The containment could be threatened if the RPV head collided with it. (The WASH-1400 report was replaced by better-based[original research?] newer studies, and now the Nuclear Regulatory Commission has disavowed them all and is preparing the overarching State-of-the-Art Reactor Consequence Analyses [SOARCA] study - see the Disclaimer in NUREG-1150.) It has not been determined to what extent a molten mass can melt through a structure (although that was tested in the Loss-of-Fluid-Test Reactor described in Test Area North's fact sheet). The Three Mile Island accident provided some real-life experience, with an actual molten core within an actual structure; the molten corium failed to melt through the Reactor Pressure Vessel after over six hours of exposure, due to dilution of the melt by the control rods and other reactor internals, validating the emphasis on defense in depth against core damage incidents. Some believe a molten reactor core could actually penetrate the reactor pressure vessel and containment structure and burn downwards into the earth beneath, to the level of the groundwater. By 1970, there were doubts about the ability of the emergency cooling systems of a nuclear reactor to prevent a loss of coolant accident and the consequent meltdown of the fuel core; the subject proved popular in the technical and the popular presses. In 1971, in the article Thoughts on Nuclear Plumbing, former Manhattan Project (1942–1946) nuclear physicist Ralph Lapp used the term "China syndrome" to describe a possible burn-through, after a loss of coolant accident, of the nuclear fuel rods and core components melting the containment structures, and the subsequent escape of radioactive material(s) into the atmosphere and environment; the hypothesis derived from a 1967 report by a group of nuclear physicists, headed by W. K. Ergen. The geographic, planet-piercing concept of the China syndrome derives from the misperception that China is the antipode of the United States; to many Americans, it is the “the other side of the world”. Moreover, the hypothetical transit of a meltdown product to the other side of the Earth (i.e. China) ignores the fact that the Earth's gravity tends to pull all masses towards its center. Assuming a meltdown product could persist in a mobile molten form for long enough to reach the center of the Earth; gravity would prevent it continuing to the other side. Other reactor types Other types of reactors have different capabilities and safety profiles than the LWR does. Advanced varieties of several of these reactors have the potential to be inherently safe. CANDU reactors CANDU reactors, Canadian-invented deuterium-uranium design, are designed with at least one, and generally two, large low-temperature and low-pressure water reservoirs around their fuel/coolant channels. The first is the bulk heavy-water moderator (a separate system from the coolant), and the second is the light-water-filled shield tank. These backup heat sinks are sufficient to prevent either the fuel meltdown in the first place (using the moderator heat sink), or the breaching of the core vessel should the moderator eventually boil off (using the shield tank heat sink). Other failure modes aside from fuel melt will probably occur in a CANDU rather than a meltdown, such as deformation of the calandria into a non-critical configuration. All CANDU reactors are located within standard Western containments as well. Gas-cooled reactors One type of Western reactor, known as the advanced gas-cooled reactor (or AGCR), built by the United Kingdom, is not very vulnerable to loss-of-cooling accidents or to core damage except in the most extreme of circumstances. By virtue of the relatively inert coolant (carbon dioxide), the large volume and high pressure of the coolant, and the relatively high heat transfer efficiency of the reactor, the time frame for core damage in the event of a limiting fault is measured in days. Restoration of some means of coolant flow will prevent core damage from occurring. Other types of highly advanced gas cooled reactors, generally known as high-temperature gas-cooled reactors (HTGRs) such as the Japanese High Temperature Test Reactor and the United States' Very High Temperature Reactor, are inherently safe, meaning that meltdown or other forms of core damage are physically impossible, due to the structure of the core, which consists of hexagonal prismatic blocks of silicon carbide reinforced graphite infused with TRISO or QUADRISO pellets of uranium, thorium, or mixed oxide buried underground in a helium-filled steel pressure vessel within a concrete containment. Though this type of reactor is not susceptible to meltdown, additional capabilities of heat removal are provided by using regular atmospheric airflow as a means of backup heat removal, by having it pass through a heat exchanger and rising into the atmosphere due to convection, achieving full residual heat removal. The VHTR is scheduled to be prototyped and tested at Idaho National Laboratory within the next decade (as of 2009) as the design selected for the Next Generation Nuclear Plant by the US Department of Energy. This reactor will use a gas as a coolant, which can then be used for process heat (such as in hydrogen production) or for the driving of gas turbines and the generation of electricity. A similar highly advanced gas cooled reactor originally designed by West Germany (the AVR reactor) and now developed by South Africa is known as the Pebble Bed Modular Reactor. It is an inherently safe design, meaning that core damage is physically impossible, due to the design of the fuel (spherical graphite "pebbles" arranged in a bed within a metal RPV and filled with TRISO (or QUADRISO) pellets of uranium, thorium, or mixed oxide within). A prototype of a very similar type of reactor has been built by the Chinese, HTR-10, and has worked beyond researchers' expectations, leading the Chinese to announce plans to build a pair of follow-on, full-scale 250 MWe, inherently safe, power production reactors based on the same concept. (See Nuclear power in the People's Republic of China for more information.) Experimental or conceptual designs Some design concepts for nuclear reactors emphasize resistance to meltdown and operating safety. The PIUS (process inherent ultimate safety) designs, originally engineered by the Swedes in the late 1970s and early 1980s, are LWRs that by virtue of their design are resistant to core damage. No units have ever been built. Power reactors, including the Deployable Electrical Energy Reactor, a larger-scale mobile version of the TRIGA for power generation in disaster areas and on military missions, and the TRIGA Power System, a small power plant and heat source for small and remote community use, have been put forward by interested engineers, and share the safety characteristics of the TRIGA due to the uranium zirconium hydride fuel used. The Hydrogen Moderated Self-regulating Nuclear Power Module, a reactor that uses uranium hydride as a moderator and fuel, similar in chemistry and safety to the TRIGA, also possesses these extreme safety and stability characteristics, and has attracted a good deal of interest in recent times. The liquid fluoride thermal reactor is designed to naturally have its core in a molten state, as a eutectic mix of thorium and fluorine salts. As such, a molten core is reflective of the normal and safe state of operation of this reactor type. In the event the core overheats, a metal plug will melt, and the molten salt core will drain into tanks where it will cool in a non-critical configuration. Since the core is liquid, and already melted, it cannot be damaged. Advanced liquid metal reactors, such as the U.S. Integral Fast Reactor and the Russian BN-350, BN-600, and BN-800, all have a coolant with very high heat capacity, sodium metal. As such, they can withstand a loss of cooling without SCRAM and a loss of heat sink without SCRAM, qualifying them as inherently safe. Soviet Union-designed reactors Soviet designed RBMKs, found only in Russia and the CIS and now shut down everywhere except Russia, do not have containment buildings, are naturally unstable (tending to dangerous power fluctuations), and also have ECCS systems that are considered grossly inadequate by Western safety standards. The reactor from the Chernobyl Disaster was a RBMK reactor. RBMK ECCS systems only have one division and have less than sufficient redundancy within that division. Though the large core size of the RBMK makes it less energy-dense than the Western LWR core, it makes it harder to cool. The RBMK is moderated by graphite. In the presence of both steam and oxygen, at high temperatures, graphite forms synthesis gas and with the water gas shift reaction the resultant hydrogen burns explosively. If oxygen contacts hot graphite, it will burn. The RBMK tends towards dangerous power fluctuations. Control rods used to be tipped with graphite, a material that slows neutrons and thus speeds up the chain reaction. Water is used as a coolant, but not a moderator. If the water boils away, cooling is lost, but moderation continues. This is termed a positive void coefficient of reactivity. Control rods can become stuck if the reactor suddenly heats up and they are moving. Xenon-135, a neutron absorbent fission product, has a tendency to build up in the core and burn off unpredictably in the event of low power operation. This can lead to inaccurate neutronic and thermal power ratings. The RBMK does not have any containment above the core. The only substantial solid barrier above the fuel is the upper part of the core, called the upper biological shield, which is a piece of concrete interpenetrated with control rods and with access holes for refueling while online. Other parts of the RBMK were shielded better than the core itself. Rapid shutdown (SCRAM) takes 10 to 15 seconds. Western reactors take 1 - 2.5 seconds. Western aid has been given to provide certain real-time safety monitoring capacities to the human staff. Whether this extends to automatic initiation of emergency cooling is not known. Training has been provided in safety assessment from Western sources, and Russian reactors have evolved in result to the weaknesses that were in the RBMK. However, numerous RBMKs still operate. It is safe to say that it might be possible to stop a loss-of-coolant event prior to core damage occurring, but that any core damage incidents will probably assure massive release of radioactive materials. Further, dangerous power fluctuations are natural to the design. Lithuania joined the EU recently, and upon acceding, it has been required to shut the two RBMKs that it has at Ignalina NPP, as such reactors are totally incompatible with the nuclear safety standards of Europe. It will be replacing them with some safer form of reactor. The MKER is a modern Russian-engineered channel type reactor that is a distant descendant of the RBMK. It approaches the concept from a different and superior direction, optimizing the benefits, and fixing the flaws of the original RBMK design. There are several unique features of the MKER's design that make it a credible and interesting option: One unique benefit of the MKER's design is that in the event of a challenge to cooling within the core - a pipe break of a channel, the channel can be isolated from the plenums supplying water, decreasing the potential for common-mode failures. The lower power density of the core greatly enhances thermal regulation. Graphite moderation enhances neutronic characteristics beyond light water ranges. The passive emergency cooling system provides a high level of protection by using natural phenomena to cool the core rather than depending on motor-driven pumps. The containment structure is modern and designed to withstand a very high level of punishment. Refueling is accomplished while online, ensuring that outages are for maintenance only and are very few and far between. 97-99% uptime is a definite possibility. Lower enrichment fuels can be used, and high burnup can be achieved due to the moderator design. Neutronics characteristics have been revamped to optimize for purely civilian fuel fertilization and recycling. Due to the enhanced quality control of parts, advanced computer controls, comprehensive passive emergency core cooling system, and very strong containment structure, along with a negative void coefficient and a fast acting rapid shutdown system, the MKER's safety can generally be regarded as being in the range of the Western Generation III reactors, and the unique benefits of the design may enhance its competitiveness in countries considering full fuel-cycle options for nuclear development. The VVER is a pressurized light water reactor that is far more stable and safe than the RBMK. This is because it uses light water as a moderator (rather than graphite), has well understood operating characteristics, and has a negative void coefficient of reactivity. In addition, some have been built with more than marginal containments, some have quality ECCS systems, and some have been upgraded to international standards of control and instrumentation. Present generations of VVERs (the VVER-1000) are built to Western-equivalent levels of instrumentation, control, and containment systems. However, even with these positive developments, certain older VVER models raise a high level of concern, especially the VVER-440 V230. The VVER-440 V230 has no containment building, but only has a structure capable of confining steam surrounding the RPV. This is a volume of thin steel, perhaps an inch or two in thickness, grossly insufficient by Western standards. - Has no ECCS. Can survive at most one 4 inch pipe break (there are many pipes greater than 4 inches within the design). - Has six steam generator loops, adding unnecessary complexity. - However, apparently steam generator loops can be isolated, in the event that a break occurs in one of these loops. The plant can remain operating with one isolated loop - a feature found in few Western reactors. The interior of the pressure vessel is plain alloy steel, exposed to water. This can lead to rust, if the reactor is exposed to water. One point of distinction in which the VVER surpasses the West is the reactor water cleanup facility - built, no doubt, to deal with the enormous volume of rust within the primary coolant loop - the product of the slow corrosion of the RPV. This model is viewed as having inadequate process control systems. Bulgaria had a number of VVER-440 V230 models, but they opted to shut them down upon joining the EU rather than backfit them, and are instead building new VVER-1000 models. Many non-EU states maintain V230 models, including Russia and the CIS. Many of these states - rather than abandoning the reactors entirely - have opted to install an ECCS, develop standard procedures, and install proper instrumentation and control systems. Though confinements cannot be transformed into containments, the risk of a limiting fault resulting in core damage can be greatly reduced. The VVER-440 V213 model was built to the first set of Soviet nuclear safety standards. It possesses a modest containment building, and the ECCS systems, though not completely to Western standards, are reasonably comprehensive. Many VVER-440 V213 models possessed by former Soviet bloc countries have been upgraded to fully automated Western-style instrumentation and control systems, improving safety to Western levels for accident prevention - but not for accident containment, which is of a modest level compared to Western plants. These reactors are regarded as "safe enough" by Western standards to continue operation without major modifications, though most owners have performed major modifications to bring them up to generally equivalent levels of nuclear safety. During the 1970s, Finland built two VVER-440 V213 models to Western standards with a large-volume full containment and world-class instrumentation, control standards and an ECCS with multiply redundant and diversified components. In addition, passive safety features such as 900-tonne ice condensers have been installed, making these two units safety-wise the most advanced VVER-440's in the world. The VVER-1000 type has a definitely adequate Western-style containment, the ECCS is sufficient by Western standards, and instrumentation and control has been markedly improved to Western 1970s-era levels. Chernobyl disaster In the Chernobyl disaster the fuel became non-critical when it melted and flowed away from the graphite moderator - however, it took considerable time to cool. The molten core of Chernobyl (that part that did not vaporize in the fire) flowed in a channel created by the structure of its reactor building and froze in place before a core-concrete interaction could happen. In the basement of the reactor at Chernobyl, a large "elephant's foot" of congealed core material was found. Time delay, and prevention of direct emission to the atmosphere, would have reduced the radiological release. If the basement of the reactor building had been penetrated, the groundwater would be severely contaminated, and its flow could carry the contamination far afield. The Chernobyl reactor was an RBMK type. The disaster was caused by a power excursion that led to a meltdown and extensive offsite consequences. Operator error and a faulty shutdown system led to a sudden, massive spike in the neutron multiplication rate, a sudden decrease in the neutron period, and a consequent increase in neutron population; thus, core heat flux very rapidly increased to unsafe levels. This caused the water coolant to flash to steam, causing a sudden overpressure within the reactor pressure vessel (RPV), leading to granulation of the upper portion of the core and the ejection of the upper plenum of said pressure vessel along with core debris from the reactor building in a widely dispersed pattern. The lower portion of the reactor remained somewhat intact; the graphite neutron moderator was exposed to oxygen containing air; heat from the power excursion in addition to residual heat flux from the remaining fuel rods left without coolant induced oxidation in the moderator; this in turn evolved more heat and contributed to the melting of the fuel rods and the outgassing of the fission products contained therein. The liquefied remains of the fuel rods flowed through a drainage pipe into the basement of the reactor building and solidified in a mass later dubbed corium, though the primary threat to the public safety was the dispersed core ejecta and the gasses evolved from the oxidation of the moderator. Although the Chernobyl accident had dire off-site effects, much of the radioactivity remained within the building. If the building were to fail and dust was to be released into the environment then the release of a given mass of fission products which have aged for twenty years would have a smaller effect than the release of the same mass of fission products (in the same chemical and physical form) which had only undergone a short cooling time (such as one hour) after the nuclear reaction has been terminated. However, if a nuclear reaction was to occur again within the Chernobyl plant (for instance if rainwater was to collect and act as a moderator) then the new fission products would have a higher specific activity and thus pose a greater threat if they were released. To prevent a post-accident nuclear reaction, steps have been taken, such as adding neutron poisons to key parts of the basement. The effects of a nuclear meltdown depend on the safety features designed into a reactor. A modern reactor is designed both to make a meltdown unlikely, and to contain one should it occur. In a modern reactor, a nuclear meltdown, whether partial or total, should be contained inside the reactor's containment structure. Thus (assuming that no other major disasters occur) while the meltdown will severely damage the reactor itself, possibly contaminating the whole structure with highly radioactive material, a meltdown alone should not lead to significant radiation release or danger to the public. In practice, however, a nuclear meltdown is often part of a larger chain of disasters (although there have been so few meltdowns in the history of nuclear power that there is not a large pool of statistical information from which to draw a credible conclusion as to what "often" happens in such circumstances). For example, in the Chernobyl accident, by the time the core melted, there had already been a large steam explosion and graphite fire and major release of radioactive contamination (as with almost all Soviet reactors, there was no containment structure at Chernobyl). Also, before a possible meltdown occurs, pressure can already be rising in the reactor, and to prevent a meltdown by restoring the cooling of the core, operators are allowed to reduce the pressure in the reactor by releasing (radioactive) steam into the environment. This enables them to inject additional cooling water into the reactor again. Reactor design Although pressurized water reactors are more susceptible to nuclear meltdown in the absence of active safety measures, this is not a universal feature of civilian nuclear reactors. Much of the research in civilian nuclear reactors is for designs with passive nuclear safety features that may be less susceptible to meltdown, even if all emergency systems failed. For example, pebble bed reactors are designed so that complete loss of coolant for an indefinite period does not result in the reactor overheating. The General Electric ESBWR and Westinghouse AP1000 have passively activated safety systems. The CANDU reactor has two low-temperature and low-pressure water systems surrounding the fuel (i.e. moderator and shield tank) that act as back-up heat sinks and preclude meltdowns and core-breaching scenarios. Fast breeder reactors are more susceptible to meltdown than other reactor types, due to the larger quantity of fissile material and the higher neutron flux inside the reactor core, which makes it more difficult to control the reaction. Accidental fires are widely acknowledged to be risk factors that can contribute to a nuclear meltdown. United States There have been at least eight meltdowns in the history of the United States. All are widely called "partial meltdowns." - BORAX-I was a test reactor designed to explore criticality excursions and observe if a reactor would self limit. In the final test, it was deliberately destroyed and revealed that the reactor reached much higher temperatures than were predicted at the time. - The reactor at EBR-I suffered a partial meltdown during a coolant flow test on November 29, 1955. - The Sodium Reactor Experiment in Santa Susana Field Laboratory was an experimental nuclear reactor which operated from 1957 to 1964 and was the first commercial power plant in the world to experience a core meltdown in July 1959. - Stationary Low-Power Reactor Number One (SL-1) was a United States Army experimental nuclear power reactor which underwent a criticality excursion, a steam explosion, and a meltdown on January 3, 1961, killing three operators. - The SNAP8ER reactor at the Santa Susana Field Laboratory experienced damage to 80% of its fuel in an accident in 1964. - The partial meltdown at the Fermi 1 experimental fast breeder reactor, in 1966, required the reactor to be repaired, though it never achieved full operation afterward. - The SNAP8DR reactor at the Santa Susana Field Laboratory experienced damage to approximately a third of its fuel in an accident in 1969. - The Three Mile Island accident, in 1979, referred to in the press as a "partial core melt," led to the permanent shutdown of that reactor. Soviet Union In the most serious example, the Chernobyl disaster, design flaws and operator negligence led to a power excursion that subsequently caused a meltdown. According to a report released by the Chernobyl Forum (consisting of numerous United Nations agencies, including the International Atomic Energy Agency and the World Health Organization; the World Bank; and the Governments of Ukraine, Belarus, and Russia) the disaster killed twenty-eight people due to acute radiation syndrome, could possibly result in up to four thousand fatal cancers at an unknown time in the future and required the permanent evacuation of an exclusion zone around the reactor. During the Fukushima I nuclear accidents, three of the power plant's six reactors reportedly suffered meltdowns. Most of the fuel in the reactor No. 1 Nuclear Power Plant melted. TEPCO believes No.2 and No.3 reactors were similarly affected. On May 24, 2011, TEPCO reported that all three reactors melted down. Meltdown incidents - There was also a fatal core meltdown at SL-1, an experimental U.S. military reactor in Idaho. Large-scale nuclear meltdowns at civilian nuclear power plants include: - the Lucens reactor, Switzerland, in 1969. - the Three Mile Island accident in Pennsylvania, U.S.A., in 1979. - the Chernobyl disaster at Chernobyl Nuclear Power Plant, Ukraine, USSR, in 1986. - the Fukushima I nuclear accidents following the earthquake and tsunami in Japan, March 2011. Other core meltdowns have occurred at: - NRX (military), Ontario, Canada, in 1952 - BORAX-I (experimental), Idaho, U.S.A., in 1954 - EBR-I (military), Idaho, U.S.A., in 1955 - Windscale (military), Sellafield, England, in 1957 (see Windscale fire) - Sodium Reactor Experiment, (civilian), California, U.S.A., in 1959 - Fermi 1 (civilian), Michigan, U.S.A., in 1966 - Chapelcross nuclear power station (civilian), Scotland, in 1967 - Saint-Laurent Nuclear Power Plant (civilian), France, in 1969 - A1 plant, (civilian) at Jaslovské Bohunice, Czechoslovakia, in 1977 - Saint-Laurent Nuclear Power Plant (civilian), France, in 1980 China Syndrome The China syndrome (loss-of-coolant accident) is a fictional nuclear reactor operations accident characterized by the severe meltdown of the core components of the reactor, which then burn through the containment vessel and the housing building, then notionally through the crust and body of the Earth until reaching the other side, which in the United States is jokingly referred to as being China. The system design of the nuclear power plants built in the late 1960s raised questions of operational safety, and raised the concern that a severe reactor accident could release large quantities of radioactive materials into the atmosphere and environment. By 1970, there were doubts about the ability of the emergency cooling systems of a nuclear reactor to prevent a loss of coolant accident and the consequent meltdown of the fuel core; the subject proved popular in the technical and the popular presses. In 1971, in the article Thoughts on Nuclear Plumbing, former Manhattan Project (1942–1946) nuclear physicist Ralph Lapp used the term "China syndrome" to describe a possible burn-through, after a loss of coolant accident, of the nuclear fuel rods and core components melting the containment structures, and the subsequent escape of radioactive material(s) into the atmosphere and environment; the hypothesis derived from a 1967 report by a group of nuclear physicists, headed by W. K. Ergen. In the event, Lapp’s hypothetical nuclear accident was cinematically adapted as The China Syndrome (1979). The geographic, planet-piercing concept of the China syndrome derives from the misperception that China is the antipode of the United States; to many Americans, it is the “the other side of the world”. Moreover, the hypothetical transit of a meltdown product to the other side of the Earth (i.e. China) ignores the fact that the Earth's gravity tends to pull all masses towards its center. Assuming a meltdown product could persist in a mobile molten form for long enough to reach the center of the Earth; momentum loss due to friction (fluid viscosity) would prevent it continuing to the other side. See also - Behavior of nuclear fuel during a reactor accident - Chernobyl compared to other radioactivity releases - Chernobyl disaster effects - High-level radioactive waste management - International Nuclear Event Scale - List of civilian nuclear accidents - Lists of nuclear disasters and radioactive incidents - Nuclear fuel response to reactor accidents - Nuclear safety - Nuclear power - Nuclear power debate - Martin Fackler (June 1, 2011). "Report Finds Japan Underestimated Tsunami Danger". New York Times. - International Atomic Energy Agency (IAEA) (2007). IAEA Safety Glossary: Terminology Used in Nuclear Safety and Radiation Protection (2007edition ed.). Vienna, Austria: International Atomic Energy Agency. ISBN 92-0-100707-8. Retrieved 2009-08-17. - United States Nuclear Regulatory Commission (NRC) (2009-09-14). "Glossary". Website. Rockville, Maryland, USA: Federal Government of the United States. pp. See Entries for Letter M and Entries for Letter N. Retrieved 2009-10-03. - Reactor safety study: an assessment of accident risks in U.S. commercial nuclear power plants, Volume 1 - Hewitt, Geoffrey Frederick; Collier, John Gordon (2000). "4.6.1 Design Basis Accident for the AGR: Depressurization Fault". Introduction to nuclear power (in Technical English). London, UK: Taylor & Francis. p. 133. ISBN 978-1-56032-454-6. Retrieved 2010-06-05. - "Earthquake Report No. 91". JAIF. May 25, 2011. Retrieved May 25, 2011. - Kuan, P.; Hanson, D. J., Odar, F. (1991). Managing water addition to a degraded core. Retrieved 2010-11-22. - Haskin, F.E.; Camp, A.L. (1994). Perspectives on Reactor Safety (NUREG/CR-6042) (Reactor Safety Course R-800), 1st Edition. Beltsville, MD: U.S. Nuclear Regulatory Commission. p. 3.1–5. Retrieved 2010-11-23. - Haskin, F.E.; Camp, A.L. (1994). Perspectives on Reactor Safety (NUREG/CR-6042) (Reactor Safety Course R-800), 1st Edition. Beltsville, MD: U.S. Nuclear Regulatory Commission. pp. 3.5–1 to 3.5–4. Retrieved 2010-12-24. - Haskin, F.E.; Camp, A.L. (1994). Perspectives on Reactor Safety (NUREG/CR-6042) (Reactor Safety Course R-800), 1st Edition. Beltsville, MD: U.S. Nuclear Regulatory Commission. pp. 3.5–4 to 3.5–5. Retrieved 2010-12-24. - ANS : Public Information : Resources : Special Topics : History at Three Mile Island : What Happened and What Didn't in the TMI-2 Accident - Nuclear Industry in Russia Sells Safety, Taught by Chernobyl - 'Melt-through' at Fukushima? / Govt. suggests situation worse than meltdown http://www.yomiuri.co.jp/dy/national/T110607005367.htm - Test Area North - Walker, J. Samuel (2004). Three Mile Island: A Nuclear Crisis in Historical Perspective (Berkeley: University of California Press), p. 11. - Lapp, Ralph E. "Thoughts on nuclear plumbing." The New York Times, 12 December 1971, pg. E11. - "China Syndrome". Merriam-Webster. Retrieved December 11, 2012. - Presenter: Martha Raddatz (15 March 2011). "ABC World News". ABC. - Allen, P.J.; J.Q. Howieson, H.S. Shapiro, J.T. Rogers, P. Mostert and R.W. van Otterloo (April–June 1990). "Summary of CANDU 6 Probabilistic Safety Assessment Study Results". Nuclear Safety 31 (2): 202–214. - http://www.insc.anl.gov/neisb/neisb4/NEISB_1.1.html INL VVER Sourcebook - Partial Fuel Meltdown Events - ANL-W Reactor History: BORAX I - Wald, Matthew L. (2011-03-11). "Japan Expands Evacuation Around Nuclear Plant". The New York Times. - The Chernobyl Forum: 2003-2005 (2006-04). "Chernobyl’s Legacy: Health, Environmental and Socio-economic Impacts". International Atomic Energy Agency. p. 14. Retrieved 2011-01-26. - The Chernobyl Forum: 2003-2005 (2006-04). "Chernobyl’s Legacy: Health, Environmental and Socio-Economic Impacts". International Atomic Energy Agency. p. 16. Retrieved 2011-01-26. - Hiroko Tabuchi (May 24, 2011). "Company Believes 3 Reactors Melted Down in Japan". The New York Times. Retrieved 2011-05-25.
<urn:uuid:593ff668-f2a3-43a3-a234-69537b1789d6>
2013-05-24T01:52:01Z
CC-MAIN-2013-20
[ [ -0.0322265625, -0.009521484375, -0.0101318359375, 0.00555419921875, 0.11474609375, -0.0966796875, 0.00142669677734375, 0.15234375, -0.013427734375, -0.048095703125, 0.0498046875, 0.02978515625, 0.0267333984375, 0.03271484375, 0.03369140625, -0.010314...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934809
11,510
http://en.wikipedia.org/wiki/Nuclear_meltdown
0.475524
|Single by The Beatles| |A-side||"Strawberry Fields Forever"| |Released||13 February 1967 (US) 17 February 1967 (UK) |Recorded||29 December 1966 – 17 January 1967 EMI Studios, London |Genre||Baroque pop, psychedelic pop| |The Beatles singles chronology| Recorded during the Sgt. Pepper sessions, "Penny Lane" was released in February 1967 as one side of a double A-sided single, along with "Strawberry Fields Forever". Both songs were later included on the Magical Mystery Tour LP (1967). The single was the result of the record company wanting a new release after several months of no new Beatles releases. The song's title is derived from the name of a street near Lennon's childhood home for his first 5 years (Newcastle Road, just off Church Road), in the band's hometown, Liverpool. McCartney and Lennon would meet at Penny Lane junction in the Wavertree area to catch a bus into the centre of the city. At the time, in the 1960s, this was a significant bus terminus for several routes, and buses with "Penny Lane" displayed were common throughout Liverpool. The name Penny Lane is also used for the area that surrounds its junction with Smithdown Road, Smithdown Place (where the terminus was located) and Allerton Road, including a busy shopping area. Penny Lane is named after James Penny, an 18th century slave trader. The street is an important landmark, sought out by many Beatles fans touring Liverpool. In the past, street signs saying "Penny Lane" were constant targets of tourist theft and had to be continually replaced. Eventually, city officials gave up and simply began painting the street name on the sides of buildings. This practice was stopped in 2007 and more theft-resistant "Penny Lane" street signs have since been installed, although some are still stolen. Beatles producer George Martin has stated he believes the pairing of "Penny Lane" with "Strawberry Fields Forever" resulted in probably the greatest single ever released by the band. Both songs were later included on the US Magical Mystery Tour album in November 1967. In the UK, the pairing famously failed to reach No. 1 in the singles charts, stalling one place below Engelbert Humperdinck's "Release Me". In the US the song reached No. 1 on the Billboard Hot 100 for a week before being knocked off by The Turtles song "Happy Together". The single was released following the success of the double A-side "Yellow Submarine"/"Eleanor Rigby", when Brian Epstein enquired if the band had any new material available. Since the Beatles usually did not include songs released as singles on their British albums, both songs were left off the Sgt. Pepper's Lonely Hearts Club Band album, a decision Martin later regretted. This was also the first single by the Beatles to be sold with a picture sleeve in the UK, a practice rarely used there at that time, but common in the US and various other countries (such as Japan). Production began in Studio 2 at Abbey Road on 29 December 1966 with piano as the main instrument. On 17 January 1967, trumpet player David Mason recorded the piccolo trumpet solo. The solo, inspired by a performance of Bach's 2nd Brandenburg Concerto, is in a mock-Baroque style for which the piccolo trumpet (a small instrument built about one octave higher than the standard instrument) is particularly suited, having a clean and clear sound which penetrates well through thicker midrange textures. Mason was paid 27 pounds and 10 shillings for his performance on the recording. Penny Lane production effects include percussion effects, piano through a Vox guitar amplifier with added reverb. The original US promo single mix of "Penny Lane" had an additional flourish of piccolo trumpet notes at the end of the song. This mix was quickly superseded by one without the last trumpet passage, but not before a handful of copies had been pressed and sent to radio stations. These recordings are among the rarest and most valuable Beatles collectibles. A stereo mix of the song with the additional trumpet added back in was included on the US Rarities compilation and the UK album: The Beatles Box in 1980, and is included on an alternate take of the song released on Anthology 2 in 1996. - Paul McCartney – lead, harmony and backing vocals, three pianos and bass - John Lennon – harmony and backing vocals, two pianos, congas and handclaps - George Harrison – backing vocal, handbell and handclaps - Ringo Starr – drums, tambourine - George Martin – piano, production, orchestration - David Mason – piccolo trumpet solo - Ray Swinfield, P. Goody, Manny Winters – flutes, piccolos - Leon Calvert, Freddy Clayton, Bert Courtley, Duncan Campbell – trumpets, flugelhorn - Dick Morgan, Mike Winfield – oboes, cor anglais - Frank Clarke – double-bass In August 1987, the piccolo trumpet Mason played on "Penny Lane" and two other Beatles tracks ("All You Need Is Love" and "Magical Mystery Tour") was sold in an auction at Sotheby's for $10,846. Lyrics and music The song has a double tonic structure of B major verse (in I-vi-ii-V cycles) and A major chorus connected by formal pivoting dominant chords. In the opening bars in B major, after singing "In Penny Lane" (in an F#-B-C#-D# melody note ascent) McCartney uses major 3rds[clarification needed Do you mean harmony intervals, III chords, melody notes?] (on "Lane" and "Pocket") and major 7ths[clarification needed same issue] (on "a fireman" and "a portrait") then switches to a Bm key involving flattened 3rd notes (on "Queen" with a i7 [Bm7] chord) and flattened 7th notes (on "engine clean" [with a ♭VImaj7 [Gmaj7] chord] and "clean machine" [with a V7sus4 [F#7sus4] chord]). This has been described as a profound and surprising innovation involving abandoning mid-cycle what initially appears to be a standard I-vi-ii-V Doo Wop pop chord cycle. To get from the verse "In the pouring rain - very strange" McCartney uses an E chord as a pivot, (it is a IV chord in the preceding B key and a V in the looming A key) to take listeners back into the chorus ("Penny Lane is in my ears..."). Likewise to get back from the chorus of "There beneath the blue suburban skies I sit, and meanwhile back..., McCartney uses an F#7 pivot chord (which is a VI in the old A key and a V in the new B key). The lyrics "very strange" and "meanwhile back" can be viewed as hinting at these complex tonal changes. A feature of the song was the piccolo trumpet solo played by Mason. This is thought to be the first use of this instrument (a distinctive, speciality instrument, pitched about an octave higher than the standard B-flat trumpet) in pop music. Martin later wrote, "The result was unique, something which had never been done in rock music before." McCartney was dissatisfied with the initial attempts at the song's instrumental fill (one of which, featuring cors anglais, was released on Anthology 2), and was inspired to use the instrument after seeing Mason's performance on a BBC television broadcast of the second Brandenburg Concerto by Johann Sebastian Bach. The song features contrasting verse-chorus form. Lyrically there are several ambiguous and surreal images. The song is seemingly narrated on a fine summer day ("beneath the blue suburban skies"), yet at the same time it is raining ("the fireman rushes in from the pouring rain") and approaching winter ("selling poppies from a tray" implies Remembrance Day, 11 November). Ian MacDonald has stated: "Seemingly naturalistic, the lyric scene is actually kaleidoscopic. As well as raining and shining at the same time, it is simultaneously summer and winter.". Macdonald suggests an LSD influence, and that the lyrical imagery points to McCartney first taking LSD in late 1966. However, he also cites a different story, which dates McCartney's first LSD trip to 21 March 1967. Macdonald finishes with the comment: "Despite its seeming innocence, there are few more LSD-redolent phrases in the Beatles' output than the line… in which the Nurse 'feels as if she's in a play'… and 'is anyway'." The 'shelter in the middle of the roundabout' refers to the old bus shelter, later developed into a cafe/restaurant with a Beatles theme, but now derelict and abandoned, despite its popularity as a tourist attraction. This is also Penny Lane Bus Terminus, where the Nos 46 (Penny Lane to Walton) and 99 (Penny Lane to Old Swan) buses terminated and is officially on Smithdown Place. The mysterious lyrics "Four of fish and finger pies" are British slang. "A four of fish" refers to fourpennyworth of fish and chips, while "finger pie" is sexual slang of the time, apparently referring to intimate fondlings between teenagers in the shelter, which was a familiar meeting place. The combination of "fish and finger" also puns on fish fingers. The lyrics as printed on the compilation album The Beatles: 1967–1970 (aka the "Blue Album"), however, are "Full of fish and finger pies" which are incorrect. In the remastered version, the lyrics read as "For a fish and finger pies," which is also incorrect. Penny Lane today Prior to securing international fame, Penny Lane's chief renown was as the terminus for the No 46 and No 99 bus routes to Walton, Old Swan and the city centre. The terminus included a purpose-built bus shelter, with waiting room and toilets for waiting passengers. The shelter is located on its own "island" which is the mentioned "shelter on the roundabout" in the Beatles song. In the 1980s, the shelter was bought privately and converted to the Sergeant Pepper's Bistro, though it has since closed and now stands in the middle of its roundabout looking in a very sorry state. The shelter is actually situated in Smithdown Place, though the terminus was named Penny Lane because of its proximity to Penny Lane. Towards the end of the 1970s, businesses in Penny Lane included Penny Lane Records and a wine bar known in the early years as Harper's Bizarre, now called Penny Lane Wine Bar (this was actually a Doctors' Surgery, previously Drs Walton, Endbinder and Partners); the practice moved to Smithdown Place in the 1980s. Following privatisation, the Merseyside Passenger Transport Executive bus depot, slightly up the hill past Bioletti's, was demolished and replaced with a shopping precinct complete with a supermarket and a public house. Since then, the general Penny Lane area has acquired a distinct trendiness and desirability. The "alternative" businesses (wholefood outlets, charity shops), the now expanded array of cafés, bars, bistros, and takeaway food emporiums, as well as handily located traditional businesses (WHSmiths and Clarke's cake shop), make the neighbourhood the most sought-after among Liverpool's large student population. Though the song refers to the "Penny Lane junction" on Smithdown Road, the street itself also leads down at the other end to the University of Liverpool's student halls of residence, near Sefton Park. In July 2006, a Liverpool Councillor proposed renaming certain streets because their names were linked to the slave trade. It was soon discovered that Penny Lane, named after James Penny, a wealthy 18th-century slave ship owner and strong opponent of abolitionism, was one of these streets. Ultimately, city officials decided to forgo the name change and re-evaluate the entire renaming process. On 10 July 2006, it was revealed that Liverpool officials said they would modify the proposal to exclude Penny Lane. The fireman and fire engine referred to in the lyrics are based upon the fire station at Mather Avenue. This is some distance, "about half a mile down the road",[clarification needed] from Penny Lane. The station is still in use today. Promotional film The promotional film for "Penny Lane" was, together with the video for "Strawberry Fields Forever", one of the first examples of what later became known as a music video. The music video for the song was not filmed at Penny Lane, as the Beatles were reluctant to travel to Liverpool. Street scenes were filmed in and around Angel Lane in London's East End. The broken sequence of Lennon walking alone was filmed on the King's Road (at Markham Square) in Chelsea. The outdoor scenes were filmed at Knole Park in Sevenoaks on 30 January 1967. The promotional film for "Strawberry Fields Forever" was also shot at the same location, during the same visit (during The Beatles stay in Sevenoaks, Lennon wandered into an antiques gallery and purchased the poster for Pablo Fanque's Circus Royal that would inspire the song, "Being for the Benefit of Mr. Kite!"). Both films—directed by the Swede Peter Goldmann—were selected by New York's MoMA to be among the most influential promotional music films of the late 1960s. Film of "Penny Lane" was included - with some scenes of green Liverpool buses and a brief overhead view of the 'shelter in the middle of the roundabout', but none of the Beatles attended. |Canada CHUM Chart||1| |UK Singles Chart||2| |U.S. Billboard Hot 100||1| "Love Is Here and Now You're Gone" by the Supremes |Billboard Hot 100 number one single 18 March 1967 (one week) "Happy Together" by the Turtles - Courrier, Kevin (2009). Artificial paradise: the dark side of the Beatles' utopian dream. Michegan: Praeger. p. 157. ISBN 0313345864. - Heylin, C (2007). The Act You've Known For All These Years: the Life, and Afterlife, of Sgt. Pepper. London: Canongate Books. p. 153. ISBN 1-84195-955-3. - RIAA 2009. - Unterberger 2009. - Pandey, Swati (16 July 2006). "Beneath the blue suburban skies". Los Angeles Times. Retrieved 23 February 2011. - Lynskey 2004. - The Beatles 2000, p. 239. - Babiuk et al. 2002, p. 195. - Ingham 2009, p. 245. - Miles & Charlesworth 1998, p. 228. - Steele-Perkins 2001, p. 120. - Morin 1998. - MacDonald 2005, pp. 221–223. - Pedler 2003, p. 658. - Pedler 2003, pp. 658-659. - Pedler 2003, p. 659. - Pedler 2003, pp. 348-349. - Martin & Hornsby 1994, p. 202. - Lewisohn 1988, p. 93. - Young 2007. - Beatles Interview Database 2009. - Macdonald, Ian (1994). Revolution in the Head. p. 179. - Mann, Brent (2005). Blinded By the Lyrics: Behind the Lines of Rock & Roll's Most Baffling Songs, p. 171. New York, NY: Kensington Publishing Corp. (Accessed 6-18-2010). - FOX News 2006. - Miles, Barry. Paul McCartney: Many Years From Now. - Austerlitz, Saul (2007). Money for Nothing: A History of the Music Video from the Beatles to the White Stripes. Continuum. - Turner, Steve (1994). A Hard Days Write. HarperCollins. - The Beatles Bible 2008. |Wikimedia Commons has media related to: Penny Lane| - Babiuk, Andy; Lewisohn, Mark; Bacon, Tony (2002). Beatles Gear: All the Fab Four's Instruments, from Stage to Studio. Backbeat Books. ISBN 0-87930-731-5. - The Beatles (2000). The Beatles Anthology. San Francisco: Chronicle Books. ISBN 0-8118-2684-8. - Ingham, Chris (2003). The Rough Guide to the Beatles. Rough Guides. ISBN 1-84353-140-2. - Lewisohn, Mark (1988). The Beatles Recording Sessions. New York: Harmony Books. ISBN 0-517-57066-1. - "Liverpool Won't Rename Penny Lane, Despite Slavery Ties". FOX News. 10 July 2006. - Lynskey, Dorian (7 May 2004). "Greatest chart number twos". The Guardian. - MacDonald, Ian (2005). Revolution in the Head: The Beatles' Records and the Sixties (Second Revised ed.). London: Pimlico (Rand). ISBN 1-84413-828-3. - "Magical Mystery Tour". Beatles Interview Database. 2009. Retrieved 28 December 2009. - Martin, George; Hornsby, Jeremy (1994). All You Need Is Ears. New York: St. Martin's Press. ISBN 0-312-11482-6. - Miles, Barry; Charlesworth, Chris (1998). The Beatles: A Diary. Omnibus Press. ISBN 0-7119-6315-0. - Morin, Cari (1998). The Evolution of Beatles' Recording Technology. - Pedler, Dominic (2003). The Songwriting Secrets of the Beatles. New York: Music Sales Limited. Omnibus Press. - "Penny Lane". The Beatles Bible. 2008. Retrieved 12 October 2008. - "RIAA Gold & Platinum Searchable Database - The Beatles Gold Singles". RIAA. 2009. Retrieved 20 July 2009. - Steele-Perkins, Crispian (2001). "The Trumpet". Menuhin Music Guides (London: Kahn & Averill). ISBN 1-871082-69-2. - Unterberger, Richie (2009). "Review of "Penny Lane"". Allmusic. Retrieved 24 November 2009. - Young, Neville (1 September 2007). "The piccolo trumpet solos in the Beatles' "Penny Lane"". - An appreciation of the song from the McSweeneys.net series of Short Essays on Favorite Songs, Inspired by Nick Hornby's Songbook. - Alan W. Pollack's Notes on "Penny Lane" - Golden Oldies of Music Video a presentation from New York's MoMA originally screened on 17 April 2003 - St Barnabas Church Penny Lane - Penny Lane Development Trust building a community/visitor centre on Grove Mount Penny Lane
<urn:uuid:355fe5d2-c98b-4618-b5c4-63c9f1768059>
2013-05-24T02:06:01Z
CC-MAIN-2013-20
[ [ -0.006561279296875, 0.0159912109375, -0.0172119140625, -0.003936767578125, 0.10546875, -0.076171875, -0.00250244140625, 0.07763671875, -0.023193359375, -0.05712890625, 0.087890625, 0.025634765625, 0.01141357421875, -0.02099609375, 0.0255126953125, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.922956
4,049
http://en.wikipedia.org/wiki/Penny_Lane
0.265027
Roman siege engines |This article is part of the series on: Military of ancient Rome (portal) 753 BC – AD erals |Roman navy (fleets, admirals)| |Lists of wars and battles| |Decorations and punishments| |Military engineering (castra, siege engines, arches, roads)| |Strategy and tactics| |Frontiers and fortifications (limes, Hadrian's Wall)| Roman siege engines were, for the most part, adapted from Hellenistic siege technology. Relatively small efforts were made to develop the technology; however, the Romans brought an unrelentingly aggressive style to siege warfare that brought them repeated success. Up to the 1st century BC the Romans utilized siege weapons only as required and relied for the most part on ladders, towers and rams to assault a fortified town. Ballistae were also employed, but held no permanent place within a legion's roster, until later in the Republic, and were used sparingly. Julius Caesar took great interest in the integration of advanced siege engines, organizing their use for optimal battlefield efficiency. Army engineering corps To facilitate this organization and the army’s self-sufficiency, an engineering corps was developed. An officer of engineers, or praefectus fabrum, is referenced in armies of the Late Republic, but this post is not verifiable in all accounts and may have simply been a military advisor on the personal staff of a commanding officer. There were legion architects (whose rank is yet unknown) who were responsible for the construction of war machines who would also assure that all artillery constructions in the field were level. Ensuring that constructions were level was the job of the libratores, who would also launch missiles and other projectiles (on occasion) during battle (Le Bohec 1994: 52). The engineering corps was in charge of massive production, frequently prefabricating artillery and siege equipment to facilitate its transportation. Roman artillery was very efficient at that time, and during a siege the Romans would attack the weakest area of their enemy’s defenses and attempt to breach the walls at that point. To support this effort, artillery fire would commence, with three main objectives: to cause damage to defenses, casualties among the opposing army, and loss of enemy morale. It would also provide cover fire for troops building siege ramps or those in siege towers. There were machines called tormenta , which would launch (sometimes incendiary) projectiles such as javelins, arrows, rocks, or beams. These devices were on wheeled platforms to follow the line’s advance. All were “predicated on a principle of physics: a lever was inserted into a skein of twisted horsehair to increase torsion, and when the arm was released, a considerable amount of energy was thus freed”. It was later stated that sinew, instead of twisted hair, provided a better “spring.” These weapons were high-maintenance devices and vulnerable to having their leather, sinew, or hemp skeins affected by wet or even damp, which would cause them to slacken and lose tension, rendering the engine useless. It is somewhat difficult to clearly define and describe Roman artillery, as names are easily confused and historians still do not agree on all definitions. Perhaps best known are the ballista, the onager, and the scorpio. After the absorption of the Ancient Greek City states into the Roman Republic in 146 BC, some advanced Greek technology began to spread across many areas of Roman influence. This included the hugely advantageous military advances the Greeks had made (most notably by Dionysus of Syracuse), as well as all the scientific, mathematical, political and artistic developments. The Romans 'inherited' the torsion powered Ballistae which had by now spread to several cities around the Mediterranean, all of which became Roman spoils of war in time, including one from Pergamum, which was depicted among a pile of 'trophy' weapons in relief on a balustrade. The torsion ballista, developed by Alexander, was a far more complicated weapon than its predecessor, and the Romans developed it even further. Every century (group of 60-100 men) in the Roman army had a ballista by the 1st century AD. It was the command of the chief of the ballista, under whom were the artillery experts, or doctores ballistarum and finally, the artillerymen, or ballistarii. Ballistae were heavy missile weapons, hurling large rocks great distances to damage rampart walls. They resembled large crossbows, rather than catapults. They were powered by two horizontal like arms, which were inserted into two vertical and tightly wound "skein" springs contained in a rectangular frame structure making up the head or principal part of the weapon. The arms were drawn rearward with a winch lever to further twist the skeins and thus gain the torsion power to cast a projectile. It has been said that the whirring sound of a ballista-fired stone struck fear and dread into the hearts of those inside the walls of besieged cities. The stones chosen to be used in the ballista had to be a particular sort. According to Vegetius river stones were best, since they are round, smooth, and dense. Ballista stones found at the site of Masada were chiseled to make them as round as possible. Early Roman ballista The early Roman ballistae were made of wood, and held together with iron plates around the frames and iron nails in the stand. The main stand had a slider on the top, into which were loaded the bolts or stone 'shot'. Attached to this, at the back, was a pair of winches and a claw, used to ratchet the bowstring back to the armed firing position. A slider passed through the field frames of the weapon, in which were located the torsion springs (rope made of animal sinew), which were twisted around the bow arms, which in turn were attached to the bowstring. Drawing the bowstring back with the winches twisted the already taut springs, storing the energy to fire the projectiles. The ballista was a highly accurate weapon (there are many accounts right from its early history of single soldiers being picked off by the operators), but some design aspects meant it could compromise its accuracy for range. The lightweight bolts could not gain the high momentum of the stones over the same distance as those thrown by the later onagers, trebuchets, or mangonels; these could be as heavy as 90-135 kg (200-300 pounds). The Romans continued the development of the Ballista, and it became a highly-prized and valued weapon in the army of the Roman Empire. It was used, just before the start of the Empire, by Julius Caesar during his conquest of Gaul and on both of his expeditions to Britain. Both attempted invasions of Britain and the siege of Alesia are recorded in his own Commentarii (journal), The Gallic Wars (De Bello Gallico). It was also used in the Roman siege of Masada. First invasion of Britain The first invasion of Britain took place in 55 BC, after a rapid and successful initial conquest of Gaul, in part as an exploratory expedition, and more practically to try and put an end to the re-enforcements sent by the native Britons to fight the Romans in Gaul. A total of eighty transports, carrying two legions attempted to land on the British shore, only to be driven back by the many British warriors assembled along the shoreline. The ships had to unload their troops on the beach, as it was the only one suitable for many kilometers, yet the massed ranks of British charioteers and javeliners were making it impossible. Seeing this, Caesar ordered the warships – which were swifter and easier to handle than the transports, and likely to impress the natives more by their unfamiliar appearance – to be removed a short distance from the others, and then be rowed hard and run ashore on the enemy’s right flank, from which position the slings, bows and artillery could be used by men on deck to drive them back. This manoeuvre was highly successful. Scared by the strange shape of the warships, the motion of the oars, and the unfamiliar machines, the natives halted and then retreated a little. (Caesar, The Conquest of Gaul, p. 99) Siege of Alesia In Gaul, the stronghold of Alesia was under a Roman siege in 52 BC, and surrounded by Roman fortifications. As was standard siege technique at the time, ballistae were placed up in the towers with other soldiers armed with either bows or slings. The Onager The onager was a post-classical Roman siege engine, which derived its name from the kicking action of the machine, similar to that of an onager (wild ass). It is a type of catapult that uses torsional pressure, generally from twisted rope, to store energy for the shot. The onager consisted of a frame placed on the ground to whose front end a vertical frame of solid timber was rigidly fixed; through the vertical frame ran an axle, which had a single stout spoke. On the extremity of the spoke was a sling used to launch a projectile. In action the spoke was forced down, against the tension of twisted ropes or other springs, by a windlass, and then suddenly released. The spoke thus kicked the crosspiece of the vertical frame, and the projectile at its extreme end was shot forward. The onagers of the Roman Empire were mainly used for besieging forts or settlements. They would often be loaded with large stones or rocks that could be covered with a flammable substance and set alight. In the Middle Ages (recorded from around 1200 C.E.) a less powerful version of the onager was used that employed a fixed bowl rather than a sling, so that many small projectiles could be thrown, as opposed to a single large one. This engine was sometimes called the mangonel, although the same name may have been used for a variety of siege engines. The scorpio was a crossbow-like device that fired smaller arrows with deadly accuracy used both in the field and in sieges. They were so-named for their deadly, armor-piercing sting and could be operated by just one or two men. Scorpions were meant to kill and injure enemy troops, rather than break down enemy fortifications. Thanks to their smaller size, they could be mounted on or in siege towers. During the Siege of Amida, a scorpion-fired arrow killed the son of Grumbate, king of the Chionitae, when he was approaching the city to surrender. There has been some research done into the existence of the self-loading, serial-fire scorpio or polybolos. Legionaries either side would continuously keep turning cranks which turned a chain, which operated the various mechanisms to load and fire the catapult. All that was needed was for another soldier to keep feeding in more arrows. Breaking the walls Battering rams Roman battering rams, or aries, were an effective weapon for breaking down an enemy’s walls, as well as their morale. Under Roman law, any defenders who failed to surrender before the first ram touched their wall were denied any rights. The moment they heard the ram hit the wall, those inside the city knew that the siege proper had begun and there was no turning back. It is an immense beam, similar to a ship’s mast, with one end covered with iron shaped into a ram’s head; hence its name. It is suspended from another beam like a balance arm by cables around its middle, and this in turn is supported at both ends by posts fixed in the ground. It is drawn back by a huge number of men who then push it forward in unison with all their might so that it hits the wall with its iron head. There is no tower strong enough nor any wall thick enough to withstand repeated blows of this kind, and many cannot resist the first shock. For protection, a battering ram was suspended in a mobile shelter called a tortoise, or testudo. According to Vegetius, it was given this name because the ram would swing out of the shelter much like a tortoise’s head comes out of its shell. Such shelters would provide the men within protection against missiles and incendiary devices. They were constructed from a framework of strong timbers with planks and wicker hurdles on the sides. The entire shelter would then be covered with a fireproof material such as uncured hides. According to Apollodorus of Damascus, the shelter should be fixed to the ground while the ram was being used to both prevent skidding and strain on the axles from the weight of the moving apparatus. This would also increase the strength of the impact on the walls. Siege towers According to Josephus, the Roman siege towers at Jotapata were 50 feet high and iron-plated to protect them from fire; those at Masada were reported to be 75 feet high. It was possible to have many different devices on siege towers, such as artillery, draw bridges and rams. Those at the top of the tower were to keep defenders off the walls while those below them attempted to breach the wall using ramps. Following a basic design, details of tower construction varied from siege to siege and there is no known treatise which specifies at which level siege equipment should be placed. Vegetius noted that, “besiegers sometimes built a tower with another turret inside it that could suddenly be raised by ropes and pulleys to over-top the wall”. Mines could be dug under city walls as a means of entering a city secretly and capturing it but were more frequently constructed to weaken city walls. Once dug, sappers would underpin the walls with wood and cause the walls to collapse by firing the supports with resin, sulfur and other incendiary materials. - Goldsworthy 2000: 144 - Keppie 1984: 99 - Le Bohec 1994: 138 - Catapulta at LegionXXIV - Le Bohec 1994: p. 138 - Le Bohec 1994: p. 49 - Garrison 1997. - Goldsworthy 2000: 191 - Siege weapons at roman-empire.net - Goldsworthy 2000: p. 145 - Gilliver 1999: p. 140 - Le Bohec 1994: p. 139 - Gilliver 1999: pp. 134-135 - Gilliver 1999: p. 138 - Gilliver 1999: pp. 136-137. - Gilliver 1999: 138 - Gilliver 1999: 140 - James V. Garrison (1997). "Casting stones: ballista, stones as weapons, and death by stoning". Brigham Young University Studies 36 (3): 351–352. - Gilliver, C.M. (1999). The Roman Art of War. Charleston, SC: Tempus. ISBN 0-7524-1939-0. - Goldsworthy, Adrian (2000). Roman Warfare. London: Cassell. ISBN 0-304-35265-9. - Keppie, Lawrence (1984). The Making of the Roman Army from Empire to Republic. Totowa, NJ: Barnes & Noble Books. ISBN 0-389-20447-1. - Le Bohec, Yann (1994). The Imperial Roman Army. London: B.T. Batsford Ltd. ISBN 0-7134-7166-2. See also
<urn:uuid:7555b458-aab3-4580-8c8c-7208b26dc94e>
2013-05-24T02:08:32Z
CC-MAIN-2013-20
[ [ -0.0081787109375, 0.00946044921875, -0.017333984375, 0.0045166015625, 0.095703125, -0.058837890625, -0.016845703125, 0.107421875, -0.01177978515625, -0.059814453125, 0.0302734375, 0.04150390625, -0.03662109375, 0.03662109375, 0.037109375, 0.014160156...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972766
3,269
http://en.wikipedia.org/wiki/Roman_siege_engines
0.31419
Signal-to-noise ratio (often abbreviated SNR or S/N) is a measure used in science and engineering that compares the level of a desired signal to the level of background noise. It is defined as the ratio of signal power to the noise power. A ratio higher than 1:1 indicates more signal than noise. While SNR is commonly quoted for electrical signals, it can be applied to any form of signal (such as isotope levels in an ice core or biochemical signaling between cells). Signal-to-noise ratio is sometimes used informally to refer to the ratio of useful information to false or irrelevant data in a conversation or exchange. For example, in online discussion forums and other online communities, off-topic posts and spam are regarded as "noise" that interferes with the "signal" of appropriate discussion. where P is average power. Both signal and noise power must be measured at the same or equivalent points in a system, and within the same system bandwidth. If the signal and the noise are measured across the same impedance, then the SNR can be obtained by calculating the square of the amplitude ratio: where A is root mean square (RMS) amplitude (for example, RMS voltage). Because many signals have a very wide dynamic range, SNRs are often expressed using the logarithmic decibel scale. In decibels, the SNR is defined as which may equivalently be written using amplitude ratios as The concepts of signal-to-noise ratio and dynamic range are closely related. Dynamic range measures the ratio between the strongest un-distorted signal on a channel and the minimum discernable signal, which for most purposes is the noise level. SNR measures the ratio between an arbitrary signal level (not necessarily the most powerful signal possible) and noise. Measuring signal-to-noise ratios requires the selection of a representative or reference signal. In audio engineering, the reference signal is usually a sine wave at a standardized nominal or alignment level, such as 1 kHz at +4 dBu (1.228 VRMS). SNR is usually taken to indicate an average signal-to-noise ratio, as it is possible that (near) instantaneous signal-to-noise ratios will be considerably different. The concept can be understood as normalizing the noise level to 1 (0 dB) and measuring how far the signal 'stands out'. Difference from conventional power In Physics power (physics) of an ac signal is defined as But in Signal Processing and Communication we usually assume that so that usually we don't include that resistance term while measuring power or energy of a signal. This usually causes some confusions among readers but the resistance term is not significant for operations performed in signal processing. Most of cases the power of a signal would be where 'A' is the amplitude of the ac signal. In some places people just use as the constant term doesn't affect much during the calculations. Alternative definition where is the signal mean or expected value and is the standard deviation of the noise, or an estimate thereof.[note 2] Notice that such an alternative definition is only useful for variables that are always non-negative (such as photon counts and luminance). Thus it is commonly used in image processing, where the SNR of an image is usually calculated as the ratio of the mean pixel value to the standard deviation of the pixel values over a given neighborhood. Sometimes SNR is defined as the square of the alternative definition above. The Rose criterion (named after Albert Rose) states that an SNR of at least 5 is needed to be able to distinguish image features at 100% certainty. An SNR less than 5 means less than 100% certainty in identifying image details. SNR for various modulation systems Amplitude modulation Channel signal-to-noise ratio is given by where W is the bandwidth and ka is modulation index Output signal-to-noise ratio (of AM receiver) is given by Frequency modulation Channel signal-to-noise ratio is given by Output signal-to-noise ratio is given by Improving SNR in practice All real measurements are disturbed by noise. This includes electronic noise, but can also include external events that affect the measured phenomenon — wind, vibrations, gravitational attraction of the moon, variations of temperature, variations of humidity, etc., depending on what is measured and of the sensitivity of the device. It is often possible to reduce the noise by controlling the environment. Otherwise, when the characteristics of the noise are known and are different from the signals, it is possible to filter it or to process the signal. For example, it is sometimes possible to use a lock-in amplifier to modulate and confine the signal within a very narrow bandwidth and then filter the detected signal to the narrow band where it resides, thereby eliminating most of the broadband noise. When the signal is constant or periodic and the noise is random, it is possible to enhance the SNR by averaging the measurement. In this case the noise goes down as the square root of the number of averaged samples. Digital signals When a measurement is digitised, the number of bits used to represent the measurement determines the maximum possible signal-to-noise ratio. This is because the minimum possible noise level is the error caused by the quantization of the signal, sometimes called Quantization noise. This noise level is non-linear and signal-dependent; different calculations exist for different signal models. Quantization noise is modeled as an analog error signal summed with the signal before quantization ("additive noise"). This theoretical maximum SNR assumes a perfect input signal. If the input signal is already noisy (as is usually the case), the signal's noise may be larger than the quantization noise. Real analog-to-digital converters also have other sources of noise that further decrease the SNR compared to the theoretical maximum from the idealized quantization noise, including the intentional addition of dither. Although noise levels in a digital system can be expressed using SNR, it is more common to use Eb/No, the energy per bit per noise power spectral density. The modulation error ratio (MER) is a measure of the SNR in a digitally modulated signal. Fixed point Assuming a uniform distribution of input signal values, the quantization noise is a uniformly distributed random signal with a peak-to-peak amplitude of one quantization level, making the amplitude ratio 2n/1. The formula is then: This relationship is the origin of statements like "16-bit audio has a dynamic range of 96 dB". Each extra quantization bit increases the dynamic range by roughly 6 dB. Assuming a full-scale sine wave signal (that is, the quantizer is designed such that it has the same minimum and maximum values as the input signal), the quantization noise approximates a sawtooth wave with peak-to-peak amplitude of one quantization level and uniform distribution. In this case, the SNR is approximately Floating point Note that the dynamic range is much larger than fixed-point, but at a cost of a worse signal-to-noise ratio. This makes floating-point preferable in situations where the dynamic range is large or unpredictable. Fixed-point's simpler implementations can be used with no signal quality disadvantage in systems where dynamic range is less than 6.02m. The very large dynamic range of floating-point can be a disadvantage, since it requires more forethought in designing algorithms. Optical SNR Optical signals have a carrier frequency that is much higher than the modulation frequency (about 200 THz and more). This way the noise covers a bandwidth that is much wider than the signal itself. The resulting signal influence relies mainly on the filtering of the noise. To describe the signal quality without taking the receiver into account, the optical SNR (OSNR) is used. The OSNR is the ratio between the signal power and the noise power in a given bandwidth. Most commonly a reference bandwidth of 0.1 nm is used. This bandwidth is independent of the modulation format, the frequency and the receiver. For instance an OSNR of 20dB/0.1 nm could be given, even the signal of 40 GBit DPSK would not fit in this bandwidth. OSNR is measured with an optical spectrum analyzer. See also - The connection between optical power and voltage in an imaging system is linear. This usually means that the SNR of the electrical signal is calculated by the 10 log rule. With an interferometric system, however, where interest lies in the signal from one arm only, the field of the electromagnetic wave is proportional to the voltage (assuming that the intensity in the second, the reference arm is constant). Therefore the optical power of the measurement arm is directly proportional to the electrical power and electrical signals from optical interferometry are following the 20 log rule. - The exact methods may vary between fields. For example, if the signal data are known to be constant, then can be calculated using the standard deviation of the signal. If the signal data are not constant, then can be calculated from data where the signal is zero or relatively constant. - Often special filters are used to weight the noise: DIN-A, DIN-B, DIN-C, DIN-D, CCIR-601; for video, special filters such as comb filters may be used. - Maximum possible full scale signal can be charged as peak-to-peak or as RMS. Audio uses RMS, Video P-P, which gave +9 dB more SNR for video. - Michael A. Choma, Marinko V. Sarunic, Changhuei Yang, Joseph A. Izatt. Sensitivity advantage of swept source and Fourier domain optical coherence tomography. Optics Express, 11(18). Sept 2003. - D. J. Schroeder (1999). Astronomical optics (2nd ed.). Academic Press. p. 433. ISBN 978-0-12-629810-9. - Bushberg, J. T., et al., The Essential Physics of Medical Imaging, (2e). Philadelphia: Lippincott Williams & Wilkins, 2006, p. 280. - Rafael C. González, Richard Eugene Woods (2008). Digital image processing. Prentice Hall. p. 354. ISBN 0-13-168728-X. - Tania Stathaki (2008). Image fusion: algorithms and applications. Academic Press. p. 471. ISBN 0-12-372529-1. - Jitendra R. Raol (2009). Multi-Sensor Data Fusion: Theory and Practice. CRC Press. ISBN 1-4398-0003-0. - John C. Russ (2007). The image processing handbook. CRC Press. ISBN 0-8493-7254-2. - Defining and Testing Dynamic Parameters in High-Speed ADCs — Maxim Integrated Products Application note 728 - Fixed-Point vs. Floating-Point DSP for Superior Audio — Rane Corporation technical library - Taking the Mystery out of the Infamous Formula,"SNR = 6.02N + 1.76dB," and Why You Should Care. Analog Devices - ADC and DAC Glossary – Maxim Integrated Products - Understand SINAD, ENOB, SNR, THD, THD + N, and SFDR so you don't get lost in the noise floor – Analog Devices - The Relationship of dynamic range to data word size in digital audio processing - Calculation of signal-to-noise ratio, noise voltage, and noise level - Learning by simulations – a simulation showing the improvement of the SNR by time averaging - Dynamic Performance Testing of Digital Audio D/A Converters - Fundamental theorem of analog circuits: a minimum level of power must be dissipated to maintain a level of SNR
<urn:uuid:a29a332a-7233-45be-ae61-4e108349e3b2>
2013-05-24T01:39:18Z
CC-MAIN-2013-20
[ [ -0.038330078125, 0.00787353515625, -0.007720947265625, -0.000514984130859375, 0.0299072265625, -0.14453125, 0.007293701171875, 0.12060546875, -0.036376953125, -0.00927734375, 0.10791015625, -0.0028533935546875, -0.048095703125, 0.0400390625, 0.0415039062...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.89808
2,484
http://en.wikipedia.org/wiki/Signal_to_noise_ratio
0.731278
Definition from Wiktionary, the free dictionary See also opt in opt-in (not comparable) - Of a selection, the property of having to choose explicitly to join or permit something; a decision having the default option being exclusion or avoidance; used particularly with regard to mailing lists and advertisement. - They set up an opt-in mailing list, so that those who wanted the notices could subscribe.
<urn:uuid:e23e1bd6-43d1-48b3-9a0c-7e504776f9b6>
2013-05-24T02:04:27Z
CC-MAIN-2013-20
[ [ -0.042170699685811996, 0.045026883482933044, 0.0065104165114462376, -0.005880376324057579, 0.04334677383303642, -0.05309139937162399, -0.0025621638633310795, 0.08400537818670273, -0.034610215574502945, 0.009114583022892475, 0.08602150529623032, 0.04771505296230316, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.798871
84
http://en.wiktionary.org/wiki/opt-in
0.198745
- (informal) To respond to an invitation, usually to indicate that one will be coming to the corresponding event. - Will you rsvp for the party? - When did you rsvp to the wedding invitation? Usage notes Generally one rsvps to invitations and rsvps for events, as in the example sentences provided. An RSVP regrets only means that the sender will assume the invited people will come unless they reply. Alternative forms Initialism of répondez s'il vous plaît (“please reply”). - (at the end of a letter) Please reply.
<urn:uuid:734e6716-10f1-4d9c-bd0b-163e9cbadc97>
2013-05-24T02:04:30Z
CC-MAIN-2013-20
[ [ -0.0037571564316749573, 0.03530534356832504, 0.026359733194112778, -0.012941316701471806, 0.08110687136650085, -0.012166030704975128, -0.00036900644772686064, 0.07633587718009949, -0.04317748174071312, -0.034828245639801025, 0.08826335519552231, 0.004920085892081261...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.765499
137
http://en.wiktionary.org/wiki/rsvp
0.630289
Madhan Karky Vairamuthu is a Tamil software engineer, poet, teacher,lyricist, and film dialogue writer. He is better known as the son of the famous Tamil poet and lyricist Vairamuthu. Madhan Karky stepped into the Tamil film industry with the 2009 release Kanden Kadhalai in which he penned the lyrics for a song titled Ododi Poren. But it was his work in the 2010 blockbuster and Tamil superstar Rajinikanth starrer Enthiran that shot him to fame. Madhan Karky was born as the eldest son to his father Vairamuthu and mother Ponmani. He completed an undergraduate degree in computer engineering at Anna University in 2001. He further completed post-graduate studies in Information Technology at the University of Queensland in 2004, where he also worked as an assistant professor.He is currently working as an assistant professor in Anna University. In the 2010 release, Enthiran he penned the lyrics for the song Irumbile oru Irudhaiyam and received rave reviews for his work. Being a person from a technical background, he also worked as one of the dialogue-writers for the movie which was basically set agaiinst a scientific backdrop. His latest works includes the song Nenjil Nenjil from the movie Engeyum Kaadhal, Vaanthan Vendran and the movie KO audio track released and all the movie songs were hit, Especially the Ennamo Edho song from KO makes him very popular. He has also written the dialogues for Shankar's Nanban movie which is under production.
<urn:uuid:7e5e3e08-3dee-41f0-8ec2-b82cb88c285a>
2013-05-24T02:05:02Z
CC-MAIN-2013-20
[ [ -0.018376866355538368, 0.006436567287892103, -0.024253731593489647, -0.01735074631869793, 0.09850746393203735, -0.06902985274791718, -0.00109608203638345, 0.039179105311632156, -0.04011194035410881, -0.06194029748439789, -0.04067164286971092, 0.001189365633763373, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981553
337
http://entertainment.oneindia.in/celebs/madhan-karky/biography.html
0.209034
cfilson wrote:I must be the only one who thinks this is incredibly lame. Apparently you can't afford a prostitute/maid and don't feel like the modicum of effort that is required to chat up some drunken woman at the event. It's the soliciting through an ad that offends me, not hooking up for a week. Yeah, someone will probably reply with 'well, at least he/she's being honest.' True, but that's an explanation, not an excuse. Interestingly, I've seen a lot of girlfriend wanted ads, but not any boyfriend wanted ads.. I guess not everyone needs a security blanket. Look, if you're that insecure that you can't make a slutty new friend of your own accord when you get there, maybe you shouldn't go. I thought the point of Burning Man was to jump in headfirst and enjoy the ride? But if this is your "art" that you are contributing to Burning Man, then by all means, knock yourself out. It's just pretty lame. mdmf007 wrote:... thats the free part in free speach (sic ), you are free not to read it. LisaLuckyOne wrote:mdmf007 wrote:... thats the free part in free speach (sic ), you are free not to read it. She simply expressed her opinion of the OP - which btw I happen to agree with. It's a shame you're not smart enough to take your own advice, nosepicker. mdmf007 wrote:The inevitable side effect of free speech is pornography, .... Perhaps it's more accurate to say: Once you have free speach in general, it's difficult to exclude "prawnography."Cassidy wrote:Oh, Lisa... don't be too hard on the little nosepicker, he's doin his best!! :lol:mdmf007 wrote:The inevitable side effect of free speech is pornography, .... Really? :shock: Hadn't thought of that but maybe it's true. Maybe only in America? In the few places that really encourage 'free speech', I haven't had the urge to speak about pornography, but then, I'm just me and am sure I have some sort of religious guilt thing I haven't quite broken free from (but BM is helping). But this sounds like a great topic for a new thread... On a related topic though, I'm still brainstorming about how a possible speed dating thing might work out there... Peace!! ygmir wrote:wildfire wrote:This shit is driving me crazy. I have looked(ok, not that hard) and can not find what trolled means. Please help the virgin SilverOrange wrote:ygmir wrote:wildfire wrote:This shit is driving me crazy. I have looked(ok, not that hard) and can not find what trolled means. Please help the virgin Wikipedia: In Internet slang, a troll is someone who posts controversial, inflammatory, irrelevant or off-topic messages in an online community, such as an online discussion forum or chat room, with the primary intent of provoking other users into an emotional response or to generally disrupt normal on-topic discussion. Ok, I'm done. Ugly Dougly wrote:Everyone knows that only way to get nookie on the playa is The Smut Shack and that's gone forever. C.f.M. wrote:Ugly Dougly wrote:Everyone knows that only way to get nookie on the playa is The Smut Shack and that's gone forever. Well, there was GHB, but apparently that's a myth. Gonna have to do it the old fashioned way, I reckon. Users browsing this forum: No registered users and 0 guests
<urn:uuid:a50ef3cc-28f6-44fd-be0d-45c0b3fae341>
2013-05-24T01:59:40Z
CC-MAIN-2013-20
[ [ -0.01116943359375, 0.01324462890625, 0.0201416015625, -0.00994873046875, 0.07568359375, -0.0673828125, 0.006103515625, 0.08349609375, -0.042236328125, -0.04443359375, 0.048583984375, 0.036376953125, -0.032958984375, 0.0272216796875, 0.03759765625, -0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968278
779
http://eplaya.burningman.com/viewtopic.php?p=445753
0.501881
Fire_Moose wrote:^That is in Old Town Scottsdale. A quick 10 minutes south of me^ Ugly Dougly wrote: theCryptofishist wrote:ARe they supposed to look like goats' eyes? And if so, why didn't they go with the more traditional sheep's eyes? This is from SF Pride '07 Users browsing this forum: No registered users and 0 guests
<urn:uuid:f5e9aa71-8845-43ec-bdbc-520d1255a067>
2013-05-24T01:59:33Z
CC-MAIN-2013-20
[ [ -0.02309027686715126, 0.03020833246409893, 0.014409721828997135, 0.02552083320915699, 0.07569444179534912, -0.0520833320915699, -0.005360242910683155, 0.04218750074505806, -0.01892361044883728, -0.0251736119389534, 0.07013888657093048, 0.05972222238779068, 0.074...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.976395
87
http://eplaya.burningman.com/viewtopic.php?p=548632
0.608235
July 24, 2011 The photo above shows a lovely group of mushrooms nestled against the trunk of a eucalyptus tree. The association between the fungi and the tree however is no accident. This is a mutualistic relationship, where the two species assist each other, and in fact probably would be poorer without each other. Mutualism is any relationship between two species of organisms that benefits both species. Up to a quarter of the mushrooms you see while walking through the woods actually make their living through a mutualistic relationship with the trees in the forest. Remember of course that the mushroom is just the reproductive structure of a far more extensive organism consisting of a highly intertwined mass of fine white threads called a mycelium. The word mycorrhiza is derived from the Classical Greek words for "mushroom" and "root." In a mycorrhizal association, the fungal hyphae of an underground mycelium are in contact with plant roots but without the fungus parasitizing the plant. While it's clear that the majority of plants form mycorrhizas, the exact percentage is uncertain, but it's likely to lie somewhere between 80 and 90 percent. When the fungus’ mycelium envelopes the roots of the tree the effect is to greatly increase the soil area covered by the tree’s root system. This essentially extends the plant’s reach to water and nutrients, allowing it to utilize more of the soil’s resources. This mutualistic association provides the fungus with a relatively constant and direct access to carbohydrates, such as glucose and sucrose, supplied by the plant. In return the plant gains the benefits of the mycelium's higher absorptive capacity for water and mineral nutrients (due to comparatively large surface area of mycelium-to-root ratio), thus improving the plant's mineral absorption capabilities. Photo taken on May 7, 2011. Photo details: Camera Maker: Canon; Camera Model: Canon EOS 50D; Focal Length: 70.0mm; Aperture: f/10.0; Exposure Time: 0.013 s (1/80); ISO equiv: 1250; Exposure Bias: -1.00 EV; Metering Mode: Matrix; Exposure: aperture priority (semi-auto); White Balance: Auto; Flash Fired: No (enforced); Orientation: Normal; Color Space: sRGB.
<urn:uuid:8821cc54-1a17-46f7-9c23-b857acf0dd8d>
2013-05-24T01:36:43Z
CC-MAIN-2013-20
[ [ -0.024658203125, 0.0185546875, -0.005645751953125, 0.01904296875, 0.08740234375, -0.053466796875, 0.0126953125, 0.119140625, -0.0003986358642578125, -0.0252685546875, 0.076171875, 0.00872802734375, -0.0201416015625, 0.050048828125, 0.0125732421875, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.916095
492
http://epod.usra.edu/blog/2011/07/mycorrhizal-fungi.html
0.167681
Marginal Regression Models with Varying Coefficients for Correlated Ordinal Data. Collaborative Research Center 386, Discussion Paper 177 This paper discusses marginal regression models for repeated or clustered ordinal measurements in which the coefficients of explanatory variables are allowed to vary as smooth functions of other covariates. We model the marginal response probabilities and the marginal pairwise association structure by two semiparametric regressions. To estimate the fixed parameters and varying coefficients in both models we derive an algorithm that is based on penalized generalized estimating equations. This allows to estimate the marginal model without specifying the entire distribution of the correlated categorical response variables. Our implementation of the estimation algorithm uses an orthonormal cubic spline basis that separates the estimated varying coefficients into a linear part and a smooth curvature part. By avoiding an additional backfitting step in the optimization procedure we are able to compute a robust approximation for the covariance matrix of the final estimate. We illustrate our method by an application to longitudinal data from a forest damage survey. We show how to model the dependence of damage state of beeches on non-linear trend functions and time-varying effects of age.
<urn:uuid:240d50a3-f822-4cd9-838e-7712667feffd>
2013-05-24T01:44:00Z
CC-MAIN-2013-20
[ [ -0.020939625799655914, 0.006032100412994623, 0.015306122601032257, 0.012808248400688171, 0.037840135395526886, -0.06930272281169891, 0.011745323427021503, 0.10841836780309677, -0.025403911247849464, 0.020727040246129036, 0.06377550959587097, -0.0015744578558951616, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.82779
234
http://epub.ub.uni-muenchen.de/1565/
0.28795
Something on our side of things went wrong. The site could be overloaded, or you may have tried something we didn't test. If you get this error page consistently, we'd love it if you'd write us, telling us exactly what you did to get the error. With any luck, we'll fix the problem, and it'll work the next time you try. Click here to go to our home page.
<urn:uuid:4c854b21-153f-4bd8-97fb-5443b35f5b32>
2013-05-24T01:38:48Z
CC-MAIN-2013-20
[ [ -0.018450798466801643, 0.017204122617840767, 0.035073138773441315, -0.008976063691079617, 0.03756649047136307, -0.06515957415103912, 0.00428025284782052, 0.05452127754688263, -0.0329122357070446, -0.07878989726305008, 0.003490691538900137, 0.04920212924480438, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970114
86
http://error.woot.com/
0.224707
|ETCSLtranslation : t.1.6.3| unknown no. of lines missing 1-4. "At his command your weapon struck me evilly. As I let the divine powers go out of my hand, these divine powers returned to the abzu. As I let the divine plan go out of my hand, this divine plan returned to the abzu. This tablet of destinies returned to the abzu. I was stripped of the divine powers." 5-8. Ninurta was stunned at these words of the Anzud chick. Ninmena gave out a wail: "And what about me? These divine powers have not fallen into my hand. I shall not exercise their authority. I shall not live (?) like him in the shrine, in the abzu." 9. Father Enki in the abzu knew what had been said. 10-14. The Anzud chick took the hero Ninurta by his hand and drew near with him to Enki's place, the abzu. The Anzud chick returned Uta-ulu to the abzu. The lord was delighted with the hero, Father Enki was delighted with the hero Ninurta. 15-24. Lord Nudimmud honoured him duly: "Hero, no god among your brother gods could have acted so. As for the bird which your mighty weapon captured, from now to eternity you will keep your foot placed on its neck. May the great gods give your heroic strength its due. May your father Enlil do whatever you command. May Ninmena not fashion your equal (?). May no one be as revered as you and no god extend an upraised hand before you. Monthly may your house (?) regularly receive tributes in the shrine, in the abzu. May An (?) proclaim your name in the seat of honour." 25-30. The hero secretly was not happy with these promises. Where he stood, he darkened and yellowed like (?) a flood-storm (?). He contemplated great deeds and inwardly he was rebellious. He uttered a word which has no ……. The hero Ninurta set his sights on the whole world. He told no one and inwardly did not ……. 31-32. The great lord Enki intuitively grasped the substance of the plan. In the shrine, in the abzu he stirred up a dark flood-storm. 33-35. By the house the minister Isimud opposed Ninurta. The hero Ninurta refused to come out and raised his hand against the minister Isimud. 36-46. Against Ninurta, Enki fashioned a turtle from the clay of the abzu. Against him he stationed the turtle at an opening, at the gate of the abzu. Enki talked to him near the place of the ambush and brought him to the place where the turtle was. The turtle was able to grab Ninurta's tendon from behind. The hero Ninurta managed to turn back its feet. Enki, as if perplexed, said, "What is this!" He had the turtle scrape the ground with its claws, had it dig an evil pit. The hero Ninurta fell into it with the turtle. The hero did not know how to get out from ……. The turtle kept on gnawing his feet with its claws (?). 47-54. The great lord Enki said to him: "From ……, you who set your mind to kill me, …… who makes big claims -- I cut down, I raise up. You who set your sights on me like this -- what has your position seized for you, how ……? Where has your strength fled? Where is your heroism? In the great mountains you caused destruction, but how will you get out now?" 55-60. Ninmena learned of this situation. She ripped the clothes on her body and she ……. "You my plant-eater Enki, who shall I send to you? Men will shake their heads in fear ……. Who shall I send to you? That name is not Enki. That name is Ugugu-that-does-not-pour (?). You who are death which has no mercy, who shall I send to you?" © Copyright 2003, 2004, 2005, 2006 The ETCSL project, Faculty of Oriental Studies, University of Oxford
<urn:uuid:0c06e1e0-ca96-427c-85ec-90ea21f17e44>
2013-05-24T01:45:12Z
CC-MAIN-2013-20
[ [ -0.01446533203125, 0.0036468505859375, -0.029296875, 0.00909423828125, 0.1259765625, -0.045166015625, -0.0087890625, 0.09619140625, 0.00689697265625, -0.037841796875, 0.03173828125, 0.0147705078125, 0.006195068359375, 0.005950927734375, 0.03662109375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968848
910
http://etcsl.orinst.ox.ac.uk/cgi-bin/etcsl.cgi?text=t.1.6.3&display=Crit&charenc=gcirc&lineid=t163.p4
0.553398
|Quest Started By:||Description:| |Tabazin Gearflinger is located at 90, -1475, 375. You say, 'Hail, Tabazin Gearflinger' Tabazin Gearflinger says 'Well hello there! You've come to look at this marvelous machine, have you not? Isn't she amazing! I know, she looks battered now, but she'll be flying again in no time. I just need some [key parts] and a bit of elbow grease and I'll have her back in shape. Soon she will be terrorizing Meldrath's minions [again]!' You say, 'Again?' Tabazin Gearflinger says 'Of course again! Don't let those [naysayers] get to you. I was aboard when she flew up here and engaged the enemy. She soared like a hawk and struck like a snake! Why, there's no doubt in my mind that we would have won this battle right then if one of those crazy flying steambots hadn't got in through a window and crashed into one of the engines. The explosion was pretty bad, but she was still flyin' true! It was the smoke that got into the bridge that was the problem. The captain just couldn't see where he was going, that's why we crashed.' You say, 'What naysayers?' Tabazin Gearflinger says 'Those poopy pants! They say that the engine exploded under the strain of flight! What do they know about it anyway! Don't believe their stories about a slight down draft causing our crash, it's all poppycock! And we most certainly had engaged the enemy before the crash! No matter how many times they tell you that the Albatross hit the ground before the enemy had even know we were here, you just laugh at their ignorance!' You say, 'What key parts?' Tabazin Gearflinger says 'Oh, you know, simple things like springs, gears, [screws], wire, metal sheets. . . Nothing complicated and all of it could be scavenged from those rotten steamworks by someone [brave enough] to go out there.' You say, 'I am brave enough' Tabazin Gearflinger says 'I bet you are! Well then, I have a couple of tasks that need doing.' A task window pops up offering eight different versions of "Gearing Up". You can have multiple versions going at once. All items required are dropped by various clockworks in the zone. You have been assigned the task 'Gearing Up, Part II'. Deliver 5 Small Coil Spring to Tabazin Gearfinger 0/5 (Fortress Mechanotus) Deliver 4 Large Hex Bolt to Tabazin Gearfinger 0/4 (Fortress Mechanotus) Faction with Ak'Anon Strike Force V |Send a Correction|
<urn:uuid:f0b23f40-6608-4df5-9ccf-12c9ff798a19>
2013-05-24T01:44:18Z
CC-MAIN-2013-20
[ [ -0.01953125, 0.002777099609375, 0.002288818359375, 0.0087890625, 0.10888671875, -0.0712890625, -0.004302978515625, 0.09228515625, -0.01226806640625, -0.0634765625, 0.07275390625, 0.0284423828125, 0.0169677734375, 0.01416015625, 0.0380859375, 0.006652...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964813
608
http://everquest.allakhazam.com/db/quest.html?quest=4399
0.579711
From the World Heritage inscription: Founded, according to legend, by Romulus and Remus in 753 BC, Rome was first the centre of the Roman Republic, then of the Roman Empire, and it became the capital of the Christian world in the 4th century. The World Heritage site, extended in 1990 to the walls of Urban VIII, includes some of the major monuments of antiquity such as the Forums, the Mausoleum of Augustus, the Mausoleum of Hadrian, the Pantheon, Trajan’s Column and the Column of Marcus Aurelius, as well as the religious and public buildings of papal Rome. The Historic Center of Rome is probably one of the most significant, historical, and impressive world heritage sites in the world. Like sites I’ve seen in Kyoto, Jerusalem or Angkor, there is a whole city of sites which could be world heritage sites on their own. The most significant and recognizable location in Rome is the Colosseum which was recently named as one of the New Seven Wonders of the World.
<urn:uuid:3512a769-71b7-49ff-bb08-574499bbd917>
2013-05-24T01:50:36Z
CC-MAIN-2013-20
[ [ -0.010575873777270317, -0.026200873777270317, 0.00006263433169806376, -0.012691047973930836, 0.10316593945026398, -0.015966156497597694, -0.010848798789083958, 0.05786026269197464, -0.006993722636252642, -0.02838427945971489, -0.012963973917067051, 0.009825327433645...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95842
220
http://everything-everywhere.com/2009/08/05/uensco-world-heritage-site-68-historic-centre-of-rome/
0.785384
, on a low plateau draining into the basins of the Bristol Channel , the English Channel , and the eastward-flowing Thames . Oh, and home . It is surrounded by the counties of Gloucestershire Trowbridge is the administrative centre of Wiltshire for reasons that seem to escape pretty much all of the local inabitants. Trowbridge is, after all, a nasty little hole full of 1970s council buildings and a sausage factory. Surely Salisbury or even Swindon would have been a much better choice? The administrative, geographic, and historic counties occupy slightly different areas. The administrative county of Wiltshire comprises four districts—Salisbury (in the south), West Wiltshire, Kennet in the east, named for the river Kennet and North Wiltshire. The geographic county encompasses the entire administrative county together with the unitary authority of Swindon. The historic county of Wiltshire is nearly the same as the geographic county but also includes a small area north of Sherston in the Cotswolds, and thus administratively controlled by Gloucestershire, but we'll get it back, damn their eyes. Much of Wiltshire is made up of chalk hills. Salisbury Plain occupies central Wiltshire but not many people go near there since most of it is Crown Land and reserved for the Armed Forces to play soldiers on. North of the River Kennet are the Marlborough Downs, which make up one side of the Vale of the White Horse. Along the county's western border rise parts of the Cotswolds, a range of limestone hills. Between these two upland areas lie the clay valleys of Wardour and Pewsey. South of Trowbridge the valleys are fairly heavily forested in contrast to the open, rolling countryside of the uplands. Savernake Forest was the last known refuge of the English black bear for a very long time. Parts of the Marlborough Downs, the Cotswolds, and the Vale of Pewsey have been designated Areas of Outstanding Natural Beauty. Of course, in real terms all that this actually means is that building a bloody great housing estate there is more expensive than elsewhere, requiring one to own many more politicians and local councillors than one would need to in, for example, Melksham. In prehistoric times the chalk uplands were the most heavily populated parts of England, and Wiltshire has many prehistoric monuments. Stonehenge, about 8 miles north of Salisbury, dates from the Neolithic Period and its use by prehistoric peoples has been a topic of much debate. The predominant local theory is that either it's a huge bong that no-one's found the mouthpiece from yet or that it was constructed on perfectly good arable land by neolithic Wiltshiremen in a (very successful) effort to irritate their decendants. There are plenty of other important Neolithic monuments nearby, including those at Avebury and Windmill Hill. The latter is believed by those credulous fools from universities to have been a centre of ritual and of seasonal tribal fasting in the 4th millennium BC but these are the kind of people who say crop circles were made by aliens, so what can you expect? The former is a big stone circle with a pub in the middle and is therefore of at least some value. Long Neolithic burial mounds, or barrows, are all over the place as are round burial mounds from the Bronze Age. The ancient practise of building large mounds of earth over dead people is suspected locally to be a means of making certain that the buggers don't get out. Durrington Walls, a large ditch-enclosed ceremonial earthwork, dates from the late 3rd millennium BC, apparently. These days it hosts the occassional rave. Plus ca change, plus c'est la meme chose. During the Iron Age, hill forts were constructed, such as those at Yarnbury Castle, near Berwick St. James, and at Old Sarum, outside Salisbury. The county has played a role in national affairs in as much as any county can be said to have done so. There are Roman remains all over the place, and in the Middle Ages, sheep farming by Cistercian monks was probably the most important activity. Oliver Cromwell won a decisive battle against the Royalists just outside Devizes and King Alfred the Great soundly kicked the Danes' collective arse just outside of Chippenham. Salisbury has long been the ecclesiastical centre of the county and is renowned for its 13th-century cathedral which apparently still has the tallest church spire in Britain. Salisbury is unusual in that the building of elegant crescents in the Georgian period never really caught on there, so the city is still faithfully Tudor in design. In the Northwest of the county there a couple of places that visitors call "quaint" and think are authentic. Well, there's one born every minute, after all. The first is Lacock, an entire village owned by the National Trust. Lacock is steadfastly 16th Century apart from the Volvos and is regularly annexed by the BBC so they can do yet another interminable Jane Austen costume drama. It has three really good pubs, an abbey that was unabbeyfied during the Reformation and later served as home to the father of modern photography, William Henry Fox Talbot and tourists are available for shooting all year round. Another is Castle Combe, a wool-village with a working mill and a manor house that stems from the same period but is even more picturesque. I know people who think heaven will look Castle Combe. It is noticeable for, among other things, the largest number of antique shops per capita of anywhere in the world. The last that i shall mention is the village my family are from. It's a hamlet called Sandy Lane where all the houses are quaintly thatched and there's even a thatched, wooden church dating from the Norman Conquest - the only one of its kind remaining in the UK. Finally, the one thing that may surprise you, is that Wiltshire is big. It comprises of just over 1,255 square miles. Not exactly Texan but for the South of England, that's pretty huge. In this size, there's room for a lot of cool stuff. Ignore my sarcasm, Wiltshire is well worth a visit.
<urn:uuid:57e11e9d-794a-4130-91ef-03de44569790>
2013-05-24T02:00:25Z
CC-MAIN-2013-20
[ [ 0.04638671875, 0.00604248046875, -0.020751953125, 0.0087890625, 0.09619140625, -0.05908203125, -0.027099609375, 0.1220703125, 0.026123046875, 0.013671875, 0.051025390625, 0.0390625, -0.0023651123046875, -0.0361328125, 0.015380859375, -0.0162353515625...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969801
1,334
http://everything2.com/title/Wiltshire
0.477277
Since the majority of the human experience involves making sense of our experiences and manipulating abstract symbols in pretty ways, that a great deal of problems seem to stem from defending the mental conception of self (the ego) is not surprising. In animals whose experience of the world is more centered in their sensory input, a simpler life is achieved. Energy is devoted to the preservation and maintenance of the physical existence. Humans, however, get the wonderful thrill of mixing symbols and mashing up postulates and assumptions, flashing signs and flaunting language in the effort to preserve the center of their existence: the ego. After the hairless bipeds have worked out the various controls of their orifices, the urge to achieve ends through using those openings for expression sets in and the vast world of the intangible and irritating ideas can really be explored. All the words they ever use are learned within the first few years, the rest are simply variations and ways of disguising 'I, me, my', the various positions those may take ('want, have, like') in reference to the three things the world is composed of: 'food, sex, and sleep'. To utter anything is to defend the ego. To place a metaphorical toe in the stream of symbols is to say 'I exist and I matter and I probably want sex or a sandwich,'. The act of asking a question implies the worth of the inquirer of receiving an answer. Even degrading or denying the ego, asserts its existence and the value of the source of the scathing and/or negative comments (the ego). The ego is volunteered to order the often nonsensical sets of symbols it sees and organize appropriate reactions to the world based on previous and probably misunderstood information. So, otherwise rational minds are set to the insane task of defending an ever changing, intimidated, and fragile thing, the existence of which is often denied, in a game which no one referees and rules are made up and ignored to suit whatever whim a player stubborn enough to disregard the other players' protests can hit upon.
<urn:uuid:3681d5eb-20e4-4f94-8d9f-34075ff239e1>
2013-05-24T01:46:30Z
CC-MAIN-2013-20
[ [ -0.022576531395316124, -0.003077168483287096, 0.009502550587058067, 0.009438775479793549, 0.06632652878761292, -0.03125, 0.0011479591485112906, 0.12091837078332901, 0.0010204081190750003, -0.016709184274077415, 0.08979591727256775, 0.023979591205716133, -0.03571...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953434
413
http://everything2.com/title/ego
0.191215
I have an issue here with deployment order in general and the timing in particular. I have an ear 1 which provides some functionality via a bean and some queues. The queues are configured in the standalone.xml. Another ear 2 which uses this service from ear1. So the dependency looks like: ear1 <-- ear2 So I configured the deployment structure of ear 2 to depend on ear 1 and the deployment order itself is correct now. <?xml version="1.0" encoding="UTF-8"?> <jboss-deployment-structure> <deployment> <dependencies> <module name="deployment.ear1.ear" /> </dependencies> </deployment> </jboss-deployment-structure> The deployment order is correct now, but what I now have is a race condition due to a (I guess) not initialized bean from ear 1. When I delay the deployment of ear2, everything works fine. Does anyone know how to control the timing of the deployment. Can one specify not only the order of the deployments via jboss-deployment-structure.xml, but also the lifecycle which needs to be reach to start the next deployments? I tried to specify the actual bean jar which contains the service to be used. This is not working, too. It looks like: <?xml version="1.0" encoding="UTF-8"?> <jboss-deployment-structure> <deployment> <dependencies> <module name="deployment.ear1.ear.bean.jar" /> </dependencies> </deployment> </jboss-deployment-structure>
<urn:uuid:49773177-7257-4c02-9288-3f0f403c427b>
2013-05-24T01:45:54Z
CC-MAIN-2013-20
[ [ -0.03518408536911011, 0.015587885864078999, -0.013583729043602943, -0.015513657592236996, 0.08194774389266968, -0.05849168822169304, 0.0005567102343775332, 0.08669833838939667, -0.027612825855612755, 0.023901425302028656, 0.07779097557067871, 0.05967933312058449, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.880464
360
http://facebook.stackoverflow.com/questions/11343732/jboss-as-7-deployment-order-and-timing
0.724691
My HTML looks like this: <li class="li-top"><a class="top sub" href=#>Blah</a> .... </li> What I am trying to do is to select the anchor tag, so I can change the color of the text ("Blah"). But here's the catch: I am using closest() because I am starting from a descendant of that li tag: How do I get that anchor tag from this starting point? I tried next(), each(), children(), etc. I can't get it. Thanks.
<urn:uuid:9fe16aa9-4871-47e1-9f35-b61ca2bec19d>
2013-05-24T01:59:28Z
CC-MAIN-2013-20
[ [ -0.053466796875, -0.004486083984375, 0.004669189453125, 0.00518798828125, 0.0260009765625, -0.068359375, 0.01318359375, 0.0537109375, -0.001739501953125, 0.01171875, 0.040283203125, 0.054931640625, -0.0390625, 0.109375, 0.024169921875, 0.002838134765...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.781463
114
http://facebook.stackoverflow.com/questions/8774450/selecting-first-anchor-inside-li-element-with-jquery
0.91733
Adopt-a-Soldier Wins $10K After Flurry of Late Contest Votes A Fair Lawn-based charity that supports troops stationed overseas finished 161st in the Chase Community Giving Program, high enough to garner a $10,000 donation from the bank. The Adopt-a-Soldier Platoon Program, which for a few days had fallen out of the running in a national contest for Chase grant money, made a dramatic surge on the contest's final day to finish 161st and earn a $10,000 check from the bank. The Fair Lawn-based organization, which collects non-perishable food items, toiletries, small electronics and other items for soldiers stationed overseas, had been in fierce competition for up to $250,000 in grants from Chase as part of the bank's annual Community Giving Program. After being nominated earlier in the year, Adopt-a-Soldier entered a voting process with nearly 30,000 other charities across the nation. The 196 charities that garnered the most votes during the process shared in $5 million in Chase grants. Early in the voting — which ended Sept. 19 — Adopt-a-Solider was hovering around 150th, but it had dropped out of the top 196 in the final days of the contest. Things looked grim, but a torrid finish of nearly 300 votes over the contest's final six hours put the charity back in the money. As a result of its 161st place finish, Chase Bank will make a donation of $10,000 to the Adopt-a-Soldier Platoon Program.
<urn:uuid:d58e93d5-1b77-4c7d-9bde-bdfaf5463dd8>
2013-05-24T01:43:25Z
CC-MAIN-2013-20
[ [ -0.006395947653800249, 0.02077609859406948, -0.025068681687116623, 0.0007029103580862284, 0.05975274741649628, -0.0379464291036129, 0.0003568209067452699, 0.07451923191547394, -0.026270603761076927, -0.0334821417927742, 0.06559065729379654, -0.0015882555162534118, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952907
327
http://fairlawn-saddlebrook.patch.com/articles/adopt-a-soldier-wins-10k-after-flurry-of-late-contest-votes
0.237473
A Girl by Ezra Pound The tree has entered my hands, The sap has ascended my arms, The tree has grown in my breast- The branches grow out of me, like arms. Tree you are, Moss you are, You are violets with wind above them. A child - so high - you are, And all this is folly to the world.
<urn:uuid:f98d7e9d-8780-4091-8a98-2d9f5ac9e7e7>
2013-05-24T01:37:39Z
CC-MAIN-2013-20
[ [ 0.005168635863810778, 0.01619664579629898, -0.013338414952158928, 0.023246951401233673, 0.09679877758026123, -0.03715701401233673, 0.011051828972995281, 0.043635670095682144, -0.006955030374228954, -0.04039634019136429, 0.03506097570061684, 0.022103657945990562, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930576
83
http://famouspoetsandpoems.com/poets/ezra_pound/poems/18774
0.43709
A brief look of understanding was all that passed between the two women, but it was enough to convey the mutual agreement to forget any previous discrepancies. He had a habit of staying up late to research or just to enjoy a good book, as did his dad. ~I just think 'father' would work better here because the Malfoys would be a more formal sort of family Dark Lordís wishes and(,) if she was to trust Severusí letters ~I don't think the comma would be needed there ^_^ she craved, but(,) although she adored her sister ~I don't think the comma is needed there and I suggest that you use 'though' in place of 'although' - no real reason, but I think it sounds better that way Narcissa had tried to accept it and move on, but the doubts leave for Hogwarts again; Bella arrived looking haggard but exceedingly pleased. Narcissa half-shrugged, ~ this is me being nit-picky again... I always pictured Narcissa as too classy to just shrug ... maybe a mor feminine gesture like bowing her head or closing her eyes? I think I ought to stop the nit-pick and concentrate on the more important things. There are lots of things that I like in this story. First is the sisterly relationship between Bella and Narcissa. Most people don't show this side of Bellatrix, but the fact that she accompanied Narcissa in Spinner's End ought to show that she does care for her sister. You showed this well in this story of yours. Another thing I liked is the relationship between Narcissa and Lucius Malfoy those details of the nickname and how she depends on him to give him strength and even compared Draco's actions to Lucius's own. Its showed great Malfoy Family dynamics. The ending where she firmly believed that this will be better. It sets such a nice contrast: Despite all the dark acts/politics in the family, Narcissa clings on to the light and though she thinks herself weak, she actually provide light to both Draco and Lucius. Brilliant ending and story :) Author's Response: I never believed that Lucius was an abusive father or husband and from what we see of Narcissa in HBP, I think that she loves both her husband and her son very much. I enjoyed showing this slightly different side to a dark family, although I was afraid that they sounded a bit too loving at times. I don't know why but I have a really soft spot for the Blacks and the Malfoys and I can't stand them being portrayed as completely evil without any love or compassion, not even towards each other. Squeak! Squeak! Squeak! Welcome to SPEW! Author's Response: Thank you! *huggles* *feels special* Today isn't such a bad day after all^^
<urn:uuid:c68ddafa-69d1-40fa-af24-60e4aac90f96>
2013-05-24T01:38:17Z
CC-MAIN-2013-20
[ [ -0.0031890869140625, 0.0079345703125, 0.00921630859375, 0.0028076171875, 0.06396484375, -0.035400390625, -0.01361083984375, 0.08642578125, -0.037109375, -0.076171875, 0.04736328125, 0.007293701171875, -0.020263671875, 0.001953125, 0.034912109375, -0....
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981012
590
http://fanfiction.mugglenet.com/reviews.php?type=ST&item=35213
0.336279
A. There is an instant at which the string is completely straight. B. When the two pulses interfere, the energy of the pulses is momentarily zero. C. There is a point on the string that does not move up or down. D. There are several points on the string that do not move up or down. E. A and C are both true. F. B and D are both true.
<urn:uuid:abc13551-d525-435b-9b24-7edce26b05a0>
2013-05-24T02:03:59Z
CC-MAIN-2013-20
[ [ -0.0384480319917202, -0.022384129464626312, 0.014132725074887276, 0.004323209170252085, 0.05372190847992897, -0.04775280877947807, -0.0052887992933392525, 0.07268258184194565, -0.02247191034257412, 0.015537219122052193, 0.17134831845760345, -0.004367099609225988, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960526
88
http://faraday.uwyo.edu/~ddale/teach/11_12/ch15/s13.html
0.944574
The following metadata was found in MoinMoin that could not be converted to a useful value in MediaWiki: Copyright © 2013 Red Hat, Inc. and others. All Rights Reserved. For comments or queries, please contact us. The Fedora Project is maintained and driven by the community and sponsored by Red Hat. This is a community maintained site. Red Hat is not responsible for content.
<urn:uuid:32455eaa-bc77-401a-8182-0b9a61684a6d>
2013-05-24T01:38:55Z
CC-MAIN-2013-20
[ [ -0.057528410106897354, -0.003639914793893695, 0.03746448829770088, 0.016335226595401764, 0.029296875, -0.08629261702299118, 0.013405540026724339, 0.05255681648850441, 0.015269886702299118, -0.06569602340459824, 0.09943182021379471, 0.06001420319080353, 0.0009710...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935148
81
http://fedoraproject.org/wiki/Talk:SELinux/Config
0.242575
1/2 cup shredded cheddar cheese 1 cup chopped fresh spinach 1 teaspoon butter salt and pepper to taste Heat a small cast iron skillet or saute' pan over high heat. If you are using a non-stick pan you might be able to skip the butter. Crack the eggs into a medium bowl, then lightly beat the eggs with a fork. Put the butter into the pan to melt and heat a bit. Pour in the eggs, add the cheddar cheese and give the mixture a stir. Add the spinach and stir it in. Let sit for a few seconds, then stir again. Grind on some pepper and stir again. When eggs are cooked as firmly as you like, scoop onto two plates and sprinkle lightly with salt (if you want salt). All of this will take a very short time. Don't overcook the eggs.
<urn:uuid:77f86b96-4ac6-4ba3-81e2-154574094073>
2013-05-24T01:59:15Z
CC-MAIN-2013-20
[ [ -0.01028580404818058, 0.00887248758226633, -0.0017862750682979822, 0.030935930088162422, 0.09233668446540833, 0.005456972401589155, -0.028109297156333923, 0.06658291816711426, 0.03706030175089836, 0.0221419595181942, 0.054020099341869354, 0.052449747920036316, 0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.920304
177
http://feedingmyenthusiasms.blogspot.com/2009/04/egg-scramble.html
0.533874
"It was a real fight for survival," Shechko said after returning to Kyiv, her voice trembling. "We ended up in the hands of the butchers who kill and terrify the Belarusian people." Shechko, 24, said that at one point the activists were made to sit still on a bus for several hours, prevented from speaking or moving. "If we moved our heads or hands, they beat us, it was very painful," Shechko said. The activists were finally left half-naked in a freezing forest, where they eventually found help from area residents and contacted the Ukrainian embassy. Activist Inna Shevchenko's hair had been dyed green and some of it cut off in the back. The three activists' protest took place on the steps of the KGB headquarters and was one of multiple demonstrations against Lukashenko on the first anniversary of his re-election. Agents quickly broke up that demonstration and arrested several journalists and Femen's Australian videographer Kitti Green, Femen said. The group said Green was deported to Lithuania. Lukashenko has repressed opposition and independent media since becoming leader of the former Soviet republic in 1994. In December 2010 elections, he was declared winner of a new term, but tens of thousands of protesters assembled to denounce alleged vote fraud. Police harshly broke up that demonstration and arrested around 700 people, some of whom remain in jail, including two of the candidates who opposed Lukashenko. Femen activists have become popular in Ukraine for staging half-naked protests, and they have conducted some in other countries.
<urn:uuid:4832032d-8f17-4b1b-bc77-0e2e925fd534>
2013-05-24T01:44:05Z
CC-MAIN-2013-20
[ [ -0.0018749999580904841, 0.01941666752099991, -0.019083334133028984, 0.009624999947845936, 0.12399999797344208, -0.05433333292603493, -0.03449999913573265, 0.07900000363588333, -0.002093750052154064, -0.07966666668653488, 0.07666666805744171, 0.03200000151991844, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.988599
329
http://femen.info/ukrainian-protesters-return-after-belarus-ordeal-2/
0.328574
The Ven was elected by the members of the Council, consisting of Tsurlagol's highest nobles and leading merchant lords, from among their number. Each Ven served for a 10-year term, in which their word was law, though unpopular Ven tended to die prematurely. Strangely, the true identity of the Ven was kept secret throughout their reign; it was an odd arrangement but apparently worked well for Tsurlagol. The spokesperson of the Ven was the Ven's Voice, who served as their chief advisor and announced the Ven's decrees to the people of Tsurlagol. However, the Voice was often more powerful than the Ven.
<urn:uuid:1136a02b-2e11-4a22-b700-d247e4d46af3>
2013-05-24T01:37:39Z
CC-MAIN-2013-20
[ [ 0.000027571053578867577, 0.006627155002206564, -0.020043103024363518, 0.002168642356991768, 0.07801724225282669, -0.037068966776132584, -0.035991378128528595, 0.1034482792019844, 0.00883620698004961, -0.06594827771186829, 0.034698277711868286, 0.020258620381355286, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.994282
132
http://forgottenrealms.wikia.com/wiki/Ven
0.84223
I consider the things that you call 'more powerful', easy. There is nothing that you cannot do in C or assembly(I'm not talking about language dependant features), these features of the language just make it easier(often safer too ). As I said before 'abstracting your code from what is really happening just doesn't work for me', but this is just my opinion(I cannot recommend something I don't like or use IMO, C is definitely the easier language to master as there's a lot less to learn. I honestly hate C, it just can't do crap compared to C++. Code in C ends up being very repetitive and messy because the language isn't powerful enough to write good code with. Templates are very powerful in C++, and allow you to write many different optimized routines from just 1 function. With C you will have to to write a lot more repetitive code to do the same result. This isn't 'harder', but just 'more annoying' and stupid. Another example are the lack of references make you always pass pointers, and then you have to de-reference the pointers adding more code clutter... again this isn't harder, but just more annoying. Elegant code is something I feel is very important when programming, and C doesn't let you do that. I don't say I know C++, I don't like it nor use it - 'originally named "C with Classes". It was renamed C++ in 1983.' C++ has come along way from just C with Classes, which is what the article posted was saying. When people that claim C++ is just "C with classes", its a good indication they don't know the language. I recommend you eventually learn C++, and maybe after 2 years of coding with the language you will figure out that it really is better than C.
<urn:uuid:57d62c13-1644-4a75-a4fd-88e53c3f9005>
2013-05-24T01:37:51Z
CC-MAIN-2013-20
[ [ -0.06353919208049774, 0.02004156820476055, 0.029097387567162514, -0.009798100218176842, 0.05403800308704376, -0.05047506093978882, -0.005938242189586163, 0.08076009154319763, -0.014326009899377823, -0.03176959604024887, 0.09144893288612366, 0.036668647080659866, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975061
392
http://forum.gpwiki.org/viewtopic.php?p=131742
0.197911
Nov 15th, 2009, 12:31 AM any issues using my WS template's Jaxb2Marshaller? Hi All - I plan on digging in more on this, but was hoping I could possibly get some feedback here. The problem: I've subclassed WebServiceGatewaySupport, this handles all of our web service calls so far perfectly. Now I'm required to add a new web service call to my app that doesn't quite fit in right. Typically my WebServiceGatewaySupport returns types ready for anyone who needs them, by that i mean no more unmarshalling. This new service basically results (via WebServiceTemplate.marshalSendAndReceive) in a, let's say, ServiceResponse object, and this class only really has one method, "String getResponse()". The String is a big ol' chunk of xml, for which I have a schema. So the problem is really that I need an extra unmarshalling step in my gateway. The solution I've come up with is that in my gateway, I ask my WebServiceTemplate for it's unmarshaller, create a source based on the xml String, and unmarshal away. Any implications to this? Anything that maybe the template does behind the scenes (synchronization?) that I need to take care of myself? Thanks for reading,
<urn:uuid:b91b453d-e056-4f53-9ca9-8421e497b710>
2013-05-24T01:57:47Z
CC-MAIN-2013-20
[ [ -0.029677672311663628, 0.006682389881461859, 0.026926100254058838, -0.0021988011430948973, 0.004422169644385576, -0.05149371176958084, -0.001621462288312614, 0.06367924809455872, -0.003611438674852252, -0.039308175444602966, 0.020931603386998177, 0.05149371176958084...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939034
281
http://forum.springsource.org/showthread.php?80552-any-issues-using-my-WS-template-s-Jaxb2Marshaller
0.162831
Is it possible to somehow leverage iFrames to allow an interactive SWF created in Indesign to display on an iPad? I have created some rather complex interactive SWF's that simply can't be replicated using Digital Publishing or any other solution I can find. I was curious if there is a way to leverage the iFrame capability as a work-around. Does anyone have any suggestions? SWF can't be played on an iPad or other iOS devices. This has noting to do with the DPS but with Apple iOS that simply not allows to play Flash files. You have to switch to HTML5 technology to create your Animations. There are several solutions like Adobe Edge, Tumult Hype, ... to create those Animations without coding. That's the answer I was expecting unfortunately. I am aware of Adobe Edge, but I am pretty sure it will not be capable of replicating what I have built within Indesign... I have really taken the interactive aspects of the program to their limits.Can I send you a private message with a URL that will display an example of my work? I doubt you've seen anything quite like what I've done. Europe, Middle East and Africa
<urn:uuid:bdfcb181-d43d-4d5d-aa57-b8907899022b>
2013-05-24T02:00:28Z
CC-MAIN-2013-20
[ [ -0.046090733259916306, 0.021597489714622498, 0.02485521323978901, -0.001990830060094595, 0.0453667938709259, -0.04440154507756233, 0.0008634471450932324, 0.06611969321966171, -0.019666988402605057, -0.057915057986974716, 0.04633204638957977, 0.043194979429244995, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955014
244
http://forums.adobe.com/message/4614724
0.522623
A "reliable source in the Far East Asian supply chain" relayed to How To Arena that Apple is planning to release a new, thinner 15-inch MacBook Pro by the end of April. The details corroborate with a separate report that surfaced on Wednesday, though there remains confusion as to whether the new notebook will be a "Pro" or an "Air." Thursday's newest take said the new 15-inch MacBook Pros will be powered by Core i5 and Core i7 Ivy Bridge processors. That would be a change from the existing Sandy Bridge-based MacBook Pros, as both 15-inch models feature high-end Core i7 processors, while an Intel Core i5 CPU is found in the entry-level 13-inch MacBook Pro. Thursday's report said it is "not clear" if Apple plans to introduce a new MacBook Pro with an entry-level Core i3 Ivy Bridge CPU from Intel. It's possible that, like the current MacBook Pro lineup, all of the company's "Pro" laptops could feature only Core i5 and Core i7 processors. Finally, the anonymous supply chain source also reportedly indicated that the new 15-inch MacBook Pro will be "thicker than currently available MacBook Airs but thinner than MacBook Pros." Thursday's report does stand in contrast to the earlier rumor on Wednesday from Electricpig, which characterized the forthcoming notebook update as a 15-inch MacBook Air, rather than a MacBook Pro. The confusion likely stems from the fact that Apple's next MacBook Pros are expected to feature the same design as the ultraportable MacBook Air and ditch the optical disc drive to create a thinner device. An illustration of Apple's notebook lineup planned for the 2012 calendar year. AppleInsider reported in February that this year Apple will radically redesign its MacBook Pro lineup with thinner chassis. A person familiar with the new designs said "they're all going to look like MacBook Airs." But earlier reports dating back to last year have claimed that Apple is looking to expand its MacBook Air lineup with a new 15-inch model that is expected to launch in the coming months. It's possible that these products are one and the same, with the only question being whether the MacBooks will be branded "Pro" or "Air." [ View article on AppleInsider ]
<urn:uuid:bd5535e2-e395-49f9-9982-d6951846b530>
2013-05-24T02:01:01Z
CC-MAIN-2013-20
[ [ -0.022216796875, 0.017578125, 0.01519775390625, 0.01385498046875, 0.07666015625, -0.0023956298828125, -0.009033203125, 0.0888671875, -0.04541015625, -0.064453125, 0.044677734375, 0.02294921875, -0.042724609375, 0.0213623046875, 0.0218505859375, -0.03...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923852
467
http://forums.appleinsider.com/t/146280/apples-thinner-15-inch-macbook-pro-rumored-to-debut-in-april-with-ivy-bridge-i5-i7-cpus
0.298904
How Can I open a plant 3D project with C# I have tried this but it does not work: string sProject = Path.Combine(ProjectPath.Text , "Project.xml"); PlantProject oProject = PlantProject.LoadProject(sProject, true, "", ""); The best way I've found is to send the commands to the command line (Pinvoke acedCommand) or use LISP. Set FILEDIA to zero and then you can pass a file name to the OPENPROJECT command. You can build a result buffer and then call acedCommand. Sorry! And haw can I get current project name, if I already opened it? I need know current project name to load dot net libraries depend project. And finaly I use LISP to load dot net. So I need LISP way. I haven't seen any of the plant api exposing functions via LISP. So you are much better of using the .Net api directly. If needed, you can build a dll that references .Net code, and make your own functions exposed to Lisp. You can get project name information by referencing the project part dll in the installation directory. Make sure you install the plant 2013 sdk as well. Thank you for reply! OK I will try to use .Net, but... really... it's too long way opposite simply a couple of LISP strings for this purpose.
<urn:uuid:4373c935-d19f-47c0-8e83-4f485812247f>
2013-05-24T01:38:00Z
CC-MAIN-2013-20
[ [ -0.05838558077812195, 0.008718651719391346, 0.03017241321504116, 0.0024245688691735268, 0.028605015948414803, -0.04858934134244919, 0.031152037903666496, 0.032719437032938004, -0.014988244511187077, 0.00009298772783949971, 0.05838558077812195, 0.057210031896829605, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.860222
307
http://forums.autodesk.com/t5/AutoCAD-P-ID/Plant-3D-API-Opening-a-project/m-p/3790112
0.163661
I realize I'm new to this forum but a thread like this has been extremely helpful in all other online forums I've been a part of and not having one here has left many of my questions unanswered because I didn't feel they were worthy of their own thread. The rules, if you could call them rules, are simple. This thread is for quick questions. Something like, "How much does the Infinity Blade cost?" would be suitable. On the other hand a question that has a long answer with varying opinions should be asked elsewhere. So anything along the lines of, "What is the best weapon class?" should be avoided because some will say light cause you have a sword and shield, heavy because the weapons do more raw damage, or dual because the combo chains are better, or it depends on your play style. That was just an example I pulled off the top of my head but I'm sure my point was clear. Please no theories, or questions that involve hypothetical answers. I love the mysteries in Infinity Blade as much as the next guy but they're really too in depth and vague for discussion here. If you know the answer to a question feel free to answer it! This thread should be a place where new gamers can come to learn. If a question has already been answered don't reply with the same answer. However, if you have something to add that's helpful then by all means go for it. Many questions will be asked over and over so the ones we see often can be added to a FAQ thread that could be linked in this post. tl;dr: Ask and answer simple questions here
<urn:uuid:92508694-e99e-47d3-aebb-cb874b4bb911>
2013-05-24T01:36:44Z
CC-MAIN-2013-20
[ [ -0.02976190485060215, 0.005492822267115116, 0.021008403971791267, -0.004529937170445919, 0.05427170917391777, -0.055322129279375076, -0.01706932857632637, 0.07212885469198227, -0.02591036446392536, -0.031512606889009476, 0.03693977743387222, 0.03851540759205818, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982139
330
http://forums.epicgames.com/threads/911545-One-Answer-Question-Thread
0.157386
Panseared Salmon with soy noodles Serves 4 Prep Time : 10 mins Cooking Time : 10 mins For the salmon 2 tsp. green tapenade 4 salmon steaks For the salad 2 tsp. sesame 1 red chilli, chopped 1 tsp. ginger, chopped 1 clove garlic, crushed 1 bunch spring onions, chopped 100 gram bean sprouts 3 tbs. white wine 300 gram rice noodles, cooked 3 tsp. light soy sauce 1 bunch chive, chopped Warm a non-stick frying pan over a moderate heat. Rub the tapenade into both sides of the salmon, then carefully lay them into the pan. To make the noodles, warm a wok over a high heat and add the oil. Fry the chilli, ginger and garlic together for two minutes, then add the spring onions and fry for two more minutes. When the salmon is half done, turn it over to finish cooking from the other side. Add the bean sprouts to the stir fry and cook for one minute, then reduce the heat and add white wine. Stir well and add the noodles and allow to heat through. Season to taste with the soy sauce. To serve, ball the noodles onto the plates and lay a salmon steak on each. Pour the juice from the noodles over and around.
<urn:uuid:fbc9be5f-2d17-40dd-9de7-46c02f3866c6>
2013-05-24T01:51:52Z
CC-MAIN-2013-20
[ [ -0.008099916391074657, 0.016617892310023308, -0.014736621640622616, 0.030936455354094505, 0.08695652335882187, 0.010451504960656166, -0.003527382854372263, 0.034908026456832886, 0.019439799711108208, 0.03302675485610962, 0.07065217196941376, 0.056020066142082214, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.755177
284
http://forums.hexus.net/salmon/11475-panseared-salmon-soy-noodles.html
0.354851
Thank you for your reply. But it does not solve the issue! Something wrong with my link? Should it be the full path? Even if it is the full path I should specify the exact package name! Well I think that would be solved with the final release, though I managed to solve the problem with a workaround. The root shell on this machine was csh while the user shell was set to zsh. Once I changed the root shell to zsh and added the export PACKAGESITE to the .zshrc file, sudo pkg_add -r worked, though I have a question: The PACKAGESITE variable is set to full path : and I need to input the full package name in order to install packages! What should it be set to? Thank you again for your support.
<urn:uuid:a2f561e9-54f4-47a4-9b9f-fdc232829405>
2013-05-24T01:44:36Z
CC-MAIN-2013-20
[ [ -0.06319444626569748, 0.0022135416511446238, 0.02395833283662796, 0.0011990016791969538, 0.06215277686715126, -0.07951389253139496, 0.01675347238779068, 0.06180555373430252, -0.02656250074505806, -0.001079644076526165, -0.001220703125, 0.0381944440305233, 0.0451...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.891453
174
http://forums.pcbsd.org/showthread.php?p=101652
0.814867
A eulogy for Steve Jobs written and delivered by his sister was published over the weekend. It reveals many personal details of the techbiz titan's life, among them his last words as he lay dying with his family around him. According to Mona Simpson, Jobs' sister and a professor of English at the University of California, his … Worst news story ever. How he hell is this tech news? What a pile of shit! So its probably a pain induced Owwww Owwwwwwwwwwwwwwwwwww Owwwwwwwwwwwwwwwww rather than this. But I digress. SJ - RIP, will miss your showmanship on the yearly 'one last thing'. My thoughts too, either pure pain or his body flooding him with chemicals to counter the same. Not any kind of visions of the afterlife or ghosts or any of that mythical nonsense. Whatever we neither need this story nor comments. Including this one. better one here... I preferred the interview with the nun who had been beside Mother Teresa as she passed away. The TV reporter, off-camera, asked her what the Holy Mother's last words had been.. The reply, quite meekly but as a simple matter-of-fact, was: "I can't breathe" "Not any kind of visions of the afterlife or ghosts or any of that mythical nonsense." People seeing visions as they near death is pretty well documented and can't realistically be called nonsense. If you want to call them hallucinations I'll go with that, but to say people don't see things that look like God or angels or (more likely in Jobs' case) Nirvana is to ignore tons of documented research on the subject. He saw the Light He saw the glow as he ascended to a Windows icon surrounded by light.... Actually, when your brain is on the way out, you do get those sorts of visions. Cue Maxwell Smart. "Hang on, Chief, I think he's trying to say something." Max, kneeling, leans in close and places his ear next to the dying man's mouth and listens, then he stands. "So, Max, what did he say? -Get you knee off my chest." Saul... ehhh... Steve on the road to Damascus... Oh Wow, Oh Woh Oh Wow I've just realised why Android is so good He probably said that. Not pain induced. By the time he said that he would have been doped to the gills by hospice. I'm sure I won't be the first, but had he just seen iGod? That's so direspectful to him. Of course it had to be iBudda. Let's respect the man's iFaith if we're going to make iJokes. The cult of Jobs now has the kernel of an afterlife myth. If only people buy Apple products and services, they too may follow Steve into a smooth, minimalist version of heaven. You aren't allowed out though and there's a strict dress code. This s getting complcated. I think Jobs' version of 'heaven' would mean 'hell' to me. And vv maybe. Not sure where I hope he went, don't wanna meet him. I swear on my iPhone 4S... I saw Steve Jobs showing a Hillsbus route 610X bus driver a more efficient way to change gears. Steve has NOT left the building. heaven is running OS X 10.9 and the angels have ditched harps for iPads I'm thinking heaven to Jobs would look like THX1138 with earbuds. Could be worse... She was probably carrying a Samsung. As famous last words go, not too memorable, and up against:- God damn you --- George V - not a particularly good final few words - maybe he realised the brompton cocktail was to get him into the first editions... but infinitely better than... They couldn't hit an elephant at this dist.... which were the highly inaccurate last words of General John Sedgwick a commander in the US civil war. I beg to differ... As words to get you remembered, General John Sedgwick was spot-on. Yep, the one with the musket and telescopic sight... Probably wasn't a telescopic sight, just a Kentucky long rifle... Other (applicable) last quotes.. Leonardo da Vinci: "I have offended God and mankind because my work did not reach the quality it should have" Pancho Villa: "Don't let it end like this. Tell them I said something…" Ludwig von Beethoven: "Friends applaud, the comedy is over." Personally I'm going to copy Rick Wakemans epitaph: …”There’s been a mistake . I haven’t finished yet”. And lo, a shiny orb of of glowing glass and aluminium did envelop him, raising him up to his rightful place in the heavens..... Perhaps he was being burnt by the overheating iPhone battery? That's all I have That's what happens when you're on palliative care drugs. But not sure if it's something that deserves the El Reg treatment. So right. My very ill mother was pumped full of morphine for the last few months of her life to control pain, and whilst it could be entertaining listening to her having babysat the neighbours kids the night before, the induced hallucination was not very pleasant to behold in someone who was so dearly loved. A joke is okay, but there are some areas which should be treated as completely out of bounds. Sorry about your mum, but you REALLY need to grow a thicker skin! Pretty much everything people say that isn't small talk is going to be capable of offending someone, somewhere. How often have you or someone you know said "oh, you nearly gave me a heart attack", when surprised... well curse you for treating heart attacks in such a light-hearted way! Chill some. Oh, and my Dad had Alzhemiers and I often hear the jokes about that and don't really mind; it's human nature and it's not meant personally, I know - so I do speak from some experience. Some years ago, my Dad was suffering an aggressive form of prostate cancer and quite advanced Alzheimers (he always was an unlucky bugger). In his more lucid moments, he would often comment that he was glad he had Alzheimers, it made him forget he had cancer. I can only hope I can face my end with such humour and equinamity as and when it comes. Its not a bad last message Lets face it.. Infront of your family, children especially. Seeing dad screaming in pain wouldnt be a nice lasting memory. So, if you do have the abilty/presence of mind to be able to give them a warming last memory, its not a bad one to go with. He was often quoted as looking forward to his next journey, so it would fit the Man. If it's true, and was planned, good for him. "He was often quoted as looking forward to his next journey, so it would fit the Man." As long as he didn't need registration plates for his transportation vehicle and there were lots of disabled places for him to park in I expect he would be happy! Reading this brought me chills... If I was dying of Cancer I'd want to be so full of drugs that I'd be as far out of it as a van full of hippies on owsleys old original too... That's usually the way it goes. I know two people who died as a result of their cancers, and witnessed their deaths... both were heavily sedated and quite unconscious for the last 24 hours or so. Neither were in a particularly coherent state for some time prior to that as a result of large doses of painkillers and sedatives. I Am Not A Medic, but I doubt it was any different here. You too might go "Oh Wow" when dosed up with enough opiates to make the world go away. No matter how much you dislike the man, someone dying with his family present is most distressing. I hope his family have the strength to cope with this loss and don't get too upset about the various strong views being expressed. Huh? It should depend on the CIRCUMSTANCES of how one is passing on. What I may have missed and what doesn't seem to be here is his sister's account of whether or not he was *smiling* or lamenting or was he bowling over in pain. Nevermind the drugs. The problem with humans is we "cling" too much. If we're more rationally earlier in life trained to EXPECT death, how EVER it comes, part of the excessive preoccupation with transformation of some sort is nixed. Now, if one is violently removed from our realm, and it was an most unfair, vicious means, then of course, getting emotional, defiant, and and full of denial is much more to be expected. Revenge and all sorts of other things can result. But, for those who live long, reasonably good, materialistic, violence-free lives, and who have very little to want for, those kinds of people ought to be more rooted, and many probably are. Many of them *likely* (if thoughtful) prepared their familes and loved ones to be strong and not deny the inevitable fact of death. It is truly one's right to die with dignity and without uncouth activity, but one cannot demand AND get the right to be corporeally persistent. Given Jobs' past, I'm pretty sure he very well prepared his family. I suspect there are some uncouth, profiteering journalists and rags out there seeking to monetize every last bit of the man's life. If it was not the drugs, then it probably IS the case that he was energetic enough to vocalize what he felt he was experiencing as a transition. So long as we're not truly evil or murderous, it's possible we'll get to feel or think we're feeling a new level of existence, probably for a better path, not a regressive or "back to square one" or, "onward, straight to a hell box". We're too caught up in "death" because we're not permitted in general to die then come back to talk about it. Those who do claim the event are commercialized to the hilt and yet the world is not globablly transformed. "If we're more rationally earlier in life trained to EXPECT death, how EVER it comes, part of the excessive preoccupation with transformation of some sort is nixed." Sorry to break it to you but that's utter bollocks. I lost a child a few years ago (at a few months old), and my older children KNOW what death is because of that. Everything was explained to them at an appropriate level for their ages, and any questions over the years have been answered truthfully. At the time they weren't too bother, now they do worry more over death and dying than other children of comparable age (6-9). They worry more when people are ill that they will die. I would never have withheld the information from them, but it does change their outlook on life...... I used to worry, too... I've lost dearest friends, casual friends, and relatives, and shipmates. Some from my age of about 10, some older. Biology class, war movies, news, and living in rough neighborhoods with very little isolation from danger has a way of altering perception, outlook, expectations... Nowadays, even if I have a spell of pain, I still *hope* that they went to a place better than here. It needn't be some human-named place called "Heaven" or "heaven", it just hopefully is not some dead-end, meaningless, pointless, void of a place. So, in my case even before my teen years, I knew what death was likely to be like. I too worried at times. Had some anxiety over it. It came and went off an on over the years. Sometimes, now, I actually WELCOME it. Nothing will last forever, and the longer we are cushioned by denial or those who withold it form us As for the adults, having knowing that he delayed treatment, and went to the hospital at least 3 times, they had to have known for years that he was on the losing end. He probably made his inner peace. Do you think Jobs withheld it from his family and banned them from watching the news? The adults surely must be capable of coping with this, shouldn't they? Obviously (and, did I need to say it?) the kids are a special case. I am preeeety sure that any close relatives of any family standing to get the kind of money Jobs is leaving behinds will have a few frames of mind: 1. I feel sorry for you that you have to go so soon, at this youngish age, in this manner 2. I hope like hell your affairs are all in order and that I get some of that pie 3. I hope I can live long enough to enjoy it -- whether or not a make a + difference in the world 4. I hope like hell you don't perceive of me from afar as undeserving of your gifts -- GODS, thank you, man. ANd who knows what else. As for kids, I know that not all kids will process the loss of a parent, but many kids can be reslient, especially if they have several years of preparation. I am not certain, but I doubt Jobs and his wife and relatives would deprive the kids (I don't know their ages) of the evolutionary stages of passing on if they are at least past 6 years old. It'd be kind of cruel to just spring it on them by way of a sudden disappearance from the daily hugs and wrestling or TV watching and so on. Now, if someone left *me* that kind of money, even $500,000 after taxes, I could create jobs and income streams and maybe open an incubator or two. PS, I wasn't trying to demean or degrade individuals stages of grief. It's just that we as a species vest a lot in clingyness as if there is no chance to "meet up" later. Could've been bowowow. Perhaps he was about to be reincarnated as a dog. Unless it was "oh no" rather than "oh wow" Or it's upside-down MOM HO! MOM HO! MOM HO! The Castle of Aaargh "The Castle of Aaargh." What is that? He must have died while carving it. -That's what it says. Look, if he was dying, he wouldn't bother to carve "Aaargh." -He'd just say it. -That's what's carved in the rock. -Perhaps he was dictating it. -Does it say anything else? But, for the complainers, i'm sure this was a Bootnotes story. No? Oh... He's iShuffled off this mortal coil. I'd rather see the castle of Anthrax, really. Your mother was a Napster and your father smelled of Blackberry? "Sorry. We're right out of Bondi Blues. (pause) I've got an iPhone4s." "Does it talk?" "I'll have it." And other assorted Monty Python references not intended to cause offence. Did you really need to publish this 'story'? Especially with the clientele the register attracts these days, it's only going to be unpleasant. reg customers LIKE unpleasant The post is required, and must contain letters. Yes these articles are getting a bit rediculous. Long past the point of beating a dead CEO! Dougal: Aww...he was fantastic, wasn't he? Ted: Ah he was brilliant. - Product Round-up Smartwatch face off: Pebble, MetaWatch and new hi-tech timepieces - Geek's Guide to Britain The bunker at the end of the world - in Essex - FLABBER-JASTED: It's 'jif', NOT '.gif', says man who should know - If you've bought DRM'd film files from Acetrax, here's the bad news - VIDEO Herschel Space Observatory spots galaxies merging
<urn:uuid:e6411e69-6db2-4bd0-895b-677bbba91d56>
2013-05-24T01:57:45Z
CC-MAIN-2013-20
[ [ -0.015380859375, 0.0108642578125, 0.00640869140625, -0.01531982421875, 0.10107421875, -0.029296875, -0.008544921875, 0.10009765625, -0.0004329681396484375, -0.0380859375, 0.0145263671875, 0.02294921875, 0.01397705078125, 0.02392578125, 0.03662109375, ...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97709
3,476
http://forums.theregister.co.uk/forum/1/2011/10/31/steve_jobs_last_words/
0.196733
Those are very rare wheels. AFAIK, they aren't modified. They were made like that... Hello, i saw this pic from cult classic, and the wheels are speedline II style but they have a lip on them. How would i go about doing this to my wheels? FIND IT OR GRIND IT
<urn:uuid:adf012db-3345-4f4c-b033-819cf1c3a503>
2013-05-24T01:58:26Z
CC-MAIN-2013-20
[ [ -0.0716145858168602, -0.0038519965019077063, 0.02669270895421505, 0.008572048507630825, 0.0607638880610466, -0.0941840261220932, -0.0020073784980922937, 0.02506510354578495, -0.0438368059694767, -0.03059895895421505, -0.00689019076526165, 0.0222439244389534, 0.0...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971556
67
http://forums.vwvortex.com/showthread.php?5793783-Speedline-II-s-with-lip-Help
0.230793
well here goes. "High everyone"! or am i just talking to myself at the moment? I'm known as k9slayer(real name Paul) and would like to say thnxs to Lacadamon for letting me join this new and exciting site; and hope I will enjoy my stay. I hope to learn and hopefully contribute to this new site, but at the moment I'm a lot computer illiterate".ho yes, to all of you. A Merry Christmas and Happy New year.
<urn:uuid:7db681fb-7b21-406c-bfef-9bcb775f12b9>
2013-05-24T01:57:07Z
CC-MAIN-2013-20
[ [ -0.009556361474096775, 0.0424107126891613, -0.005336216650903225, 0.01018415205180645, 0.0641741082072258, -0.0368303582072258, -0.01953125, 0.0535714291036129, 0.0074637276120483875, -0.03097098134458065, 0.00634765625, 0.0033133369870483875, -0.053013391792774...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969366
103
http://fr33sp33k.h33t.com/index.php?topic=1319.0
0.90884
ZF-6668: Zend_Locale_Data fails creating cache when tmp directory is not writeable On our production server it isn't possible for a user to create and write files to the /tmp/ directory. However, Zend_Locale_Data::getList() tries to create a cache by itself at line 293 when no cache is present. When there's no cache present it uses Zend_Cache_Backend::getTmpDir() to request a directory to write in. When the /tmp/ directory isn't writeable by users an exception gets thrown by Zend_Cache at line 208: cache_dir must be a directory In 1.7.5 Zend_Locale_Data only used a cache when it was set and didn't try to create one by default. The only way for me to get this to work is setting $_ENV['TMPDIR'] to a custom directory. With multiple websites deployed this is not very desirable. I think Zend_Locale_Data (and perhaps other components?) shouldn't try to create a cache by default in a temp directory, as you never know if it's actually writeable. Another solution could be that Zend_Cache_Backend checks if the directory from Zend_Cache_Backend::getTmpDir() is actually writeable. If not cancel the creation of the cache and just continue. No need to warn about it either I think. The priority of this ticket might be a bit too high, but currently I can't savely upgrade to 1.8.1.
<urn:uuid:de212e00-ff44-4ab0-8aff-86de1041a06f>
2013-05-24T01:44:48Z
CC-MAIN-2013-20
[ [ -0.03878726437687874, 0.01012025773525238, 0.018885500729084015, -0.018462060019373894, 0.03861788660287857, -0.09620596468448639, 0.005398882087320089, 0.022357722744345665, -0.0086805559694767, -0.006012872792780399, 0.08299458026885986, 0.03370596095919609, -...
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927325
331
http://framework.zend.com/issues/browse/ZF-6668?actionOrder=desc
0.656054