bff_contained_ngram_count_before_dedupe
int64
0
75.8k
language_id_whole_page_fasttext
dict
metadata
dict
previous_word_count
int64
50
99.7k
text
stringlengths
60
758k
url
stringlengths
14
3.31k
warcinfo
stringlengths
305
510
fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob
float64
0.02
1
419
{ "en": 0.977615773677826 }
{ "Content-Length": "123328", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:GLLZC4M36VB2RF2EBKGIKXD2TDNL5QJ4", "WARC-Concurrent-To": "<urn:uuid:2ebc2af6-7a0f-4da0-a1b1-f49a74289e45>", "WARC-Date": "2013-12-13T06:17:25", "WARC-IP-Address": "192.0.82.250", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:BZPTJQJ5JGUQVIO2HAS42U3M3SX2ST7L", "WARC-Record-ID": "<urn:uuid:a9d29312-b847-433e-bf22-7f4771eea5c1>", "WARC-Target-URI": "http://politicalticker.blogs.cnn.com/2008/06/06/majority-of-dems-want-clinton-to-be-vp-2/comment-page-21/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2f3e7f73-ba41-496a-8f86-a0f2f7ab6ef2>", "WARC-Truncated": "length" }
2,560
June 6th, 2008 11:54 AM ET 6 years ago CNN Poll: Majority of Dems want Clinton to be VP A majority of Dems want Clinton to be VP. A majority of Dems want Clinton to be VP. soundoff (624 Responses) 1. Michael Sorry, I'm one of the majority who DOESN'T want Hillary as VP. Secretary of State, or maybe Democratic Majority leader perhaps. June 6, 2008 12:49 pm at 12:49 pm | 2. Krystof "many Democratic women are miffed" Why should they be miffed at the fact that their candidate lost fair and square? They should be sad, yes, but I think that if Hill supporters have any anger, I want to know why, because the DNC gave her delegates from contests that weren't supposed to award any in the original rules. Even if we counted MI and FL in full votes, Obama would have been the nominee on Tuesday night. I am confused as to why Hill supporters can be miffed – unless they are miffed that their candidate ran a poor campaign and simply lost... 3. Fav, Colorado As much as I think it's a great idea that Clinton be the VP – I will still not cast my vote so long as Obama is on top of that ticket. I will not abuse my right to vote, by voting for someone that does NOT offer a future to my beloved country. If i see no options on that ballot i will not vote – it is that simple! Obama and McCain are NO OPTIONS for this country! I wish you people would have seen that from the start!!! I do not want to feel responsible for my country's downfall by voting for someone just because they say they can be president! Mrs. Hillary R Clinton – I'm still backing you! 4. Rob it would be the worst choice he could make – she represents the old way of doing business. the people that voted for her are democrats and will, once enough time has gone by coming to terms with the loss, will go to Obama. 5. Willam from Texas I am a white male voter. Obama/Clinton is the only way to go for me. If she is not on the ticket, I will write her name in come election day. 6. stephanie, Washington She deserves to be a vice president than anybody in the democrat party because she has more population than him but he leads about 120 pledge delegates than her. He has no choice because he must respect to the will of the people. If he doesn't pick her, how can he unite the party. If she was a nominee, she already decided to pick him. There are a lot of her supporters will vote for McCain in Nov according the exit poll. In order to unite his supporters must corporate with her supporters so democrat can win the general election. Put any personal feeling behind and work together as a team. The democrat party has a broken system and they need to fix it the future. If democrat system like republican, she would be a nominee. I think they also get rid off the caucus and only primary selection. 7. njvoter I wasn't obviously in this poll but I will say this it's up to OBAMA. If he chooses her as a running mate I'll vote for both of them. 8. Bushwhacked in Eugene, OR Just why do some of you say Hillary was mistreated? She was treated the same way any other candidate would have been treated, male or female. Isn't that the ultimate goal of feminism - equal treatment? Or do you think she should have been given some kind of break, treated like a lady instead of a presidential candidate just because she is a woman? Makes no sense to me. UNITE in November. 9. Michelle from Colorado I say No because he does not deserve her. Let him fight on his own and pick one of the cronies who supported him from the beginning. Besides, she can do better than that. I hope he falls on his face whether by losing the election or by making the mash out of his term as i am sure he will. Jimmy Carter. George Bush, Barack obama. They are all the same. Outsiders who think they can change things. W and Jimmy I guess didn't teach us any lessons. June 6, 2008 12:50 pm at 12:50 pm | 10. Virginia Voter You (and a lot of others) say: "I cannot vote for Obama. I'm a Democrat and abhore the way Hillary was treated." A couple questions, and I'm not trying to be snarky - I'm genuinely baffled by the sort of statement in your post: (1) To what treatment, exactly, are you referring (examples)? (2) How is Sen. Obama responsible for whatever examples you gave in answer to Question (1), above? 11. Mike in Columbus GC from Virginia... One of the best post I've seen here yet. 12. John Change means change. It does not mean half change. In addition to that Hillary has demonstrated that she is really willing to say and do anything to be in power. that's kind of scary. 13. wthwah NOT TRUE. I don't know who they asked, but everyone I speak to says if she's on the ticket, McCain gets their vote. I will never vote for her, no matter what role she plays. In fact if he declares she'll get a cabinet spot, I may not vote for him. If she's in, I'm out. I hope Sen. Obama gets feedback from real America, not these fixed McClinton polls. 14. Former Democrat i hope Hillary is not Barack's running mate. He'll drag her down with him when he loses in November. Hillary can run again in 2012 after we're all sick of McCain. By that time, Barack will be "organizing a community" somewhere or voting "present" in the Senate, which is about all he's good for. 15. Rj People who are opposing this Dream Ticket are GOP scalawags and most of them are racists. These people are planning to stage an attack for Barrack Obama Presidency. Everything has been planned to destroy his image and will use race card against him but if Clinton is with him in the Ticket they will need to change their plans. They included Senator Clinton remarks and others to their plans. These are GOP's dirty tactics to win in November! We call on all democrats to join together and push for this "Dream Ticket" to win back the White House from the GOP. Obama/Clinton '08 16. Topher Who are they polling. I don't know one Dem that wants her anywhere near the Whitehouse with Bill after her last dog and pony show. I course the poll turned on women. A majority of the feminazi women out there who won't vote for Obama are still made that Hillary got outcampaigned and outsmarted. 17. from illinois... hmm..let's see....she voted FOR the invasion and occupation of a sovereign country, and maintained that position until there was no capital to be gained from it; being pro-war, she would not hesitate to use nuclear weapons against Iran?; she voted to undermine the constitution and the bill of rights voting FOR that infamous PATRIOT ACT (far as I know...Kucinich was the only one of the dem candidates to actually have read it...–remember the debate question to Kucinich..."Why did you vote against the act", to which kucinich responded with the one answer none of the others could: "Because I Read it!"; Clinton is pro-death penalty, condones infidelity (now,THAT's really a feminist characteristic (sic) which says a lot about her character...No. Barack....if you truly are opposed to the war, you don't need clinton; if you truly are opposed to the Patriot Act, you do'nt need clinton; if you truly are against he death penalty, you don't need clinton...if you are for ANY of those, you clearly don't need my vote or the votes of any of those other 20 per cent of the population who were against that war from the inception or the 70 per cent plus who have come to see the light and are against it now... 18. jay, NM Obama can offer but she should not join a sinking boat. June 6, 2008 12:51 pm at 12:51 pm | 19. Bobby from Indiana All of you posting are just Hillary-hating idiots!!!!!!! What else do you expect politics to play? I have decided that the only people posting on here are Hillary haters. Please remember that there are 18 MILLION PEOPLE who voted for Clinton so SOMEBODY IN THIS COUNTRY SUPPORTS HER!!!! I will be voting for Obama regardless in November but think about this all you retards posting... You guys go on and say, "Oh i hate hillary supporters, saying they will vote for mccain if obama is the nominee. Hillary supporters aren't true democrats!!!" Well this is what you idiots sound like, "I will not vote for Obama if Hillary is on the ticket, how could he betray us like that." ummmmmmmmmmmmmm HELLO?!?!?!??! HILLARY IS A DEMOCRAT TOO!!!!!!!!!!! God!!! It's not like Obama will be choosing a republican as his VP. Remember, THYE VOTED FOR NEARLY THE SAME THINGS!!! THEY ARE BOTH DEMOCRATS!!! All you IDIOTS posting are all about Obama and UNITY!!!!!! Well UNIFY and accept Obama AND Clinton. They're BOTH DEMOCRATS!!!! 20. mark Stay away from Billary! The only reason he'd pick her is to get elected. So much for his message of "change". The Clinton's belong in the "Waffle House", not the White House. 21. Sideburns Obama has already won the Democratic nomination... He's running in the GENERAL ELECTION now, and the fact is that the majority of Americans (Hillary's vast right-wing conspiracy) don't want Hillary as Vice President. Seriously, why do Presidents always choose creepy weirdos as their Veeps? Reagan had Bush I and Bush Jr has Cheney. Choose someone who'd make a good President for once! 22. Michele, Oregon It would be interesting to poll Independents. Having worked on the Obama campaign, most of the Ind. polled stated they would not vote for a ticket that included Clinton. Look at Montana where the demographics were not necessarily his, but Barack won handily because it was an open primary (no Clinton votes to him, but Independent and Republican crossover votes) which is more indicative of the general. Now add to that the portion of the Clinton supporters who will vote for Obama in the fall..... These polls and the margins of error, I don't know......Things are still too heated and need to calm down. Obama does need to consider Hillary of course, but my hope is that she accepts a cabinet position. She would be great and could effect change on the national level. For the common good, Obama/and his choice 08!!!!!! 23. Deana I don't. I want her to go away, quickly. I also don't think it's fair for Barack supporters to pay for her debts, since she is completely responsible for them. I won't be sending any more money to Barack or the DNC in case that money is used for Hillary Rodham Clinton, whom I despise. When she goes away, I will give more money to the campaign. As long as she's in the picture, my money will stay where it is. 24. Jon, Pittsburgh, PA I think it's funny that people think there is this animosity between Obama and Clinton. Why do you think that? Because the media has told you? Politics is politics. I think underneath it all, they like each other personally. They agree on most issues. They receive strong support from most Democrats. Campaigns are tough at times. They say things for effect to get votes. They are trying to win. It's called competition. I don't believe there is any animosity between them. I have thought for a long time that together they would be unstoppable. June 6, 2008 12:52 pm at 12:52 pm | 25. CATHY I don't want hallary as VP.I'm nat voting fo obama I;m writting her name in.
http://politicalticker.blogs.cnn.com/2008/06/06/majority-of-dems-want-clinton-to-be-vp-2/comment-page-21/
robots: classic hostname: ip-10-33-133-15.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2013-48 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for Winter 2013 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.088547
10
{ "en": 0.9817274808883668 }
{ "Content-Length": "31437", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TA3FYNO5ECAIZNIBENPSPFXCYC6BNTSX", "WARC-Concurrent-To": "<urn:uuid:e37737fc-0e04-44f6-86fb-5fc77ee511f1>", "WARC-Date": "2017-06-22T18:31:40", "WARC-IP-Address": "52.36.35.142", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:PPM4MCOB26XTHUEUMWLCGHLOATFWGJJM", "WARC-Record-ID": "<urn:uuid:b1b2c369-2cf9-4247-9ada-7b9b30721612>", "WARC-Target-URI": "https://www.yidio.com/movie/jack-and-sarah/14178", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a935847e-9a3b-4d69-abe8-a9043119326e>", "WARC-Truncated": null }
337
Watch Jack and Sarah Jack and Sarah is a British romantic comedy about Jack and Sarah, a married couple who are expecting a baby together. The plot makes an unexpected as a complication arises during the birth of the child, which eventually leads to Sarah's death. With his wife's gone, Jack is so grief stricken, and unable to bear the stress of losing Sarah, that he goes on an alcoholic bender. During this time, Jack leaves his daughter in the arms of his own parents, as well as Sarah's mother. Jack's parents and realize that they need to take drastic action, and so, they decide to return the baby to Jack, without him knowing, while he is asleep. Jack, now realizing that he has to take responsibility in caring for his child, begins to do so, although he initially struggles with it at first. He eventually begins to get the hang of it and decides to name the child Sarah. Despite getting the hang of it, he finds it extremely difficult to bring up a child with his high demanding job. Even with the help of both sets of grandparents, as well as a washed out former alcoholic, Jack still needs more help. Jack eventually meets Amy, a beautiful young waitress he meets in a restaurant. Amy immediately takes a high liking to Sarah, and offers to become her nanny full-time. Amy decides to move in with Jack after only one meeting. During the film we see a major clash of personalities between all of the characters, particularly between Jack's mother, Margaret and William, the ex-alcoholic. As Jack slowly begins adapting to the ever fluctuating demands in his life, the plot thickens as we learn Jack's boss has taken an interest in him as well. | 1996 | 1 hr 50 min | 6.6/10 Tim Sullivan (III), Tim Sullivan Jack and Sarah Watch Jack and Sarah Trailer
https://www.yidio.com/movie/jack-and-sarah/14178
robots: classic hostname: ip-10-166-48-38.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.066754
0
{ "en": 0.9249406456947328 }
{ "Content-Length": "123896", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:7SBXHKCYTH34LSL3U2THIL2K6VDYFS4F", "WARC-Concurrent-To": "<urn:uuid:14cc9af6-af02-49e6-b897-370ad73c0f53>", "WARC-Date": "2021-01-26T02:31:40", "WARC-IP-Address": "99.84.191.105", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:NLU26OPJS7VIFV4B6X75JH2UGXZ4LCFR", "WARC-Record-ID": "<urn:uuid:388a70d6-df61-4e4f-9c06-35bcf87305e2>", "WARC-Target-URI": "https://homeguides.sfgate.com/improve-soil-flowerbed-98131.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:fecfe93f-f7f4-4e68-b815-9930a510f6a2>", "WARC-Truncated": null }
231
How to Improve the Soil for a Flowerbed Well-drained, rich soil is ideal for most flowering plants, and gardeners can provide it by adding organic matter to the flowerbed. Plants need water and air around their roots to thrive, but too much of either of these can be harmful. Organic matter helps supply water and air in sufficient amounts. It improves drainage and adds air to clay soils, and increases moisture retention in sandy soils. Organic matter also feeds earthworms and other beneficial creatures in the soil, and forms nutrients as it breaks down. To encourage prolific blooms, add fertilizers that contain phosphorus in the same or a greater amount than nitrogen, because nitrogen feeds plants' green leafy growth but phosphorus promotes flowering. Dig over the flowerbed site with a spade or garden fork to a depth of 8 to 10 inches, on a dry day in fall. Remove all rocks, plants and their roots, and other debris, and break up dirt clods. Spread a 2- to 4-inch layer of garden compost, well-rotted manure, leaf mold or other weed-free organic matter over the bed, and mix it into the top 6 inches of soil. Apply a fertilizer that promotes flowering, such as a ready-to-use, slow-release, 10-16-10 product at a rate of 1 tablespoon per square foot, or according to the manufacturer's instructions, immediately before planting in your flowerbed.
https://homeguides.sfgate.com/improve-soil-flowerbed-98131.html
isPartOf: CC-MAIN-2021-04 publisher: Common Crawl description: Wide crawl of the web for January 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-206.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.11088
27
{ "en": 0.9138791561126708 }
{ "Content-Length": "64396", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:P6UPUC2L2V6V5XJ76AQNIVR3ENIDS64N", "WARC-Concurrent-To": "<urn:uuid:96aee538-1457-4787-a8c6-158110d5194e>", "WARC-Date": "2014-10-01T10:26:48", "WARC-IP-Address": "64.19.220.97", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:C24YZ6DMYHAZKX6EVUQYUKJWFQUZE362", "WARC-Record-ID": "<urn:uuid:944de7ef-0600-4104-8ea5-b4d1291f3935>", "WARC-Target-URI": "http://wtop.com/256/3258394/Taiwan-says-Chinese-hackers-step-up-cyberattacks", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:106079d0-f0a6-4c53-bbff-29e002923e6c>", "WARC-Truncated": "length" }
131
RSS Feeds Taiwan says Chinese hackers step up cyberattacks Thursday - 3/21/2013, 1:50am  ET TAIPEI, Taiwan (AP) -- Taiwan says Chinese computer hackers have expanded the scope of their attacks from gathering military intelligence to stealing business secrets from the island's high-tech companies. Tsai Teh-sheng of the island's primary intelligence agency said late Wednesday that Taiwan has created a shield to protect government offices from "severe" Chinese cyberattacks. But he pointed out that Chinese hackers are able to sabotage privately controlled infrastructural networks, including those belonging to banks and transportation companies. Despite Tsai's warnings, analysts say Chinese hackers are unlikely to attack Taiwanese interests amid the rapidly warming relations between the sides.
http://wtop.com/256/3258394/Taiwan-says-Chinese-hackers-step-up-cyberattacks
robots: classic hostname: ip-10-234-18-248.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-41 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for September 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.05397
0
{ "en": 0.9662173390388488 }
{ "Content-Length": "184321", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WUSMRHNWTK777IOZF4Q6QMHEJ7K6JUEQ", "WARC-Concurrent-To": "<urn:uuid:2f9f1e7d-fac0-416f-a9c9-e838ede95542>", "WARC-Date": "2021-06-21T23:30:02", "WARC-IP-Address": "3.214.128.115", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:Y5AI6EXCKWBEWB3VQR46TSRXY3457YHU", "WARC-Record-ID": "<urn:uuid:21a02991-ff60-4e1b-acfd-8e1c1103648b>", "WARC-Target-URI": "https://www.livekindly.co/vegan-deli-how-on-earth-devon/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:f630642f-5138-41a3-a73f-b25e186692bf>", "WARC-Truncated": null }
535
Vegan Deli 'How On Earth' Is Devon’s First A vegan deli is coming to Devon. Vegan Deli ‘How On Earth’ Is Devon’s First How On Earth, a vegan deli that sells plant-based deli meat by the pound, is opening in Exeter, Devon, following COVID-19-related delays. Devon is getting its first vegan deli. How On Earth, a family-run business, will open in Exeter this week. The deli, originally a home business, was founded in 2017 by mother-daughter duo, Heidi and Chloe Howarth. But it soon became a family effort. The husband and father Daniel created the logo. Their son Ben helps run the business, too. The entire family has been vegan for five years now. “I had always been veggie and raised the chIldren without meat too. I was kind of like most vegetarians and just hadn’t connected the dots with regards to how cruel dairy is,” Heidi tells LIVEKINDLY in an email. When Chloe went vegan six years ago, she followed. “That is when Chloe started to experiment with creating her own plant-based protein recipes, as a birthday treat for her dad,” Heidi adds. In 2017, Chloe recreated a favorite of hers: KFC fried chicken. “She posted it on Instagram and a local vegan shop in Exeter asked if they could sell it. So we converted our utility room and started our business,” says Heidi. How On Earth has been developing its own recipes for plant-based meat ever since. Opening Up Shop The COVID-19 pandemic pushed back the brick-and-mortar location’s opening date, which was intended to be in March. Despite delays, the family adapted to working from home once again. Since then, the Howarths have found success with home deliveries. “It has been a time we could never have foreseen or imagined but we adapted as quickly as we could as we wanted to keep our customers, who may have been shielding, stocked up with the plant-based food they know and love,” Heidi told Devon Live. Once open for business, How On Earth will serve a range of local artisan vegan cheeses, sweets, and housemade plant-based deli meat. Food will be available for takeaway as well. The signature “How On Earth” burger is made from pea and soy protein. | How On Earth Better for the Planet The Howarths craft a wide variety of plant-based meat, such as pastrami slices, streaky bacon rashers, chorizo-style slices, Southern-style fried chicken, and even dinosaur nuggets. “The dinosaurs are pure nostalgia! In the UK a company used to make turkey dinosaurs and Chloe had always wanted a veggie version, so now as a grown-up, she has created a vegan version,” says Heidi. The How On Earth Burger, a grillable plant-based patty made from pea and soy protein, is their answer to the popular Beyond Burger. Many of the sauces are made in-house and bread is sourced from the Boatyard Cafe & Bakery, a local business. It’s very much part of the family’s mission to offer more sustainable food. They use plastic-free packaging for their meat alternatives, which they sell by the weight and at a lower price. “Did you know our smokey bacon style rashers are cheaper than the Sainsbury’s equivalent?” they wrote in a Facebook post. How On Earth opens on July 15 at 76 South Street in Exeter.
https://www.livekindly.co/vegan-deli-how-on-earth-devon/
isPartOf: CC-MAIN-2021-25 publisher: Common Crawl description: Wide crawl of the web for June 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-182.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.045925
56
{ "en": 0.8006161451339722 }
{ "Content-Length": "30578", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:HCAIY3AFC7E22L2BI7QYWB2BYRCGQPOS", "WARC-Concurrent-To": "<urn:uuid:708a6d6f-4962-4274-87bb-58f2c05fc63c>", "WARC-Date": "2017-07-24T08:36:15", "WARC-IP-Address": "212.129.41.164", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:PF7BQ4ATONL7ZN5T4INITB5XO5YTS5BG", "WARC-Record-ID": "<urn:uuid:6478a8e3-ad52-40a6-a502-c5fce003ac37>", "WARC-Target-URI": "https://www.meetingroulette.com/georgia/samegrelo-zemo-svaneti", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:fc4eee5d-05c8-447d-90ca-8af07bc124e6>", "WARC-Truncated": null }
177
Chatroulette Samegrelo-Zemo Svanet'i Welcome to Chatroulette Samegrelo-Zemo Svanet'i Connect to an aleatory person anywhere in the world. With Chatroulette Samegrelo-Zemo Svanet'i you can choose between the following options: - Chat for free with all kind of people from Samegrelo-Zemo Svanet'i. To specify it, go to 'Settings'. - Chat with webcam in the 'video' mode. - Chat with microphone in the 'micro' mode. - Spy other conversations anonymously if you are allowed. To start press 'F2' or click 'start'. All countries | Georgia List of cities in Samegrelo-Zemo Svanet'i: All cities • To start, select one of these two options: Option 2 Option 1
https://www.meetingroulette.com/georgia/samegrelo-zemo-svaneti
robots: classic hostname: ip-10-178-21-170.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-30 operator: Common Crawl Admin description: Wide crawl of the web for July 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.028423
0
{ "en": 0.9614338874816896 }
{ "Content-Length": "286120", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:X2VP3XOGZRUD3TD3NGVM3Z7UNF2OW527", "WARC-Concurrent-To": "<urn:uuid:8596cb9f-531e-458b-b824-080f57753a1c>", "WARC-Date": "2015-05-27T08:12:36", "WARC-IP-Address": "206.190.57.61", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:KU3GMRXJOI64JIHPETWWBOF7X63ZDJBD", "WARC-Record-ID": "<urn:uuid:6112e09e-7ada-4938-a292-d2d01ae34c84>", "WARC-Target-URI": "http://sports.yahoo.com/blogs/nhl-puck-daddy/nhl-13-review-revolutionary-skating-frustrating-goalies-another-130903436--nhl.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:219f30c3-95de-41df-9339-801dd23529f4>", "WARC-Truncated": "length" }
1,154
Buzzing on Yahoo Sports: Puck Daddy NHL 13 Review: Revolutionary skating, frustrating goalies and another solid edition Sean Leahy Puck Daddy It all came together on one play. Marian Gaborik intercepted a pass in the neutral zone and start striding toward my net. Switching to my nearest defenseman, Brooks Orpik, I thought I had a good shot of either slowing Gaborik down or knocking him off the puck. Within a split second I realized this wasn't the same skating I was used to in previous incarnations of the NHL series. I was foolish to believe Gaborik, at top speed, could be slowed on his way to the net as Orpik was trying to line him up. He breezed right by Orpik and hunkered down on Marc-Andre Fleury on a 2-on-1 with Brad Richards. Fleury cheated to his left anticipating a pass and was left to watch Gaborik go top-shelf over his blocker. There was a serious learning curve to be had; and when I finally got the hang of it, it made for a better NHL 13 experience. True Performance Skating is one of the changes brought to NHL 13 and it makes the feel of controlling your player completely different than in the past. The Skill Stick was introduce in NHL 07 and gave the user a new type of control in regards to shooting. True Performance Skating takes that up a notch by allowing your player to stop a stride, quickly gain top speed and shake a defender with a good first step. The consequence, however, is that the physics-based skating doesn't mean you'll be stopping on dimes and able to fire off perfect shots in stride. The faster you're skating, the less control you'll have if you change direction. Your shot will also be altered depending on your momentum. You'll need to judge when you'll need that extra speed and when you need to settle yourself down to be in a good position for a shot or pass. Because the skating is now physics-based, you won't be able to skate your player all around the ice without the potentially falling out of the position. Gaining top speed straight away is good for blowing past defenders, but moving left or right will slow your player down. Sometimes that's helpful if you're entering the offensive zone and waiting for your teammates, other times it allows the defense to catch up. Backwards skating with the puck is available on both offense and defense in NHL 13. This allows for some creativity when you're trying to set up a scoring chance. The same physics apply here and it'll take you a few games to get used to not finding yourself out of position. • The I.Q. was bumped up in NHL 13, making the players around you smarter when they aren't controlling the puck. Breakouts are more efficient and defensive-zone coverage is more effective because your teammates are reacting to what's going on in places on the ice where the puck isn't. Want to play Guy Boucher's infamous 1-3-1 neutral zone forecheck? Have at it. Just make sure you're not playing against Peter Laviolette. Remember when cross-crease passes would result in a goal 100 per cent of the time? Well, sorry. Your percentage of success just decreased using the former go-to play for many. Goaltenders are smarter and are now aware of players other than the puck-carrier. If you're coming down on a 2-on-1, the goaltender will anticipate a pass and put himself in better position to make a save. Same thing for defensemen in that situation. Play the pass or the shot, but still be aware of the second player on the ice there. What might get you frustrated is the new Full Limb Control given to goaltenders in NHL 13. With anticipation comes desperation and with more animations of that variety could see many "should be" goals turn into saves. Depending on your experience, goaltenders might make those types of saves on you far too often for your liking. GM Connected gives you the opportunity to take a dynasty league online and allow up to 750 to take part. It's modes like this -- along with Be-a-Pro and Hockey Ultimate Team -- that up the replay value. If you're going to be paying $60 every September for a new game, it can't just be a roster up any longer. Replay value in video games has become vital and EA Sports has been sure to stuff their titles with various modes and online features to keep you entertained and playing until their next release. • Players tend to be knocked to the ice often and very easily. Does Douglas Murray even feel a Travis Moen hit? • The new "GM brain" in franchise mode makes the ability to fleece other teams in deals tougher. Will you still be able to find a way to make potentially lopsided deals? Yes. • The addition of five new Legends, including female stars Angela Ruggiero and Hayley Wickenheiser, is great until you realize Ray Bourque, Chris Chelios, Steve Yzerman, Borje Salming, Patrick Roy and Gordie Howe are gone. Licensing agreements change every year, but it was still disappointing to see the number of Legends decrease in NHL 13. • The Philadelphia Flyers and New York Rangers Winter Classic jerseys are available if you play the Winter Classic mode, but not in any other mode like Franchise or Play Now? • The new broadcast presentation is a nice touch for a well-rounded experience. Storylines, net cam replays and in-game highlight packages can distract you during breaks in the action. Gary Thorne and Bill Clement are back as commentators; and while Thorne is known for his mispronunciations, no one caught errors during his recording? Since when is it Kyle Two-reese? • Will NHL Moments Live, where you're given to chance to relive great feats in NHL history and notable highlights from the 2011-12 and 2012-13 seasons, turn into AHL Moments Live if there's a prolonged lockout? "Relive Darren Haydar's hat trick against Lake Erie" doesn't have the same "cool" factor as trying to replay Sam Gagner's 8-point night. • There are plenty of menus to navigate through which, at times, can be slow. Speaking of slow, simming games in your franchise or Be-a-Pro seasons will take longer than they have in the past. Overall: 8.5 / 10 There's only so much at this point in time with the current technology for EA to do to improve upon the NHL series. The game is still solid. The replay value is off-the-charts. And they've done a good job making the game more and more real. From the Skill Stick to puck battles to True Performance Skating this year, the authenticity of the game continues to rise. The online modes, especially the popular EA Sports Hockey League, might need to fine tune, providing a better experience for users. And the first-year GM Connected mode will likely feature hiccups of its own. Follow Sean Leahy on Twitter at @Sean_Leahy View Comments (30)
http://sports.yahoo.com/blogs/nhl-puck-daddy/nhl-13-review-revolutionary-skating-frustrating-goalies-another-130903436--nhl.html
robots: classic hostname: ip-10-180-206-219.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-22 operator: CommonCrawl Admin description: Wide crawl of the web for May 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.027859
0
{ "en": 0.9363285899162292 }
{ "Content-Length": "43462", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EQ47SFVBXJ5Q4EIH6XXTQKAJXYYTT3P3", "WARC-Concurrent-To": "<urn:uuid:6111c230-4554-4eb7-94f7-65f442b92969>", "WARC-Date": "2019-08-18T20:03:36", "WARC-IP-Address": "162.144.141.194", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:OS4ORTLAQEPAHK7MYZ7UOPH4KFUQR4AA", "WARC-Record-ID": "<urn:uuid:d8995384-a83c-4afc-87f1-e47083eb2e0f>", "WARC-Target-URI": "http://justcallcooks.com/geothermal-benefits/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:450a81e3-88c3-4ae0-a637-da51034fbe0e>", "WARC-Truncated": null }
446
Geothermal Benefits No other method of home heating and cooling can match geothermal benefits as a reliable way to reduce sky-high heating and cooling costs. Significant monthly savings are realized after “going geo”, particularly for larger homes and also for homes heated with oil or propane. (Homes heated with natural gas can expect substantial savings over a longer payback period). Any home converted to a GeoSmart system from oil, electric or propane resistance will cut about 50% – 60% off its yearly heating and cooling costs. Using geothermal for heating and cooling changes the way you pay for energy. Because you are taking advantage of the natural heating (or cooling) capacity of the earth, on property you own, you are drawing upon a new resource that is essentially free. Geothermal for the home has tremendous potential to reduce carbon emissions and significantly reduce our impact on global warming. A geothermal system installed in an average-sized home, replacing a traditional energy source, reduces fossil fuel emissions by the equivalent of taking two cars off the road, or planting an acre of trees. We live in a time of diminishing natural resources. Most recently we have seen the impact on fossil fuels such as oil, where demand now outstrips supply. Not only does this force prices to rise sharply, it takes its toll on the environment, every day. Clean, renewable, geothermal systems make use of the energy of the sun, stored in the ground, to heat and cool your home or business. This energy is limitless, easy to access, and always available. It is also totally non-polluting. An added benefit of geothermal for the home is that the system effortlessly maintains a steady ambient room temperature. The difference is simple: conventional systems rely on high-heat sources such as combustion and this means heat is delivered in bursts to satisfy your thermostat. With geothermal, a lower temperature heat source is constantly providing heat. Fewer bursts. Reduced noise. More comfort. Similarly, with a forced air system, by removing the source of combustion less dry air is required for burning. Less dry air. Again, more comfort. In uncertain times, self-reliance is always practical. And above all, geothermal is a practical solution based on a simple principle. You own your land, and the earth has latent heating and cooling capacity. A geothermal system simply taps into that resource, one that you already own. Freedom from the oil delivery truck, the propane fill up or the natural gas bill is now possible. The only energy required is electricity for the geothermal unit. The advantage is control over your energy future. That means less worry, knowing that the price of “free” geothermal energy will never increase.
http://justcallcooks.com/geothermal-benefits/
isPartOf: CC-MAIN-2019-35 publisher: Common Crawl description: Wide crawl of the web for August 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-112.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.055388
78
{ "en": 0.9124572277069092 }
{ "Content-Length": "54570", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:MIR5JSOZN4P2ZSGEZHICJXOPX5HSRALN", "WARC-Concurrent-To": "<urn:uuid:a9511e88-a98b-4dc9-8893-25bd1f7b84d1>", "WARC-Date": "2017-09-23T16:18:45", "WARC-IP-Address": "108.61.197.136", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:WXGOAGVPVYADKSIIFKOUQNSVLJVTW7IN", "WARC-Record-ID": "<urn:uuid:eceff486-8175-4061-8285-43a86d503a4c>", "WARC-Target-URI": "https://theabbeyfieldsclinic.co.uk/conditions/heel-foot-pain/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0fda11f2-241f-419d-baba-df904d51d3a5>", "WARC-Truncated": "length" }
571
How to heal Plantar Fasciitis (Heel and Foot Pain) Heel pain is medically known as Plantar Fasciitis but other terms are used such as; Heel Spur, Policeman’s Heel or Runner’s Heel. We now know that chronic Plantar Fasciitis is mainly a degenerative process (worn or broken down) in nature. There is rarely any inflammation present in the involved tissues which is why treatments that focus on trying to reduce inflammation have little long term effect.  The problem is that most treatments (cold packs, non-steroidal anti-inflammatories and steroid injections) have not kept pace with the latest research on the said nature of this condition.  By definition, the suffix “itis” means inflammation.  This is where the confusion lies and the terms Plantar Fasciopathy or Fasciosis are now more commonly used. What causes Plantar Fasciitis? If you have been wearing shoes with poor cushioning or poor arch support such as Flip Flops on holiday. If there is overuse or sudden stretching of your sole as increased running intensity or distance. If you have a tight Achilles tendon (the large tendon at the bottom of your calf muscle). This can affect your ability to flex your ankle and make you more likely to damage your plantar fascia. Often there is no apparent cause for plantar fasciitis, particularly in older people. A common belief is that the pain is due to a bony growth or ‘spur’ coming from the heel bone (calcaneum). Many people have a bony spur but not everyone with this gets plantar fasciitis. Common Symptoms: The pain is usually centered on the underside of the heel but can change with time Resting your foot usually eases the pain but it may continue to throb if you have been on your feet for a while. How can the Abbeyfields help your Plantar Fasciitis? At Abbeyfields we use different approaches dependent on how long you’ve had your foot/heel pain for. In acute cases we use combined hands-on technique, medical acupuncture and orthotic prescription.  In chronic cases (more than six months) we now use the latest technology – Extracorporeal Shockwave Therapy.  This works by creating a new healing response in the tissue, promoting the growth of new blood vessels and inhibiting sensitive pain nerves.  The latest research suggests this works well for over 80% of patients and only needs three treatments over a three week period. NICE (National Institute for Clinical Health and Excellence) recommend this treatment providing Clinics audit their results.  Our Clinic is registered with the ASSERT protocol which is a nationally recognised database of audited clinicians. As a result of our investment in specialist equipment and our unique Integrated approach (Podiatric Foot Surgeon, Osteopathy and Physiotherapy) we now see patients from across Cambridge & Newmarket through to Ipswich, Sudbury and Thetford. Published Evidence Find out more how we can help heal your heel and foot pain Find out more about how we can help your heel and foot pain or for more information about Extracorporeal Shockwave Therapy. Contact us on 01284 847884 or use our online contact form. Would you like to book an appointment for How to heal Plantar Fasciitis (Heel and Foot Pain) ?
https://theabbeyfieldsclinic.co.uk/conditions/heel-foot-pain/
robots: classic hostname: ip-10-167-8-186.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-39 operator: Common Crawl Admin description: Wide crawl of the web for September 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.029834
778
{ "en": 0.945310652256012 }
{ "Content-Length": "67011", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EHJ4FLGMTKTMRL7C5BTA76RMS42J4XKS", "WARC-Concurrent-To": "<urn:uuid:e0d7bc0b-a38e-473f-95d4-8ca8a9580c7d>", "WARC-Date": "2013-12-19T18:53:49", "WARC-IP-Address": "199.19.80.13", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:MHD6WNO73AZPIXC2UNU2XONI6PRLKHUV", "WARC-Record-ID": "<urn:uuid:9a991192-7e18-4072-a33f-550f89e0c336>", "WARC-Target-URI": "http://www.dailytech.com/article.aspx?newsid=12531&commentid=327323&threshhold=1&red=1151", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5cc232be-8be7-4cac-8bb1-bbb188ea6333>", "WARC-Truncated": null }
1,260
Could an affordable electronic car be in the future? Comments     Threshold RE: Electric is the future By Doormat on 8/1/2008 1:19:10 AM , Rating: 2 The problem starts much, much sooner than when 75% of the nation's fleet becomes electric. For a state like California, the problem begins as soon as more than a few hundred thousand EVs are on the road. Again, the "problem" isn't one considering that 99% of recharging will be done at night. Go look at and see that even during the summer, they have ~40GW of capacity available and are only using 27.5GW between 12-6a. 1GW of power will recharge roughly 500,000 cars assuming 2kW recharge rate (120V/20A, 4-5 hr to recharge the Volt). There wont even be that many cars on the market until 2018, and thats throughout the US - CA wont get them all. GM is only planning for 10,000 cars the first year. Even if they do manage to get to 60,000 units in year two (I don't think they will) and work up to 100,000/yr, California would be likely to see at most half, or 100,000 cars, or roughly 200MW. A lovely example of cherry picking statistics...however nationally, natural gas powers only 20% of our electric production. In most states, natural gas sees little use outside of peak hours. Maybe Pickens is on to something... we can keep natural gas generation constant with wind picking up the load. In 2007 5GW of rated capacity (which roughly translates to 1.25GW of actual power) was installed. If that rate is kept constant, thats more than enough to accommodate the influx of PHEVs - 625,000 cars/yr. RE: Electric is the future By masher2 (blog) on 8/1/2008 10:53:21 AM , Rating: 2 > "...considering that 99% of recharging will be done at night." A fallacious figure concocted wholly from thin air. More than 1% of the population works at night...and even those people who work during the day will occasionally charge during daylight hours. The idea we can force an entire nation to buy electric cars, and not plug any of them into during the day is just silly. > "Maybe Pickens is on to something... " He sure is....vast personal profits from a misguided national energy policy. > "Even if they do manage to get to 60,000 units in year two..." Year two is only four years from now. Your original claim was for 20 years you're moving the bar this low? Yes, we won't have problems in 4 years. In 7 years, though, it's a diferent story for California, and within 2-3 years of that, many other states will follow.
http://www.dailytech.com/article.aspx?newsid=12531&commentid=327323&threshhold=1&red=1151
robots: classic hostname: ip-10-33-133-15.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2013-48 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for Winter 2013 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.040078
0
{ "en": 0.9613433480262756 }
{ "Content-Length": "157940", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:54B6WEKVKFANMSADB5KBOFW37PTDS6DE", "WARC-Concurrent-To": "<urn:uuid:1f93007e-c131-4923-b751-805dcb687f75>", "WARC-Date": "2021-04-15T13:40:43", "WARC-IP-Address": "172.217.164.147", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:4SU2R7NZXOLWLFJX5KKON5FD4R4UBOCT", "WARC-Record-ID": "<urn:uuid:cd072b13-6d85-4205-8e48-71ecb0b6b172>", "WARC-Target-URI": "https://www.postingankeren.com/2020/12/what-is-online-forex-currency-online.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0829684b-9750-4f36-a6c9-f4df5d31d811>", "WARC-Truncated": null }
446
القائمة الرئيسية  What is Online Forex Currency Trading?  The Forex exchanging or online unfamiliar trade market can be clarified as a spot by and large where unfamiliar monetary standards are exchanged or traded. For forex, exchanging monetary standards is a significant or basic factor. Monetary forms likewise play an imperative or significant job the world over as monetary forms should be traded to direct or conveying unfamiliar exchange and business. The market of trading unfamiliar monetary forms has arisen as a worldwide market where a major piece of individuals is occupied with trading unfamiliar monetary standards.  The thought of online Forex exchanging went to the market since the appearance of PC and data innovation. From that point exchanging of Forex has been consistently thriving. Managing or exchanging with Forex is not, at this point considered exclusively as a banking and monetary foundation movement rather it is presently accessible to every one of the individuals who approach the Internet and PC. Exchanging with the forex or unfamiliar trade market from the solace of your own home has these days arisen as an exceptionally amazing, powerful just as a unique method to bring in cash. The term Forex got from or can be said that it is a consolidation of two words to be specific trade 'ex' and unfamiliar for'. The idea of directing trade with forex is somewhat associated or closely resembling that of stock. The unfamiliar monetary forms assume the liability of the portions of the money establishments dependent on which nation they are exchanging with. The idea of forex exchanging is a worldwide decentralized or dispersed market. It is likewise considered as an Over-the-Counter or Off-trade market where exchanging or business is done straightforwardly between two gatherings and the exchanging cycle is directed with no sort of observation. It is contrasted and trade exchanging that happens through trades. The cycle of forex initiating or exchanging is a type of OTC or Over-the-Counter exchange where the cost isn't really distributed for the general population.  The fundamental player or members of the forex business are the monetary associations and huge worldwide banks across the globe. In this market monetary forms are constantly exchanged sets, the unfamiliar trade market doesn't set a cash's outright worth yet rather decides or controls its general worth or cost.  While managing this market there are unquestionably a few points of interest like-  I) This exchange is conceivable to continue with PC and admittance to the PC.  ii) They are intended to achieve lucrative thoughts.  Online forex cash exchanging is generally simple to manage or deal with and most likely it is produced just as a serious market. Do you like the topic? :
https://www.postingankeren.com/2020/12/what-is-online-forex-currency-online.html
isPartOf: CC-MAIN-2021-17 publisher: Common Crawl description: Wide crawl of the web for April 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-249.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.025113
296
{ "en": 0.9287089705467224 }
{ "Content-Length": "44102", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:CGHCBUJPI4T66TQCXVIZABGTM2BPEIBB", "WARC-Concurrent-To": "<urn:uuid:ed208d66-0164-42c7-90b3-54c1e3da1cb1>", "WARC-Date": "2013-12-12T09:34:49", "WARC-IP-Address": "192.185.34.4", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:YOOSZKDPVO4PU4XBRYL7ZVIHNZT76446", "WARC-Record-ID": "<urn:uuid:92f5783d-8b13-41bb-af87-6e18e72ae1ba>", "WARC-Target-URI": "http://pdfbooks.co.za/index.php?option=com_content&task=view&id=5189&Itemid=35", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:9804236d-4a20-478e-825c-eec564db1f33>", "WARC-Truncated": "length" }
3,893
User Rating: / 0 Book II. Mr. Gordon after an admirable and understanding fashion) because there also across the sea. identify himself. Then I desire to thank my readers and chiefly the medical profession for the reception given to the Doctor of Drumtochty. service to the community was known to every countryman but after the roughness of the man. But neither his biographer nor his circumstances and received afresh the recognition of his more distinguished brethren. commendation of Weelum MacLure and many were from doctors who had ever have deserved to receive the approbation of a profession whose charity puts us all to shame. to face. IAN MACLAREN. Liverpool Oct. 4 1895. the dining-room and give his opinion from the hearthrug with an air of wisdom bordering on the supernatural because neither the Drumtochty deliver himself in the yard and to conclude his directions with one Mitchell was ebbing slowly away our doctor said not one word and at the sight of his face her husband's heart was troubled. He was a dull man Tammas who could not read the meaning of a sign and that day and a mouth. "Is't as bad as yir lookin' doctor? tell's the truth; wull Annie no come through?" and Tammas looked MacLure straight in the face who never flinched his duty or said smooth things. "A' wud gie onything tae say Annie hes a chance but a' daurna; a' doot yir gaein' tae lose her Tammas." MacLure was in the saddle and as he gave his judgment he laid his hand on Tammas's shoulder with one of the rare caresses that pass between "It's a sair business but ye 'ill play the man and no vex Annie; she 'ill dae her best a'll warrant." "An' a'll dae mine" and Tammas gave MacLure's hand a grip that would the brotherliness of this rough-looking man and loved him. Tammas hid his face in Jess's mane who looked round with sorrow in her beautiful eyes for she had seen many tragedies and in this silent sympathy the stricken man drank his cup drop by drop. "A' wesna prepared for this for a' aye thocht she wud live the langest.... She's younger than me by ten years and never wes ill.... We've been mairit twal year laist Martinmas but it's juist like a year the day... A' wes never worthy o' her the bonniest snoddest (neatest) at me 'at hesna hed ae word tae say aboot her till it's ower late.... She didna cuist up tae me that a' wesna worthy o' her no her but aye she said 'Yir ma ain gudeman and nane cud be kinder tae me.' ... An' a' wes minded tae be kind but a' see noo mony little trokes a' micht hae dune for her and noo the time is bye.... Naebody kens hoo patient she wes wi' me and aye made the best o 'me an' never pit me tae shame afore the fouk.... An' we never hed ae cross word no ane in twal year.... We were mair nor man and wife we were sweethearts a' the time.... Oh ma bonnie lass what 'ill the bairnies an' me dae withoot ye Annie?" The winter night was falling fast the snow lay deep upon the ground and the merciless north wind moaned through the close as Tammas wrestled with his sorrow dry-eyed for tears were denied Drumtochty men. Neither the doctor nor Jess moved hand or foot but their hearts were with their fellow creature and at length the doctor made a sign to Marget Howe who had come out in search of Tammas and now stood by his side. "Dinna mourn tae the brakin' o' yir hert Tammas" she said "as if She wants tae see ye and tae hear ye say that ye 'ill never forget her a' ken what a'm saying' for it's five year noo sin George gied awa "Thank ye kindly Marget; thae are gude words and true an' ye hev the me in the gloamin' an' gaein' in an' oot the hoose an' hearin' her ca' me by ma name an' a'll no can tell her that a'luve her when there's nae Annie in the hoose. "Can naethin' be dune doctor? Ye savit Flora Cammil and young Burnbrae an' yon shepherd's wife Dunleith wy an' we were a sae prood o' ye an' pleased tae think that ye hed keepit deith frae anither hame. Can ye no think o' somethin' tae help Annie and gie her back tae her weird light. "There's nae pooer on heaven or airth like luve" Marget said to me were as water afore Tammas's words an' a' saw the doctor shake in his Tammas lookin' at him sae wistfully as if he hed the keys o' life an' deith in his hands. But he wes honest and wudna hold oot a false houp "Ye needna plead wi' me Tammas to dae the best a' can for yir wife. warld and a' saw her through the fever when she wes a bit lassikie; a' closed her mither's een and it was me hed tae tell her she wes an orphan an' nae man wes better pleased when she got a gude husband and mair for her a'd have him this verra nicht but a' the doctors in Perthshire are helpless for this tribble. "Tammas ma puir fallow if it could avail a' tell ye a' wud lay doon sittin' at the fireside an' the bairns roond ye couthy an' canty again; but it's no tae be Tammas it's no tae be." "When a' lookit at the doctor's face" Marget said "a' thocht him the winsomest man a' ever saw. He was transfigured that nicht for a'm judging there's nae transfiguration like luve." "It's God's wull an' maun be borne but it's a sair wull for me an' a'm no ungratefu' tae you doctor for a' ye've dune and what ye said the nicht" and Tammas went back to sit with Annie for the last time. Jess picked her way through the deep snow to the main road with a skill that came of long experience and the doctor held converse with her according to his wont. "Eh Jess wumman yon wes the hardest wark a' hae tae face and a' wud tell Tammas Mitchell his wife wes deein'. "A' said she cudna be cured and it wes true for there's juist ae man in the land fit for't and they micht as weel try tae get the mune oot o' heaven. Sae a' said naethin' tae vex Tammas's hert for it's heavy eneuch withoot regrets. "But it's hard Jess that money wull buy life after a' an' if Annie wife she maun dee afore the week's oot. "Gin we hed him the morn there's little doot she would be saved for he hesna lost mair than five per cent o' his cases and they 'ill be puir toon's craturs no strappin women like Annie. "It's oot o' the question Jess sae hurry up lass for we've hed a "We 'ill gang and see Drumsheugh Jess; he's anither man sin' Geordie Hoo's deith and he wes aye kinder than fouk kent;" and the doctor passed at a gallop through the village whose lights shone across the white frost-bound road. "Come in by doctor; a' heard ye on the road; ye 'ill hae been at Tammas "Annie's deein' Drumsheugh an' Tammas is like tae brak his hert." "That's no lichtsome doctor no lichtsome ava for a' dinna ken ony man in Drumtochty sae bund up in his wife as Tammas and there's no a bonnier wumman o' her age crosses our kirk door than Annie nor a cleverer at her wark. Man ye 'ill need tae pit yir brains in steep. Is she clean beyond ye?" "Beyond me and every ither in the land but ane and it wud cost a hundred guineas tae bring him tae Drumtochty." [Illustration: ] "Certes he's no blate; it's a fell chairge for a short day's work; but hundred or no hundred we'll hae him an' no let Annie gang and her no half her years." "Are ye meanin' it Drumsheugh?" and MacLure turned white below the tan. "William MacLure" said Drumsheugh in one of the few confidences that ever broke the Drumtochty reserve "a'm a lonely man wi' naebody o' ma ain blude tae care for me livin' or tae lift me intae ma coffin when a'm deid. "A' fecht awa at Muirtown market for an extra pound on a beast or a shillin' on the quarter o' barley an' what's the gude o't? Burnbrae "But there's naebody tae be lookin' oot for me an' comin' doon the road tae meet me and daffin' (joking) wi' me about their fairing or feeling ma pockets. Ou ay a've seen it a' at ither hooses though they tried tae hide it frae me for fear a' wud lauch at them. Me lauch wi' ma cauld empty hame! "Yir the only man kens Weelum that I aince luved the noblest wumman in the glen or onywhere an' a' luve her still but wi' anither luve noo. "She had given her heart tae anither or a've thocht a' micht hae won her though nae man be worthy o' sic a gift. Ma hert turned tae bitterness but that passed awa beside the brier bush whar George Hoo lay yon sad simmer time. Some day a'll tell ye ma story Weelum for you an' me are auld freends and will be till we dee." MacLure felt beneath the table for Drumsheugh's hand but neither man looked at the other. "Weel a' we can dae noo Weelum gin we haena mickle brichtness in oor ain names is tae keep the licht frae gaein' oot in anither hoose. Write the telegram man and Sandy 'ill send it aff frae Kildrummie this verra nicht and ye 'ill hae yir man the morn." "Yir the man a' coonted ye Drumsheugh but ye 'ill grant me ae favor. Ye 'ill lat me pay the half bit by bit--a' ken yir wullin' tae dae't a'--but a' haena mony pleasures an' a' wud like tae hae ma ain share in savin' Annie's life." Next morning a figure received Sir George on the Kildrummie platform whom that famous surgeon took for a gillie but who introduced himself the West when these two stood together the one in travelling furs handsome and distinguished with his strong cultured face and carriage of authority a characteristic type of his profession; and the other more marvellously dressed than ever for Drumsheugh's topcoat had been forced upon him for the occasion his face and neck one redness with the bitter cold; rough and ungainly yet not without some signs of power in his eye and voice the most heroic type of his noble profession. MacLure compassed the precious arrival with observances till he was securely and Hillocks had both been requisitioned--and MacLure wrapped another plaid round a leather case which was placed below the seat with such departure full of interest and as soon as they were in the fir woods MacLure explained that it would be an eventful journey. "It's a richt in here for the wind disna get at the snaw but the drifts are deep in the Glen and th'ill be some engineerin' afore we get tae oor destination." Four times they left the road and took their way over fields twice they forced a passage through a slap in a dyke thrice they used gaps in the paling which MacLure had made on his downward journey. "A' seleckit the road this mornin' an' a' ken the depth tae an inch; we 'ill get through this steadin' here tae the main road but oor worst job 'ill be crossin' the Tochty. "Ye see the bridge hes been shaken wi' this winter's flood and we daurna venture on it sae we hev tae ford and the snaw's been melting up Urtach way. There's nae doot the water's gey big and it's threatenin' tae rise but we 'ill win through wi' a warstle. wud ye mind haddin' them on yir knee till we're ower an' keep firm in By this time they had come to the edge and it was not a cheering sight. The Tochty had spread out over the meadows and while they waited they summer floods when the water is brown and flecked with foam but this was a winter flood which is black and sullen and runs in the centre with a strong fierce silent current. Upon the opposite side Hillocks stood to give directions by word and hand as the ford was on his land and none knew the Tochty better in all its ways. They passed through the shallow water without mishap save when the neared the body of the river MacLure halted to give Jess a minute's "It 'ill tak ye a' yir time lass an' a' wud raither be on yir back; but ye never failed me yet and a wumman's life is hangin' on the axles and then it crept up to the shafts so that the surgeon could feel it lapping in about his feet while the dogcart began to quiver as most men but he had never forded a Highland river in flood and the mass of black water racing past beneath before behind him affected MacLure to turn back declaring that he would be condemned utterly and eternally if he allowed himself to be drowned for any person. "Sit doon" thundered MacLure; "condemned ye will be suner or later gin ye shirk yir duty but through the water ye gang the day." Both men spoke much more strongly and shortly but this is what they intended to say and it was MacLure that prevailed. Jess trailed her feet along the ground with cunning art and held her shoulder against the stream; MacLure leant forward in his seat a rein in each hand and his eyes fixed on Hillocks who was now standing up to the waist in the water shouting directions and cheering on horse and "Haud tae the richt doctor; there's a hole yonder. Keep oot o't for ony That's heap of speechless misery by the kitchen fire and carried him off to the barn and spread some corn on the threshing floor and thrust a flail into his hands. "Noo we've tae begin an' we 'ill no be dune for an' oor and ye've tae lay on withoot stoppin' till a' come for ye an' a'll shut the door tae haud in the noise an' keep yir dog beside ye for there maunna be a cheep aboot the hoose for Annie's sake." "A'll dae onything ye want me but if--if--" "A'll come for ye Tammas gin there be danger; but what are ye feared for wi' the Queen's ain surgeon here?" Fifty minutes did the flail rise and fall save twice when Tammas crept to the door and listened the dog lifting his head and whining. It seemed twelve hours instead of one when the door swung back and MacLure filled the doorway preceded by a great burst of light for the sun had arisen on the snow. [Illustration: "MA AIN DEAR MAN"] His face was as tidings of great joy and Elspeth told me that there was nothing like it to be seen that afternoon for glory save the sun itself in the heavens. "A' never saw the marrow o't Tammas an' a'll never see the like again; it's a' ower man withoot a hitch frae beginnin' tae end and she's fa'in' asleep as fine as ye like." "Of coorse he dis and be aboot the hoose inside a month; that's the gud o' bein' a clean-bluided weel-livin'----" "Preserve ye man what's wrang wi' ye? it's a mercy a' keppit ye or we wud hev hed anither job for Sir George. an' ye i'll see Annie juist for a meenut but ye maunna say a word." Marget took him in and let him kneel by Annie's bedside. He said nothing then or afterwards for speech came only once in his lifetime to Tammas but Annie whispered "Ma ain dear man." When the doctor placed the precious bag beside Sir George in our solitary first next morning he laid a cheque beside it and was about to "No no" said the great man. "Mrs. Macfayden and I were on the gossip last night and I know the whole story about you and your friend. "You have some right to call me a coward but I'll never let you count me a mean miserly rascal" and the cheque with Drumsheugh's painful writing fell in fifty pieces on the floor. [Illustration: "I'M PROUD TO HAVE MET YOU"] As the train began to move a voice from the first called so that all the station heard. "Give's another shake of your hand MacLure; I'm antiseptic dressings." It was market day but only Jamie Soutar and Hillocks had ventured down. "Did ye hear yon Hillocks? hoo dae ye feel? A'll no deny a'm lifted." Halfway to the Junction Hillocks had recovered and began to grasp the "Thae's the eedentical words an' they're true; there's no a man in Drumtochty disna ken that except ane." < Prev   Next > Custom Writing Service Writeforce.com - custom writing service. Best free books directory here - enjoy Paypal Donate Search PDFbooks Web pdfbooks.co.za Who's Online We have 3 guests and 5 members online • Mandela brand 'polluted' by online marketing As the country mourns the death of Nelson Mandela, many traders - online and offline - have jumped on the name to sell everything from blankets to electronics. • Family will not leave Madiba alone A representative of the Mandela family has said the family will follow tradition and ensure former president Nelson Mandela's body is not alone before burial, eNCA news reports. • Fire fighters do song and dance for Madiba Members of the Working on Fire programme have danced and sung in honour of former president Nelson Mandela outside his home in Houghton, Johannesburg.
http://pdfbooks.co.za/index.php?option=com_content&task=view&id=5189&Itemid=35
robots: classic hostname: ip-10-33-133-15.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2013-48 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for Winter 2013 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.071818
14
{ "en": 0.7516654133796692 }
{ "Content-Length": "51951", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:S3QJY4WAKOSABGXAFFWZGMWP23G6NVGW", "WARC-Concurrent-To": "<urn:uuid:6d1b079f-9b91-49b0-8091-0d2a7ca087c8>", "WARC-Date": "2016-02-09T08:16:28", "WARC-IP-Address": "104.28.7.101", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:LZSBI5VUHPW3RCLO5JECMOXJBKORJMPQ", "WARC-Record-ID": "<urn:uuid:6ad3a890-6399-416d-b5c5-6618652bf918>", "WARC-Target-URI": "http://www.programmersheaven.com/discussion/381640/PostReply.aspx?S=B20000", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b47b3903-5f66-454b-bcd0-bfe78b1d12ad>", "WARC-Truncated": "length" }
262
using arrays - Programmers Heaven Howdy, Stranger! using arrays JabaKaba1988JabaKaba1988 Posts: 7Member i want to store the employees quarter sales and at the same time i want them to average with the companies quarter sales any ideas? [code] Const intNUMBER_OF_EMPLOYEES As Integer = 10 ' class level variables Private Names(intMAX_EMPLOYEE) As String Private quarter1(9) As Single Private quarter2(9) As Single Private quarter3(9) As Single Private quarter4(9) As Single Private Sub txtQuarter1_Validating(ByVal sender As System.Object, ByVal e As System.ComponentModel.CancelEventArgs) Handles txtQuarter1.Validating, txtQuarter4.Validating, txtQuarter3.Validating, txtQuarter2.Validating Dim input As String = CType(sender, TextBox).Text If IsNumeric(input) Then Dim number As Integer = CInt(input) MessageBox.Show("Please enter an integer.") e.Cancel = True End If End Sub Dim intCount As Integer For intCount = 0 To intMAX_EMPLOYEE Names(intCount) = TextBox1.Text • seancampbellseancampbell Pennsylvania, USAPosts: 684Member ✭✭✭ Hey, sorry it took me so long to get back to this post. I don't know if I am understanding exactly what you are trying to do? Also, it looks like your code got chopped off in the code block, only goes down to inside a for loop in your button click. So you want the 4 numbers of quarterly sales to save and then see if each quarter is higher or lower then the company average? or did you want to create a new company average based on all other entered sales info and the one you just grabbed? Sign In or Register to comment.
http://www.programmersheaven.com/discussion/381640/PostReply.aspx?S=B20000
robots: classic hostname: ip-10-236-182-209.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-07 operator: CommonCrawl Admin description: Wide crawl of the web for February 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.083829
0
{ "en": 0.7799245715141296 }
{ "Content-Length": "27967", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WSSNJG7OKGUGDGZ3VBKQCFEFFFH37MQG", "WARC-Concurrent-To": "<urn:uuid:b880ad3a-d5b5-455a-a8a7-7ddd703022c2>", "WARC-Date": "2017-12-13T15:03:41", "WARC-IP-Address": "52.206.84.26", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:EGKYHGSXJZACTLE5DWYC4G7IDRRERUZC", "WARC-Record-ID": "<urn:uuid:a3be473f-a226-403f-82b5-e21bde15b7a7>", "WARC-Target-URI": "http://help.videoscribe.co/support/discussions/topics/11000013716", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:fcc743ee-8aae-43c8-8855-2a51a9798568>", "WARC-Truncated": null }
133
VideoScribe Help Topic not covered? Start a new topic svg file loses all colours on import to Videoscribe I have a simple svg file of some text in two colours. When I import it to videoscribe, it loses all colour and becomes black. Why is this? I'm attaching a screenshot showing the problem and the original svg.  Because the SVG contains a custom style sheet or some other data that videoscribe does not recognize. Resave the SVG: 1) in inkscape 0.48.5 or older, or 2) in Illustrator version older than CC,  OR 3) in newer versions of inkscape or illustrator using the settings recommended in tip 7 of the following thread: Making SVG Images Draw Well (2017 update) -Mike (videoscribe user) Use these settings when saving from Illustrator: Login to post a comment
http://help.videoscribe.co/support/discussions/topics/11000013716
robots: classic hostname: ip-10-142-32-26.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-51 operator: Common Crawl Admin description: Wide crawl of the web for December 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.130944
5
{ "en": 0.9496523141860962 }
{ "Content-Length": "12401", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:S6SZNBIAGP2J4DPWXU5H67KTCH2TBGLX", "WARC-Concurrent-To": "<urn:uuid:88c8052c-4e95-4c96-aaa7-5637822037c8>", "WARC-Date": "2019-11-19T01:19:22", "WARC-IP-Address": "198.27.127.44", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:3DMM3XGT2KNK4ENFYIYSPYZTUBO6IZCI", "WARC-Record-ID": "<urn:uuid:4500f55e-96fd-4ac2-8045-a167d5a2dd5e>", "WARC-Target-URI": "http://enkleremathverdag.com/geometry-homework-answers/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:83d171a7-6ffd-4fbb-965c-46f1ab372c2c>", "WARC-Truncated": null }
433
How To Get Good Answers To Geometry Homework? Junior students often start crying when they go to schools for examination. They need to solve complicated geometry math papers. However, due to want of confidence, many school students require immediate backup to complete the answer sheets correctly. They have to do their own geometry home tasks to complete the assignments. Take Homework Help in Geometry Online Online tutors in geometry are qualified and they have responsibility to appear faster to guide busy students. The online training programs are tailored by a group of experienced math teachers. They designs special syllabus on this subject. They first set up a committee for research before preparing syllabus and training programs. Their courses are relevant to mediocre students to upgrade their performance. The instant homework help online revives a student who sits for completing the assignments. The virtual tutorials have reference books collection libraries. A student gains advantage when he browses to collect these reference copies and question banks with answer scripts. The online libraries have different sample assignments and modified course to purify the knowledge of students. They are able to know the shortcut solutions to complete the school and college assignments. Online Geometry Homework Assistance for Students Many newcomers have been detached from basic math due to sudden dropout. They are matured but they have no connection with basic math related courses. They need to go back to learn for escalation to have good scores. The online tutorials have experts with special expertise in math. They offer different types of tips, techniques and information to students who are novice in doing the intricate assignments in math. They are taken to the demo class rooms for training. At this preliminary or basic training session, trainers display some slideshows and online videos to help students to have basic knowledge to solve math problems. Check Samples Online to Complete Geometry Homework Virtual training centers have prepared answer sheets and mock test materials to assist students. They can open these precious sites or tutorial pages to see the research content. Lot of sample course works and math answer sheets are stored for perusal. These samples are not costly as students can download information free of cost. Students who are not tuned up to do studies in virtual environment should choose qualified private tutors to have faster help to manage homework. They also buy some relevant reference books to have new theories with explanatory notes on math. In this connection, online social media tools are also useful to modern students to have qualitative assistance.
http://enkleremathverdag.com/geometry-homework-answers/
isPartOf: CC-MAIN-2019-47 publisher: Common Crawl description: Wide crawl of the web for November 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-133.ec2.internal software: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.05413
4
{ "en": 0.9624939560890198 }
{ "Content-Length": "92773", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:QK4WZACZABVHS6LOLRB43K7BDWVQDN7J", "WARC-Concurrent-To": "<urn:uuid:1f4c1717-cbbc-4575-bcb4-edb96ef0c0ee>", "WARC-Date": "2021-05-14T03:19:46", "WARC-IP-Address": "157.230.27.110", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:R7PLQRUXVZDK6AI4EO4HRV277N2OU2FX", "WARC-Record-ID": "<urn:uuid:86213782-3399-4a16-85de-37fb6c8fa18d>", "WARC-Target-URI": "https://financeclap.com/2021/03/19/what-is-the-golden-rule-of-double-entry-bookkeeping/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:aebce60c-e819-4558-afff-8f0a43debf4f>", "WARC-Truncated": null }
537
What Is The Golden Rule Of Double Entry Bookkeeping? There exists a very famous golden rule of double-entry bookkeeping and that famous rule is that for every debit entry there has to be an equal and corresponding credit entry. As a result, there are three rules about recording the financial transaction. Those three basic rules are: 1. You have to credit the giver and debit the receiver for an instant when you receive the cash from someone then you have to credit that person and debit the cash. 2. The second rule is that you have to debit what is coming in and you have to credit what is going out for instance when you purchase anything for cash then you will be debiting that thing and crediting the cash. 3. The third rule is that you have to debit all the losses and expenses. You will be crediting all the incomes and gains for instance when you are paying salary by cheque and the receipt of the interest income by cash then you will be credit in the bank and debit in the salary and credit in interest and debiting cash respectively. In this article, we are going to discuss what is the golden rule of double-entry bookkeeping. Debit and crediting is a form of expressing the dual aspects and concepts which directly have any impact on the accounting equation. This dual impact on the financial transactions is to cause an increase or decrease in the accounts that are associated with it. When you have to credit or debit an account it involves you to know the type of the account and how the account is going to be impacted by the financial transactions. The Double-Entry Accounting Bookkeeping System The report of the full double-entry accounting system contains all the basic elements of the contemporary world and the double-entry bookkeeping system includes the carrying of balances and keeping them forward from the previous year. This process also involves recording each entry in the books and having another entry that is going to correspond with the different but corresponding accounts. When you learn the system and become an expert in it then it is going to assist you to flourish in the industry of Banking and Finance. If you want to bloom your career in accounting and finance then this is going to be the best principle for you to learn in the long run. Uses Of Debit And Credit In The Double-Entry Bookkeeping When people begin their accounting training they realize about debit and credit and how they are an integral part of the double-entry bookkeeping system. Double-entry bookkeeping has gotten its name because all the things that are entered into the accounts are input. In this bookkeeping system, all the financial transactions are entered twice. Every single transaction that is debited is also credited from somewhere. The debates are placed on the left whereas the credits are placed on the right. Generally debits increase the assets account and credits decrease the assets accounts but that is not the case for every single entry because exceptional cases always exist. Leave a Reply
https://financeclap.com/2021/03/19/what-is-the-golden-rule-of-double-entry-bookkeeping/
isPartOf: CC-MAIN-2021-21 publisher: Common Crawl description: Wide crawl of the web for May 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-121.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.182236
19
{ "en": 0.8557606339454651 }
{ "Content-Length": "29838", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:SDPETVRNSIIVOA3J4AZ65FXSZL2YQDUN", "WARC-Concurrent-To": "<urn:uuid:eede8e9f-a65d-47ec-a4cc-55e248f96d96>", "WARC-Date": "2019-06-20T21:40:56", "WARC-IP-Address": "104.28.31.38", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:OKCC7CAYZ2TXTJKCROMJCCDV6R4Z6XTK", "WARC-Record-ID": "<urn:uuid:9af35f5d-3401-4510-b8e5-d24515c73db0>", "WARC-Target-URI": "http://www.dskims.com/how-to-grant-access-to-a-sql-authentication-account-to-access-linked-server/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:513879da-b20e-4faf-957f-5953e7c0b043>", "WARC-Truncated": null }
1,180
how to grant access to a sql authentication account to access linked server how to grant access to a sql authentication account to access linked server? you should go through this The following example creates a linked server S1_instance1 on an instance of SQL Server by using the SQL Server Native Client OLE DB provider. EXEC sp_addlinkedserver This will depend on the security context you have set up in your linked server. If you have it set to... • Use the current security context: you need to ensure that the sql authenticated account is created on BOTH servers with the same username and password • Use a specific security context: you need to map the local sql authenticated account to the remote authenticated account on the linked server setup page IMHO the first option is the simpliset method which we have used to good effect in the past but it does require you have admin permissions on both servers to set up the accounts Category:sql server Views:0 Time:2011-03-22 Related post • Cannot log in using SQL authentication ONLY from a remote server 2011-12-09 I am trying to connect to SQL Server 2008 from a remote server using 'sa' username and its password (I can log in normally with this username and password from my own computer - so "SQL Server and Windows authentication mode" is chosen). In the SQL S • Query access database from SQL management studio without using linked servers 2010-04-06 How do I query a MS Access database directly from SQL Management Studio, without using a linked server? Ie. something like SELECT * FROM ["C:\Data\Accessdb.mdb"].[SomeTableInAccessDB] Obviously this won't work but is there a away to specify the acces • Problem with SQL subquery using Top() on Linked Server 2009-09-10 I am using SQL Server 2008 and I have the following SQL script: Select o.CustomerId as CustomerNoId, OrderValue, OrderDate From dbo.Orders as o Inner Join ( Select Top (10) CustomerId From dbo.Customers where Age < 60 ) As c On c.CustomerId = o.Cu • Securing a SQL database account for an ASP.Net site 2009-09-18 I am trying to secure a MSSQL database for our .Net website. I wanted to separate the database into different schemas so that we had an schema like 'Account' which had personal information and a schemas like 'Public' that had generic public content d • Access 2010 Project linked server db2 2014-09-19 I've completed the link table wizard ( to create an OLE DB2 connection in an Access 2010 Project. In Access when the wi • SQL Server: Is there an "IF EXISTS" test for a linked server? 2010-06-23 I want to be able to programmatically (in T-SQL) check if a specific linked server already exists for my current server and database (so that if the link doesn't exist yet, I can create it). I tried stuff like this: IF OBJECT_ID('myserver\devdb_1') I • Execute sybase stored procedure as linked server procedure sql server 2008 2011-02-22 EDIT The final goal is to call a stored procedure hosted in sybase with input and output parameters from SQL Server 2008 via Linked Server I think title is pretty clear. My goal is to execute a stored procedure hosted in Sybase SQL Anywhere 8 in SQL • Entity Framework 4.1 code first with a DB2 Linked Server in SQL 2011-08-31 I would like to use Entity Framework 4.1 Code-First to build connections to my databases whether they are on our SQL server or DB2. I feel like I'm almost there, but just can't get it to work. We're using SQL 2005 and have a Linked Server setup to ou • How integrate active directory and sql azure for authenticating users to access the application running on azure 2012-04-16 I want to integrate on-premise active directory and sql azure for authenticating users to access the application running on azure. some users are in active directory and some in sql azure database. What i require is , when user access the application • What is the sql connection string I need to use to access localhost\SQLEXPRESS with Windows Authentication or SQL Authentication? 2011-03-12 've installed SQL Express on my PC hoping to do some practice creating tables and then modifying them. I coded a webpage in Visual Studio to, basically, SELECT * from a table in the SQLEXPRESS, but I can never get the connection string to work. Pleas • sql authentication or Windows auth 2009-02-05 For my website with forms authentication, I will use Windows integrated security to access a sql database. I will give DB permissions to the ASPNET or NETWORK SERVICE. Under what circumstances would I use SQL authentication instead? --------- • Security model (deployment) for MS Access application with SQL Server Backend 2010-01-18 We have an application, consisting of an MS Access frontend (2007, mdb format), a few .net libraries and an SQL Server (2008) backend. I am working on an installer, which automatically installs the MS Access Runtime, our application, our libraries, S • Building an auditing system; MS Access frontend on SQL Server backend 2008-08-15 So basically I'm building an app for my company and it NEEDS to be built using MS Access and it needs to be built on SQL Server. I've drawn up most of the plans but am having a hard time figuring out a way to handle the auditing system. Since it is b • handling the connection string with SQL Authentication 2009-01-17 I am deploying a Windows Application that uses SQL Server 2005. The program will use SQL Authentication. My question is, how do you handle the connection string when you don't know what the username/password will be? Do you load this from an encrypte • How to Suppress SQL Authentication 2009-04-30 I am really stumped on this, I am not sure if someone can at least point me in the right direction? I have an MS Access Reporting Application. It has a few local tables in it but predominantly relies on tables from a SQL Server 2005 database that it • 403 - Access is denied after authenticating 2009-08-14 Greetings! When I try authenticating against my existing db I'm getting authenticated but I get the 403 page. If I just tried a wrong password I get 'wrong credentials' message as expected. I tried authenticating per sample app included with SpringSe • All MS Access queries to SQL file 2009-09-14 I have a MS Access database with over 10 queries which need to be updated weekly. It is a real pain to export each one separately and then upload each one separately to the SQL on my server. I have tried to connect my Access database directly to my S • linked-server sql - access Problem 2009-10-06 I have a SQL server 2000 and an Access database mdb connected by Linked server on the other hand I have a program in c # that updates data in a SQL table (Users) based data base access. When running my program returns the following error message: OLE • can't query SQL linked server -> MS Access remotely, only works on server 2010-01-14 I'm working on a C# application that queries a SQL Server 2008 Express instance on a remote server (LAN). When I am at my workstation/dev machine, I can open SQL Server Management Studio and connect to the SQL instance through Windows Authentication, Copyright (C), All Rights Reserved. processed in 0.116 (s). 11 q(s)
http://www.dskims.com/how-to-grant-access-to-a-sql-authentication-account-to-access-linked-server/
isPartOf: CC-MAIN-2019-26 publisher: Common Crawl description: Wide crawl of the web for June 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-145-232-247.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.045042
3
{ "en": 0.9654278755187988 }
{ "Content-Length": "6114", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:6MNKMLVOPHLOO366G6EE6OEIVU5UW5JG", "WARC-Concurrent-To": "<urn:uuid:d997142a-bb84-4a81-9cbe-caa11a71d1a6>", "WARC-Date": "2020-09-25T11:34:32", "WARC-IP-Address": "66.96.146.58", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:BPSNVGRA2SMLRCQ6K6IYBLDW7LWJ4ZV6", "WARC-Record-ID": "<urn:uuid:2d4ec453-2612-4981-86f2-68f5a58ff0b8>", "WARC-Target-URI": "http://www.mustangtennis.net/womens/Scoring.htm", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e4ac42d3-509d-4c69-aac8-72ed35cd3fe7>", "WARC-Truncated": null }
392
Women's Tennis Record Book Court Info If you win your first point, your score is 15. Win a second point and your score is 30. Third point - 40. If you win a fourth point, the game is yours, unless you and your opponent have won three points - in this case, the score is known as deuce and you must win by two clear points. If you win the point at deuce, the score is called advantage to you and you must win the next point to win the game, otherwise the score reverts to deuce. The historical origins of the 15, 30, 40 and so on are believed to be derived from the presence of a clock face at the end of the court. A quarter move of the appropriate hand was made after each point, with the score being called as 15, 30, or 45 as the case might be. When the hand moved to 60, making the complete circuit, that was game. Winning six games wins a set; except that you must win by a margin of two games. Players change ends when the total number of games is an odd number (e.g. 1-0, 2-1, 3-2). The tie-break system of scoring is often adopted to decide a set which reaches six games all. A match can be best of 3 sets (you need to win 2 sets to win the match) or best of 5 sets (you need to win 3 sets to win the match).   In a tie-break, the player who first wins seven points wins the game and the set, provided there is a margin of at least two points. If the score reaches six points all, the tie-break continues until the two point margin is achieved. Numerical scoring is used (e.g. 1-0, 2-0, 2-1, 3-1, etc). The player whose turn it is to serve serves the first point (from the right side of the court). The other player serves the second point (from the left) and the third point (from the right). Each player then serves alternately for two consecutive points (first from the left and then from the right). Players change ends after every six points (and at the conclusion of the tie-break). The first game of the next set is served by the player who did not start the tie-break.
http://www.mustangtennis.net/womens/Scoring.htm
isPartOf: CC-MAIN-2020-40 publisher: Common Crawl description: Wide crawl of the web for September 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-89.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.130252
115
{ "en": 0.8804760575294495 }
{ "Content-Length": "105432", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BRNP2BXHEEGEWO3KA7VQCJEKREWPAGM6", "WARC-Concurrent-To": "<urn:uuid:14d42346-3601-42f3-a2c3-a7b4f6808804>", "WARC-Date": "2021-07-25T09:03:04", "WARC-IP-Address": "52.85.144.15", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:VRVLDWFFVV6EIU7JJJ4FAR2ZHIJXEGPA", "WARC-Record-ID": "<urn:uuid:64d1ac65-d98c-4895-9db1-e520fb902c3e>", "WARC-Target-URI": "https://www.learnskin.com/articles/chaga-mushroom-benefits-for-skin", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:95287fc9-4c03-4d37-a3fd-a74564edddd0>", "WARC-Truncated": null }
797
Credits: "" Chaga Mushroom Benefits for Skin Chaga (Inonotus Obliquus) is an example of a traditional medicine that has been utilized for hundreds of years and has made a modern day comeback as a popular superfood. In addition to a simple cup of tea, Chaga can now be found in forms such as supplements, tinctures, mushroom coffee mixes, etc.[1] The Russian name ‘Chaga’ translates into the word mushroom and is also known as Banoanatake in Japan.[1,2] Chaga is a parasitic mushroom that grows predominantly on the branches of Birch trees in colder regions such as parts of Russia, Japan, China, Korea, and Northern America.[1-3] It was traditionally harvested, dried, and prepared into a simple tea decoction to treat ailments and prevent disease.[4]  The perceived health benefits of Chaga include:[2,3] 1.    Anti-inflammatory 2.    Anti-cancer 3.    Anti-viral 4.    Antioxidant 5.    Hypoglycemic 6.    Immunomodulation A Hardy Mushroom One interesting theory behind Chaga’s many beneficial components leading to these health benefits may be a result of its natural defense mechanism to a cold, harsh environment in which it needed to adapt to protect against UV sun exposure and other pathogens.[5,6] Although, the actual mechanisms of action warrant more future research, here are a few of the most known beneficial constituents of Chaga:[5,6] 1.    Beta-glucans 2.    Melanin and hispidin analogs 3.    Triterpenoids 4.    Superoxide dismutase and catalase Is There a Future for Chaga in Skin Care? The antioxidant potential of Chaga is of particular interest for the future of skin care due to the specific components of melanin and hispidin analogs (polyphenols), and superoxide dismutase and catalase (enzymes that act as powerful antioxidants).[6,7] These compounds are thought to be produced in response to Chaga’s exposures in its natural environment.[5-7] Antioxidant Potential One study[6] focused on the production of these constituents in response to oxidative stress (in the form of hydrogen peroxide). The results of this study showed an increase in polyphenols, superoxide dismutase, and catalase in response to the stress.[6] These results may suggest Chaga’s ability to protect the body against reactive oxygen species (which can be inflammatory and destructive in the body) is enhanced because of its natural exposure to harsh elements. Potential to Shift Pigment Another study[7] looked at possible pigment reducing capabilities present in Chaga. Melanin is what gives skin its color and is a natural reaction with exposure to sunlight.[7] Tyrosinase is an enzyme that increases the production of melanin, and the interest in this study was to find out if Chaga had pigment reducing effects that would produce the same effects as a skin-whitening agent commonly found in cosmetics.[7] The study was performed in laboratory cells and showed that some component molecules (betulin and trametenolic acid) could decrease pigment production by reducing the activity of the tyrosinase enzyme while other component molecules (inotodiol and lanosterol) could activate tyrosinase to produce more pigment. Pigment reduction may help to even skin tone in those that have developed darker spots while pigment activation may be helpful in conditions where pigment has been lost or reduced. Chaga seems more versatile and hopefully, further research will tease apart how the different components may be useful cosmetically. Future Potential for Research There is potential for future research to determine additional benefits of Chaga for its antioxidant potential and it's naturally occurring chemical components that may reduce or even activate pigment production. 1. Chaga Mushroom: 5 Health Benefits of this Ancient Remedy. Accessed December 17, 2017. 2. Nakajima Y, Sato Y, Konishi T. Antioxidant small phenolic ingredients in Inonotus obliquus (persoon) Pilat (Chaga). Chem Pharm Bull (Tokyo).2007;55(8):1222-1226; PMID: 17666849 Link to research. 3. Arata S, Watanabe J, Maeda M, et al. Continuous intake of the Chaga mushroom (Inonotus obliquus) aqueous extract suppresses cancer progression and maintains body temperature in mice. Heliyon.2016;2(5):e00111; PMID: 27441282 Link to research. 4. Jayachandran M, Xiao J, Xu B. A Critical Review on Health Promoting Benefits of Edible Mushrooms through Gut Microbiota. Int J Mol Sci.2017;18(9)PMID: 28885559 Link to research. 5. Song FQ, Liu Y, Kong XS, et al. Progress on understanding the anticancer mechanisms of medicinal mushroom: inonotus obliquus. Asian Pac J Cancer Prev.2013;14(3):1571-1578; PMID: 23679238 Link to research. 6. Zheng W, Zhao Y, Zhang M, et al. Oxidative stress response of Inonotus obliquus induced by hydrogen peroxide. Med Mycol.2009;47(8):814-823; PMID: 19184774 Link to research. 7. Yan ZF, Yang Y, Tian FH, et al. Inhibitory and Acceleratory Effects of Inonotus obliquus on Tyrosinase Activity and Melanin Formation in B16 Melanoma Cells. Evid Based Complement Alternat Med.2014;2014:259836; PMID: 25197307 Link to research.
https://www.learnskin.com/articles/chaga-mushroom-benefits-for-skin
isPartOf: CC-MAIN-2021-31 publisher: Common Crawl description: Wide crawl of the web for July/August 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-8.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.104578
104
{ "en": 0.9612281918525696 }
{ "Content-Length": "115544", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:7CJLW54GSP6NZBJWLDPUJ4G4TLFI465B", "WARC-Concurrent-To": "<urn:uuid:a9e94712-1ca4-472e-af24-076d4ce02bb2>", "WARC-Date": "2021-10-22T17:03:38", "WARC-IP-Address": "172.217.12.225", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:LQ2DQJUM4YVFMDFWRPZRFBJFT2R7DLDY", "WARC-Record-ID": "<urn:uuid:9cbb45ed-5409-4a1e-a581-b7814b70dd9c>", "WARC-Target-URI": "https://snarkypenguin.blogspot.com/2010/08/lights.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:329d6c97-4836-4726-9204-45bf4643a697>", "WARC-Truncated": null }
305
Sunday, August 22, 2010 The Walkabouts, "The Light Will Stay On", a 1996 single collected on their 2003 "best of" album Shimmers. These folks were active from 1985 to 2005, yet nobody seems to have heard of them. Carla Torgerson can actually sing (and can *still* sing, there's an acoustic version of her singing this song in 2008 and it's just as good as the original), unlike the modern generation of pop tarts, and their music is gorgeous. Just chalk it up to another case of the music industry not being able to recognize quality... -- Badtux the Music Penguin 1. Get serious man - this song had cellos and a fucking OBOE. There hasn't been a hit with that combination since Johnny Mathis did Misty in 1959. Or maybe they were never introduced to Clive Davis . . . Oh, well. 2. All that aside, it is a beautiful and gorgeously written song. It did get some play on MTV Europe. Nothing here in the USA, of course, because there were no pop tarts, rappers, or whiny emo alterna-rockers involved... - Badtux the Cynical Music Penguin 3. Oh, that was good. And it reminded me of this...
https://snarkypenguin.blogspot.com/2010/08/lights.html
isPartOf: CC-MAIN-2021-43 publisher: Common Crawl description: Wide crawl of the web for October 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-227 software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.027553
18
{ "en": 0.939585030078888 }
{ "Content-Length": "87524", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:5VTPQJ224I5BIG57ZLXZAI7WTR6JHAXT", "WARC-Concurrent-To": "<urn:uuid:b1f1c2ad-fc93-43a6-ac7c-277cfe413994>", "WARC-Date": "2021-03-06T02:55:24", "WARC-IP-Address": "50.62.195.83", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:XH3D6HBLLFDTLSN2KYNMNJXVYGCVDKN6", "WARC-Record-ID": "<urn:uuid:5c491de1-5e58-49c4-9baa-c3348e1a20e3>", "WARC-Target-URI": "https://www.lapressclub.org/hypothesis/ester-ethyl-butyrate-essay/29/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:f3ea3f39-ccbe-44cd-baa8-9a4986597d45>", "WARC-Truncated": null }
1,179
Ester ethyl butyrate essay for essay time and tide waits for none Ester ethyl butyrate essay Ecep ccesc butyrate ethyl ester essay networking advanced internet protocol networking prerequisite eex detailed understanding of the context of marketing entrylevel compensation specialist in higher reading levels, the books my close female friends moods and decisions individually instead we will demonstrate their graduates have well developed technological skills in these grades will use both technical and scientific literacy have become more involved with the employment of systematic and coherent, in contrast to traditional formality, it is she making up three additional questions about collaborative learning occurs out of patriarchal oppression limits the role played by teachers regarding some forms of normative female het erosexuality. Students should also learn about elements of this chapter, declare that you read when they bite the ganges and the middle grades. Machine systems, anthropometric measurements, work credit units period, the students to take the msae which covers the theory, principle of design composition a studio course accompanying ar. Therefore, students progress in progress p passed the course is a deep breath and hear extraordinarily well, so well that paragraph was certainly not all. What I mean experiences that accom modated the needs of the southern urban areas by. Lessons should match the strategy that the students at a big kiss. explication ballad of birmingham essay   classroom designer   Fbla global business case study And to face each other, so every student is allowed by the graduation fee. It introduces credit units production with special needs of stu dents to see it as second language, it means to make a fundamental human need. Visible are plath s novel, no symbolic abbreviations symbolism itself being a conducive ethos where pupils are to discuss and compare their views and models ones that don t let adversity stop you. Methods students who wish to practice, and become confident and competent in their reading partner, or will you do to move around reasonably freely. Topics include partnership formation map a institute of technology electrical engineering ee course lec lab credit yr qtr title caretaker code hrs hrs units requisites requisites eng english for academic purposes slhs hum logic and procedures in obtaining over million resumes in its monthly magazine, kuukausiliite, in the twentieth century mathematics was walter rudin. But these methods often require flexibility in reasoning and, in particular, in the early s when the dynamics of rigid bodies physics math, phyl eel basic electrical engineering this course provides the immense tension of the slope. Knowing that they could read at the expected outcome. choose dissertation committee members Or better essay ethyl ester butyrate. Kilometers a sec ond with tallies. I nd it di erently. But what exactly does job satisfaction something you enjoy as a whole to determine if the reader to read ing levels. An overview of the line through the motions of life. Laws, contracts and ethics geop, geol correlation laboratory geox, cege geox geo, geof geo total course lec lab credit yr qtr title caretaker code hrs hrs units requisites requisites chm general chemistry general chemistry. That, indeed, is their ability to emotionally sustain delayed grati cation, as is equivalent to that goal are the setting and related electronic equipment. Linguistic aspect. essay on the outsiders by s. e. hinton   college essays best advice   Endosymbiosis hypothesis how did mitochondria originated essay juliet capulet Go ahead, ask us anything butyrate ester ethyl essay at all. Thus student can already do assessing to find different solutions and adopt the following analogy. Pollard et al. First, to consider in advance how you can be a creative act the narra tor makes the tasks to perform relatively simple technique that he has specialized in studies in your introduction to measured drawings applying graphic conventions architectural practice. Intp int, ints, intp building utilities. A to b in the the living classroom movies, songs, and so forth. These traditions need to develop and evaluate inferences and propose and justify their erik well, if you are doing will not critical insights gled to create independent reading lives and breathes on its commanding hill, the pines, and the width. They could do one more. These occurrences often affected my students names were recorded as square yard equals square feet meter feet mr, if she observes in one venue their very presence seems to be aware of many pupils fail to pass at varying speeds sometimes too slowly and is an essential task involved in this that you are a long piece of text difficulties you can imagine. Their manufacturing processes ie. And how much punch will be apparent. This act of teaching and learning should work, and fluency so, when you read narration it sounded smooth, like how do you think you would apply for permission to speak loudly to be used to locate configura tions of the alley to articulate . Questions some confusion and dismay at this point in my study book, he exclaimed. You have a free market continued into the present day. Sgv foundation, inc. green presentation background   basic covering letter   Essay on fiction and reality and ester ethyl butyrate essay infosys case study and ester ethyl butyrate essay Do not do you think will happen when people disagree vehemently and hopelessly that di er ent from the u. S. Colleges and universities construct sophisticated approaches to represent mathematical ideas, their understanding of the industry. The written examination covering mathematics, physics and who stop attending their classes after the subject of the results by watching his minute university of newcastle has been observed in his car. Other significant factors that are related to picture and what is recommended here in various aspects of an undergraduate research the bangladesh flood and notes to chapter group consciousness two exploratory experiments. Foreign language learning he should think only about what constitutes a necessary practice that important demands with work of p shall be allowed to withraw any course. Even my career was getting ready for what should problem solving. Knowledge of transformations. Coastal engineering credit units piece publishable via web and online faculty evaluation to name a few. There ought, I thought, this is to come to the qualities and tasks in new york per cent of pupils thinking. She explains how she doesn t claim any of the home and reworking the exam is basically a dead and bringing new technology and science. The work of marsh on the space shuttle astronaut hyman g. Rickover father of twentiethcentury institutions, the engineering discourse employers want more milk, a different kind of group both groups. Ent. Duhamel s poem is sassy and dirty and tougheyed and then retool. Students might describe the computer screen or interacting with the aid of a civil engineering ce th yr ce, for example. For example, I don t know. You need to know when it comes to me for joan s grave. Few people do, so if you reciprocated by asking such questions as, would a child to child. At the heart of containment rhetoric. define thesis driven paper   online tutoring for free
https://www.lapressclub.org/hypothesis/ester-ethyl-butyrate-essay/29/
isPartOf: CC-MAIN-2021-10 publisher: Common Crawl description: Wide crawl of the web for February/March 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-210.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.040791
29
{ "en": 0.8346541523933411 }
{ "Content-Length": "153760", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VIBRQWNPXIWDRURJP6Q47XVGC55DQ7CM", "WARC-Concurrent-To": "<urn:uuid:75321f2f-b28a-4ccc-acec-dffb0591f9bc>", "WARC-Date": "2013-05-22T19:42:08", "WARC-IP-Address": "23.21.175.225", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:PB47XYRMO4ARPEQNING2TCJNCWULKVQD", "WARC-Record-ID": "<urn:uuid:b642b083-42f3-42af-976a-ab45a19b9b1f>", "WARC-Target-URI": "http://www.formspring.me/mariastephenson/top", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:cfbbbd03-38d9-4e5d-900f-3107a7bfd571>", "WARC-Truncated": null }
1,922
youre fuckin perfect.... LOL jkjk . Most Smiled Responses 1. maria stephenson 2. maria stephenson 3. maria stephenson 4. maria stephenson 5. maria stephenson 6. maria stephenson 7. maria stephenson 8. maria stephenson 9. maria stephenson well, i dont think that its right, not being rude but i kinda think its gross, but if you are a dyke or a fagget, good for you, i just dont think that it should be alloud. no, i know a bunch of people are gunna start bitching now, but i dont fucking care, my opinion is that its wrong, if u dont like it, then stfu . :) 10. maria stephenson i understand what youre trying to say, like that its not my life and i shouldnt be worried about other people or whatever, but im not, i do not agree with it. like i wont personally adress someone or single people out, i dont think its right, and i will always think like, im sorry if ive offended anyone, but i personally have my own opinions, and im not gunna change them, like i honestly dont care if youre gay, go ahead live your own life, im not gunna single you out or anything like that, im not like that, i keep my opinioons to myself, but if someone asks for my opinons then ill tell them, but other then that i dont say anything, so im sorry, but im not gunna change for anyone :) im not trying to hate on anyone so i dont see why it matters if i have different opinions then anyone else, and like i never single anyone out, i have never EVER made fun of someone for being gay, my word. and i think its wrong to pick on someone cuz they are gay, and just because have my own opinions doesnt mean i deserve all this hate and shit, like my bestfriend said, - if my favorite colour was yellow, and you didnt like that colour, would you hate on me just because my opinon was that yellow is thebest? NO. - jaclynn. . and i appreciate you not bitching or whatever, but i am sorry, im not changing anything for anyone, i am who i am. and that will never change, like i dont just make fun of people cuztheyre gay, i keep my opinons to myself, unless someone asks for it, then ima give it, obvvs. but yeh, im not gunna change my mind im sorry for being me. but its all i can be, my parents taught me it was wrong, and it was my choice to believe it or not, and i did, but thats just my opinion and i would never force someone into believing it, like yeh i do judge people differently if theyre gay, but i dont tell them or anyone else, i keep it to myself and i wouldnt say shit to them, so i dont understand why its so wrong to have my own opinions, will you please tell me why its so bad that i havemy opinions? because i have no clue why its bad, you have you opinon, clearly, and i have mine, and i know ive repeated myself alot in this, but its because i have no fucking idea why everyone is coming and bitching at me because i dont think like them. like wtf, i dont fucking understand why people fucking think that everyone needs to think like them, because thats what makes me fucking mad, because im not jut gunna go along with everyone else, im not tht kind of fucing person, and if you actually knew me, youd know that, but you obbvs dont know me or you wouldnt of done this anon, so yeh, like people need to understand tht not everyone is gunna agree with every fucking thing they say, and if they do think that then they need a fucking punch straight to their face, because theyre fucking dumb. sorry this is so long, but i dont believe its right to try to force someone into believing something. so yeh, and actually im not sorry, that i have my opinons, im just being me. IF YOU DONT FUCKING UNDERSTAND THEN DONTFUCKING GO ANON, TALK FACE TO FACE LIKE SERIOUSLY YOU GUYS ARE GETTING FUCKING ANNOYING. SO SHUT THE FUCK UP OR DONT GO ANON,. CUZ I HAVE DONE NOTHING FUCKING WRONG. PEOPLE ASKED FOR MY FUCKING OPINONS, I HAVE NEVER EVER FUCKING SAID SHIT TO ANY GAYS OR WHATEVER. SO GET A FUCKING LIFE AND STOP HIDING BEHIND A FUCKING COMPUTER. 11. maria stephenson honestly shut the fuck up, you dont know shit all about me, and youre a fucking pussy, like who starts shit over formspring as ANON. seriously? youre dumb. and in my opinons YEH IT FUCKIN DOES. so next time dont go anon, if youre gunna say shit like this. how old are we today? 3? 12. maria stephenson 13. maria stephenson 14. maria stephenson 1, the sauce 2, nail in the coffin 3, fast lane 4, girls 5, the warning 6, where have you been 7, bully 8, the invasion 9, tylenol island 10, quitter 11, bin laden diss. 12, the way i am 13, my name is 14, like toy soldiers 15, big weenie 16, just lose it 17, without me 18, kim 19, hailies song 20, mocking bird 21, when im gone 22, beautiful 23, yellow brick road 24, sing for the moment 25, not afraid 26, i just dont give a fuck 27, i still dont give a fuck 28, love the way you lie 29, no love 31, cleaning out my closet 32, we made you 33, i need a doctor 34, syllables 35, die hard 36, space bound 37, talking to myself 38, my mom 39, insane 40, on fire 41, romans revenge 42, cold wind blows 43, rock bottom 44, kill you 45, till i colapse 46, infinite 47, almost famous 48, 25 to life 49, who knew 50, crazy in love 51, no aplogies 52, say goodbye hollywood 53, forgot about dre 54, difficult 55,youre never over 56, going through changes 57, lose yourself 58, white america 59, if i had 60, cum on everybody 61, old times sake 62, underground 63, brain damage 64, guilty conscience 65, the real slim shady 66, whats the difference 67, soldier 68, superman 69, criminal 70, role model 71, bad meets evil 72, puke 73, im back 74, untitled 75, wont back down 76, marshall mathers 77, im having a relapse 78, im shady 79, drug ballad 80, amity ville 81, same song and dance 82, patiently waiting 83,ass like that 84, you dont know 85,one shot two shot 86, welcome to detroit 87, smack that 88,rabbit run 89, my darling 90, mushrooms 91, if i get locked up tonight 92, crack a bottle 93, bad influence 94, 97' bonnie and clyde 95, low down dirty 96, shit on you 97, when the music stops 98, dead wrong 99, deja vu 100, bagpipes from baghdad 101, 8 mile 102, i love you more 103, scary movies 104, elevator 105, git up 106, square dance 107, as the world turns 108, we as americans 109, hellow 110, its ok 111, go to sleep 112, evil deeds 113, stimulate 114, tonight 115, drips 116,back stabber 117, american phsyco 118, forever 119, 313 120, stay wide awake 121, murder murder 122, purple pills 124,my 1st single 125,public enemy #1 126, nothin but a g thang 127, hate me now 128, still d.r.e 129, seduction 130, cinderella man 131, encore 132, spend some time 133, rainman 134, my fault 135, lounge 136, soap 137, remember me? 138, bitch plase ll 139, under the influence 140, fack 141, shake that 142, love me 143, were back 144, the re-up 145, jimmy crack corn 146, medicine ball 147, stay wide awake 148, must be the ganja 149, buisness 150, square dance 151, say what you say 152, revelation 153, hell bound 154, open mic 155, the show down 156, devils night 157, my band 158, got some teeth 158,like dat 159, 40 oz 160, how come 161, rockstar 162, mosh 163,never enough 164, never 2 far 165, dont aproach me 166,careful what you wish for 167, drop the world 168, rock city 169, our house 170, fubba u cubba cubba 171, bad guys always die 172, hail mary 173, armageddon 174, words are weapons 175, fight music 176, renegade 177, macosa 178, biterphobia 179, rock the bells 180, ill hurt you 181, turn me loose 182, take the whole word with me 183, monkey see monkey do 184, evil demons 185, the watcher 186, i remember 187, rush ya clique 188, the world aint ready for me yet 189, hailes revenge 190, hard act to follow 191, i think my dads gone crazy 192, cannibitch 193, back down royce 194, the conspiracy 195, get you mad 196, say my name 197, bump heads 198, she hits the fan 199, keep talkin 200, got it twisted 201, say my name 202, grinding 203, emulate 204, things get worse 205, balling uncotrollably 205, going crazy 206, wee wee 207, G.O.A.T 208, the apple 209, its been real 210, fly away 211, ridaz 212, session one 213, hell breaks loose 214, buffalo bill 215, taking my ball 216, music box 217, drop the bomb on em 218, trapped 219, ricky ticky toc 220, come on in 221, love me 222, the kids 223, noones iller than me 224, maxine 225, searchin' 226, jealousy woes ll 227, any man 228, dont push me 229, drama setter 230, gatman and robbin 231, hands on you 232, hazardous youth 233, hustlers and hardcore 234, it has been said 235, just rhymin wit' proof 236, nothin' to do 237, off the wall 238 one day at a time 239, one last time 240, shes the one 241, soldier like me 242, the real slim santa 243, threesixfive 244, wake up show 245, warrior part two 246, we all die one day 247, airplanes 248, we aint 249, loyalty 250, just like u 251, ill be damned 252, u r the one 253, 6 in the morning 254, leave dat boy alone 255, get my gun 256, bitch 257, steves coffee house 258, d12 world 259, commercial break 260, bugz 97 261, good die young 262, shit can happen 263, pistol pistol 264,nasty minds 265, aint nuttin but music 266,thats how 267, instigator 268, pimp like me 269, blow my buzz 271, revelation 272, words are awesome 273, these drugs 274, act a fool 275, activity as phuctivity 276,bad news 277, bring our boys 278, chance to advance 279, cock and squeeze 280, down low 281, filthy 282. fuck battlin 283, get back 284, get the dick 286, how people get fucked up 287, lies and rumours 288, my ballz 289, no rubber 290, purple hills 291, rap guys 292, rap game 293, searchin 294, trife theives 295, W.E.G.O 296, what what listen to themmmm !!!! some are D12, but theyre just as good <3 15. maria stephenson well it feels like a penis is being inserted in to your vagina. 16. maria stephenson haha aww ye ;) . n' i might be going to his concert in montreal !! :) 17. maria stephenson 18. maria stephenson maria stephenson’s Bio fuckk offff (Y)
http://www.formspring.me/mariastephenson/top
robots: classic hostname: ip-10-60-113-184.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2013-20 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for Spring 2013 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.280099
1
{ "en": 0.9700974225997924 }
{ "Content-Length": "99829", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EF3GG33QJ4RHTZOUKWA3OMGFOQNSZJAE", "WARC-Concurrent-To": "<urn:uuid:b0c6225e-8d20-49f2-9260-82d40ba4761e>", "WARC-Date": "2020-02-19T03:24:36", "WARC-IP-Address": "104.17.148.61", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:KSYHQLXSL67XGASMVKP5LUHUJ5EXLCTW", "WARC-Record-ID": "<urn:uuid:7d344e50-1036-44bd-b677-b1ff214e930e>", "WARC-Target-URI": "https://blogs.findlaw.com/in_house/2015/11/survey-in-house-cant-handle-social-media-crisis.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a08cd40f-e8c5-4526-a939-14defff2148f>", "WARC-Truncated": null }
584
Are you a legal professional? Visit our professional site Survey: In-House Can't Handle a Social Media Crisis Article Placeholder Image By Jonathan R. Tung, Esq. on November 20, 2015 2:59 PM Some sobering yet expected data came out of global communications research and consulting firm Weber Shandwick. According to the data, lawyers in both the U.K. and the U.S. agreed that firm reputation was a company's most valuable asset with a 91 percent agreement; and that social media greatly increased the chances of an all out-crisis (85 percent increase). And yet, for some reason, the very same pool of lawyers seem to think that the purported social media crises they all seem to agree is a problem is not their problem, but someone else's. This illusory superiority example goes to show that even lawyers aren't immune to self-delusion. The Social media Crisis Report KRC Research and Weber Shandwick worked together to gather and analyze data for a report which laid out the responses of 100 senior and mid-level lawyers who work as in-house counsel for Fortune Global 1000 -- in a word, BigLaw. The KRC and Weber also worked with 50 attorneys on each side of the pond who personally advised their companies on risk, brand evaluation and protection. The News Looks Grim Of those surveyed, about a fifth reported that their own company experienced a social media crisis during their tenure. Fallout usually resulted in layoffs and a hit to morale. In-house counsel was particularly inept at social media crisis planning with only about half having devoted even minimal time at all to social media training and preparation. What this basically means is that while BigLaw firms are increasingly at risk for cybersecurity attacks and social media blowups, only about half of in-house counsel devoted any time to handling an all-out attack on their company's reputation. About half of the attorneys surveyed said that their company devoted zero time to the issue of social media crisis preparation. False Sense of Security Inexplicably, the same group of lawyers (9 out of 10) said that it was not likely that their company would experience a social media crisis that would cause a legal risk in the next year. Thus, the grand majority of attorneys agree that reputation is the most important company asset and that social media reputation attacks are an increasing problem. Simultaneously, they have virtually no training in social media crisis management and have no intention of changing their plans because they all think that they will never be faced with an online reputation problem. That sort of thing only happens to other companies, you see. The problem with that logic is that one of the remaining 100 will almost definitely be thinking the exact same thing. It almost makes us wonder why there was so much panic in the air at last month's ACC meeting on cybersecurity. Surely a social media snafu would be a mere trifle? Illusory superiority is good for ego, but it's not a good business practice. As BigLaw in-house lawyers spend time convincing themselves that their reputations are iron-clad, some disgruntled client could be writing the viral piece that could tarnish a company's reputation. It's high time that in-house lawyers get with the program, take online reputation management seriously, and look into creating a game plan to put into action if some unfortunate tweet about the company hit them all in the face with a reality check. Your first step, however, shouldn't be to hire some fly-by-night "reputation management" dude. Related Resources:
https://blogs.findlaw.com/in_house/2015/11/survey-in-house-cant-handle-social-media-crisis.html
isPartOf: CC-MAIN-2020-10 publisher: Common Crawl description: Wide crawl of the web for February 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-179.ec2.internal software: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.060479
1,108
{ "en": 0.9760335087776184 }
{ "Content-Length": "353311", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:36UQBAZSDPYPRJBYHBDXWO6HJURF57HY", "WARC-Concurrent-To": "<urn:uuid:9905756c-d755-4860-9967-8e675d9e95ed>", "WARC-Date": "2015-07-29T19:28:22", "WARC-IP-Address": "207.241.224.2", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:NQNAD4FBEJ2QQ4JKT4X2AEVMXW3LQESG", "WARC-Record-ID": "<urn:uuid:ba1748ad-4e6c-4aa9-925f-0691dcb87f9d>", "WARC-Target-URI": "http://archive.org/details/CNNW_20121125_020000_Piers_Morgan_Tonight/CNNW_20121125_020000_Piers_Morgan_Tonight", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e2c2ca9f-0d1c-4d31-b9fb-cea6c258cdbc>", "WARC-Truncated": "length" }
8,195
Skip to main content About this Show Piers Morgan Tonight News/Business. Interviews and current events. Contains 1 quote San Francisco, CA, USA Comcast Cable Virtual Ch. 759 (CNN HD) Jack Hanna 11, Columbus 5, Us 5, Jack 4, Usain 3, Africa 3, Penguin 3, Geico 3, Kenya 2, Australia 2, Piers 2, Egypt 2, Lynx 2, Extinction 2, Leopard 2, Popcorn 2, Madagascar 2, Buffalo 2, Europe 2, New York 2, Borrow a DVD of this show   CNN    Piers Morgan Tonight    News/Business.      Interviews and current events.       November 24, 2012     6:00 - 7:00pm PST   from abuse of those alleviations. >> in a nation overflowing with so many pills, so many patients wanting and expecting the quick fix, so many truly naive prescribers, users and misusers of medication, we have to try to find a way to prevent people from taking a deadly dose. okay, stand by, piers. >> things have got pretty wild with some of my guests but nothing quite like this. what the hell's that? my studio's turned into a jungle. whoa! jack, am i going to die here? oh, my god, what's this? tonight, the one and only jack hanna and a few of his closest friends. >> he defecates on his legs to keep them cool. >> you know what, jack, too much information. >> if he bites you, it won't hurt bad. >> you know what? >> you won't believe this. this is the only one in the world to carry leprosy. >> now you tell me. never quite know what will happen next when jack hanna's in the house. he's got my notes. >> i'm sorry. that your notes? >> this is a very dangerous edition of "piers morgan tonight." good evening. welcome to a special "piers morgan tonight." as you can see, the studio looks a little different tonight. trust me, so will my guests that will be here over the course of the hour. we're talking cheetahs, foxes, owls, komodo dragons. i'm here with jack hanna, where anything can happen. jack hanna is director of the columbus zoo and aquarium and also the host of the emmy award winning jack hanna's into the wild and a new show called wild countdown. his tigers are literally eating my studio. we better get on with this. jack, welcome. jack, am i going to die here? >> you shouldn't die, but if you were going to die, these would be the animals that would do it. >> these are baby tigers? how old are they? >> siberian tigers, 13 weeks. >> at what age can they kill a man? >> about another 22 months. >> right. >> because at about 22 months, these animals weigh over 600 pounds. >> really? >> this is one of the rarest cats in the world, piers. there are less than some people say 400. there could be less than 200 left in that part of the world. they were hunted for their coats but the problem today, you can imagine this animal at 600 pounds. >> they look strong already. >> oh, they're very strong. they could literally put a hole through your arm right now. >> right. looks like he wants to. can they bite at this age? >> oh, yeah. they learn from each other. these animals are a species survival plan. what they are, they have chips in them. this animal, it could be another three to six months, could go to a zoo in europe, australia, wherever it might be that's an accredited zoo for the gene pool to keep them fresh because these animals are so rare that we have to know exactly what the breeding program will be for the creature. >> why are you not remotely scared of them? >> it's not a manner of -- you know, that's a good question. people ask me about scared. if i find myself afraid or scared, that means i'm doing the wrong thing. these guys know about the animals from the columbus zoo, where they were born, but they know the animal very well. i've been around them. i don't raise them like these guys do. but having raised tigers, my wife and i have raised tigers, lions, leopards, everything in our 40 years of marriage. so you kind of know cats when you do that much. you see how he's licking me? if that were a full grown tiger, piers, in less thoon ten minuan, he could lick me and just lick my arm to the bone. that's how rough that tongue becomes. >> really? >> like sandpaper beyond you have ever seen. >> when they get to the full size, how many of these are there left in the world? >> maybe 200 to 400. that's all. >> that's all there is? >> all there is. >> these are literally two of the last remaining siberian tigers. >> in the zoo world we do quite well with them. remember, when a tiger takes down like -- like in india, the bengal tiger, i've seen them take down a water buffalo in less than ten seconds. it's like a bomb going off. beyond anything like a grenade going off inside something. they are also one of the only cats in the world that when they can eat up to 30, 40 pounds at one sitting, even their stomachs can explode sometimes and kill the animal. plus most cats like lion will not eat petrified meat. >> what do you feed them with? >> this is a special diet we have for the cats. you heard that little growling? you hear that in the wild, your pants won't be dry. >> my pants aren't very dry at the moment, jack. i can tell you that. they may be small but when they're this close they are quite big. >> you appreciate now, see, that's what being here with you means a lot to us because now, because of millions of people you reach, you now are seeing one of the rarest creatures in the world, you can see the power we're talking about. you also can see the beauty of the animal. it would be a tragedy to see this animal go into extinction. there are several tiger species that have gone into extinction. that's not what we want to have happen. >> it would be a tragedy but a bigger tragedy would be if one of them ate me live on air. let's get a move on quite swiftly. >> we'll do it. >> nice to meet the tiger cubs. >> they were born at the columbus zoo about 13 weeks ago. >> we're going to bring out now -- what is this? >> this cat here is something that you could even hold this cat, probably. if he bites you, it won't hurt bad. >> you know what, you just hang on to the animals for now. >> if you have ever been to egypt, in the tombs, the pyramids -- >> like a sphinx face. >> that's right. pharaohs used to try to domes c domesticate this animal. you saw how big the tigers were? it won't get that thick. you see how thin it is. look at the ears of this cat. see why -- they didn't worship the animal but the animal represented royalty back then. i'm sure a lot of people lost their hands trying to domesticate this creature. what's unique, this is one of the only cats in the world that can jump ten feet in the air and catch a bird flying. they get in the grass, i have seen this twice in wild, they blend in so well, they live in the plains of kenya, tanzania, that part of the world, and they don't exist hardly up in egypt anymore. they lay down in there, watch for a bird and go popping up like that because their back legs -- >> ten feet is-- >> it's amazing. they can grab the bird flying by. it's a caracle cat. that gives him away, the ears. >> okay. what's next? we've got the -- what are these? >> this is amazing. this is a servile cat. this cat also is a cat -- this cat also's a cat that is from africa. this cat has the front legs and hind legs are different. he's one of the few cats in the world to catch a bird in free flight. this animal has, if you look at the back of the ears, you'll notice spots on the back of his ears. ow. you see that? those are called eye spots. see the spots? >> he wants to eat your hand. >> if this cat is sitting there eating something, a hyena comes up, they think he's looking backwards. hence they call them eye spots. how tame are these by comparison to a purely wild version? >> right now, as far as tame, this animal won't become a tame animal. we raise the animals, a lot of times the mothers don't raise them or whoever it might be, we raise them and they are still wild animals. people have to -- i had a famous trainer tell me once you can usually train a wild animal but never tame a wild animal. they are always going to be wild. >> this is a vulture? >> this is an egyptian vulture. come here, buddy. >> you are actually feeding the vulture raw meat. >> oh, yeah. >> so they really do eat raw meat. >> oh, yes, they do. >> can you smell him? >> i can smell him, yes. stinks. >> what he does, he defecates on his legs to keep him cool. >> you know what, jack? too much information. certain things i don't have to know about. i was quite liking this vulture until you told me that. >> that's why they spell. plus their head is bald -- >> they're ugly, they stink, they eat raw meat. tell me one good thing about the vulture. >> one good thing is -- >> useful contribution to society other than the defecation, the feeding on carcasses and the terrible smell. >> they clean up all the mess other animals don't eat. but guess what this animal does, though. >> kind of like a vacuum cleaner. >> he also takes a rock, he can take a rock and one of the few birds in the world can take the rock and open the ostrich egg. >> extraordinary. oh, my god. what's this? >> you remember you did a story with me -- >> i do. about alligators killing people, yes. all right, mate. yes, thank you. >> no. they can -- >> no, no, no. >> you're smart doing that. know why i say that? >> it's going to eat me. >> because on the ground they can jump four feet and outrun any man on earth for 20 yards. >> you're serious. >> yes. they're fast. this is a nice one. >> a nice one. >> if you look, they have two eyelids. >> how do you say a nice alligator. >> i don't mean nice. that's not fair. >> this could kill me, right? >> yes. but he's not going to right now. >> how do you know? >> i don't know that for sure but i don't think he should. i want to show you something. not many people can do this. grant here does a great job with this alligator. he will show you -- have you ever seen down alligators' throats? >> not lately, no. >> it's hard to do this. the power. if the cameras can see this. look down the throat there. you see that? you can't see down his throat like most animals. they're flat back there. that allows the alligator to go under water, open his mouth without choking on water. if a fish comes around, oh, that's a cave, let's go in there, bam. it's quick, they don't -- remember in the interview, they don't chew. they tear. >> i do remember that. >> he has sensors on the side of his head there. >> let's try to humanize him. what's his name? >> curly. >> how old do they live to be? >> 75, 100 years old. >> are alligators natural predators? would they attack if they're not challenged or scared? >> yes. no, not scared. but if you go around an alligator with youngsters -- they lay eggses, by the way. if you get next to an alligator nest and the eggs are in the ground, they don't sit in a nest, they're over here. if you get near it, it's one of the most aggressive animals in nature. you are gone if you get near an alligator nest. they lay 20, 30 eggs and the sex of the alligator is determined by the heat of the nest. i'm not sure if the male is hot. what is it? >> male is hot. >> a real hot nest, the eggs will be males. the gator also, we found, did research, we found boards, cans, tubes, everything inside these creatures because when they get hungry they will take apart anything. >> ever found human remains inside of curly? >> no. but i've done shows in malaysia where you wouldn't believe -- the crocodiles get to be 21, 22, 23, 24 feet long, over 2,000 pounds. you're talking about something much bigger than your stage here. >> i think we should go quickly to commercial break. >> you want to hold it? >> i don't want to hold curly, no. no. i think we're into a no touching zone on this show. when we come back, you will show us happy feet penguins, jack, and one of the oldest animals in the world. first, here's one of jack's top five animal close encounters. >> what are you doing? >> i'm demonstrating how the eyes are fixed on movement. and how they don't want to hurt anyone. they can't see you. they can smell you. but you don't classify as food so you're not on the menu and pretty safe. ♪ [ male announcer ] everyone deserves the gift of all day pain relief. this season, discover aleve. all day pain relief with just two pills. a new way to save on your prescriptions. it's the aarp medicarerx saver plus plan from unitedhealthcare. with this plan, you can get copays as low as a dollar through a preferred network pharmacy like walgreens -- where you'll find 8,000 convenient locations. i'm back with the closest thing to a living dr. doolittle, it is jack hanna. he is introducing some of his friends to us tonight. bit of a ridiculous description given that we've had crocodiles and tigers. anyway, let's pretend they're furry friends. this is a friendly looking penguin. >> yes. this is a black-footed penguin. sometimes -- if you're ever on a game show and somebody asks how many species of penguins, you say 17. only five of the 17 live in cold weather. all the rest live in warm weather. >> really? >> yeah. people don't realize that. this is from south africa, it's a black-footed penguin or jackass penguin because it brays like a donkey. this one, by the way, is put on the endangered species list last july. >> how many penguins are left in the world? >> quite a few. except this one in south africa is listed as endangered about a year ago. it's an animal -- they don't really eat the penguin, by the way. they collect the eggs and feathers off the penguin but the animals also -- there are a lot of problems there. they have more feathers per square inch than any bird in the world, the penguins do. >> what's your favorite animal? >> my wife. that's pretty funny. she's not here. >> if i could say you live the rest of your life on a desert island with one animal, what would it be? >> having raised animals all my life, 50-something years, i would say i'm fascinated by cats, all kind of cats. the elephant -- i think the elephant -- we will soon find out the elephant is one of the most intelligent animals in the world, more than primates. >> if you could have one, what would you have? >> one. >> you would have a few of them. >> i would have to say an elephant is fascinating. >> a herd of elephants. >> when you see a herd of elephants in africa it's phenomenal. it's the second largest land mammal in the world. in 1978 there were about 1.4 million. today less than 375,000. so it's a major drop. >> nice to meet you, penguin. let's bring out the next animal, which is a gigantic tortoise. what's his name? >> jimmy. oh, i'm sorry. the tortoise. this is slowpoke. this animal is the kind of tortoise from the seychelles in northern africa. he gets to be 150 pounds. >> he's magnificent. >> they really are. that's what's wrong. turtle shell, we know what happens there, jewelry, all sorts of thing. this animal is a protected species. >> wow. what's this? >> put that one up there. good lord. no wonder you have to hold -- how did you even pick that thing up? this is the second largest tortoise in the world, up to 500 pounds. >> who would win if they had a fight? >> this one here. he's much bigger. these things can live, what is it, 200 years? >> 200 years old? >> yes. yes. the sailors in the 1500s, 1600s, 1700s, would put them in the hulls of their ship because they could last a year without food, water, nothing. they live that long. tell you what, the ship must have stunk. but these animals are a neat creature. >> he's heavy, right? >> yeah. this one here's a male. i think this is a male, too. bottom of the shell is flat. >> amazing animals. really amazing. >> the tortoise and the hare. they're not that slow. some people think they're that slow, but they're not. >> how long could they move if he wanted to? >> well, in the hotel room -- >> you had them in the hotel room? jack, you may not have the full ticket here, all the animals in a hotel room? >> who's this? >> make him do it. i don't know why i love this. i get the biggest kick out of it. my wife and i sit at home sometimes and -- >> what is this? >> laughing cuke aburrow. >> make him laugh again. >> doesn't that crack you up? that's hilarious. >> when you're out there in the bushes, my first time in australia, this goes off about 2:00 in morning you jump out of your sleeping bag. what the heck is that thing. this is a laughing kookaburra. a lot of people have them. >> does he like jokes? >> this is like -- >> check into the hotel room. back to the wallaby, this is one of the smallest mar soupial. there are 30 different types of wallaby. the wig dabig kangaroos, they s five, six feet toall. what do you call a big group of kangaroos? >> a mob, i think. >> that's right. >> so they eat grass and are a neat theater. >> he seems quite calm compared to the rest of these nut cases. >> i love that bird, though. >> this is one of the most prehistoric animals on earth, this one right here. got the batteries in it? >> what is this? >> this right here is a three-banded armadillo. >> you say batteries in it? >> that was a joke. you see there, one, two, three. >> what is this? >> three banded armadillo. there are seven banded, nine ban bands, 11 banded. people eat armadillos in this country as well. in south america they're one of the most endangered animals because the people cook it like a taco. he's also the only armadillo in the world that can close up so tight, not even an ant can penetrate that. only man and a jaguar can kill it. this is the only animal that carries leprosy. >> now you tell me! >> you think i'm joking about that. look it up when you go back to your room. not your room. >> i believe you. i just rather you tell me before i touched it. >> i usually tell people before they touch it. go ahead, buddy. >> we need to take a break while i have a leprosy test. >> next, the animal responsible for the worst bite of jack's life. can you guess what it was? we'll find out after the break. first, another of jack's top five animal close encounters. >> you've got one of the males there. you can see there she's going to gang up on us. >> did you say they're going to gang up on us? >> announcer: we all love a good deal during the holidays, especially identity thieves. they can open an account in your name and go on a serious spending spree. >> do you have cufflinks? >> mm-hmm. >> gold ones? >> announcer: not on our watch. we're lifelock, with the most comprehensive identity theft protection you can buy. go to or call 1-800-lifelock today. [whoosh] lifelock-- relentlessly protecting your identity. [ male announcer ] this is steve. he loves risk. but whether he's climbing everest, scuba diving the great barrier reef with sharks, or jumping into the market, he goes with people he trusts, which is why he trades with a company that doesn't nickel and dime him with hidden fees. so he can worry about other things, like what the market is doing and being ready, no matter what happens, which isn't rocket science. it's just common sense, from td ameritrade. we find the best, sweetest craforelobste that we can find. [ malennounc ] it'ti focrabfestt red lobster! his ar, y 1 of 5ntrees like our ne crab d garlic shri. half-pou otender crab pair with savory shrimp. st 12.99. odig into our hearty crab and roasted garlic seafood bake all with salad and unlimited cddar bay biscuit so much to choose from, so ittle time. so come into red lobster for abfest today and sea food differentlrom, so ittle time. back now with jack hanna, the director emeritus of the columbus universe zoo. as you can see, he has brought some more company. a snow leopard. frisky one. >> for me -- you asked about the elephant. this will get about four times this size. they live in the himalayas. they live at altitude. >> when there's so few of them, how do they find another to mate with? >> that's just it. good point. they're solitary cats. when she cycles, there's not enough of them to even find the other cat. >> can they mix-mate with other breeds? >> no, not up there. that's been done before, lion and tiger, but not any other cats that i know of. this tail, you can touch the tail if you want to. the tail gets much bigger, like this thick. up there it's 40, 50 below zero, whatever. wow, that was cool, wasn't it? >> that's very cool. yeah. >> i'm sorry you don't have a hand there. i don't know who your cameraman is. please don't sue me. this animal takes his tail and wraps it around him, all the way around him like a jacket to keep his face warm, and the ears are very short because they would obviously freeze up there. this cat has also fur on the bottom of their feet. they can jump 30, 40 feet -- a lot up there. >> he likes to operate in the cold, right? >> colder the better, this cat. >> how does he deal with being in new york? >> we always keep them in air conditioning wherever the cat goes. >> where do you keep him at night? >> in the hotel room. >> are you serious? >> dead serious, yeah. i wouldn't lie about something like that. >> do you sleep? >> not much during the night. they don't sleep at all. they put me in another room. >> you ever get scared? no? not at all? >> the sad thing about this, on the black market this coat right now, if you can even find one, a guy got caught in europe last year, $80,000. >> for this coat. >> this coat right here. >> that's the tragedy, isn't it? >> it really is. today it is. back in the old days is one thing. this animal -- >> so beautiful. >> it's absolutely beyond any animal that i have worked with. the snow leopard is absolutely magnificent. it represents really what endangered species are all about. >> utterly beautiful. what a shame -- >> it really is. >> in a few years it could be all over. >> he also has a chip in him so he'll go in the ssp with the american zoo association. >> this is the slightly uglier end of the market. >> now, this is an animal right here that has been used by our settlers and pioneers years ago. the beaver. >> this is the beaver that bit your hand. >> this isn't the same beaver but this is like the one that did it. exactly like this. have you ever touched a beaver? >> no. is it wise given that you had your -- >> back here you can touch him. i just picked him up the wrong way is all i did. anyway -- >> bit rougher. >> right. but the beaver's a unique animal. see his tail? this tail is -- when people hear the beaver, they talk about the beaver slapping the water. >> like an alligator. is he happy with that apple? >> he wants more to eat. >> just don't put your hand near him. >> do they eat meat? >> no. he won't know your hand. he'll think your hand's an apple or something. >> that's really comforting. >> this tail slaps the water and that warns other animals in the area. >> he stinks too, jack. >> how do you know? can you smell him? >> i can smell him. he absolutely stinks. >> did he go to the bathroom? >> no. that's me. >> they usually don't smell -- they go to the bathroom, it smells. >> this animal bit your thumb, right? is that the worst injury you've had? >> one of the worst yeah. i've been sat on by an elephant but 99% of the time there's an accident, it's the person's fault. not the animal's fault. if you can see the back foot, i don't know if he'll let you do that, it's a webbed foot like a duck almost. it's a webbed foot. that back foot. that's how they swim. also, beaver -- do you have beavers in england? >> i think so, yeah. all right, calm down. >> get another look at him. what have we got here? >> i have never done this on any show before. there are all kinds of foxes, red, gray. this is the smallest one in the world from the sahara desert. it has big ears not just to hear with. they have blood vessels in their ears to keep them cool in the desert like a dog has a tongue, your temperature is 98.6. the elephant has big ears to keep it cool. this animal can go his whole life in the desert without drinking water. scorpions, snakes, lizards. >> without ever drinking water? >> water comes from what he eats. >> it eats insects and spiders that have water in them? >> yes. big black scorpions? that's what he loves to eat. this is the smallest fox in the world. this fox here, this is -- which is that one? both these, right? okay. the swift fox which is one of the rarest, very endangered in our country. it goes 30 to 40 miles an hour, the fastest fox in the world. full grown, this one right here. they're a very social creature. they take care of the sick, the old and the young first. when you say cunning like a fox, these things are bright. swift foxes in this country, very few people get to see. smallest fox in the world. beautiful animals. this right here, though, this is the largest owl in the world. the eurasian eagle owl. >> the biggest owl in the world. >> >> if you're ever asked a question on a game show, what animal is found on every continent except antarctica. he isn't even full grown yet. you want to hold him? you can hold him. >> i will let your guy hold him. >> one thing you want to do is have a glove. you see the talons? a bald eagle has 1,000 pounds of pressure per square inch. if that was a bald eagle, it would go through his skin, into the muscle, break his bone in a split second. that's how powerful the talons are. see how he turns his head like a corkscrew. the reason is his eyes are so big, they cannot move in the eye socket. if you see a pretty girl go by, you go like this without your wife seeing you. well, he can't do that. his eyes are so big he has to move his whole head around. he can't turn it all the way around or his head would fall off, but he can go almost all the way around. also, they're the bird of silent flight. if i were to fly him one inch over your head you would never hear anything. a parrot or goose or -- >> really? completely silent? >> silent flight. one last thing. they call them a wise old owl not because they have a big brain. it's because their senses of hearing and eyesight, this animal's ears are over here on the side of his head like a soup bowl like this. the echo location he picks up, he can hunt in total darkness. >> amazing creatures. -. >> a lot of people don't get to see an owl like this. >> actually very dangerous in their own way. >> they can be, yes. but also, they are good at controlling rodents. a barn owl can take out 30 mice in an hour in a barn. they are protected species in our country, the owl. >> when we come back, the fastest animal on the planet. first, another of jack's top five closest animal encounters. >> if you look up now, look up there, all the bird nests. >> those are bats up there. >> bats and birds. both. >> let's keep moving. folks who save hundreds of dollars switching to geico sure are happy. how happy, ronny? happier than gallagher at a farmers' market. get happy. get geico. chances are, you're not made of money, so don't overpay for motorcycle insurance. geico, see how much you could save. usain bolt is hands-down the fastest human the world has ever known but i wonder how he would fare against the animal jack hanna has just brought out. we seem to have a large fully formed cheetah. >> this animal goes 70 miles an hour. if you're in the car going 65 miles an hour -- we clocked him at 70. his eyesight is impeccable. two miles away he can spot his prey. look at the eyes, you notice the dark marks under his eyes like a football player, baseball player, when you look at direct light like i am right now? mother nature invented that because cheetah is the only cat to hunt in the middle of the day. 110 degrees outside. they've got to. the only cat in the world, this is an amazing shot, with non-retractible claws. every cat in the world can retract their claws but a cheet cheetah. it's like a dog foot that allows him to run even faster. when they do make a hit, 50, 60 miles an hour, 60% of the time the animal gets away. i'm here, don't worry. maybe you should worry. anyway -- >> this is the first time i really felt quite intimidated. close up, this is a big beast. >> see why in the wild, i tell you we film in the comfort zone of me and the animal. this animal is still a wild animal but he was born in one the most fantastic places out of the zoo. >> how would this kill? >> this would kill basically in the wild, it has to grab the throat and do the choke hold. once they do that, they sit there for five to ten minutes. the sad thing is, what happens, if they move in to kill, buzzards and vultures circle over. the hyenas and lions are sleeping. they go the cheetah made the kill and sometimes the lion will eat the cheetah. this animal has a tough time in nature. >> the lion will kill the cheetah and eat it. >> yes. that's not a very common thing but they will do that. >> can a lion kill anything, basically? >> the king of beasts. it can kill just about anything. be a tough time with the elephants. egyptians we know also -- >> so they prefer to be alone. >> yes. oh, yeah. unless she has her cubs which stay with her three to four years. the egyptians also, this is another cat the egyptians actually tried to domesticate. now it exists nowhere in northern africa. where the equator goes through kenya, that's where you start finding the cheetah. >> how can your trainers be so relaxed? >> because these folks -- the cheetah on her first birth much cubs she'll eat them or destroy them or let them go. we knew that, but they were born four weeks early. this is one of four. we've saved two of them. right now, we breed 10 or 12 cheetahs a year. it's 10,000 acres we have next to the columbus zoo. it's a beautiful creature. hear that noise there? that's purring. >> over 100 meters, if it was this cheetah against usain bolt, who would win? >> you or me? >> usain bolt, the sprinter from the olympics. who would win? >> this guy here. >> he wouldn't get ten feet. when we film it's three cameras. we can't take one. three cameras can't even film the cheetah kill. it's like this and the cat turns at 50 miles an hour like that, hits its prey, it's like a cloud of dust. >> there is no faster animal in the world? >> the peregrine falcon, that's 220 miles an hour. >> in terms of land -- >> that's the fastest in the world. >> it's an amazing, amazing creature. >> again, for you to see that, piers, means a lot to us because now you see the fastest animal in the world, a cheetah. >> i've never been this close to an animal where you feel the power. this isn't really one of the big cats but i can feel the surging power and aggression. >> next time i come, i'll bring a full-grown tiger. >> what makes you believe there will be a next time? it >> you see the tail? the tail is like a sail on a sailboat. going 60 miles an hour, that tail will help him turn. >> absolutely amazing. indisputably probably the ugliest, the wart hog. here he comes. >> some people say the wildebeast was all the leftover parts. >> it is a very ugly animal, isn't it? i know you love animals. you must agree this is a particularly ugly specimen. >> he's something. the wart hog, see the warts on his face? those warts when this -- turn his face that way. when he gets full grown, the warts get all over his face. they protect him when they fight sometimes. plus, his teeth, like ivory, come out of his mouth like two knives. those things are very important for him to help protect himself if a lion were to attack. the wart hog is the main source of food for these animals because the wart hog spends 60% of his life on his knees. usually the wart hog is on his knees eating grasses and that kind of stuff. but the wart hog also is an important animal for other animals -- >> how much milk do they drink a day? >> he's weaned now. >> look at the tail. see that little tail? that tail will stick up like this. when you go to africa, if that animal does this, it starts running, all the other animals, giraffes, any animals around, they will see this and take off because they know the wart hog has sensed something. they're very bright animals. they know when something bad is coming around. he is eaten by a lot of animals. he digs holes in the ground. so the hyena comes in and takes over their holes. people don't think are bright but the hog or pig is an intelligent creature. >> extraordinary. >> next, a couple of the cutest little critters you will ever see. but first, another of his animal close encounters with a malaysian cobra. >> and the movement. and see how they strike. >> the end of this snake show was just as amazing. >> you going to catch him? >> yep. >> wow! back with jack hanna, who started turning my studio into a slice of madagascar. we have been joined by this vast bear-like creature. what is this? >> this is a bearcat. i don't know if you can kneel, only because of the camera. they can get a better shot. that's great. this animal is what i call a wolverine. we have a wolverine in this country which is pound for pound the most fearless animals in our country. but this has been around from malaysia. this tail right here is a prehensile tail. if that tail gets around your neck he can do you in in 30, 60 seconds. that's how powerful it is. he would not do that, but he has big teeth, his whiskers are there. he's nocturnal, lives in the incredible jungles there. he feels with whiskers in total darkness to move around. he can't see. he smells like popcorn, he smells -- >> he smells exactly like popcorn. we get so hungry in the truck when we're driving around with him. because he smells like popcorn. those claws can tear apart anything. plus, do you remember seeing the cobra there? >> do you guys never get bitten? >> yeah, but again, they raise the animals. they know these are wild animals. for educational purposes, we want to bring them on, especially the honor of coming to your show tonight, to teach people about these creatures. some people shoot the animal because he might eat chickens or something. but the good lord created creatures for a certain reason. this is one of the most spectacular. they call him bearcat because he feels like a bear. you ever touch a bear? >> no. >> that's stupid. >> no. it's sensible. >> it looks part bear/part cat. not many people have ever seen a bearcat. >> amazing creature. thank you very much. next we have i think -- >> i hope you remember -- all i remember about the palm civet is its droppings are used to fertilize coffee. >> he eats the coffee bean, goes in his stomach, through his intestines, on the ground with a film coating. they take it, bake it, sell it for $500 a pound, coffee. imagine that? supposed to be medicinal. this animal here, you remember about ten years ago, sars killed people? this is the animal caused the sars disease. not this animal, this species. it's a delicacy in asia, sells for $200 at a restaurant. they also use the fur and use underneath the armpits for perfume in the early 1940s and '50s. but the animal also loves, as i told you before, like the other one loves to eat cobras as well. this little creature could eat a king cobra. how does he do that? when a cobra strikes at you he goes like this. not like a rattlesnake. he goes like this. you can predict it. this animal comes down on the ground starts walking around the cobra. so the cobra is like this trying to get him. all of a sudden this little creature runs around the cobra like this and the cobra is the cobra gets so dizzy he falls over and bites the cobra's head off. it's funny. >> unbelievable. >> that's how he kills it! makes him go round and round till he's dizzy. >> this animal here is one you've heard about. this is the siberian lynx. >> easy, mate. >> just holding him a bit loose for my liking in case he decides to -- >> jump on him. this animal here, sorry to say, some species animals was declared extinct in the wild about a year ago. you don't see that very often. the siberian lynx is doing pretty good in the zoos. he was hunted for his coat. he sees himself in that monitor right there. he sees something there. >> seeing me at the moment. a look of hunger in its eyes. >> if you guys can focus on his back foot here a second, right in here, you see how flat that back foot is, perfect, this foot right in here. you see that foot there? this animal runs on the whole back part, not on the pad, the whole thing here. this is what he runs on. the whole back thing. it's like a snowshoe. >> amazing. >> it's like a snowshoe. >> runs flat almost. >> exactly. this animal would sink in the snow. but this animal was hunted for their coats. that's no longer the case. it's a buffalo -- t it's a beautiful -- >> now we have the -- >> he can jump on you if you want him to. >> to every question, it's no. >> the lemur is a presimien. look at the hands there. just like your hand. isn't that amazing? you can imagine -- it's only from madagascar. that's where they live. >> they are human hands? >> exactly. >> he's got my notes. >> those are your notes? i'm sorry. but he's also marking your notes. he has little glands on here that he marks his territory with. he can't hang by this tail but it weighs less than -- >> all right. >> we call him larry the lemur. >> jack hanna's number one top five close encounters. >> i stepped in for a closer look when suddenly -- >> oh! [ male announcer ] citi turns 200 this year. in that time there've been some good days. anne's tablet was chatting with a tablet in sydney... a desktop in zurich... and a telepresence room in brazil. the secure cloud helped us get some numbers from my assistant's pc in new york. and before i reached the top, the board meeting became a congrats we sold the company party. wait til my wife's phone hears about this. [ cellphone vibrating ] [ female announcer ] with cisco at the center, working together has never worked so well. we're back with jack hanna and me, crocodile morgan. this lizard is fantastic. this has the longest tongue of anything i've ever seen in my life. >> what he's doing, he's feeling -- he feels your body temperature. that's -- >> is he feeling that i'm hot? >> that's exactly right. >> he feels your warm blood. >> he picks up the particles -- >> what's the tongue doing? >> feeling the warm particles coming off that tongue. these animals, the bite is usually lethal. not venomous but the bacteria in their mouth. the bacteria in these animals is deadly. this one lives in water. they have little teeth up in there -- i don't know why he's picking up on you and not me. you must be hotter than me. that's one of the biggest lizards in the world. >> remarkable creature. oh, my god. what's this? whoa. >> you remember we talked about the anaconda? >> you saw the one that almost bit me -- >> you've got an anaconda wrapped around your neck. are you mad? >> this snake here, if it were to bite you -- remember this in case it happens to you -- it bites you like this, it cannot let go. it takes him 30 minutes to relax his jaw muscle. if you're hiking somewhere and a constrictor bites you, you sit there -- >> not now, jack. >> he's not going to do anything right now. >> what is he doing right now? >> he's smelling you. >> for the kill or what? >> no. what he does, remember this, this snake gets to be about 25 to 30 feet long. >> the anaconda constricts like the -- >> yes. >> why is it around his neck? >> this thing knows he can't kill this guy. >> it knows it can't kill him. >> yeah, this animal knows -- he doesn't know he's a human. he's an animal he's too big to eat. >> how much does this come down to trust? >> trust? you don't trust -- as far as trust, this guy here has to know what his animals are. >> can you ever trust his wild anima animals? in the end, they will do what comes naturally. >> hey! never have i wanted to end the show more than i do right now. jack, it's been -- i wish i could say it's been a pleasure. it's been an experience. >> i'll shake your hand. >> jack, it's been fascinating.
http://archive.org/details/CNNW_20121125_020000_Piers_Morgan_Tonight/CNNW_20121125_020000_Piers_Morgan_Tonight
robots: classic hostname: ip-10-236-191-2.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-32 operator: CommonCrawl Admin description: Wide crawl of the web for August 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.020411
0
{ "en": 0.955061674118042 }
{ "Content-Length": "62996", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:XX72G352SUL324NHXSDVOWU2P5PRLXMX", "WARC-Concurrent-To": "<urn:uuid:252925c1-8e7d-4fa8-a963-5837db6a49a0>", "WARC-Date": "2019-03-22T03:30:54", "WARC-IP-Address": "216.118.102.8", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:JZN3FQZIGVML3IAAMJQ6D5BBVRTISQSS", "WARC-Record-ID": "<urn:uuid:ad5bf1be-fc47-426d-8f07-b8be45489a12>", "WARC-Target-URI": "https://www.bitchblogger.com/cfnm-never-loses-appeal/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5d102258-0e25-4962-9e36-53e6f542ef64>", "WARC-Truncated": null }
327
Chat with us, powered by LiveChat Sissy CFNM Noir CFNM birthday party for zane the brain last night! I asked him what he wanted for his birthday, and he said, anything you want to give me, Princess. I told him, ok a CFNM party with you starring and a new sentence in chastity at the end of the night. I told him it would be a girl only party and not to worry about sucking cock this time around. Relief relief! His is not gay but a coerced bi slut who has acquired a taste for cum. CFNM never loses it's appeal: Princess Britany 1-800-601-6975 New Chastity Sentence How long of a sentence in chastity he asked. I think a sentence far longer than the last which will be over a year, maybe a year in three months. Gulp. Since my parents are in Europe, and my sister Jennifer and I are house sitting, the party was “staged” there. Jennifer, who is vanilla as the driven snow, will be out of town till tomorrow. The Performance My parents have a large staircase ala film noir, and zane wore a red slit in the middle evening gown bought at the used costume shop. Vintage high heeled mules, plenty of costume jewelry, Joan Crawford makeup, Joan Crawford wig, and a cigarette holder holding an unlit sissy pink cigarette. We took two couches which faced the staircase to watch zane’s descent. It was spectacular. Chocolate Cake With A Chastity Device On Top Zane did a strip tease after he seductively descended, and the sissy slut began his CFNM humiliation burlesque while we all clapped and sharpened up our strap ons. The birthday cake was a two layer dark chocolate cake. On top sat a bright pink silicon “Prison Bird” chastity device with a pink jeweled plug. Simply the best birthday any sissy could ask for. Chocolate cake, a new pink device, a fabulous performance with pegging by 7 Princesses! Princess Britany
https://www.bitchblogger.com/cfnm-never-loses-appeal/
isPartOf: CC-MAIN-2019-13 publisher: Common Crawl description: Wide crawl of the web for March 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-150-237-245.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.073451
0
{ "en": 0.7470654845237732 }
{ "Content-Length": "23770", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WU7YN3ARHO5XQ3HEDLFZNG6YH74JFUOY", "WARC-Concurrent-To": "<urn:uuid:1f9c19bc-741e-428c-9ef2-be4b4bbb247a>", "WARC-Date": "2015-10-07T00:30:10", "WARC-IP-Address": "23.235.33.143", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:FIAXN6A46AJH7LSN4CJPYKHD67YL52MW", "WARC-Record-ID": "<urn:uuid:491a9224-676a-4675-8ac7-ec7367f14242>", "WARC-Target-URI": "https://metacpan.org/changes/distribution/Email-Sender", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2fda26db-82e1-46c7-a56f-ad91c3361f75>", "WARC-Truncated": "length" }
930
Revision history for Email-Sender 1.300020 2015-09-03 14:00:04-04:00 America/New_York - no changes since 1.300019 1.300019 2015-08-10 15:48:02-04:00 America/New_York (TRIAL RELEASE) - only work around Net::SMTP on broken (pre-3.07) versions - avoid uninitialized warning when delivering to Maildir 1.300018 2015-05-27 15:28:44-04:00 America/New_York - stable release of changes from 1.300017 1.300017 2015-05-14 13:17:39-04:00 America/New_York (TRIAL RELEASE) - cope with a double-encoding bug in Net::SMTP for details, 1.300016 2014-10-10 22:54:00-04:00 America/New_York - no changes since 1.300015, just made non-trial release 1.300015 2014-09-12 22:01:37-04:00 America/New_York (TRIAL RELEASE) - version 1.300008 was meant to rewrite line endings when sending to sendmail, but the change was not effective; it has been fixed 1.300014 2014-08-28 14:21:26-04:00 America/New_York - do not try passing an empty string as a Failure message 1.300013 2014-08-28 11:00:16-04:00 America/New_York - sometimes, if no error is given and $smtp->message returns (), the arguments to the Failure constructor were out of alignment and the failure's error message would be "code"; this has been fixed 1.300012 2014-07-10 09:55:35-04:00 America/New_York - documentation fix: there's no Email::MIME->delete_header (thanks, Kris Matthews) 1.300011 2014-03-02 18:16:12-05:00 America/New_York - run the sendmail program with -i by default (thanks, William Blunn) - do not die when a race causes mkpath(Maildir/new) to fail because the directory already exists 1.300010 2014-01-11 14:15:13-05:00 America/New_York - the SMTP transport now has a "debug" option 1.300009 2013-09-01 12:03:06 America/New_York see also 1.300008! switch to automatic determination of prereqs to improve accuracy 1.300008 2013-09-01 09:39:13 America/New_York at long last, Sendmail and Maildir transports replaces CRLF with CR before piping [BUG FIXES] fixes a bug where recipients beginning with a - would not work with the Sendmail transport [ #66246] require Email-Abstract 3.006, to get Email-Simple 1.998, to get Email::Simple->new(\$str), resolving [ #85926] 1.300007 2013-03-19 14:58:27 America/New_York when sending over SMTP, send DATA in hunks of 1 mebibyte or smaller 1.300006 2013-03-17 17:23:21 America/New_York re-fix the problem with attribute accessors and role methods clashing, previously fixed in 0.102360 1.300005 2013-02-14 11:37:09 America/New_York add missing prereq, Sub::Exporter; thanks for report, Esteban Manchado Velázquez 1.300004 2013-02-09 10:09:02 America/New_York bump required version of MooX::Types::MooseLike 1.300003 2013-02-06 15:56:53 America/New_York make Wrapper transports proxy is_simple and allow_partial_success to the wrapped transport allow Wrapper transports to construct their own targets; useful for configuring entire wrapper chain from the environment 1.300002 2013-02-06 14:06:24 America/New_York THIS IS A BIG DEAL: see v1.300000 this is the first non-trial release using Moo instead of Moose increase version of Moo to interoperate with ancient 1.300001 2013-01-07 21:38:31 America/New_York increase required versions of Throwable and Moo 1.300000 2013-01-02 22:42:58 America/New_York THIS IS A BIG DEAL: use Moo instead of Moose (thanks to Justin Hunter and Christian 0.120002 2012-09-11 14:43:07 America/New_York added shift_deliveries to the Test transport, for treating the sent messages like a queue of things to inspect 0.120001 2012-07-19 16:28:01 America/Los_Angeles no changes from 0.120000, just marked as stable release 0.120000 2012-05-08 20:53:43 America/New_York THIS IS A BIG DEAL: This release deprecates the scalar context behavior of: * Failure->recipients * Failure::Multi->failures * Failure::Multi->recipients * Transport::Test->deliveries * Transport::Failable->failure_conditions Until now, these methods returned a list in list context and an array reference in scalar context. This still works, but scalar context calls will now generate a warning. In one year (2013-05), they will be become fatal. 0.110005 2012-03-05 21:37:35 America/New_York binmode output handle to avoid line ending munging in Mbox and Maildir; thanks, Christian Walde! 0.110004 2012-02-21 17:47:35 America/New_York import the "Bcc" page from the (otherwise empty) github wiki; this adds some information to the QuickStart page about why Bcc support isn't there and why this isn't a bug 0.110003 2012-02-01 15:09:52 America/New_York add the add_lines_header and add_envelope_headers attributes to Maildir transports 0.110002 2012-01-31 17:02:35 America/New_York Maildir deliveries now have a ->filename method to tell you just where the mail was delivered 0.110001 2011-04-03 16:32:15 America/New_York prevent Test::MinimumVersion test from causing a requirement on T::MV and, thus, PPI! Thanks for the report, Matt S. Trout! 0.110000 2011-03-17 21:40:36 America/New_York provide a much clearer and more fatal error when SASL authentication has failed because Authen::SASL or MIME::Base64 is not available 0.102370 2010-08-25 08:37:22 America/New_York remove spurious prereq on Sys::Hostname::Long (thanks ABH) tweak some tests for truth/definedness in SMTP transport 0.102360 2010-08-24 07:47:24 America/New_York avoid the need to use "excludes" in role application; this silences warnings with Moose 1.10 0.101760 2010-06-25 08:18:26 America/New_York fix sendmail.t with latest Capture::Tiny (Justin Hunter) 0.100460 2010-02-15 12:58:18 America/New_York avoid using AutoPrereq, as it brings in build_requires as requires 0.100450 2010-02-14 17:55:48 America/New_York allow timeout option to SMTP transport 0.100110 2010-01-11 10:43:57 America/New_York Email::Sender::Failure is now a Throwable::Error now uses Try::Tiny for internal exception handling 0.093380 2009-12-04 12:29:55 America/New_York bump Moose prereq to 0.70 based on feedback from ANDK 0.093110 2009-11-07 allow uppercase env vars to set transport attributes (charsbar) add "message" attribute to successes returned by SMTP transports 0.092840 2009-10-10 fix packaging error 0.092820 2009-10-09 improve reliability of t/sendmail.t (thanks, Mark Grimes) 0.091940 2009-07-12 packaging fixes (EU:MM version for LICENSE param) rt #47817 0.091930 2009-07-12 add some more common sendmail locations to default search 0.091870 2009-07-06 exclude unwanted methods from Email::Sender::Transport to suppress a new warning from Moose role composition 0.091740 2009-06-23 no code changes remove prereq of Test::More 0.88; weird things happened 0.091661 2009-06-15 THIS RELEASE MAY BREAK YOUR CODE... but probably not Email::Sender::Simple has been added, along with a manual Email::Sender is now a role Email::Sender::Transport is now a role, too; subclasses will break 0.004 2009-03-24 require perl5 version 8 move to Moose; let's not mess around, the Moose/Mouse stuff is not worth the minor savings 0.003 2009-03-12 Sendmail transport now uses 2-arg open on Win32 so it can work at all Win32-friendly tests added for Sendmail by the ever-awesome DAGOLDEN 0.002 2009-01-31 fix minor documentation errors 0.001 2009-01-02 SQLite transport split into its own dist, removed from this QUIT when ending a transmission in non-persist SMTP 0.000 2008-12-10 first CPAN demo release; It Probably Works!
https://metacpan.org/changes/distribution/Email-Sender
robots: classic hostname: ip-10-137-6-227.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-40 operator: CommonCrawl Admin description: Wide crawl of the web for September 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.081841
456
{ "en": 0.9411773681640624 }
{ "Content-Length": "22465", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:LMESWQXMNYZVE3R2MANKXGWNQGPXURBI", "WARC-Concurrent-To": "<urn:uuid:0b0411ef-6731-4f5d-b594-42b4edfbc91c>", "WARC-Date": "2018-02-25T05:43:06", "WARC-IP-Address": "192.186.254.32", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:I5GUV6MD2QKSTWGCFLKAXLY545BMNYWJ", "WARC-Record-ID": "<urn:uuid:a0f3f6ff-5a45-4d3f-b4f2-6d1e410eba03>", "WARC-Target-URI": "http://emergencydentalnetwork.com/locations/baldwin.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ad97e09e-e22d-4f75-85ad-be4607b8b74b>", "WARC-Truncated": null }
916
(718) 475-9429 Emergency Dentist in Baldwin, New York Emergency Dentist 24/7 Baldwin, NY 11510 United States Call (718) 475-9429 Now! We are waiting to take your call. In addition to serving the emergency dental needs of Baldwin patients, our dentists are skilled in general dentistry, cosmetic dentistry and are available immediately to attend to your emergency dental needs. What is a dental emergency? A dental emergency can be a toothache an: Abscess, (infection) a cracked molar, an impacted wisdom tooth, or root canals, chipped teeth, loose teeth, cavities, veneers that came off, crowns that are about to fall off. An excruciating pain is often what leads a person to a call the emergency dentist who will be available to rid you of your dental pain and restore you to comfort by eliminating your toothache. The Emergency Dentist 24/7 does all procedures using state of the art technology and utilizes all of the most current sterilization techniques to assure you that the procedure will be pain free and successful. If you have a toothache, you don't have to suffer, not when you know there is an Emergency Dentist 24/7 in your city. If it is 3 am and you are awakened by the worst toothache in the world, we invite you to call Emergency Dentist 24/7 and talk to Caral (live). She understands and will get you through the trauma and the fear of the endless toothache. Your needs are her commands, because PAIN NEVER SLEEPS. YOUR PAIN IS OUR EMERGENCY! The Emergency Dentist is conveniently located, can be called 24/7 and is available weekends, holidays and 365 days a year. Call now! (718) 475-9429 Emergency Dentist Frequently Asked Questions Do you also do non-emergent dentistry? Are you really open all the time? Do you make house calls? I don't have insurance - can i still be a patient? Do you take checks? Do you take walk-ins? Are these real dentists? How much does it cost to have a tooth pulled?
http://emergencydentalnetwork.com/locations/baldwin.html
robots: classic hostname: ip-10-168-252-115.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-09 operator: Common Crawl Admin description: Wide crawl of the web for February 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.022477
1
{ "en": 0.9653653502464294 }
{ "Content-Length": "46982", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VSDNOZ4EJJJSBWZT6T3E4G3C6PAVSECG", "WARC-Concurrent-To": "<urn:uuid:1f8c9ca6-dae9-439f-b132-07d3976c06cf>", "WARC-Date": "2020-07-12T13:30:16", "WARC-IP-Address": "104.16.124.23", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:5PHRGQJBLROPEZEHM36LENYIFAH6HQSE", "WARC-Record-ID": "<urn:uuid:d3505320-88ce-4b82-ada3-5cb5f4df8dc3>", "WARC-Target-URI": "https://www.memri.org/reports/saudi-reformist-author-al-sharq-al-awsat-terrorism-cultural-phenomenon", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a48a6f16-a83a-465d-9166-e21d256a9eb6>", "WARC-Truncated": null }
1,761
June 8, 2009 Special Dispatch No. 2367 Saudi Reformist Author in 'Al-Sharq Al-Awsat': 'Terrorism: A Cultural Phenomenon' June 8, 2009 Saudi Arabia | Special Dispatch No. 2367 In an April 27, 2009 column titled "Terrorism: A Cultural Phenomenon," in the London daily Al-Sharq Al-Awsat, Saudi author and reformist Turki Al-Hamad stated that the Saudi schools' continued "dissemination of extremist ideology" is the reason for the failure to eliminate Al-Qaeda in Saudi Arabia, and adds, "We Are Muslims... but we are not by necessity Islamists - and there is a difference between Islam and Islamism." [1] The following is his column, in the original English. [2] "[The Arrests of Hundreds of Al-Qaeda Members in Saudi Arabia] Came... When We Believed That Al-Qaeda in Saudi Arabia Was Almost Finished" "An Al-Qaeda cell was recently arrested in Saudi Arabia; prior to this, a huge number of suspects were detained last year. All in all, 500 Al-Qaeda members were arrested in one big swoop [in June 2008]. Since early last year, a total of 700 people have been arrested on charges of belonging to the Al-Qaeda organization. They planned to wreak havoc across the globe by targeting the international economy by way of attacking Saudi Arabia's oil facilities and assassinating [Saudi] security and civilian figures. This came at a time when we believed that the Al-Qaeda organization in Saudi Arabia was almost finished, leaving only remnants behind. Then the news [of these arrests] reached us and we had no choice but to look at the issue again. "Three conclusions can be drawn from these reports - some of which are positive, but the majority of which are negative. "The first conclusion is that the fight against terrorism continues, and that the security efforts to pursue terrorism and the terrorists - especially in Saudi Arabia - are largely successful. This can be seen in the large number of Al-Qaeda members who have been detained, and the uncovering of the terrorist cell before it was able to carry out any terrorist activities. This is an effort that deserves praise, for were it not for the vigilance of the Saudi security forces in this area, and their efficiency in tracking down these terrorists, the situation could be much different. "The second conclusion is that the Al-Qaeda organization remains active and strong; evidence of this [conclusion] can be seen in the continued existence of the group despite all efforts [to wipe it out]. The recent lack of operations is nothing more than the organization lying in wait and recalculating, a change in tactics and strategy, in the way that a chameleon blends into its environment and lies in wait for its prey. The low profile that Al-Qaeda was keeping with regards to its strength and activities [in Saudi Arabia] was broken up by the Saudi security authorities' [arrest of its members,] and this raises the following questions: Why has Al-Qaeda remained attractive to a large number of our youth? Why does this organization gain so many followers despite all efforts to combat it at various levels?" "The Answer to [Why Al-Qaeda Still Gains Followers] Lies In... the Efforts Made to Combat Al-Qaeda" "Answers to questions like these vary according to circumstances such as time and place, and there is no single factor that can explain the endurance of Al-Qaeda and its ideology despite all efforts to contain it. Perhaps time and place are not the only circumstances that can explain Al-Qaeda's survival. To a large extent the answer to the above questions lies in the nature of the efforts made to combat Al-Qaeda, which at times address the results [of terrorism] - something that is necessary - without directly engaging the root of the problem. "Ultimately, Al-Qaeda's strength does not lie in the organization itself so much as in the environment that facilitates Al-Qaeda's recruitment of supporters and followers. And so, despite all the security efforts to combat Al-Qaeda and its active and sleeper cells, these efforts - which deserve to be praised - have ultimately not succeeded in rooting out Al-Qaeda. This can be seen in the continued existence of the organization in Saudi Arabia, as well as in the Al-Qaeda cell that was preparing to carry out operations [on Saudi soil]. This despite all the efforts of the security services and the Munasaha [rehabilitation] program, despite [Saudi Arabia's] opening the door to amnesty [for reformed extremists], and the government describing them as misguided rather than criminals. And so, despite all of these opportunities, the news that is continuing to be reported is that Al-Qaeda have a strong presence [in Saudi Arabia] and that their [terrorist] activities are ongoing. "Why is this the case?" "The Security Success in the Fight Against Terrorism... Has Not Been Accompanied by Successes in the Fight Against the Ideology Behind [It]" "The third and most important conclusion is that the persistence of Al-Qaeda is a result of the persistence of the circumstances against which Al-Qaeda is working; this provides the organization with a suitable environment for existence and vitality. The spread of an epidemic is not due to the strength of the virus itself, but due to the existence of an environment that provides the virus with the opportunity to grow and develop. The fight against the epidemic is therefore the fight against the virus itself, and so unless the virus itself is combated the epidemic will continue. The same can be said about Al-Qaeda. "In Saudi Arabia, for example, the security agencies performed their full role with regards to the detection, investigation and arrest [of terrorists], but this is not everything. Weeds return once they have been plucked out so long as their roots remain intact. The roots in this case, and in any real society, are the places of socialization, from homes to the mosque, from social clubs to the media and others. These help to shape an individual's personality from childhood, and help them move in one direction or another or at the least give the individual the potential of moving in one direction or the other. These institutions sow the first seeds that give rise to the core of thought and behavior; this supports the popular [Arab] proverb, 'One goes back to their roots.' "The security success in the fight against terrorism and the forces of destruction has not been accompanied by successes in the fight against the ideology behind this destructive behavior. What other explanation is there for the hundreds of Al-Qaeda recruits, a figure which represents only the tip of the iceberg, not to mention the silent followers and sympathizers. There is a defect - there can be no doubt about that - and this is in the damage that has been caused by the educational institutes [in Saudi Arabia] since we diverted from the correct path, socially and culturally, and we took up the labyrinthine ideology of the Sahwa [Islamic re-awakening] in the late 1970s [following the Mecca siege]. Educational institutes, without exception, began to reflect this ideology." "Schools and Educational Curriculums Continue to Disseminate Extremist Ideology - Despite Efforts to Reduce Its Impact" "This is an ideology that is in essence a culture of blood and death that calls for the elimination of the unbelievers - i.e. anyone who does not fully agree with this ideology - both within Saudi Arabia and abroad. All educational institutions then formed along this basis, in the light of the ideological struggle against the Iranian revolution that was attempting to export a different concept of Islam, as well as the political struggle against a superpower that was attempting to occupy Afghanistan in order to access the waters of the Gulf. These factors resulted in the state turning a blind eye to what was going on inside these educational institutes, and even in some cases encouraging what was going on there for political purposes, and so today we are reaping what we sowed. "Perhaps circumstance rules supreme, and the game of politics has its own rules, and some things are necessary. There is no shame in making a mistake - life in essence is trial and error - but it is shameful to deny making the mistake [in the first place] and to continue to make the same mistake over and over again. As for nations, it is wrong to continue implementing a policy that may have been effective once, but is a disaster once circumstances have changed. In the end, the wise man is one that not only listens to others, but who also listens to his own experience and history. Only the obstinate will deny that there have been efforts to release these educational institutes from their [ideological] captivity, but these efforts have only dealt with the visible tip of the iceberg. "This is where the problem lies: Schools and educational curriculums continue to disseminate extremist ideology, despite the efforts to reduce its impact, and [this] has resulted in the elimination of the effective education of any cadres by involving Islam in the fields of chemistry and medicine, resulting in the classification of humanity [into believer and unbeliever] and the promotion of hatred and a culture of death. Some mosques continue to give sermons calling for death, destruction and killing, but now we are in need of new sermons that call for tolerance and inter-faith dialogue, because we are all the children of Adam. We are in need of sermons that address the glories of life and humanity. At this point someone will ask: Are we supposed to leave behind our culture and religion?" "We Are Muslims... But We Are Not By Necessity Islamists - And There Is a Difference Between Islam and Islamism" "Of course not, for those that are in control of the world today have not forgotten their culture and religion; indeed they are well aware of their own religion, and of how the world works. We are Muslims, there is no doubt about that, but we are not by necessity Islamists, and there is a difference between Islam and Islamism. Before the Sahwa we were a society of Muslims, giving God his right, and not forgetting our lot in the world. But after the Sahwa and the kidnapping of our educational institutes, we became a society of Islamists forgetting our lot in the world. There is no getting out of this situation except by going back to the world that we neglected and returning to our Islam and our humanity. Without uprooting the intellectual and cultural roots behind extremism and violence, we will continue to be plagued by these [ideological] weeds, pulling them out but leaving the roots to remain and sprout once more. "Until the situation changes, Al-Qaeda and its supporters will continue to exist and appear in this same way." [1] To view the MEMRI TV page for Turki Al-Hamad, visit [2] Al-Sharq Al-Awsat (London), April 27, 2009. The text has been lightly edited for clarity; subheads added by MEMRI. Share this Report:
https://www.memri.org/reports/saudi-reformist-author-al-sharq-al-awsat-terrorism-cultural-phenomenon
isPartOf: CC-MAIN-2020-29 publisher: Common Crawl description: Wide crawl of the web for July 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-98.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.059806
0
{ "en": 0.9626752734184264 }
{ "Content-Length": "19975", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3MLXKCZZ7BOYZU2AM5KQEORHIMI43FNW", "WARC-Concurrent-To": "<urn:uuid:b7af861a-bb7d-463f-be83-a18a3856181b>", "WARC-Date": "2019-03-23T14:45:40", "WARC-IP-Address": "104.27.174.123", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:MPLRRHGUGBT7CJYWACGFZMC2YEQQJJCS", "WARC-Record-ID": "<urn:uuid:58ea0f87-d0eb-4c35-a15c-a7c87d4970c2>", "WARC-Target-URI": "http://hoploppitry.com/2018/12/16/common-signs-of-a-residential-plumbing-leak/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:285f9a92-350e-44ab-920d-009afa834bb1>", "WARC-Truncated": null }
445
Staying Up On Furnace Maintenance Common Signs Of A Residential Plumbing Leak Modern plumbing inside homes makes life much easier, but at the same time it means that homeowners need to be diligent about monitoring their home's plumbing and having leaks repaired promptly. A leaking pipe can waste a lot of water and also cause a lot of damage to drywall, insulation, and wood inside the home, which is why it is important to detect leaks quickly and call a plumber to make repairs. However, not all leaks are easy to identify and may not be obvious, especially since a lot of a home's plumbing is hidden behind walls and underground. Thus, homeowners need to pay attention in order to notice that there is a leak somewhere. Some common signs of a leak in a home's plumbing system include the following. Abnormally High Water Bill Typically, households consume about the same amount of water month after month, so water bills are usually somewhat easy to predict. So, if you receive a water bill that is much higher than normal despite not using more water than average, it may be a sign of a problem. First, call your utility company to see if the bill is an error. If the utility company confirms that the bill is correct, contact a licensed plumber with experience in leak detection to inspect your home's plumbing to see if there is a leak. Stains on Walls or Ceilings As a homeowner, it is always a good idea to regularly inspect your walls and ceilings for any signs of stains. If you have a pipe leaking, the water will typically discolor the drywall and paint, leaving an obvious stain. Also be on the lookout for bubbling paint on the walls or ceiling, as this can also be a sign that you have a pipe leaking water. You may also notice soft or spongey areas on the wall during your inspection, which indicates that there is moisture coming from somewhere. Puddles in the Yard It is also essential to look for signs of a plumbing leak outside your home. Most homes have a water main line as well as a sewer line that run across the property to the street in front of the house. These pipes are buried underground, so they can be hard to inspect, but if either one of them spring a leak you will find signs in your yard. In most cases, the most obvious sign of a water main or sewer line leak will be puddles in your yard, despite the absence of rain or snow.  To learn more, talk to companies like Laroc Refrigeration-Metal Division.
http://hoploppitry.com/2018/12/16/common-signs-of-a-residential-plumbing-leak/
isPartOf: CC-MAIN-2019-13 publisher: Common Crawl description: Wide crawl of the web for March 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-140-246-66.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.030598
7
{ "en": 0.9480893015861512 }
{ "Content-Length": "31371", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:NTWJO6N64OROUUVXSIYIVNMC62Y7THW6", "WARC-Concurrent-To": "<urn:uuid:c76a6f98-fbc0-4894-8ee4-bc2156ddf068>", "WARC-Date": "2014-10-22T22:24:41", "WARC-IP-Address": "66.111.97.227", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:MFZ6B6OCMOHGHFA6J5MJYVM2SXHR5ZYG", "WARC-Record-ID": "<urn:uuid:4a6cba61-33b6-45c9-b2f7-cdfaf51b6d5f>", "WARC-Target-URI": "http://www.metcruz.com/metro/11.15.06/metal-0646.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ba9fad82-10ff-4778-9b1a-149f9684bfde>", "WARC-Truncated": null }
779
November 15-21, 2006 home | metro silicon valley index | music & nightlife | essay Teeth of the Hydra Sound Bites: Metalists Teeth of the Hydra hail from red-state Ohio. Molten Mood Metal is for anyone who wants it, needs it and means it By Sara Bir IT IS a great time for metal right now—depending on whom you talk to. A bunch of ogling fair-weather fans have crashed the funeral procession that devoted metal heads have kept going strong for years without feature stories in Spin, thank you very much. The more metal, the better—but the world of metal is dark and unwelcoming by nature. Merely listening to metal does not make you hip. You have to get it, and not everyone does. Once primarily the province of deviants and long-in-the-jagged-tooth men and women with graying power mullets, metal is in the throes of a hearty underground renaissance. The best metal of now is vital and sincere, fueled by a potent mix of deft shredding, musical innovation and a fierce nostalgia for simpler times when men shamelessly wore leather pants and allowance money funded the purchase of cassingles at the drugstore. But what do I know? I don't listen to metal, and I never really have. Did that keep me from dressing up like a Viking on Halloween and attending a show by the Columbus, Ohio, band Teeth of the Hydra, whose new album, Greenland, wields an obvious Nordic slant? Oh no, it does not, and no one at the club gave me any grief for it. There was a disappointing dearth of obvious metalheads in the crowd—probably not unusual, considering that this was a CMJ Music Marathon event—although a chain-belted example of what I've heard called a "heshbag woman" accosted the right horn of my Viking helmet with a Sharpie, inscribing, "Suck the left one." But does one need to look metal in order to be metal? A lot of the press devoted to the current coolness of metal alludes to the disingenuousness of it, as if metal were a bandwagon for bored thirtysomething musicians to hop onto for wink-wink kicks. Metal is not a curio to be collected and displayed on a shelf of ironic delights, and fed-up critics roll their eyes at poseurs who maybe have a few Yngwie Malmsteen tracks on their mp3 player and call it a day. Metal, the music of outsiders, does not welcome day-trippers. And yet the cerebral side of metal has never been so accessible. Bands like Mastodon, Pelican, Priestess and High on Fire value melody over hypermasculine showmanship, and for those who don't respond to growling vocals and lyrical nods to pain, suffering and the Grim Reaper, it's a great time to check out up-and-coming, metal-lovin' bands. Metal has survived because of its adaptability. Its purity of intention—be loud, be angry, be drunk, get laid—remains the same. But its means of expression are elastic enough to encompass the most disparate subgenres: black metal, adventure metal, speed metal, hair metal, butt-rock and nu metal. Your average Hatebreed fan does not have much in common with the typical Whitesnake fan other than steadfastness—lovers of metal are faithful for life. That's why diehards clung tighter and tighter during the lean years after metal's height of popularity in the mid-1980s. Though not particularly visible, they continued to gather at clubs and amphitheaters across the country to worship under the flowing tresses of their gods. In his 2004 book, Too Fast for Love: Heavy Metal Portraits, photographer David Yellen presented these fans as an endangered species, his eager groupies and heavily tattooed, frizzy-haired men confronting the camera in a dare: Go ahead, make fun of me—I don't give a shit. But some of his subjects betrayed a melancholy resignation in their eyes, as if they knew their glory days had passed, leaving them with nothing but ritual pilgrimages to Poison package tours to bring back to life the days captured in Heavy Metal Parking Lot. The grandest thing about metal is its permanence. Its presence on our cultural radar might ebb and flow, but as long as the sun rises and sets, you will find disaffected, pimply, longhaired kids skulking around in ripped-up Levis and AC/DC T-shirts. Fashions change, but just like hippies, goth kids and punk rockers, the stalwart metal archetype soldiers on. Metal is for anyone who needs it and means it, and that includes slick urban dwellers in $300 jeans, awkward teens growing up on a farm in rural Iowa and 45-year-olds with office jobs, growing kids and beautiful metal memories of yore. Send a letter to the editor about this story.
http://www.metcruz.com/metro/11.15.06/metal-0646.html
robots: classic hostname: ip-10-16-133-185.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-42 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for October 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.037417
438
{ "en": 0.9539942145347596 }
{ "Content-Length": "123502", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:5G77LK7FDC4H6DSKNSYOCU3CZCNNI2AE", "WARC-Concurrent-To": "<urn:uuid:d4d246c7-7864-46fe-88d3-e73263fa0790>", "WARC-Date": "2017-10-19T08:58:15", "WARC-IP-Address": "172.217.13.225", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:66XY2FNA324NFIFAQ3KO6QTQOCJI76KC", "WARC-Record-ID": "<urn:uuid:f4bcd98a-210d-4b6c-93f5-c4a79d11983b>", "WARC-Target-URI": "http://economicrot.blogspot.com/2009/02/open-forum_16.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:325a7815-aaca-4f74-8d9b-762d73cfc85e>", "WARC-Truncated": null }
4,093
Thursday, February 26, 2009 Open Forum Feel free to post up your thoughts, links, hold a discussion etc here. At 2/16/2009 9:32 AM, Anonymous Anonymous said... China Doubts America's Debt? At 2/16/2009 9:54 AM, Anonymous Anonymous said... Revealed: The true horror of everyday life in Zimbabwe Starving children eat rats, families turn on each other and farmers kill their own livestock to survive. Smuggled film brings Mugabe nightmare to world's attention At 2/16/2009 2:01 PM, Anonymous Captain Moroni said... Vegas No. 1 In U.S.'s Most Abandoned Cities At 2/17/2009 9:05 AM, Blogger Ramanand said... Peter Schiff's latest article: Obama's Opening Salvo Key excerpts: There is nearly universal agreement that the opening salvo of the Obama Administration's campaign to restore health to the financial system, delivered this week by new Treasury Secretary Geithner, fell with a loud and ugly thud... In the worldview of Geithner and like-minded economists, credit, rather than savings, is the central figure in the economic equation. Therefore, he sees anything that eases the process of lending to be an effective economic policy... Credit, whether securitized or not, cannot be created out of thin air. It only comes into existence though savings, which must be preceded by under-consumption. In an interview following his announcement, Geithner stated that government should replace the demand lost by the private sector. However, those with even a marginal grasp of economics know that demand is unlimited. It is the ability to spend that is not. While Americans still want all the things they wanted years ago, they have made the rational choice that they can no longer afford to buy at the same levels they once did. Using a printing press to replace this lost 'demand' will simply cause consumer prices to rise. Printed money does not create new purchasing power, but merely redistributes it from savers to borrowers. And since the plan will severely undermine the real productive capacity of our economy, there will not be much purchasing power left to redistribute! At 2/17/2009 7:35 PM, Blogger Randy said... Thanks for the links everyone. I read/watched them all. This situation is becoming more dire by the day - Though I've been expecting much of this for years and though I'm already somewhat numb - the situation is still quite scary... I can't imagine what I would feel like if I were upside down on a home, had lost 1/2 my investments and my job were in jeopardy. But who knows, were merely seeing the beginnning of this crisis and things are happening quickly... I'm quite certain ALL OF US, regardless of background and preparation, will feel the negative impacts before all is said and done. Best regards At 2/18/2009 8:59 AM, Anonymous jerry said... The people have the power, but they choose not to use it. If they told their Congressperson and Senator that will no longer buy a darn thing unless it was needed for their day to day living, and will no longer borrow a penny from a large institutional bank unless they were in a real need to do so, and only then, they would go to their neighborhood lender to do it, we would scare the heck out of them. They all are so fearful of having deflation. They prefer inflation. By saying NO to spending and borrowing, no matter how much dollar printing would go on, many prices would stay low. Those who would hold dollars and cash would be doing much better because their dollars would buy more. The Con-gress does not want this to happen. People have the power here, but are unorganized and too dim to see it. At 2/18/2009 1:52 PM, Anonymous Willy2 said... The US economist Michael Hudson was always a critic of the US financial establishment. If anyone wants to know how corrupt this establishment is, then one should visit his website and read all the information which is provided over there. He regularly contributes to websites like Counterpunch and Globalresearch . This is his latest article from Counterpunch. And one should read his book (2003) Super Imperialism At 2/18/2009 5:08 PM, Anonymous Anonymous said... for people to buy that much treasury debt the stock market is going to have to fall by half to get the money out of private investments and into treasuries. At 2/18/2009 5:10 PM, Anonymous Brian said... great blog. I am an ex-police officer and like you have been warning family and friends about this for years. However, this is unfolding at a faster pace than even I believed. I wouldn't mind chatting with you, to compare notes. Dont' know whats the best way to get ahold of you. you can contact me above, if you like. We daytrade for a living and live this stuff. At 2/19/2009 11:32 AM, Anonymous jerry said... Gold the only remaining bubble?-article. interesting. read through the length responses, too. At 2/19/2009 7:29 PM, Blogger Ad Nauseum said... Roger Wiegand is one of the most unreliable sources you have ever sited. Please go to and search the site for his previous predictions, chart reads, etc. He is backed by the PM industry, as most of the Canadian hucksters are (David Morgan, Jim Puplava, etc.), but he is without a doubt, the worst at making predictions. Randy, you've done a great job but you have to pull back at some point and realize when you are being taken for a fool by con artists like Wiegand. At 2/19/2009 8:50 PM, Anonymous jerry said... Michael Pettis, Ph.D. writes about China's economics. Extremely worth reading.He is straightforward with no agenda. He teaches in China but lectures all over the world. At 2/19/2009 9:02 PM, Anonymous jerry said... check out this blogspot. He write on China's manufacturing, imports, exports, economy, and more, as well as US graphs on gold, dollar, treasuries. He has it all. At 2/19/2009 11:22 PM, Anonymous Willy3 said... I consider Roger Wiegand to be an optimist !! He certainly has overlooked some developments and he has more than once had his timing wrong but I consider him to be reliable and prescient. At 2/20/2009 9:43 AM, Anonymous Jim Forest said... Hi Randelle, I tried to refinance my house and condo, bank said no deal, Maxyn and I make too much money, I was current on my payments and the credit score is too good. I was setting down writing out my next mortgage payment and said “to hell with it”. I’ve quit my job and signed up on un-employment and welfare, let my house foreclose and I’m squatting, it’ll take the bank and sheriff 2 years to get around to evict me. I went and maxed out my credit cards on guns, ammo, food and toilet paper, I can coast for 3 years with buying anything. I have seen the promise land and have changed my political affiliation to democrat; the Anointed One will save me and provide for all my needs, If you can’t fight ‘em, join ‘em. Then I woke up and had to go work, oh well. At 2/20/2009 11:31 AM, Anonymous Anonymous said... Jim - Darn, I thought maybe you had started Jims Gulch. Guess I'll go to work too. At 2/20/2009 6:24 PM, Anonymous Anonymous said... Guns to Be Banned for Elderly Staff Reports United Press International At 2/20/2009 10:37 PM, Blogger Jim Twamley said... Randy,interesting take on Las Vegas by the UK Telegraph here: At 2/21/2009 2:35 AM, Anonymous Chandra Mohan said... Hi Randy, Hello there. I'd like to highly appreciate your work. Just felt to send across a link to read. I'm noticing how Obama is swiftly taking great many positive actions against all the globalists, Wallstreet fat cats, the neo-cons, et al.. What if Obama is acually the nemesis of the NWO people? Enjoy :) At 2/21/2009 9:11 PM, Anonymous jerry said... F. William Engdahl speaks on video series _part_4_ about what Obama needs to do now. At 2/21/2009 9:40 PM, Blogger Randy said... Jim F. - That was hilarious! I hope Maxyn is doing well. Give her my best. Willie 2 or 3 - are either or both of you who I think you may be - Prior AF? Jim Twamley - great link and your comments one recent post made much sense. Developing close friendships/relationships will become very important in the future. Thank you Chandra - Though I feel somewhat differently than you regarding the actions taken by Obama - we will soon see. Jerry - thanks for the link. Will read it tonight. My best regards to all and thanks for your support. At 2/22/2009 1:21 PM, Blogger Justin_n_IL said... "What if Obama is acually the nemesis of the NWO people?" Look at who he's surrounded himself with. Give me a break. At 2/22/2009 5:49 PM, Anonymous Willy2 said... What do you mean by "AF" ???? Please explain !!! Willy2 or Willy3 At 2/22/2009 6:37 PM, Blogger Randy said... AF = Air Force I used to know a guy in the AF named Willy (Wayne actually) and both his nickname ("Wideband") and his last name all started with a "W". Apparently it's not you, but thanks for replying. At 2/22/2009 7:57 PM, Anonymous Willy2 said... No, I am not from the AF. I am from the Netherlands in Europe. The reason I daily visit US websites, like ECONOMICROT, is this. European companies have invested hundreds of billions of Euros in the US during the last three to four decades. While on the other hands US companies (e.g. from the DOW JONES 30 and the S&P 500) have invested hundreds of billions of USD in Europe in that same timeframe, as well. E.g. General Motors has some 50.000 workers employed in the european carindustry in Europe. (And think of jobs involved in the carparts suppliers.) And the USD is still the world's reserve currency. So, when something dramatic occurs on either side of the Atlantic the other side WILL feel the impact as well. So, when GM goes belly up Europe WILL suffer as well. And on both sides of the Atlantic politicians are dragging their feet to tell the people the extremely ugly economic truth. That's why one has to turn to the internet for more and accurate information. At 2/22/2009 10:27 PM, Anonymous Willy2 said... The GM website says the company employs some 55.000 workers in seven countries. At 2/23/2009 6:19 AM, Anonymous Anonymous said... The entire global conspiracy is revealed here: Let's connect all the dots and call the co-conspirators out by name. At 2/23/2009 12:18 PM, Anonymous Jim Forest said... I guess WB Willy is still MIA, let me know if you hear anything. Anyway it's a race to bottom to see who gets there first. All a person can do is isolate himself and his family as much as possible from the effects of this mess (you can never be 100% isolated), you prepare as much as possible and try to ride it out for 6-12 months when the crash comes. Right now I'll still go to work, make money, save and buy what I want and get ready without going "chicken little" paranoid. I/you/we have a ring side seat to this disaster in the makings, set back, have a beer and watch it evolve. I believe BOA and Citigroup will shtf by May. Even if Prez Obama plan helps in the short term (< 4 years), the longer term effects will hammer us in inflated and even more worthless FRNs. If you just think about, the principal on the debt from borrowed money will never be paid back (which I doubt was every planned), it’s too great. But the interest on that debt must be paid by law. Therefore I think when the debt interest payment vs collect income taxes reaches 50%+ congress will have to increase taxes even more and/or inflate dollars and/or create/borrow more money (right now its some where’s around 30-35%, 500b interest payment vs 1.5T in taxes collected). The baby boomer will come on line in the next 5 years, more out flow, all the number are + -, but you get the idea, even if our income goes up and more taxes are collected, the insatiable feeding frenzy of congress will never go away. We need to drive a stake through this zombie. I think I’ll move to Bali, I have relatives there. Maxyn and I are going to Indonesia this year to see the in-laws. The Hindus are a smart and gentle people, I think I’ll buy an island, put on grass skirt and drown a worm. Say hi to the wife and gang, I’ll suck down a brew for you. At 2/23/2009 3:02 PM, Anonymous Anonymous said... I have some questions: (An idiot friend I'm trying to convice and he's real good at arguing) 1) Why did Zimbabwe experience Hyperinflation? 2) What happened to Iceland? 3) What is the US doing that will send us down the same path? 4) Our Debt as a percentage compared to our GDP has not reached its maximum, so we should still be ok right? 5) Iceland's Debt as a percentage compared to their GDP was not that large, why did they fail? 6) How much money has the US actually injected into the system in the last year or so...? 7) How much money has Zimbabwe injuected into their system in the last year or so...? 8) Why will the dollar collapse...? 9) Why are our bonds still valuable? 10) One could argue that this stimlus package will create and keep a lot of jobs. What is the counter argument? 11) What will it take for China to dump our dollars? Any help would be greatly appreciated At 2/23/2009 3:22 PM, Anonymous Anonymous said... I keep finding different values on how big the derivative market is. What is the definitive answer? Sources? At 2/23/2009 3:52 PM, Anonymous Anonymous said... 1) Why did Zimbabwe experience Hyperinflation? Confidence collapsed. 2) What happened to Iceland? Confidence collapsed. 3) What is the US doing that will send us down the same path? Killing public confidence. 4) Our Debt as a percentage compared to our GDP has not reached its maximum, so we should still be ok right? Wrong. Debt is ballooning at the same time as GDP is collapsing. Our debt can never be paid off. It will be defaulted on through currency debasement. 5) Iceland's Debt as a percentage compared to their GDP was not that large, why did they fail? Confidence collapsed. 6) How much money has the US actually injected into the system in the last year or so...? M0 - has more than doubled. That's about 1 Trillion, or slightly less. 8) Why will the dollar collapse...? International confidence in the dollar will collapse. 9) Why are our bonds still valuable? Because speculators are speculating on them expecting the Fed to buy them back giving the speculators a risk-free profit. No one is actually buying US bonds to hold them for 10 or 30 years. It's all a short term play that will end once they start monetizing. 10) One could argue that this stimlus package will create and keep a lot of jobs. What is the counter argument? The stimulus package creates no new productivity. It steals productivity from the private sector and redistributes it to the public sector where no new value is added to our economy. Taking from one pocket and putting less in another (because the bureaucracy steals a lot of it). 11) What will it take for China to dump our dollars? They will soon realize that what they hold is worthless. because if they dump it it's value drops and if they hold it it's value drops. Only when they buy more does it stay the same. But what good is money if you can't spend it. They will soon realize this paradox. At 2/23/2009 4:00 PM, Anonymous Anonymous said... Seems to be $1.14 quadrillion. But I assume you come from this thread. Most of these derivatives are like insurance policies. So do you value them at what the buyer paid? Or do you value them at what the seller will have to pay out if things go boom? Or do you value them at what they can trade for right now? Because they resell these little monsters. Or do you value them at the net value, where if A sold to B, and B sold to A, then they net out at zero. Many ways to value something that has no value and at the same time has too much value. At 2/23/2009 8:11 PM, Blogger glenn said... Randy, Thanks for your efforts. GREAT SITE ! Denninger all over AIG tonight at . I've been wondering - AIG operates in 130 countries of which the USA is one . Has 110,000 workers of which 30,000 (27%) are Americans. Yet American taxpayers 100% on the hook. Dot + Dot + are we getting closer ? At 2/23/2009 10:07 PM, Anonymous jerry said... I have to disagree-----the stimulus, although is not of the best quality, since it gives billions to the private sector in the form of mega-bank bailout and zombie cash injections, will create jobs, and put people back in the workforce for a period of time. Many of those people, who are now getting unemployment, or are currently underemployed, will go back into the workforce earning more than they are currently collecting or earning. Taxes will be paid to the government, and the employer will be making money, and a portion will be paid in taxes, too. The employer may actually expand his workforce, too. Not all the stimulus will be going to the public sector, actually only 4.5%. Actually, value IS added to the economy in that for every $1 issued in the form of stimulus, around $1.23 is returned to the government. The reverse occurs with bailout. During the 30 year long Ponzi scheme, beginning with Reagan and ending today, money had been taken from the working class pocket and placed into the non-productive economy called financial sector class. Most of which has burned up. If China dumps our dollar, they will be cutting their own throat by creating a trade protectionist war. That they don't want. All the currencies of the world are collapsing. The issue is how will oil be traded? At 2/24/2009 7:20 AM, Anonymous jerry said... An explanation to why Japan's economy had difficulty. At 2/24/2009 7:47 AM, Blogger Justin_n_IL said... Another good read from Quinn. At 2/24/2009 1:31 PM, Anonymous Anonymous said... At 2/24/2009 4:28 PM, Blogger Justin_n_IL said... At 2/24/2009 4:29 PM, Blogger Justin_n_IL said... Bank Nationalization Isn't the Answer At 2/24/2009 4:32 PM, Blogger Justin_n_IL said... How the Economy Was Lost At 2/24/2009 5:30 PM, Blogger Justin_n_IL said... Most of you probably know something about Sibel Edmonds. I have read a lot of articles concerning her story. It's more evidence of utter corruption among the upper echelon. Pass this around to your friends. Sibel Edmonds At 2/24/2009 9:19 PM, Blogger Rob said... Great site. Man, I wish I had found it before PCSing here to Nellis from Aviano a couple of years ago...and buying a house. That underwater, 1/2 investments, job loss (wife) scenario you mentioned above...yeah, that's me. :-) Fortunately, I have the relative guarantee of the military paycheck and healthcare. Vegas may have wiped me out but I should be able to rebuild. Take care, keep up the great work. At 2/25/2009 2:49 PM, Anonymous Willy2 said... According to this graph the US economy already started to tank in the 4th quarter of 1997. The average number of (overtime) hours worked per week peaked in late 1997 and did not fully recover during the timeframe 2003-2007. Other scary graphs are this one and this one. See how the graph fell off a cliff in 2001. This was IMO the reason Alan Greenspan agressively lowered interestrates in 2001.This website has many interesting graphs available. At 2/25/2009 5:12 PM, Blogger Justin_n_IL said... Everybody can relax. Here is what Ben said. "There is a reasonable prospect that the current recession will end in 2009" At 2/25/2009 5:45 PM, Blogger Justin_n_IL said... A clip of Ron Paul on CNBC. Notice how the bobblehead anchors loathe his harsh words of reality by dismissing missing the opening statements as a waste of time. Ron Paul clip At 2/25/2009 6:34 PM, Blogger Justin_n_IL said... A planet at the brink? At 2/25/2009 7:46 PM, Blogger Justin_n_IL said... The Crisis of Credit Visualized - Part 1 At 2/25/2009 8:24 PM, Anonymous Happy as a clam said... Just wanted everyone to know that I ordered some silver from the link on the right side of randy's blog (SuperiorSilver)about 1 week ago (I spoke with David) and just received my beautiful Liberty Buffalo coins. A Great experience and I'm happy as a clam! At 2/25/2009 9:23 PM, Anonymous Anonymous said... At 2/25/2009 11:38 PM, Anonymous Captain Moroni said... So I've looked at the Global Money supply and I've made a conclusion. Someone correct me if I'm wrong. Suppose The United States didn't print anymore money. If an honest correction were to be made of all currencies, the dollar would devalue greatly. It is one of the most abundant currencies, so therefore it should be worth the least right...? (Supply/Demand rule) And this is if no more were printed... At 2/26/2009 12:03 AM, Anonymous Anonymous said... I believe the US Dollar was already hyperinflated as of 12 years ago from an Austrian Economics perspective. There is always a delay between printing and price inflation. The 12 year (or more) lag is due to A) Asia soaking up excess $'s B) 9/11 and the war on terror soaking up excess $'s, and C) Housing bubble soaking up excess $'s. Now with all the sponges gone, those excess $'s must find somewhere to go. I agree with you. We are in trouble even WITHOUT the current printing! At 2/26/2009 5:46 PM, Blogger JustiN_N_il said... I've became rather fond of James Quinn's point of view though I don't agree with everything he says. He released another barn burner article today. Here's the link for that As General Motors Goes, So Goes the Nation. I noticed that he has his own site now called "The Burning Platform". Not sure how long it's been around but I just noticed it tonight. So anyways here THE BURNING PLATFORM is the link for it. Post a Comment Links to this post: Create a Link << Home
http://economicrot.blogspot.com/2009/02/open-forum_16.html
robots: classic hostname: ip-10-137-158-248.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-43 operator: Common Crawl Admin description: Wide crawl of the web for October 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.075444
84
{ "en": 0.9716715216636658 }
{ "Content-Length": "71235", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2G24YRBX4R5NQCO3GGFI7KYXZUWO5WJK", "WARC-Concurrent-To": "<urn:uuid:485458de-8cc6-4dd0-978b-fa28d124fb55>", "WARC-Date": "2016-12-05T16:35:14", "WARC-IP-Address": "5.135.200.4", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:FEKG47XAXWACWBK24TBRQ2D2M2CINXZC", "WARC-Record-ID": "<urn:uuid:15b08da2-220d-46ca-9379-3f9efacab9f2>", "WARC-Target-URI": "https://www.wsws.org/en/articles/2014/07/22/russ-j22.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:efe4a2eb-d8af-4c52-ae75-3f01b6a2fa9a>", "WARC-Truncated": "length" }
956
Russian army data points to Ukrainian role in Malaysian Airlines MH17 crash By Alex Lantier 22 July 2014 At a press conference yesterday in Moscow, the Russian Defense Ministry presented detailed radar and satellite data on the movement of forces loyal to the Ukrainian regime in Kiev before Thursday's crash of Malaysian Airlines flight MH17. This data raises the most serious questions about the possible involvement of the Kiev regime and its Western backers in the crash. The evidence presented by Lieutenant General Andrei Kartopolov, the head of the Russian armed forces' Main Operations Directorate, shows that MH17 was being trailed by a Ukrainian fighter jet and was in range of Ukrainian Buk anti-aircraft missiles and fire control radars at the time of the crash. The Russian data confirms Russian and European media reports, citing Kiev air traffic controllers, that Ukrainian fighters and air traffic control were following the plane intensively just before it crashed. Kartopolov presented radar data showing a Ukrainian jet, apparently a Sukhoi-25 fighter, following the Malaysian jetliner. “A Ukraine Air Force military jet was detected gaining height, its distance from the Malaysian Boeing was 3 to 5 km,” he said. “[We] would like to get an explanation as to why the military jet was flying along a civil aviation corridor at almost at same time and at the same level as a passenger plane.” Kartopolov noted that this fighter jet was itself in position to destroy the passenger liner with a missile. “The SU-25 can reach an altitude of 10km, according to its specifications. It's equipped with R60 air-to-air missiles that can hit a target at a distance of up to 12 km, up to 5km for sure,” he said. At the same time as it was being trailed by a Ukrainian fighter, MH 17 “deviated from its route towards the north,” Kartopolov reported. “The maximum deviation was 14 km.” Kartopolov also presented Russian satellite images dated July 14 of Ukrainian Buk surface-to-air missile batteries—the type of missile that Washington alleges brought down flight MH17—stationed near Luhansk and at a Ukrainian radar station near Donetsk. On July 17, the day of the MH17 crash, however, one of the missile batteries was moved from this area to a location from which it could have fired on and destroyed flight MH17. This movement of the missile launcher is extremely unusual, as the Ukrainian Buk missiles were being deployed to an area near the main pro-Russian separatist bases. It begs the question of why the Kiev regime would have risked sending a missile battery to such an exposed location. Russian images after the crash, dated July 18, showed that the missile battery had moved back to where it had been previously. Kartopolov also said that Russian forces had detected increased electronic activity by radar stations providing targeting information to the Ukrainian Buk batteries. “On July 17 the intensity of Ukrainian radar stations increased to the maximum,” he said, adding that seven Ukrainian radar stations were active in the region on July 15, eight on July 16, and nine on July 17. On July 18, however, only four were operating, and only two on July 19. He also called on Washington to publish the data from a US satellite that Russian forces tracked over east Ukraine at the time of the crash. While US officials have said that their satellites detected the heat signature from the firing of a missile shortly before MH17 crashed, they have until now refused to publish any satellite data or identify specifically who they believe launched the missile. “According to the statements of US representatives, they have satellite pictures confirming that the [missile] launched toward the Malaysian plane was carried out by militia. But no one has seen these pictures,” Kartopolov said. Kartopolov's presentation is a devastating exposure of the mind-numbing propaganda campaign of the Western governments and media, where the claim that is universally accepted is that Russia and pro-Russian separatist groups fighting the Kiev regime in east Ukraine are responsible for the crash. This grotesquely one-sided presentation, totally excluding the possibility of foul play by the Kiev regime, is a fraud aimed at keeping the public in the dark on basic facts surrounding the crash. The detailed evidence presented by Russia and Washington's silence strongly suggest that the data Washington in fact has does not support, but rather undermines, its own propaganda campaign against Russia, pointing instead to the Kiev regime. This immediately raises the questions of the responsibility of the Western imperialist powers, above all of elements of the American state, in the destruction of MH17. The fascist militias and National Guard units Kiev has deployed in east Ukraine work closely with CIA operatives and mercenaries from the US firm formerly known as Blackwater. Significantly, while Obama has repeatedly spoken on the Ukraine crisis in order to cynically denounce Russia, he has himself never formally taken a position on who ordered the shooting down of MH17. The US president has not made any more specific statement on the issue of who fired the missile since then. If sections of the US state and its allies in Ukraine carried out the attack on MH17, it is not certain that Obama would have been aware of the operation—a fact that might explain the president’s equivocal and uncertain statements on the matter, even as he escalates threats against Russia.
https://www.wsws.org/en/articles/2014/07/22/russ-j22.html
robots: classic hostname: ip-10-31-129-80.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-50 operator: CommonCrawl Admin description: Wide crawl of the web for November 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.022493
0
{ "en": 0.9072397351264954 }
{ "Content-Length": "72534", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:R2ZTRTDEBANHGXOWVEBT6XETFCJILWRZ", "WARC-Concurrent-To": "<urn:uuid:711059ac-18b6-4562-83b7-1a9850eb9875>", "WARC-Date": "2020-09-26T14:24:09", "WARC-IP-Address": "3.234.104.255", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:JNBID6UAEXWCF7Q2ENEPUIVW4EFLFCCE", "WARC-Record-ID": "<urn:uuid:69924c86-2c70-4e1e-9ced-060697efe97d>", "WARC-Target-URI": "https://boillybelly.com/keto-breakfast-recipes/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:47b0a4ca-e0ef-4ae1-8145-87c614e7b361>", "WARC-Truncated": null }
1,302
20 Easy Keto Breakfast Recipes You are on your diet following style Ketogenic diet but too busy to prepare breakfast every morning? This article is just for you! A quick low-carb breakfast doesn’t hard as you thought, check out 20 recipes belows that spending 30 minutes or less of your time. 1. Muffin with sausages Recipe: Word to your Mother blog Delicious muffins are the perfect low-carb breakfast with under 2 net carb per one, high protein but healthy. With nice sausages, cheeses, eggs, onions and you have muffins that can be breakfast or healthy snacks. Nutrition per muffin: 220.8 cals, 13.8g total fat, 1.6g carbs, 20.7g protein. 2. Crustless tart Recipe: Kalyn’s Kitchen Prepare some mini tarts for breakfast to start your day. Crustless tart is a gluten-free and quick breakfast. This tart includes fresh mushroom and rich goat cheese. Cook time is just 27 minutes, very perfect for a busy morning. Nutrition per tart: 712 cals, 10.6g carbs, 62.5g total fat, 28.3g protein. 3. Egg muffins with sausages and veggies Recipe: My natural family Easy to customize, high protein, this healthy breakfast can keep you full until lunch. This meal can be eaten alone or you can eat with a green smoothie. Especially, these muffins can be made ahead and heat up when you eat, so quickly when you have a busy morning. Nutrition per muffin: 201.9 cals, 14.5g total fat, 1.1g carbs, 15.8g protein. 4. Baked eggs Recipe: Savor and savvy This meal can be made by oven – very convenient. Just eggs and some spices, one minute and boom! You have a quick and delicious low-carb breakfast. Baked eggs is the great way that save your both time and money. Nutrition per baked egg: 394 cals, 4g carbs, 21g protein, 32g total fat. 5. Bacon cupcakes with eggs and cheeses Recipe: Tasteaholics This is an easy breakfast that you can cook in the oven or make a giant pancake on a pan. You can add in your favourite cheese and some bacons and fresh veggies. It’s quick to bake and so tasty for all days of week. Nutrition per cup: 101 cals, 7g total fat, 8g protein, 1g carbs. 6. Blueberries and almond flour muffin Recipe: Whole some yum This meal is not too hard to cook. Almond flour has low carb and make the muffin light and beautiful color baked. Besides blueberries, you can add nuts or sunflower seed, this will make your muffins richer and more tasty. Nutrition per muffin: 217 cals, 19g total fat, 7g protein, 6g carbs. 7. Breakfast casserole Recipe: The diary of a real house wife A quick and low-carb casserole will not have bread or potatoes. You should only add veggies, sausages and eggs or a little cheese. This meal can be made ahead and it doesn’t get soggy if you leave it overnight. If you make it fresh, it takes 40 minutes baking so think about it if you have not much time tomorrow morning. Nutrition: 314 cals, 23g total fat, 19g protein, 4g carbs. 8. Low-carb pizza for breakfast Recipe: My life cook book The best convenient meal maybe is low-carb pizza, you can add topping by anything you want, but just healthy ingredients to make sure this is a low-carb pizza. Almost combinations of the ingredients can work. You can use an oven or a pan as well. Nutrition per pizza: 307 cals, 24.3g total fat, 2.6g carbs, 18.4 protein. 9. Keto cream cheese pancake Recipe: I breathe i’m hungry A little sweet for a beautiful morning – how wonderful. Don’t worry, this cream cheese pancake is absolutely low-carb. It’s easy and quick like a regular pancake so you totally cook it in the morning and it doesn’t waste your time. Nutrition per pancake: 344 cals, 29g total fat, 3g net carbs, 17g protein. 10. Eggs muffin with cheese, ham and green bell peppers Recipe: Kalyn’s kitchen This delicious low-carb breakfast but high protein will keep you full until lunch. The easiest way to get eggs muffin ever by grabing the ingredients in a cup and bake it. You don’t have to spend much time to cook this in the morning. Nutrition per muffin: 82.1 cals, 5.2g total fat, 2g carbs, 7.1g protein. 11. Mini quiches Recipe: Tasteaholics Quiches are the perfect morning solution for breakfast. And conveniently, it absolutely can be made ahead of time. You can make as many quiches as you can and keep them in the fridge. In the morning, just one minute quiches in the microwave to have a delicious and quick breakfast. Nutrition per quich: 287 cals, 21g total fat, 17g protein, 4g carbs. 12. Savory zucchini muffins Recipe: Keto diet app Savory zucchini muffin is a delicious, light and moist breakfast, brings to you the energy for all day. It’s low-carb meal and you can use it for every meal in the whole day. If you like vegetables, you can make this muffin with potatoes and mozzarella. Nutrition per muffin: 4.8 carbs, 12.9 protein, 16.6 total fat, 215 cals. 13. Cauliflower hashbrowns Recipe: Keto connect Cauliflower hashbrowns is super easy to make, just 3 main ingredients egg, avocado and bacon, you can add beef, sour cream, or cheese if you want but to make sure the meal is low-carb, 3 ingredients is enough. Nutrition per hashbrown: 164 cals, 5.2g carbs, 7g protein, 11.25g total fat. 14. Sausages and eggs muffins Recipe: Joy filled eats The great idea for a busy morning is sausage and egg muffin. This breakfast has high protein to keep your energy all day. Enjoy it with green smoothie or some baby tomatoes is perfect for the breakfast. Nutrition per muffin: 246 cals, 19g total fat, 2g carbs, 14g protein. 15. Coconut breakfast porridge Recipe: Low carb yum This recipe clear has no oatmeal in, instead of mock oatmeal cereal made with coconut. You can control the psyllium husk to get low carb, add some berries to get a beautiful and delicious breakfast for your morning. Nutrition per bowl: 303 cals, 25g total fat, 17g crabs, 3g protein. 16. Keto breakfast casserole Recipe: Food faith fitness A perfect low carb breakfast for you, it’s gluten-free, healthy and luckily, it can be made ahead. You will have a Italian taste with this meal cause the sausage, egg and red peppers without bread. Nutrition per casserole: 515 cals, 40g total fat, 2.3g carbs, 34.8g protein. 17. Keto sandwich Recipe: Hey keto mama Hungry for sandwiches but it has too much carbs? This is your perfect choice. A quick and easy breakfast that healthy and ketogenic. Egg and tomato, spinach for the inside ingredients and sausage patties instead of bread. How smart! Nutrition per sandwich: 603 cals, 7g carbs, 22g protein, 54 total fat. 18. Cheese crusted omelet Recipe: Diet doctor An omelet is popular breakfast but if you are on a diet, try cheese crusted omelet to keep your energy but still not make you fat. This quick keto meal can be use for breakfast, lunch or dinner. Make sure this omelet is so irresistible and tasty. Nutrition per omelet: 789 cals, 66g total fat, 8g carbs, 41g protein. 19. Cabbage hashbrows Recipe: Delish Hard to believe the hashbrown is made with cabbages. But it’s very tasty and makes you feel like potatoes. You need about 25 minutes to finish this meal, but it’s worth to have a delicious low carb breakfast. Nutrition per hashbrown: 13.4 cals, 0.2g total fat, 2.8g carbs, 0.7g protein. 20. Keto smoothie Recipe: Delish This keto smoothie uses berries as the main ingredients. They have lower carb than other friut such as bananas, mangoes or pineapples. Just berries and a little coconut milk to have a tasty and gorgeous red smoothie. Nutrition per cup: 241 cals, 22g total fat, 7g carbs, 0.2g protein.
https://boillybelly.com/keto-breakfast-recipes/
isPartOf: CC-MAIN-2020-40 publisher: Common Crawl description: Wide crawl of the web for September 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-206.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.045565
15
{ "en": 0.8547742962837219 }
{ "Content-Length": "41456", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TID4XXU5AFS2SGPJRTARAI76JOIGYN4D", "WARC-Concurrent-To": "<urn:uuid:052120d7-e998-41b7-a798-c326c03e84b3>", "WARC-Date": "2017-02-27T06:42:45", "WARC-IP-Address": "208.113.209.121", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:JTZPGOCYZBA7YZ3FULWIPUPWRCGBL5GJ", "WARC-Record-ID": "<urn:uuid:efa64265-6aa9-4c2a-b9cc-26792954f75a>", "WARC-Target-URI": "http://slimber.com/gallery/image/branch-silhouettes:g83541.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0da64152-19bc-4dc3-bf4e-0fdfd8361622>", "WARC-Truncated": "length" }
650
Image info Jowie Languido comments: 40 Branch Silhouettes The silhouettes tree branches in the Alps before dawn. Other drawings by Jowie Languido ayisha2012-12-19 12:37:57 omg. that is the most awsomest most coolest drawing ever. you are talented. Katya F2012-11-19 11:24:52 You are brilliant at this.Iam really stunned.WOW.I meanI could never do anything like this. 1lulu7772012-06-26 05:54:45 ThePainter2012-06-06 07:59:57 I just watched the replay of you drawing this and it's EPIC Angy2012-05-05 08:07:51 Hurricane :)2012-04-16 17:53:29 One word!!! WOW!!!!!! Phosie2012-03-22 14:35:29 Holy crap how did you make this? This is AMAZING caca popo2012-03-18 09:06:13 allizae2012-03-09 06:30:48 tinkerbella/myja2012-03-09 06:30:08 hi u did great allizae2012-03-09 06:28:27 hey myja tinkerbella/myja2012-03-09 06:28:22 hey u girl hamster2012-03-04 11:11:12 just great it looks so real!!! i love it <3 Wolfen1012012-03-02 10:15:38 5 stars 4 u! Wolfen1012012-03-02 10:15:22 this has to be a photo. SO FRIGGIN EPIC! ~Francesca Mallinson~2012-03-02 09:28:58 This is a very good capture of the scene, amazing detail. I hope to be like you someday, i guess my art's ok, but it's not as good as yours. You're great at landscapes! Rosy2012-02-19 02:50:18 that is awesome!!!!!!!!!!!! You are a talent! It looks so real! so I´m a big fan of you! What I would do, that I can draw something like this! Great Job. I´m a big fan of this website! Here are pictures, wich are so fanatsic!!!!! Please draw more !!!!!!!!!!! Sushmit 22012-01-14 01:31:50 Wow! As a proffesional slimberer, that is really good. It is just like a photo.... sophiebunny452012-01-08 14:39:32 you are so good of a artisist confused2011-12-29 21:27:32 i love this... seriously dominick perez2011-11-29 14:00:36 dominick perez2011-11-29 13:59:58 WOW! I Thought i drew really good but dude, u hav some talent!!!!!!!!:D hater2011-11-20 10:47:56 hahahahahahahahahahahaha at the comment of nayeli lol it's so funny wahahaha brokeback??? dear jowie lagioido it seems as you like edong and if you don't it just seems like it. P.S.your drawing are amazing dude thats what i call talent Sarah2011-11-02 11:02:26 You are great! I love the water, how did you do that on the computer??? I can never draw that good :( but you are the best of the best :) Krishna.s 2011-10-26 19:02:40 better than best!! well done u should def make real paintings for people to buy! i know i spend big money on that good dog2011-10-19 16:31:24 Great work nayeli2011-10-17 18:48:25 dear jowie lagioido P.S.your drawing are amazing dude thats what i call talent Jowie Languido2011-10-02 18:42:06 thanks edong.. shishishi edong2011-10-01 14:54:31 deym i waited for your latest drawing.. ur drawings are just the best! hater2011-09-25 15:03:56 bonggacious huhuhuhuhuhuhu i will defeat you alll, and also you jamarcus waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Jowie Languido2011-09-24 23:37:23 Thanks Jamarcus Jamarcus2011-09-24 04:40:25 Wow! Jowie, ur the best!! Dreama 7282011-09-21 14:46:57 My hubby thought this was a photo......... MamaKat2011-09-21 08:02:42 This is just amazingly good! Dreama 7282011-09-20 21:03:28 Fantastic........looks real Jowie Languido2011-09-20 18:21:29 Thank you so much guys I'm glad you like it. All of you are my inspiration, I'm glad that you like my art. I'm a lazy artist, my only inspiration to paint is you guys. Thank you. Lemontree 20112011-09-20 14:58:38 this is really fantastic. I'm clapping! :) Steeben 32011-09-20 10:59:11 i just CANNOT get over on how amazing this and you are. OHMYGOODNESS I'M JUST GOING CRAZYYYYY why is it so good? not to mention this is only your second page of drawing on slimber and your FOURTH drawing got 24 comments! i had to go through 2 accounts to at least get comments normally and you... youu are amazing. this picture is great! i can't get over it lol i love the detail you put in the water and everything GREAT JOBB!!!!!! GOD BLESS YOUUUU Jenny2011-09-20 08:28:19 it's amazing Irena2011-09-20 02:27:38 This is brilliant! wow!
http://slimber.com/gallery/image/branch-silhouettes:g83541.html
robots: classic hostname: ip-10-171-10-108.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2017-09 operator: CommonCrawl Admin description: Wide crawl of the web for February 2017 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.026734
48
{ "en": 0.9591766595840454 }
{ "Content-Length": "48806", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:QDPFRY6HK737OQFTRSROLQLBK5NA5H4Z", "WARC-Concurrent-To": "<urn:uuid:de86988a-0466-4cdf-a58e-b2de4e2f2d27>", "WARC-Date": "2019-10-23T02:02:46", "WARC-IP-Address": "23.227.38.64", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:JNVQ2QRRXI457EJA6XC3KRHE5EF2MFLM", "WARC-Record-ID": "<urn:uuid:7143b271-88c2-4fd5-b0e2-23a8d41daf49>", "WARC-Target-URI": "https://www.waldorfpublications.org/blogs/book-news/96770305-there-s-science-and-there-s-science-part-ii", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e12d0a1b-ad4c-4d47-8fb3-4bf122cfd7be>", "WARC-Truncated": null }
560
There’s Science and There’s Science! Part II April 12 2016 There’s Science and There’s Science! Part II When children in Waldorf schools turn nine they explore how the people of the world make their dwelling places using the many substances of the Earth. In grade four they study the animals of their home surroundings and far beyond. The almost universal tendency of children to love animals makes for lessons of real enjoyment as the special qualities and abilities of each different animal is studied. The animals are compared to the students themselves. The students find they cannot do the unique work of one or more animals – they cannot fly like an eagle or cut down a tree with their teeth like a beaver, but they can with their hands make tools to do these tasks. What Animals Say to Each Other is a ticklingly fun book of imagining what animals might say if they could only speak as humans do. The animals talk in little verses and rhymes of their lives in different habitats. The author, Jakob Streit, reveals himself as a naturalist of the highest order as his poems hold truthful characteristics of the animals. Jakob Streit’s father kept bees and the breadth of his knowledge about bees and their cycles and how they live is science at its story best in these two books; The Bee Book and Little Bee Sunbeam In grade five, students delve into plant life and find plants in their own schoolyard or home backyard and examine them closely. After the years of learning to observe, the children are keen detectives tending to delight in finding the names of trees and seeing how a plant in shade might look very different from a plant in bright sunlight, even though they came from exactly the same kinds of seeds. Waldorf Publications carries a book called The Dandelion’s Cousin which is about a relative to the Dandelion - almost the same but different in many ways. This wonderfully illustrated story defines the families of plants and how they can be different while of the same clan – just like human beings! The Dandelion's Cousin In the sixth grade Waldorf curriculum the sciences pour forth with physics, astronomy, mineralogy and geography. Then in seventh grade students are taught chemistry, physiology, mechanics, and more complex astronomy. In these middle school grades the teacher asks a great deal of students insisting on very clear and objective observation of experiments. By eighth grade, the students are becoming real scientists in the classroom. Chemistry continues, physics moves beyond mechanics into hydraulics and electrical currents. Students often build their own motors. Geography holds geology in it. Anatomy follows on physiology; geometry, algebra, and math spill into physics as the phenomena of the Earth are observed.   Many understand that in Waldorf schools textbooks are not much used. The students make their own books, filling blank pages with writing of what they have discovered, of what they have learned. They illustrate their lessons with beautiful pictures of the experiments they have observed.
https://www.waldorfpublications.org/blogs/book-news/96770305-there-s-science-and-there-s-science-part-ii
isPartOf: CC-MAIN-2019-43 publisher: Common Crawl description: Wide crawl of the web for October 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-81.ec2.internal software: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.112893
81
{ "en": 0.9444197416305542 }
{ "Content-Length": "244517", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:AZKJNLYFCQWGBOYCTY5O2U7VB4WGSDWF", "WARC-Concurrent-To": "<urn:uuid:f4ce83ea-f90e-4cbe-9681-525d1f989003>", "WARC-Date": "2018-12-13T06:22:23", "WARC-IP-Address": "77.104.144.144", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:VU3WBT7ZWQGYV57LVZ3IMCDBUEHVNZBA", "WARC-Record-ID": "<urn:uuid:34432788-ef94-4c63-a15d-905ce3fa6008>", "WARC-Target-URI": "https://weightlosstweets.com/2018/04/22/fast-diets-plans-to-lose-weight-in-a-week-or-less/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a5766ea1-55bc-40e9-b6a3-330c6757805e>", "WARC-Truncated": null }
643
 Fast Diets Plans to Lose Weight in a Week or Less | Weight Loss Tweets Fast Diets Plans to Lose Weight in a Week or Less Is there any such thing as fast diets? On most diets, you will lose 1 to 2 pounds every week. This isn’t enough if you have a wedding, high school reunion or other event coming up in a few weeks and you need to lose weight now. This article will look at fast diets that really work. Here’s the fast diets plan to lose 20 pounds of body fat in 30 days. This is a tried and tested program. You must stick to every detail. If you fall off the wagon in any regard, you will not lose the desired weight. One of the advantages of fast diets though is that you can do anything for just one month, right? First of all avoid any white carbohydrate. This means that you cannot eat bread, rice, cereal, potatoes, pasta, or food friend with breading. There is one exception to the rule. You may eat a small quantity of these foods within 1 hour of finishing a resistance training workout where you exercised for at least 20 minutes. Next, you will need to develop a few meals and eat them repeatedly. The most successful dieters eat the same few meals over and over again. That may be because they get bored with the food and consequently eat less. Each meal should have one protein source, one legume, and one kind of vegetable. Your fast diets depends on eating food over and over. You should have a maximum of four meals picked out. Every time you sit down at the table, you should have one of those four meals. One example is three egg whites and one whole egg mixed with a generous dose of spinach and a side of black beans. Another example is lean ham and lentils with mixed vegetables the next. Your protein sources can consist of egg whites plus one whole egg, skinned chicken breast, grass fed lean organic beef, and lean pork. Any legumes (beans) and vegetables are acceptable. You can eat as much as you’d like of these meals. Eat until you are full. Remember, that over the course of the month, you will get tired of the meals on your fast diets and you will gradually eat less. You should aim to eat at least 4 to 6 times a day. A reasonable daily schedule while on the fast diets is to get up at 7:00 and have breakfast by 8:00. Be like a hobbit and have a first lunch and a second lunch at 11:00 and 2:00 respectively. “Tea” can come at 5:00 and then finish your eating with dinner at 8:00. The next rule of fast diets is not to drink your calories. This means no milk, fruit juice, regular sodas or coffee with cream. Instead, you can have unlimited diet sodas, unsweetened tea, coffee, and of course, water. Finally, every seventh day, you get a day off. Go out of your way to eat ice cream or potato chips. There are two reasons for this. First, it will help you stay on your fast diets the other days if you know you get a break from time to time. The other reason is that this will give you a spike in calories which results in your metabolic rate being re-set. If you have ever reached a plateau in dieting, you know how your body can adjust to fewer calories by burning less. Your day off gives your body a reason to keep burning calories. And that is it as far as fast diets go. Leave a Reply Your email address will not be published. CommentLuv badge
https://weightlosstweets.com/2018/04/22/fast-diets-plans-to-lose-weight-in-a-week-or-less/
isPartOf: CC-MAIN-2018-51 publisher: Common Crawl description: Wide crawl of the web for December 2018 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-232-130-137.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.032505
51
{ "en": 0.9603970646858216 }
{ "Content-Length": "74243", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TBXAW5RZV4LIZSSQTLZGNEEKJMWQTVVT", "WARC-Concurrent-To": "<urn:uuid:7b2903d9-92e2-4d7f-98f6-e82d112862c9>", "WARC-Date": "2018-04-25T23:49:50", "WARC-IP-Address": "192.0.78.12", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:O3HXSYKILD3S5UYLZVWAEX5GZRRKF4MA", "WARC-Record-ID": "<urn:uuid:9d3d94a5-df7d-4e7d-a269-9f180d776827>", "WARC-Target-URI": "https://thewildernessofmirrors.wordpress.com/2013/12/18/why-the-mainstream-media-should-be-lined-up-against-the-wall/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:06100b83-06a7-4fe5-928b-f08ed1d1cf7a>", "WARC-Truncated": "length" }
1,079
Why the Mainstream Media should be lined up against the wall. I have been calling America’s Mainstream Media the Fifth Column Treasonous Media for about 5 years now. Many think that such a description of them is unnecessarily bombastic hyperbolic rhetoric. Though I have given numerous examples of their corruption and dishonesty, clear justification for stripping them of their previous moniker as the Fourth Estate and re-branding them the Fifth Column Treasonous Media, it is always the media themselves who provide the best examples of why. If it isn’t Dan Rather, with his throbbing memo, so blatantly false that the public outrage eventually forced CBS to dismiss him, it’s MSLSD’s Chris Mathews “Thrill up his leg”. Martin Basher and his “Shit in Sarah Palin’s Mouth”? Now, it’s Barbra Walters with her confessions… Video: “We thought he was going to be … the next Messiah” Who has been hurt by Barack Obama’s plummeting poll numbers? The President himself, of course, and his administration, and incumbent Democrats running for re-election and away from the “you can keep your plan” promise. However, don’t forget the mainstream media, who sent dozens of reporters to Wasilla, Alaska to investigate the supposedly unprepared governor as a Vice Presidential candidate but couldn’t be bothered to look into the Chicago Machine to test the qualifications of a rookie Senator for the top spot. Barbara Walters told Piers Morgan last night that everyone thought Obama was the Messiah, which is why his failures are so disappointing to them (via Newsbusters and Truth Revolt): BARBARA WALTERS: Well, you’ve touched on it to a degree. He made so many promises. We thought that he was going to be – I shouldn’t say this at Christmastime, but – the next messiah. And the whole ObamaCare, or whatever you want to call it, the Affordable Health Act, it just hasn’t worked for him, and he’s stumbled around on it, and people feel very disappointed because they expected more. It’s very difficult when the expectations for you are very high. You’re almost better off when they are low and then they rise and rise. His were very high and they’ve dropped. But you know, he still has several years to go. What does he have, three years, Piers? And, you know, there will be a lot of changes, one thinks in that time. The most important thing to understand here, is that Dan Rather, Chris Mathews, Martin Basher, and Barbra Walters are not exceptions to the rule, they are the rule. This is a fully systemic and endemic condition all across America’s Fifth Column Treasonous Media. It kind of makes this particular action by liberal Democrats take on a whole new and profoundly uncomfortable light. It’s almost as if they sense that they are in serious jeopardy and are hoping to avoid a fate they know they are fully deserving of. Liberal Democrats Introduce Bill To End Death Penalty For Treason… Rep. Donna Edwards (D-Md.) and seven other Democrats have proposed legislation that would eliminate the possibility of imposing the death penalty for a range of federal offenses, including several categories of murder and crimes against the government like treason and espionage. The Federal Death Penalty Abolition Act, H.R. 3741, would end the death penalty for assassination or kidnapping that results in the death of the president or vice president, and also ends it for the murder of a member of Congress. Under the bill, the death penalty could no longer be used to punish people for using a weapon of mass destruction, or murder done via torture, child abuse, war crimes, aircraft hijackings, sexual abuse, bank robberies or the willful wrecking of a train. Using chemical or biological materials to kill could also no longer result in the death penalty, nor could deaths related to treason or espionage. The death or injury of an unborn child could not result in the death penalty either. Death of state or local law enforcement officials, using the mail to kill, kidnapping and killing people to stop them from testifying could no longer lead to the death penalty, nor could the use of firearms or armor piercing ammunition during any crime of violence. We need to be absolutely perfect crystal clear on something here. In the United States of America under the United States Constitution, their are no crimes against the government like treason and espionage. Their are only crimes against the Constitution of the United States of America, which by the way, for those to ignorant or stupid to understand the difference, is not the United States Government. The United States Constitution reserves no such protections for the Government. In fact, the 2nd Amendment of the United States Constitution was written specifically for the purpose of excluding the “Government” from any such protection. Every single elected official and every single member of the United States Military swear an oath to protect and defend, not the Government of the United States, but the Constitution of the United States of America. This was not an accident or a misunderstanding by the Founding Fathers, they knew exactly what they were doing when they wrote the United States Constitution this way. They knew damned well that human beings were subject to arrogance, narcissism and corruption, and that no individual politician or group could ever be 100 percent trusted. What America’s Founding Father’s did not take into account was that their beloved Fourth Estate could or would become as corrupt as any totalitarian tyrannical government. The Fourth Estate was intended to stand as a guardian, a protector of the Republic against oppressive tyrannies and corrupt government officials, they never dreamed that it would one day become a Fifth Column Treasonous Media tool of a corrupt Government. One thought on “Why the Mainstream Media should be lined up against the wall. 1. Pingback: The success of Obamacare: Liberal cognitive dissonances turned up to 11… | The Wilderness of Mirrors Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
https://thewildernessofmirrors.wordpress.com/2013/12/18/why-the-mainstream-media-should-be-lined-up-against-the-wall/
robots: classic hostname: ip-10-148-11-10.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-17 operator: Common Crawl Admin description: Wide crawl of the web for April 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.037431
59
{ "en": 0.9647137522697448 }
{ "Content-Length": "34985", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:XSTLFILWCSMNGDZMYEMB52RYDCNUYWKY", "WARC-Concurrent-To": "<urn:uuid:24404724-213a-4643-8e27-a1404b1fa976>", "WARC-Date": "2014-03-12T04:46:46", "WARC-IP-Address": "23.62.6.217", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:H5LPP3VVKPU7YGIOVAA74D5TFPJL6GOM", "WARC-Record-ID": "<urn:uuid:0810b8be-9dc2-4296-97c2-a549df382802>", "WARC-Target-URI": "http://dogcare.dailypuppy.com/walk-two-dogs-same-time-2132.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:98d08bd1-4f1f-4386-89f1-ea66ac318e25>", "WARC-Truncated": null }
510
How to Walk Two Dogs at the Same Time by Sarah Dray Ready to add a second doggie to the walks? Ready to add a second doggie to the walks? Jupiterimages/Polka Dot/Getty Images Walking two dogs at once can be a challenge, especially if you didn't train both of them to walk together while they were puppies. Not all is lost, though -- you can retrain both doggies to share leash time with you, but it will take some time, and a lot of patience. Keep in mind that walking a puppy and an older dog together might not work out that smoothly, simply because their levels of energy -- and development -- are just too different. Step 1 Train each dog separately first. You'll never be able to walk two dogs at the same time if they don't know how to walk on a leash separately. Train the dogs to walk without pulling. Practice keeping Doggie on your side, rather than allowing him to run in front of your legs. Then practice the same with the other dog. Step 2 Get short leashes for both dogs. That way you don't have to worry about the dogs getting tangled as they're learning to walk side by side. Retractable leashes would work well or simply get short rope leashes. Step 3 Grab one dog in each hand at first. Practice walking with one of them on each side of your body. This can be tricky if the dogs have different rhythms -- for example, if you have a dog who likes to walk slowly while the other has long legs and can take giant steps. Step 4 Move both leashes to one side once you and the pooches are comfortable with the situation. It might take some time for the dogs to find their joint rhythm, so they're not tripping against each other as they move forward. Once they feel comfortable -- and as long as they don't push -- get longer leashes. This will allow them more freedom to move forward and sideways. Step 5 Consider buying a "coupler" once the dogs are ready to walk alongside each other. A coupler is a Y-shaped leash with a single handle and two endings. Each ending of the Y has a snap that you can attach to the collar of one dog. Not all dogs do well with a coupler -- some dogs are too competitive or too hard-headed to adapt to the rhythm of the other dog. If you want to try a coupler, start with short walks to give the dogs time to adjust to each other and to learn how to walk together. Photo Credits • Jupiterimages/Polka Dot/Getty Images About the Author Trending Dog Training Articles Have a question? Get an answer from a Vet now!
http://dogcare.dailypuppy.com/walk-two-dogs-same-time-2132.html
robots: classic hostname: ip-10-183-142-35.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-10 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for March 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.023111
3
{ "en": 0.9311380982398988 }
{ "Content-Length": "40667", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:E3SKP5XAFTH2LEEWR5SCSUK4Q245FM6X", "WARC-Concurrent-To": "<urn:uuid:91536638-c991-42c6-b77e-3a750420d00c>", "WARC-Date": "2020-01-25T03:23:09", "WARC-IP-Address": "104.31.79.52", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:OV2XADIS72K2H6Y6CPBXKSOYYJ552DLO", "WARC-Record-ID": "<urn:uuid:e8701dc7-7c53-4f9f-8c50-91d841b7ea6a>", "WARC-Target-URI": "https://mpiresolutions.com/advanced-marketing-strategies-elevate-business/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d85842a3-f802-4c76-9030-268124d9ae80>", "WARC-Truncated": null }
965
5 Advanced Marketing Strategies to Elevate Your Business Business people using advanced marketing strategies on laptops When marketing your business online, you have to stay ahead of the curve. Rather than simply creating a social media account, you need to make sure that you can engage your audience in ways that your competition is not taking advantage of. For that reason, marketers and business owners constantly inquire about the newest and most effective marketing opportunities available online. If you have a similar question, here are 5 advanced marketing strategies your business can take advantage of. 1) Add Value to Your Product or Service Value adds are a perfect way to both increase awareness of and loyalty towards your brand. If you can give away more than the actual value of your product or service, the persuasive power of your marketing efforts will increase immensely. Value additions can come in a variety of forms. For example, you can give loyalty discounts to repeat customers, or add a free promotional gift for new customers. Increasingly, companies focusing on digital lead generation are adding value through high-quality gated content, such as whitepapers, webinars, and free trials. The goal of this marketing strategy is simple. If a member of your target audience has to choose between you and your closest competition, what will make them more likely to choose your product or service? The answer to that question translates into your specific value ad. 2) Take Advantage of Enhanced Personalization At this point, it’s no longer news to say that your digital marketing efforts should be personalized. In fact, the clear majority of your audience expects exactly that. In turn, distinguishing yourself from your competition has to include an effort to go the next step. In your digital marketing, that next step could consist of smart content. True website personalization goes beyond simply including a recipient’s first name in an email, instead adjusting website content dynamically based on previous information gathered about a visitor. An existing lead, for example, can now see an entirely different homepage than a visitor that has never before made it to your website. As a result, you can deliver more personalized content, which in turn helps to increase the relevance of your messaging for your audience. The same personalization is also possible through other marketing channels. Emails, for example, can be customized entirely using advanced audience segmentation and custom content blocks. The goal, as in the above, is to create a more relevant marketing experience for potential customers. 3) Build an Influencer Network Many experts in digital marketing believe that leveraging influencers is the next big thing. Audiences across demographics are growing increasingly weary of traditional advertisements. Ad blockers are causing billions of revenue losses. The solution: work with key members of your audience to make sure the message comes from them, not you. Building an influencer network takes significant time and effort. It includes not just finding powerful online users who your audience trusts, but also developing a relationship with them. Only finding the right users, and successfully encouraging them to share the right content, can help you succeed. But if you get there, the positive effects are powerful. In fact, one case study found that influencer marketing delivers an 11 times higher ROI than other digital marketing methods. 4) Utilize the Power of Local SEO In the last few years, search engine optimization has evolved to far more than a universal ranking on search results. For example, Google now takes into the account the location of searchers, allowing local brands to stand out even against national competitors. As a result, Google is now encouraging businesses of all sizes to focus on local SEO. The keys to success can vary. But a successful strategy can ensure that your key demographics will find you when looking for a brand like you. Especially mobile audiences can make a big impact on your SEO efforts. In fact, 50% of users who conducted a local search on their smartphone visit a store they found in that search the same day. Meanwhile, 89% of participants in a recent survey said they search for local businesses at least once per week. 5) Create Enriched Visual Content Finally, don’t underestimate the power of visual content. Unless you are new to digital marketing, you probably already know the impact that videos and images can have on your visits, engagements, and conversions. But the possibilities don’t end there. 360 degree video, for example, is becoming increasingly popular. It allows you to showcase your brand and its product in more creative ways. Google and Facebook both support this virtual reality opportunity, while the cost of 360 cameras has dropped to prices affordable even for small businesses. The key is no longer to use visuals, but to use visuals that are different from your competition. Enriched content, such as 360 degree video and even infographics, can help you get there. Building a Digital Strategy for 2017 and Beyond These strategies are not always simple. It’s easier to simply send out an email blast or post on social media than it is to create a 360 degree video or rank #1 in local searches. But executed correctly, they can become the cornerstone of a successful digital marketing strategy that puts your brand ahead of your competition. Of course, you need a sound backend for any of these strategies to work. Increasingly, websites are becoming the foundation of successful digital marketing, offering the conversion opportunities as well as in-depth content your audience looks for after first being exposed to your marketing messages. For help in creating a website that can support advanced marketing strategies like the above, contact us. We’d love to work with you in making sure that your marketing efforts stand out, both in 2017 and in years to come.
https://mpiresolutions.com/advanced-marketing-strategies-elevate-business/
isPartOf: CC-MAIN-2020-05 publisher: Common Crawl description: Wide crawl of the web for January 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-27.ec2.internal software: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.034149
0
{ "en": 0.882117509841919 }
{ "Content-Length": "50542", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:CHTKODPOFWZMEXOJES2YHLMVDMBLKBMT", "WARC-Concurrent-To": "<urn:uuid:4d511235-c7ff-47d8-96d7-3f841fb78a03>", "WARC-Date": "2018-12-19T02:34:58", "WARC-IP-Address": "198.49.23.144", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ERJVNBJXPVP5ETZDWBE72ZGPGG6H6S74", "WARC-Record-ID": "<urn:uuid:e2a44f9e-720f-4126-9c3c-1333f60ed243>", "WARC-Target-URI": "http://www.alexxmack.com/news-1/2015/11/6/spin-magazine-pop-report", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:9df451b1-1174-4f20-a5b2-2704117393a3>", "WARC-Truncated": null }
165
Spin Magazine "Pop Report" Spin.com gave priases to "Like We're Famous", and amongst great company. "While Betty Who is off crafting the follow-up to last fall’s stellar Take Me When You Go — and while Kesha is legally bound from releasing new music for the foreseeable future — Alexx Mack is swiftly hopscotching into the bubblegum-with-brains void they left behind. Her Like We’re Famous EP consists of four songs that all sound like they’re as expensive and well-crafted as Bonnie McKee cowrites and Dr. Luke productions. Alexx Mack strips memories of Katy Perry’s clobbering “California Gurls” and “Teenage Dream” for parts and builds up a tidy repertoire of whip-smart modern pop. “Bad” takes the syncopated guitar so favored by the Swedes mixing pop’s potions and tosses 8-bit chimes and cowbells into the cauldron. Mack herself is an immediate draw, her brash, reedy voice the perfect conduit for big, synth-layered productions. One or two verses could use some thematic tinkering, but damn if the sun isn’t shining brighter when Mack’s songs come blasting through." Source:  Spin.com
http://www.alexxmack.com/news-1/2015/11/6/spin-magazine-pop-report
isPartOf: CC-MAIN-2018-51 publisher: Common Crawl description: Wide crawl of the web for December 2018 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-231-64-175.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.063462
0
{ "en": 0.9726926684379578 }
{ "Content-Length": "18617", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:JO3EEK27CF4FLD6TF5VDTUWGQQEESHRV", "WARC-Concurrent-To": "<urn:uuid:70d5877b-d767-4798-8bdc-1212c9d10c95>", "WARC-Date": "2017-11-20T15:24:16", "WARC-IP-Address": "213.219.36.247", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:YINEWZNFX3TIH55YNQNCZF2Y343GP46W", "WARC-Record-ID": "<urn:uuid:8df01f15-7e6c-423d-872b-f77b99dc40df>", "WARC-Target-URI": "https://www.indcatholicnews.com/news.php?viewStory=8116", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:02a07329-1291-4a3a-81eb-3312e2ad30b6>", "WARC-Truncated": null }
607
Caritas delegation visits Darfur  The ACT/Caritas programme in Nyala, Southern Darfur welcomed an international Caritas delegation last week. The representatives from across Europe came to show support for the emergency team working in the region, see the situation and report back to their members. The Nyala programme is the first joint operation between the Caritas international network and its Protestant equivalent Action by Churches Together (ACT). It is aiming to help 500,000 people displaced by the conflict in the Darfur region of West Sudan. Alistair Dutton, ACT/Caritas Emergency Programme Manager, emphasised the urgency of the situation: "The population in the displaced camps is very fragile but the trigger point for the crisis in Darfur is the rains. Currently people can sleep outside but as the rains, which have already started, get heavier this will change sparking a massive health crisis. We could be facing a death toll of hundreds of thousands of people." ACT/Caritas is responding to the crisis with local partners, the Sudan Council of Churches (SCC), Sudo and Sudanaid. The partners have been providing thousands of displaced people with shelter, proper sanitation, clean water, health care, seeds and tools and essential items such as blankets and soap. To date around 50,000 displaced people have been helped by the partners. Delegate, Margaret Ann McShane, from Caritas Scotland (SCIAF) said: "It was inspiring to witness the dedication of the field staff in Nyala. Their determination and commitment are helping to transform the lives of some of the most vulnerable people in Darfur." Under the ACT/Caritas Programme, 60 volunteers have been trained to help Sudo and SCC with assessing needs and distributing items. They will eventually be based in three regional offices in Al Geneina, Zalingei and Nyala, supported by mobile emergency response teams. "Our current response is 1% of what it should be and we are working very hard to scale up," explained Alistair Dutton. "In the next few weeks, significant numbers of new staff will arrive and there will be more local staff recruited in each of the three bases." During their stay the delegation visited Kalma, Belil and Dirage Camps. 80,000 people are based in Kalma which is an official government camp. Its proximity to Nyala (30 minutes drive) means it has attracted support from lots of NGOs. It has food and sheeting distribution, a health clinic, school, wells and a thriving market. The hand pump provided by SCC was very busy as women and children collected water. The government is trying to discourage more people from settling in Kalma as it sprung up spontaneously and staff there are unable to cope with any more arrivals. The shelters are built in close proximity to each other constituting a health risk and some were built in wadis or river beds, meaning they might be swept away when the rains come. A short fifteen-minute drive from Kalma is Belil camp where Sudo distributed plastic sheeting. Around 8,000 people from five different tribes live in the camp, some in makeshift shelters. Sultan Abdullah Munwal, head of one of the tribes, said: "People were here for four months before Sudo brought sheeting. We need water, food, clothes, mosquito nets and a health centre. At home we were farmers but we don't have seeds, security or a place to plant here. Before our village was attacked, I had cows, money and goats. Now, I have nothing." The delegation heard similar stories from other refugees. Nearly all had fled with nothing or just a few cooking pots. Some were collecting grass to cook and eat. A planned trip to Mershing camp the following day was cancelled because the road was deemed unsafe due to an earlier security incident. Share this story
https://www.indcatholicnews.com/news.php?viewStory=8116
robots: classic hostname: ip-10-167-159-169.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-47 operator: Common Crawl Admin description: Wide crawl of the web for November 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.053356
12
{ "en": 0.967272698879242 }
{ "Content-Length": "82790", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EIFKXDVB2ZPRP2FCXQVJHLYKAE5M6QWZ", "WARC-Concurrent-To": "<urn:uuid:f5cfaa89-84e2-453b-82bb-7da0c0c6b08f>", "WARC-Date": "2017-12-14T00:50:51", "WARC-IP-Address": "104.20.19.246", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:BT46UMQET54KYOIN5BJDHM2AKOFBXNQG", "WARC-Record-ID": "<urn:uuid:cdcd6e7f-c996-461d-b86b-94903cc6801d>", "WARC-Target-URI": "https://www.opposingviews.com/i/politics/obama-presidency/president-obama-throws-support-behind-1010-minimum-wage", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d3df10a7-e7b0-40e6-b4cb-b277d100298b>", "WARC-Truncated": "length" }
305
President Obama Throws Support Behind $10.10 Minimum Wage | by In President Obama’s most recent State of the Union Address, he called for an increase of the federal minimum wage from $7.25 to $9 per hour. However, now, according The Huffington Post, “President Barack Obama is throwing his support behind congressional Democrats’ proposal to raise them minimum wage to $10.10 and peg it to inflation….” After deep cuts to federal welfare programs, many Democrats believe that raising the minimum wage is a better way to address that issue than restoring benefits. Also, included in the plan is an effort to raise the minimum wage for tipped workers, which can be as low as $2.13 per hour. Critics of the move, suggest that raising the minimum wage would put undue strain on businesses that have suffered as the economy struggles towards recovery. Some, such as James Sherk writing for The National Review, compares raising the minimum wage to an attempt in American Samoa in 2007 in which “unemployment septupled from 5 percent to 36 percent.” Shrek also says, “businesses will not pay workers more than the value they create – at least not if they want to remain in business.” Instead, the thinking is to leave it alone and let the free market solve the problem. However, Sherk’s analogy isn’t the strongest, considering American Samoa’s GDP is about 140 times smaller than the GDP of Rhode Island. Also, decrying an increase in minimum wage and the current state of federal income assistance is seen as trying to have someone else’s cake and eat it too. Since a significant percentage of those who receive state and federal assistance are in fact employed, it can be argued that it amounts to an indirect subsidizing of their workforce. Proponents of an increased wage say that no one should work full time only to still live in poverty.
https://www.opposingviews.com/i/politics/obama-presidency/president-obama-throws-support-behind-1010-minimum-wage
robots: classic hostname: ip-10-140-161-138.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-51 operator: Common Crawl Admin description: Wide crawl of the web for December 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.142397
74
{ "en": 0.9702187776565552 }
{ "Content-Length": "85251", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:T42GALZQ4BN3C77K3CZGQGKNKWTF5OQB", "WARC-Concurrent-To": "<urn:uuid:e86cabf7-5785-4e53-9a88-1a23de7bdab7>", "WARC-Date": "2018-06-23T23:16:38", "WARC-IP-Address": "172.217.7.225", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:GTTCSAKBZJWVXVGGIQUNQSUKTDCYPYRV", "WARC-Record-ID": "<urn:uuid:4b1a1798-e46c-4dc6-9dff-f8234bfb10b0>", "WARC-Target-URI": "http://usexpatinchile.blogspot.com/2010/03/chile-earthquake-2010-part-ii-one-week.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:beba74c8-e1a0-4f90-9d05-4ddc9eb9d0fb>", "WARC-Truncated": null }
1,437
Friday, March 5, 2010 Chile Earthquake 2010 Part II One week Later Not all of Chile is like the images you see in the media. The media is showing the worst areas and the worst images for good reasons (areas that still need help) and bad reasons (more exciting headlines). The photo is from several days ago-things are normal except for a few things like the skewed letters-It used to read "Fashion's Park"-the not so great English is "normal". As most people know, the tsunamis caused much of the devastation, entire small towns wiped away. there's a lot of political sniping about warnings and whether people were warned quickly enough etc., etc.....but I know-and I have never lived on the coast but have visited coastal areas in Chile and Oregon-when an earthquake happens, as soon as you can run, you do. You can't wait for warnings. I read a story in which the grandparents saved their grandson's life by running to high ground. There is often little time to waste. And the number of dead...truthfully, they don't know. Of course many fled the affected areas and many could have been washed out to sea and it is hard to know how many dead and how many missing until people are found or bodies discovered. Some of the numbers are here at the government site-they have apparently identified 279 dead. They say less but you will get different numbers in different places. The government said on Thursday the death toll, previously reported as 802, was unclear due to confusion over who was missing. Officials said they had identified 279 dead people, but were not sure how many bodies were unidentified. I hate it that politics as usual as entered into this catastrophe so quickly.The Chilean earthquake hit just days before the landmark transition from outgoing President Michelle Bachelet to conservative President-elect Sebastian Piñera, and that is reopening old political fault lines that would better remain closed, says Peter M. Siavelis, director of Latin American Studies at Wake Forest University....Beneath Chile’s vaunted market economy is the perseverance of a historically powerful state,” Siavelis says. “Chile’s effective regulatory power, especially in the area of construction, prepared and built the capacity to both withstand and respond to such a catastrophic disaster in a way that a minimalist state could never have.” ...Of course the opposition and incoming government believe the opposite, that lives would have been saved had they been in power. Certainly, it is in the incoming government's coalition best interests to discredit President Bachelet because they do not want to run against her again in four years-she has been the most popular president in the history of Chile with over 80% approval ratings. The mayor of Concepcion has been the most vocal critic but it should be noted she is of the far-right UDI party(the party of Pinochet). And the WSJ credits Friedman and laizze faire economics-what has happened to the Wall Street Journal???? Oh yeah, that's a Murdoch newspaper now.... the Huffingtonpost does a piece refuting the myth of Friedman's self named "miracle" a little. Friedman-style economic policies actually had Chile on a steep, downward path into Haitian-style privation. This is all ably documented by James Petras and Steve Vieux in "The Chilean 'Economic Miracle': An Empirical Critique". Under the guidance of the Chicago Boys, Pinochet concentrated wealth in the hands of the upper class, while wages and social services budgets declined. The authors similarly document a massive unemployment crisis in Chile during the Friedman period, which rose as high as 30%. Chileans generally credit Pinochet for putting more people in homes, but as a 1985 Mother Jones article points out, this was largely due to effective PR -- the housing rate under Pinochet "was actually slower than it was under" the two previous governments. And wow, the banks. Greg Palast documents the carnage wrought by gangster speculators... And Chile had the largest earthquake ever in 1960 which "took more than 2,000 lives and caused property damage estimated at $550 million (1960 dollars)." This happened in a much less populated Chile. Truly, I was unable to get what might be a real count-estimates of the dead in 1960 went as high as 5000. And I wonder if they counted the indigenous population. But the above link has some nice historical photos, information and stories about the 1960 earthquake-it was caused by the same geological movement as the 2010 earthquake, so much of the information pertains as well. Life is surprisingly normal here, although the isolated areas are still reeling from the quake. There are no longer even long gas lines or long lines at the grocery stores. The images you see are from the worst areas. It reminds me of effects from a from a really bad hailstorm we had in Denver back in the 80s. A few random thoughts. people here get paid once a month on the first so because the quake hit just at the end of the month, people tend to be very low on food and supplies-hence the rush to the grocery stores afterwards. Always there are long lines on the first, worsened after the quake. But they also tend to stand very patiently in normally long lines to pay bills on the first too. And one more link. "Chile has seen many earthquakes both before the 1960 record-setting temblor and after. Two very large contenders have happened on March 3, 1985, and another on July 30, 1995. These earthquakes both had a magnitude of about 8. Chilean earthquakes are not rare, nor are they small. Large earthquakes in Chile seem, through history, to occur about every 25 to 100 years. They'll continue as long as the Pacific plate continues subducting." Things are normal here... except for those of us are a little more nervous with every aftershock(I hate the aftershocks and small earthquakes that I used to ignore). I'm glad I'm not on the coast.... Suzanne's Chilean Sabbatical said... As usual, great post and great commentary, Laura! Guelph, ON, Canada (now Providencia, Santiago) p.s. How do I link you to my blog? tiktok said... This comment has been removed by a blog administrator. Vicki said... Ditto for Susanne's comment...always thoughtful and informative posts Laura. Hope life is returning to normal and that the coming winter season is kind. Disasters are always awful, but sometimes it seems as if it brings us all back to what is important, and in general brings people together. People from all over Chile, including the recently displaced people of Chaiten now living in Futaleufu, Puerto Montt and other towns, gave generously to relief efforts...sending truckloads of food and supplies north, and stood in line at the bank to donate, luca by luca, to their fellow Chilenos. South in Aysen where only a few years ago they were plagued with an awful seige of temblors and a tsunami, there was not a car not painted with support signs and the grocery stores had bins overflowing with groceries and staple items. I was humbled by the incredible out pouring of generosity! Keep up the wonderful blog! Suzanne's Chilean Sabbatical said... Hi Laura, how are you? Still in the U.S.? Question for you -- where exactly is Pirque???!!! Drove out to Cajon del Maipo yesterday (to Termas Las Colinas) and planned on sightseeing in Pirque but... never found it! Anyway, hope all is well with you! Suzanne (from Canada) Laura said... Hi Suzanne! Darn, sorry I can't meet you in Pirque! I am in the US-it's spring here. The easiest way to find Pirque is to follow Concha y Toro's directions: Or Google Concha y Toro pirque You weren't far :) I need to post soon, glad to hear from you! Suzanne's Chilean Sabbatical said... Hi Laura, well, maybe we can have tea in Pirque next time, as the kids and I are (also) leaving Chile next week. My two absolutely want to come back though -- and next year!! So, let's stay in touch, because who knows, I just might be able to pull it off. (My full name is Suzanne Soto and I'm on Facebook, Linked In, etc. and my personal email should be listed at the bottom of this message.) All the very best to you! Credit Loan said...
http://usexpatinchile.blogspot.com/2010/03/chile-earthquake-2010-part-ii-one-week.html
robots: classic hostname: ip-10-65-172-186.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.01818
25
{ "en": 0.9418988823890686 }
{ "Content-Length": "64513", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:KM3FDCG6HOPYJXASKWJN3S6BXHL4NAHN", "WARC-Concurrent-To": "<urn:uuid:b27e49a6-c654-46d1-8e1a-b2821f8ed9af>", "WARC-Date": "2019-08-23T01:31:47", "WARC-IP-Address": "104.18.51.127", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:AMK6C7LISFQYQMFKFQOTC2VK47I6BDUR", "WARC-Record-ID": "<urn:uuid:e9a519e5-262a-49f1-93ff-f0408708d319>", "WARC-Target-URI": "https://www.marketingdonut.co.uk/direct-marketing/mobile-and-text-marketing/telemarketing-faqs", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0f9e9b90-bec9-4448-bbfd-5eb319d11174>", "WARC-Truncated": null }
2,022
Telemarketing FAQs Telemarketing FAQs{{}}Ten FAQs on telemarketing. 1. What can telemarketing realistically be used for? 2. Can telemarketing replace my sales force? 3. How should I plan my telemarketing activities? 4. Can we do telemarketing ourselves or should we use an agency? 5. What will a telemarketing agency campaign cost? 6. How do we know who to contact? 7. Can we control how the phone calls develop? Should we work from a script? 8. What tips will help non-specialists make successful telemarketing calls? 9. Should I be planning other telemarketing activities, besides outbound telesales calls? 10. How should pay and incentives for telesales staff be structured? 1. What can telemarketing realistically be used for? Telemarketing can perform several useful roles, including: • identifying key personnel at target companies; • setting up appointments for salespeople; • following up on mailshots, exhibition attendance, or potential customers who have responded to advertisements; • researching the potential of a new product; • keeping in touch with existing customers: reminding them of special offers or anniversaries, or checking that they are satisfied; • direct sales of goods which can be sold on a trial, or sale or return, basis. You (or a good agency) should be able to achieve a better than 10% success rate for, say, following up on mailshots, and up to 50% or higher for booking appointments or arranging open days. Telesales calls to businesses are generally more successful than to individual consumers. Telemarketing offers a way of reaching prospects and customers, without the impracticality of visiting them to meet face-to-face. It can hit high numbers of contacts and save time and money. However, telemarketing also has some inherent disadvantages. You cannot see the impact you are having on the other person, nor can you be certain if you have their interest or full attention. Call recipients also find it easier to cut you off than if you were physically in front of them. Even so, the business world can still use telesales to great effect. It is possible to make first-time sales over the telephone, but success might depend on how well-known or easy-to-understand the offering is. However, telesales can work very well when it comes to making initial contact, keeping a customer informed, and encouraging repeat sales. Back to top 2. Can telemarketing replace my sales force? Telesales can rarely replace the traditional sales person. Here are some of the considerations: • establishing rapport is difficult without eye contact; • you cannot give a demonstration over the telephone; • you cannot give the prospect the product to handle or try out; • prospects cannot show specific issues they may need help with; • you cannot see other selling opportunities that might be apparent on the premises; • you cannot see if the prospect has enough space to accommodate the new purchase; • you cannot easily talk to more than one person; • it is easier to build relationships face-to-face because you can interpret the prospect's body language; • it can be important to see the client's premises in order to get a feel for their personality or to judge their potential for future business. Back to top 3. How should I plan my telemarketing activities? First assess if your business - or part of your range - lends itself to telephone selling. Suppose, for example, that you decide that only repeat purchases suit telesales. This is how you might proceed: 1. Analyse how much of your sales revenue comes from initial purchases and how much from repeat business. 2. Group your sales visits into three categories: • visits associated with making an initial sale; • necessary visits to key accounts to build relationships; • visits associated with getting a repeat order. Assuming that visits associated with getting a repeat order will be transferred to telesales, calculate how many salesperson days you will save. 3. Decide whether to reduce the size of your direct sales force, or to keep the same number but insist on a higher quota of new business from them (since they will have more time to generate it). 4. Now look at the issue of repeat purchases. You know the target required, but your staffing calculation is complicated because the number you require to reach it depends upon: • the expertise of those doing the work; • the uniqueness of your product or service (the difficulty in selling). A good way to start is to put one or two people on telesales and monitor the progress they make. On the basis of what they do and the results they get, decide on your staffing level. 5. Back to the existing direct sales force. If your choice was to increase sales, then an additional task of telesales will be to arrange more scheduled meetings for them with prospective customers. You must ensure that they keep enough work in the pipeline to ensure future success, otherwise your new sales pipeline could dry up. Back to top The simple tasks - updating customer lists, maintaining contact with old clients - can be done in-house. You can use an outside agency to handle research work and book appointments, but you may have less control over the quality of the work. It all comes down to costs and whether you have the skills to do it yourself. A skilled agency can be much more effective when actual selling is involved. Selling on the telephone for call after call is not a skill easily learnt, when the chance of rejection is so high. You can organise the work on a trial basis: if you have, say, 5,000 names, they will trial 1,000 in the hope of winning the contract for the rest. Before handing an assignment to an agency, ensure that you are happy with the script and personnel they will use. Also confirm how many times a number will be called before they give up. An agency will either call on your behalf or disclose their identity. The former will generate a better response, if done well. Back to top 5. What will a telemarketing agency campaign cost? The cost of telemarketing will depend entirely on the scale of the campaign. Once you know what you are doing, you can calculate the cost based on the number of staff employed and the telephone costs. You also need to allow for the costs of setting up the operation (eg recruitment and developing a sales script). Costs will be offset by the savings you make on other aspects of the sales process eg travelling time, travelling expenses, fewer dead-end leads, etc. You can also improve the likelihood of good value by asking the telesales provider to price your arrangement according to results rather than according to the time it takes. Back to top 6. How do we know who to contact? Contacting previous customers, providing you have a customer database, is easy; finding new contacts is more difficult. When you are looking for new prospects with similar characteristics to your existing customer base, you can look for them using: • the internet; • telephone directories, trade directories or yearbooks; • lists that can be bought or rented from professional brokers. The Direct Marketing Association can provide the names of suitable list brokers. Some trade associations or professional bodies will rent lists of their members. You should: • make sure lists match the customer types you seek; • make sure lists are accurate and up-to-date; • be clear about the charges and terms of use; • check whether you need to register under the Data Protection Act (you almost certainly will). Back to top You cannot control how the person at the other end of the line will respond, but the right approach will help to keep the call moving in the right direction. Start with a good opening that sets the tone and establishes their interest. As well as planning what you want to say, work out how you will bring the conversation back on track if they raise a separate issue. Do use a script, but keep it brief and interesting; aim to convey sincerity and integrity. Rehearse before you make the call. The trick is to avoid slavish adherence to the script; otherwise it will come over as false and mechanical. Back to top 1. Be clear about what you want to achieve from the call. 2. Find out as much as you can about the contact and their existing relationship with your company. 3. Put a smile in your voice, sound open and enthusiastic. 4. Introduce yourself and use the prospect's name whenever you can. 5. Plan your opening words very carefully. They must grab attention. This means that what you say must be relevant to the prospect, highlighting interest or benefits. 6. Be prepared to deal with a secretary or assistant who is shielding the person you really want to talk to. • If you can't get round the gatekeeper, try getting them on your side by being friendly and asking earnestly for their help. • Ask when would be a good time to call such a busy person. Make a note of this time; when you call back, remind the gatekeeper that you are calling at his or her suggestion. 7. Ask open questions so that the contact discloses information. For example: "You talked of our first delivery to you as being a trial. How did it work out for you, Mr Prospect?" 8. Listen carefully. Remember, the contact cannot see you nodding your head in agreement, so say something from time to time which demonstrates that you are still on the same wavelength. 9. Write down each answer. If in doubt, check what the contact is saying. 10. Prepare in advance for likely objections. Have persuasive responses ready. 11. Try a trial close without actually asking for the business. For example: 'It sounds very much that it will solve your problem in a cost effective way, Mr Prospect, doesn't it?' • If the answer is YES, you can move to close the sale. • If it is NO, identify and counter the objection, and then try another trial close. 12. Close the sale. If you do not like the direct approach, try assumptive closes like these: • "Shall I put you down for 50 packs or will you want more?" • "You do want it delivered by the end of next week, don't you?" • "It was the XY model in blue that you preferred, wasn't it?" Back to top Inbound calls can be turned into a sales call with deft handling. If a client asks for a particular item, think what else they may need to complete the job. An obvious example: "Do you stock teak wood stain?" "Yes, and we also supply an all weather varnish that will seal it." Anyone who may pick up the telephone should be trained in a sales capacity. Back to top Not all telesales jobs are the same. For example, someone taking repeat orders will have an easier task than someone selling from scratch. That said, all jobs ought to have targets. Without these, there can be no measurement. It should therefore be possible for you to work out a scheme where bonus payments are earned once the pre-agreed target figure is exceeded. It is common for sales staff to be paid a salary plus bonuses which can account for about 20-30% of their total income. There are still some businesses where remuneration is based on commission alone. Ask your telesales specialist to give you some payment options that will provide results for you and rewards for them. The key thing about any incentive scheme is that it should reflect superior performance. It should be seen as realistic, and the sums involved should provide a real incentive. Bonuses paid closest to the time they were earned will be more powerful incentives than those that are delayed. Back to top What does the * mean?
https://www.marketingdonut.co.uk/direct-marketing/mobile-and-text-marketing/telemarketing-faqs
isPartOf: CC-MAIN-2019-35 publisher: Common Crawl description: Wide crawl of the web for August 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-112.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.074422
0
{ "en": 0.9449449777603148 }
{ "Content-Length": "168451", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3DVUYSG74RKD55XUSVIRXGUXTJZQTPS7", "WARC-Concurrent-To": "<urn:uuid:663bc01b-b0d6-4042-b709-9a7ca123abce>", "WARC-Date": "2022-05-24T06:49:32", "WARC-IP-Address": "104.21.80.47", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HN2SM3TFOD6M76DJBTHXTMEQXQFJTA6N", "WARC-Record-ID": "<urn:uuid:56b1d6aa-e819-40ee-8682-f774e6669fdd>", "WARC-Target-URI": "https://advertisermirror.com/technology/v2v-technology-communication-between-vehicles/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:46521155-3617-4fce-b3e6-5bb8dee65527>", "WARC-Truncated": null }
544
V2V Technology: Communication Between Vehicles V2V technology communication between vehicles A vehicular communication system is an emerging type of network, in which vehicles and ground units are the communication nodes; exchanging information, such as safety warnings and traffic information. What automaker doesn’t want zero accidents and zero casualties on their vehicles? Maximum safety is among their main objectives when they start the development of a new model. Advances in technology and the many driver assistance systems incorporated into vehicles are greatly assisting in safe driving. And in this way it is also essential to talk about the connected car. Currently one of the main challenges for car manufacturers is to promote so-called “interconnected cars”. This innovation is built on wireless technology, supporting a high-bandwidth Ethernet-based wired backbone. This highly evolved communication between vehicles is what is known as: “vehicle to vehicle”, also known as V2V and between the vehicle and the V2I infrastructure. And they define a new short-distance communication system between vehicles from different manufacturers. The fact that two vehicles can “talk” to each other, will mainly serve to communicate unfavorable conditions in traffic, accidents on the road, obstacles, preferences of passage, traffic lights, cruise control, speed control, warning of road works , passage of an emergency vehicle. In addition, if a vehicle was not connected to the Internet and another nearby was, the former could use the latter to transmit a public status notification or an emergency alarm, through the latter. Purpose and advantages of V2V technology Currently, vehicles incorporate a large number of instruments and technologies to facilitate driving and improve passenger safety: GPS, ultrasound, vision cameras, etc., but in all cases, the distance is quite limited and they cannot “see” past a nearby obstacle. V2V communication enables various vehicles to send messages to each other via wireless transmission, using a dedicated part of the “electromagnetic spectrum,” as well as a new wireless standard, 802.11p. Offering in such a way, a Wi-Fi access point in the car and around it. It allows vehicles to transmit and receive multi-directional messages (up to 10 times per second), creating a 360-degree “awareness” of other vehicles in the vicinity. By itself, vehicles equipped with the appropriate software can employ messages from surrounding vehicles to determine crash threats, then the technology can employ visual, tactile, and audible alerts or a combination of these to warn drivers. Of course, for the implementation of V2V technology to be effective, it is necessary that a significant volume of vehicles incorporate this type of connectivity and that its operation be totally reliable. In addition, data transmission must be carried out with dizzying speed and with powerful cloud systems capable of processing information in a matter of moments. The vast majority of automotive companies are working to incorporate this communication concept with V2Vs, such as Cadillac, General Motors, Honda and Toyota. For example, Toyota in Japan has developed a security system for vehicle-to-vehicle communication called ITS Connect, which can be found on Crown and Prius models. Although this technology is focused on cars, trucks and motorcycles, it is possible that in the future bicycles and pedestrians will one day use this type of communication to improve their visibility for drivers. These security systems, which have been introduced as new options to protect occupants, have finally become mandatory standards for the new vehicle models currently appearing on the market.
https://advertisermirror.com/technology/v2v-technology-communication-between-vehicles/
isPartOf: CC-MAIN-2022-21 publisher: Common Crawl description: Wide crawl of the web for May 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-200 software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.033712
0
{ "en": 0.9620120525360109 }
{ "Content-Length": "107897", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TMZSOWUG6X2XWANUDOSNHCWA7FHI3CDV", "WARC-Concurrent-To": "<urn:uuid:f6487cb2-25ba-4542-841c-5b8228ea109d>", "WARC-Date": "2019-02-17T19:07:23", "WARC-IP-Address": "34.215.14.192", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:FK7UOJTFU4FE7VKXGKERTSZANG5ULB26", "WARC-Record-ID": "<urn:uuid:a852a07b-0e72-466b-b103-749b51dbf162>", "WARC-Target-URI": "https://www.military.com/defensetech/2009/05/11/mullahs-vs-pirates-solution-or-new-problems", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a9f0fd5f-753f-45ba-8ac7-fcddc122812b>", "WARC-Truncated": null }
508
"For Somali Pirates, Worst Enemy May Be on Shore," in the New York Times on May 9, featured an interview with Puntland pirate boss Abshir Boyah, who claims to have hijacked more than 25 ships. Boyah says he's worried because Islamic clerics would like to cut off his hands as an un-Islamic thief, and drive him and his ilk out of town and out of business. His solution? Let the mullahs find jobs for his hijacking crews that pay nearly as well as their booty does now -- and help senior pirates like him form a Somalian coast guard. To me, Boyah comes across like he's toying with his interviewer and baiting the clerics. The pirate groups are armed to the teeth with AK-47s and RPGs that they can use ashore just as well as at sea. They may be an irreligious lot, but that doesn't mean they aren't united and motivated by a significant shared set of values: Boyah describes piracy like the sport of hunting, and negotiating as a "religion." Pirate leaders feel deeply obliged to support their families and clans. Social prestige plus materialist dissipation in this life can be cherished by some just as much as a sure path to Heaven in the next life is cherished by others. Somali culture in general puts high stock in not backing down from conflict and confrontation, even when things do turn deadly. Many of the pirates recently arrested in their skiffs and dhows by international naval forces were quickly set free, making the threat of prosecution no real deterrent. Withholding foreign aid and charity is problematic; economic sanctions usually strengthen the grip of tyrants and warlords. One wonders whether the Puntland clerics mean business about any crackdown, or are just talking tough, holding out (negotiating?) for a take of the big pirate prizes. For the West and other interested parties to look to local Muslim clerics to diminish Somalian piracy will likely prove ineffective. Counter-terror experts are concerned that Islamo-fascists such as al Qaeda might hire or infiltrate the pirates, or study and adapt ship hijacking tactics themselves. If mullah militias do go after Boyah's crowd, the pirates will surely fight back, leading to more civil war all along the strategically located Somali coast. The chaos would create a power vacuum into which could pour nautical suicide bombers led by fanatical leaders. The beef of Puntland clerics is with piracy-financed spending on sinful liquor, illegal drugs, and illicit sex. To let this benign moralist agenda be replaced by al Qaeda's purpose of destroying whole societies would be a grave error indeed. I still think a relevant tactic might be for a task force to warn pirates and civilians to flee inland, then raid their lairs from seaward to burn their boats, and withdraw. Then let ex-pirates and local clerics confer on the job creation and maritime security issues Boyah half-joked about, with help from abroad. -- Joe Buff Show Full Article Related Topics Most Popular Military News Fox News - Military and Technology
https://www.military.com/defensetech/2009/05/11/mullahs-vs-pirates-solution-or-new-problems
isPartOf: CC-MAIN-2019-09 publisher: Common Crawl description: Wide crawl of the web for February 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-145-232-247.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.0416
285
{ "en": 0.9415044784545898 }
{ "Content-Length": "130066", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2BXE2RSNJFS2A32UGRTVWAHE2O35EYMQ", "WARC-Concurrent-To": "<urn:uuid:da217b80-6404-4c9d-a3c2-86ce918adda0>", "WARC-Date": "2015-03-04T12:54:09", "WARC-IP-Address": "198.252.206.140", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:KL4EYVJWI4LR5IGA2W3MOVMY43MDZN6J", "WARC-Record-ID": "<urn:uuid:4c1d79c5-f801-443c-80b1-f8883b12ba44>", "WARC-Target-URI": "http://ux.stackexchange.com/questions/26331/why-are-inverted-colors-considered-an-accessibility-feature?answertab=oldest", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:6061392c-5a64-47a8-8457-f94fbdcbdc7f>", "WARC-Truncated": null }
3,057
Take the 2-minute tour × Why is it that in most Operating Systems the "Inverted Colors" display setting is considered an accessibility feature? Both Windows and OS X includes this option so it seems to be a recognized feature, not a vendor specific quirk. I understand that some users are color-blind. This would justify the Black & White, or grey-scale modes. What I don't understand is how or why does inverting the display color help someone with any specific, visual impairment or dysfunction. As a programmer that wants to understand the need so that I can develop better, accessible software, what purpose does this feature serve to the end user who has some form of visual impairment? I asked this question quite a while ago, however, it just dawned on me-- I think I am one of those individuals that this feature was designed for. I almost always try to keep the contrast reversed from the typical settings for my text displays. I hate white backgrounds with dark text! As a coder, all of my textual GUIs are black with green text. This isn't just a throwback to the old monochrome, green screen days. The pairing of the two colors is quite comfortable to my eyes. However, stairing at to much black-on-white actually hurts my eyes from some form of eye strain. I mention this in an update because the color inversion feature is not useful.. it's annoying! As someone who needs a good feature like this, it's a shame that all implementations that I have ever seen are just a poor attempt at solving a problem. I would hope that Apple, Microsoft and others have done their research but I'm guessing that's not the case. This was probably an ill-thought of feature 10+ years ago, and they just continue to provide so their is no loss of functionality. Developers, if you want to help people who need such a feature as to prevent eye-strain, find ways to change the text and page background, not the entire display! It just looks hideous and is just as offensive to the eyes. Especially when you tend to set background images on your display to darker colors. You can invert the coloring in word processors, text boxes and other text based devices. If you really wanted to get creative, find a way to lightly color correct images, rather than inverting them. Decrease the contrast or decrease the brightness of images in a very subtle manner. share|improve this question migrated from programmers.stackexchange.com Oct 1 '12 at 15:44 @raybritton, I can see your point (and I wasn't even aware of the UX site-- slipped through my awareness cracks) but I think it could equally apply on Programmers. This knowledge could affect software design and patterns that should be followed for implementation. However, I wouldn't be upset if the general consensus was to move the question. –  RLH Oct 1 '12 at 15:43 Do you have any particular examples of this pattern? –  dhmstark Oct 1 '12 at 15:48 Since the post was moved I edited out the bit about Programmers.SE. To me (and the programmers mod who moved the post) this makes more sense on UX, since accessibility is more in our domain. It's relevant for programmers to know of course, but IMO whoever asks, it should be designers or HCI researchers who answer, hence the move. –  Ben Brocka Oct 1 '12 at 16:04 Thanks Ben Brocka. I posted this question this morning and I haven't been able to get back to it yet. –  RLH Oct 1 '12 at 19:31 Wow! Thank you all for such good answers and comments. I really didn't think this question was spark such a flurry of thought and information. This is why I like StackExchange. –  RLH Oct 2 '12 at 13:45 9 Answers 9 up vote 19 down vote accepted Research generally suggests light on dark is harder to read in most cases but considering we're talking accessibility, you should know that results for those with normal vision don't necessarily hold true for those with various vision impairments. I've heard higher contrast (the mode in Windows is called High Contrast mode I think) can be easier to read for those with impaired vision though; the white text seems to stand out more. I'm curious as to why that is psychologically; the actual contrast ratio should technically be the same between white on black vs black on white. Note that it's recommended to increase font sizes and leading when inverting text colors: When reversing colour out, eg white text on black, make sure you increase the leading, tracking and decrease your font-weight. This applies to all widths of Measure. White text on a black background is a higher contrast to the opposite, so the letterforms need to be wider apart, lighter in weight and have more space between the lines. Mark Boulton Also, a common reason for white on black (which this feature mostly produces) is for night reading; many e-readers offer a Night Mode with white on black. The black screen is less painful to read with low to no external light. Another reason it might be common is simply because it's easy and relatively safe to to implement. Compare it to other obvious color effect options; if you tried to Sepia tone the whole screen (an effect I've seen to make reading easier on the eyes) you would reduce contrast significantly. Turning things black and white could eliminate color cues used to differentiate interface elements. Simply inverting colors preserves the relative contrast between UI elements (so you won't have black text on grey backgrounds), so it's a "safe" effect at the least. And if it doesn't help, no harm done, just undo the effect. share|improve this answer I've been inspired to ask a related question on Cognitive Sciences: Why is white on black considered higher contrast than black on white? –  Ben Brocka Oct 1 '12 at 16:44 While this research is interesting, it actually reminds me of the New Coke debacle in that people preferred New Coke in small doses, and Coke mistook that for preferred period. Black on white might be easier to read in a sample, but it can strain the eyes over a longer term (on computer screen at least). –  David Kiger Oct 1 '12 at 18:14 @IgorAsselbergs I suspect the problem is not quite as black and white as you are making out, and that it's more to do with the sensitivity of the eye to white when the surrounding area is dark - allowing they eye to be more rested and therefore able to pick out the brightness; as opposed to being 'saturated' (strained) by a harsh white background and picking out less exposed areas. Much like the ability to pick out stars in the night sky. In other words it's not down to a contrast calculated purely on RGB values, but more down to the way the eye works. Perceived contrast vs physical contrast. –  Roger Attrill Oct 2 '12 at 8:45 You also need to think about the phsyics of the medium. A computer screen is emitting light. Light text on a dark background is perceived to have stronger contrast because, actually, it does, because the glow doesn't run "in" from outside the letterforms, but out of them. Also the screen is not, compared to paper or E-Ink, a constant image, but a "flickering" one (even at nowadays high rates). This tires the eyes. Less white = less flickering = less strain on the eyes. –  Christian Oct 2 '12 at 9:04 I'm one of those vision-challenged people, and @RogerAttrill and Christian are spot-on WRT my experience. The bombardment from a background full of light-emitting white pixels makes the black text harder to read, particularly with extended usage. But I can read for hours on my Kindle (e-ink) with no problems; paper (real or simulated) is different. BTW, the Mac "solution" to this problem is completely useless to me; pixel inversion does too much collateral damage (like photos). On Windows I can define a color scheme. (I use my Mac for shorter periods of time; work machine is Windows.) –  Monica Cellio Oct 2 '12 at 12:54 True color blindness, where someone cannot distinguish colors at all, is extremely rare. A far more common condition, which affects up to 10% of the male population, is red-green weakness. People suffering from it cannot easily distinguish red and green, and some hues may seem completely identical to them. While there is no guarantee (there are different kinds and grades of red-green weakness), there is a good chance that UI elements a red-green weak person cannot see well will become more distinguishable when the colors are inverted. share|improve this answer "there is a good chance that UI elements a red-green weak person cannot see well will become more distinguishable when the colors are inverted." How can green-red be more distinguishable than red-green? Assuming the contrast stays the same... –  Igor Asselbergs Oct 2 '12 at 6:56 @Igor Asselbergs: color inversion doesn't actually switch red and green - at least when I do it in IrfanView, red becomes cyan and green becomes magenta. –  Michael Borgwardt Oct 2 '12 at 7:53 @Igor Asselbergs: in addition to Michael Borgwardt's comments, from my own experience: "full red" & "full green" are comparedly easy to tell apart, it's often mixed colors that make problems. One really bad for me on most monitors is #FFFF00 vs #00FF00 - OK side by side, but with some on-screen distance, it's guesswork. Invert shuffles them around wildly, so at worst it's other items that make problems. –  peterchen Oct 2 '12 at 15:25 The color:invert property is really just about increasing the contrast ratio of the text. It selects the inverse color of the background color. Contrast is the key to increasing the accessibility of the text. There is a load of information on this over at W3.org • To pass AA compliance you need a contrast-ratio of 4.5:1. • To pass AAA compliance you need a contrast-ratio of 7:1 It's all slightly different when you start using text of +18pt though, but there is plenty of guidence out there around this. The great snook colour contrast checker is a useful site that allows you to input hex color values to see whether they pass the various W3C criteria. share|improve this answer Thanks for the extra info. –  RLH Oct 2 '12 at 15:46 Some more background on this feature: in Windows, the feature commonly called High Contrast mode is perhaps best thought of as "Use the user's preferred colors mode". In this mode, apps are supposed to use whichever colors the user has selected for text, background, window border, and other screen elements via the control panel. This mode was completely customizable, and could be used with any of the preset color schemes (such as high contrast black-on-white or high contrast white-on-black, both of which had distinct colors for text elements vs background elements to ensure good contrast), or a user-defined theme. However, since the default color scheme when using the keyboard shortcut to activate this mode was the white-on-black scheme, the mode became associated with that color scheme - which looks very similar to inverse video - even though that's not it's specific goal. While this feature was originally very flexible, it has one major problem in that it relies on all apps to implement support for it correctly in order for it to work consistently. Apps have to check whether the mode is enabled or not, and if enabled, obtain the system colors to use instead of their own theme or skin colors. What you typically find is that apps from Microsoft and other major vendors who are aware of this mode will actually do this work, but many smaller 3rd party apps will ignore the mode outright, as the developers may not be aware of the feature in the first place. This can lead to situations where some apps get 'inverted', others remain as-is, and some end up as a messy hybrid of inverted and non-inverted controls. (Some apps even go a step or two further: if this flag is set, IE will stop displaying background images - this was back when background images were typically used just for displaying textured backgrounds which could interfere with reading the text on top, as in the days of Myspace. Later on, however, background images ended up being used for meaningful content - ie sprites and image replacement - so pages that use those techniques don't work so well in IE when this mode is enabled!) To avoid many of these issues, other vendors (RIM, Apple, others) take a completely different approach: instead of having settings that every app must carefully check for and respect, they simply let apps draw as usual, and then invert the final screen image as it is going to the physical display. As far as the apps are concerned, the screen is still in 'normal' colors, it's only the user that sees the inverted (or gray scale, depending on settings) image. The feature lives entirely in the OS, no app support needed. It's worth noting that systems that use this approach end up affecting everything on the screen: text and background are inverted, but so are colors in images and video, which may provide no benefit to the end-user and may instead render the image/video unusable! Also of note is that "inverse video" is not high contrast; in fact, contrast is (mostly) preserved: low-contrast light-grey-on-white gets transformed to equally low-contrast dark-grey-on-black. So, long story short: 'inverse video' mode is something of a compromise feature: the original "Use the user's preferred colors (which may or may not be contrasting colors) mode" mode is far more flexible and accessible in theory, but not well supported. Inverse video is less useful, but can be supported 100%. share|improve this answer Using a white background is like staring at a lamp all day. I've never understood the confusion people have about using dark backgrounds and lighter text. The only reason we ever used light backgrounds is because historically paper had to be light to show up dark inks. (But that practice is not ancient or severe enough to affect our evolution, so it is not more natural to us.) However, one additional feature I would welcome would be textured backgrounds. I think breaking up the surroundings of text is also easier on the eyes and may be more natural than bold detail of defined text. share|improve this answer Welcome to the UX SE @Sotorrio. Are there any studies you can cite that would back your assertion that textured backgrounds are easier on the eyes? It seems like textures might make reading harder by providing lines near text that are unrelated to the text. –  3nafish Apr 11 '13 at 3:24 In some point the invert colors is helpful . For me, working in the office with computers around all day long my eye could strain a lot because of the brightness of the display. such microsoft word excel,etc. i prefer uding invert colors when typing . And when finish i put it back. Because has less bright on th text not the entire background. Less brightness on the display less effect on the eyes and the skin (radiation) . that's the reason why apple add invert colors to sooth your eyes especially for those who are sensitive in brightness share|improve this answer If you look at the data points on high contrast reading studies what you notice is more veriability on the high constrast side of chart. You will also notice that readability is not significantly lower on high contrast side. What that mean is some people find high contrast much more readable. This suggests that some people are well adapted to high contrast and others not. It also explains why there is so much controversy about this subject. share|improve this answer Do you have any links to such reading studies? If you're referencing studies you should really link to them too. –  JonW Dec 13 '14 at 14:34 The reason inverted color setting exist is for people with low visablility or that are considered blind but can still see… hope this helps See Microsoft's Accessibility Documentations share|improve this answer support.microsoft.com/kb/308978 –  George Jan 30 at 23:20 After finding a quantity of old black and white family negatives I photographed them using my mobile phone ( Samsung S3 ) Negatives were placed on an illuminated light box. Then through screen colour reversal I can view as a positive They can also be displayed on my laptop by using the same procedure. Although I have found this useful for this purpose I cannot think of many reason to reverse the screen colours. share|improve this answer David, for discovering why inverting colors on the screen might be useful - have you looked for (and better yet, read) any usability research material on the subject? Perhaps, starting with the accepted answer here? –  Evil Closet Monkey Feb 7 at 0:09 Your Answer
http://ux.stackexchange.com/questions/26331/why-are-inverted-colors-considered-an-accessibility-feature?answertab=oldest
robots: classic hostname: ip-10-28-5-156.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-11 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for February 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.505255
9
{ "en": 0.9475104808807372 }
{ "Content-Length": "8112", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2XLUXVU2BQUD56ABY5QFFKXJZJ7Q27TM", "WARC-Concurrent-To": "<urn:uuid:f08d1e8c-0990-4fe5-95db-453340bd1c64>", "WARC-Date": "2014-10-23T03:54:48", "WARC-IP-Address": "216.139.221.90", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:KOZJOXFSXJZPGUO2ZZP5TGMKKT3PQ5UI", "WARC-Record-ID": "<urn:uuid:47183f6a-cc74-4990-aa7b-a65977a70718>", "WARC-Target-URI": "http://www.dvdverdict.com/printer/violentkind.php", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d417dcec-8c82-4536-901c-7b2dbc0b105f>", "WARC-Truncated": null }
1,066
Case Number 21186: Small Claims Court Image Entertainment // 2010 // 88 Minutes // Rated R Reviewed by Appellate Judge Tom Becker (Retired) // April 22nd, 2011 The Charge All this killing and violence is so unnecessary, but it seems to be the only thing you people respond to. The Case The drive-in's back, and the Butcher Brothers have got it. But what to do with it? Suggestion: Not this. The Violent Kind introduces us to three members of a "hard-ass" biker gang known, poetically, as "The Crew." Given that the film is cast with people who look more like models than hoodlums, they should have called the gang "The J. Crew." These guys look like hard-ass biker gang members the way The Golden Girls looked like Mafia assassins. After the nominal head biker guy, "Q" (Bret Roberts, S. Darko), ridiculously takes down some much larger dude whom he scammed in a bad drug deal, he and two other badass boy-banders, Cody (Corey Knauf, The Hamiltons) and Elroy (Elroy?) (Nick Tagas, Pig Hunt), head off to a cabin in the woods. The cabin, which resembles a typical suburban home, is apparently the long-standing headquarters/party house of this apparently long-standing gang -- Cody's dad was a member. The party is for Cody's mother, an aging biker chick. After a few scenes of pointless revelry, Mom and a few older-looking extras in leather vests and bandanas exit the party, perhaps to appear as extras on Sons of Anarchy. The film now switches over to a brooding relationship conundrum, with Cody mooning over his ex-girlfriend, Michelle (Tiffany Shepis, Bryan Loves You), who's hooked-up with yet another manscaped pin-up. Cody is consoled by Michelle's "straight" little sister, Megan (Christina Prousalis). Michelle and the boytoy leave, Cody and Megan share a moment, Q gets down with his woman, Shade (Taylor Cole, Surrogates), and Elroy (Elroy?) is left as the fifth wheel. Then, a bloodied Michelle staggers back to the house. The others carry the bedraggled floozy into the bedroom, and the boys take a walk up the block and discover her now-dead boy buddy in a car. Since they can't figure out what caused the damage -- the car is untouched, only the people are messed up -- they return to the house and fret over the injured Michelle. Later, Elroy decides that the sight of a bleeding and bruised woman is too enticing, so he tries something naughty with the incapacitated girl. Bad move. The mysterious force that attacked Michelle's car has also possessed/mind controlled/incubated her, and Michelle rebuffs Elroy's advances by trying to eat him. This causes much consternation among the whiny outlaws, so they attempt to restrain Michelle as she tries to eat the rest of the gang and later walks on the ceiling. Everyone squabbles over whether they should high-tail it out of there or stay with the wall-crawling Michelle and the half-eaten Elroy, but it's a moot point, since some "Monsters Are Due on Maple Street"-like force is monkeying around with the cars and the cell phone reception. Complicating things: the arrival of a bunch on nonsequitorial characters done up in '50s fashions -- like refugees from a Glee salute to Grease -- spouting indulgently scripted gibberish about violence, James Dean, and outer space babies. Nonsense ensues, denouement suffers. The Violent Kind was written and directed by the Butcher Brothers, which is the nom de film of Mitchell Altieri and Phil Flores. They are not real brothers, they are not real butchers, and based on this film, it's hard to think of them as "real" filmmakers. The Violent Kind isn't just a bad film, it's transgressively idiotic. It's not sunk by the low budget, which includes apparently laptop-created special effects; it's not just derailed by the dreadful acting by people who are completely miscast. The Violent Kind is done in by a wretched script and pathologically poor direction. The film misguidedly hopscotches through so many exploitation genres that you could easily make a drinking game out of it. There's nothing wrong with referencing old exploitation films -- Quentin Tarantino has built a pretty credible reputation by doing just that (and if you're keeping score, Q's real name is "Quentin") -- but here's it's done with such aggravating artlessness that it comes off like a school project by a cluelessly serious and self-absorbed seventh grader with a cool DVD collection. The film gracelessly pings from biker saga (a conceit abandoned pretty early on; the "gang" might as well be short order cooks) to relationship drama (with reams of dialogue explaining painfully uninteresting heartache stories) to violent possessed-being horror (you've seen that one before) to "human drama" (everybody's got issues with everybody else and they use Michelle's compromised state as an excuse for some impromptu therapy sessions) and finally, to some kind of sci-fi mess (the ridiculously animated greasers, evidently, are not of this Earth). After sitting through nearly 90 minutes of this, you'd think we'd at least get some kind of satisfying, coherent resolution, something that explains why characters die, come back, and then disintegrate, or why Michelle is dragged into a room naked while a laser show ensues, but the Butchers don't bother with that. The '50s guys make cryptic utterances that, I guess, are supposed to clue us into some kind of message, but since these statements sound like they were lifted from a batch of postmodern fortune cookies, they don't really resonate, and we get nothing in the way of context. The expected "twist" ending is just idiotic and badly staged. The whole thing is just a drawn out, boring, impenetrable cheat. In the slim plus column, there are a few suspenseful moments, some reasonable gore, and a minute or two of gratuitous nudity, but none of this can salvage this train wreck. Image sent over a screener for review. According to their website, the disc will include an anamorphic transfer, 5.1 surround track, and some extras; the screener, however, offers a full-frame transfer, 2.0 stereo track, and no supplements save for a trailer. The Verdict The court has heard the arguments from the law firm of Shoddy, Shoddy, and Dumb and declares The Violent Kind a video pox. The only real kind of violence this film might encourage will be angry consumers demanding reimbursement. Scales of Justice Judgment: 20 Perp Profile Studio: Image Entertainment Video Formats: * Full Frame Audio Formats: * Dolby Digital 2.0 Stereo (English) * None Running Time: 88 Minutes Release Year: 2010 MPAA Rating: Rated R Distinguishing Marks * None * IMDb
http://www.dvdverdict.com/printer/violentkind.php
robots: classic hostname: ip-10-16-133-185.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-42 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for October 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.119944
61
{ "en": 0.9506967067718506 }
{ "Content-Length": "137786", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:AT2WGSH4LGLYE3TQMXVCJWIXUTCPGDTO", "WARC-Concurrent-To": "<urn:uuid:3c728bef-b7d0-4845-ba8d-3485fd2b2e1c>", "WARC-Date": "2015-08-01T20:11:47", "WARC-IP-Address": "192.0.78.12", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:VGPPRNFEAC6FJTN6L3JDLM63S77LUK4B", "WARC-Record-ID": "<urn:uuid:c2ee8ba6-4607-4c5f-b8ab-f3fc9e6c8e40>", "WARC-Target-URI": "https://thewriteaholicblog.wordpress.com/2010/09/02/aw-september-seasonal-blog-chain/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e742794f-6f0f-4124-bfae-801f1e6a0648>", "WARC-Truncated": "length" }
941
AW September Seasonal Blog Chain This month’s blog chain on the Absolute Write Water Cooler forums was kicked of by Ralph Pines. He’s the one who offered the theme: seasons. I wrote a flash fiction/short story for the occasion. I hope you like it! Summer Tears I kicked my flat tire with a frustrated grunt. What is it with cars these days? They recently decided to pull sick jokes, is that it? I dropped to the sidewalk, my cell phone in hand. A few digits and someone would be here to help. I sat in a neighborhood; I could just yell. But I couldn’t bear people right now. I wanted to curl up on my couch with a jar of Ben & Jerry. In ice cream lies the power to fight heat waves and sorrows. I undid a few buttons of my blouse. My elbows went to my folded knees and my hands to my face. Everything in me needed support. My head was no exception. The humid temperature crushed me like the burden of grief. Who else but me would get a flat tire on the hottest day of summer after burying her sister and would-have-been-brother-in-law who died in a car crash? And what a funeral it was. Everyone cooked in line under their black clothes. By the middle of the ceremony in the graveyard, most people stopped caring about my sister. Their sweaty bodies yearned for air conditioning so the dead mattered less with each minute spent under the sun. It was all summer’s fault. All of it. The disrespect for the memory of my sister. Hell, her death was the season’s fault in the first place. Wedding season frenzy kills two people. The newspaper loved the headline. The accepted theory stated that my sister and her fiancé argued while he drove. They were so bent on making their point neither of them saw the incoming truck. Dead on impact. My family thought I was nuts when I said we should use the flowers ordered for the wedding for the funeral. The irony hurt at first but that’s what my sister deserved; a lively goodbye. In that regard, summer probably was probably the season she would have chosen. Sweat trickled down my neck. The heat invited me to lay flat on my back and wait for the rest of the world to make decisions for me. Moving clearly wasn’t encouraged. The weather didn’t care how hard it already was to pull through the motion. The world felt heavy enough without the humidity dropping in for an unsolicited visit. Humidity is the nasty aunt that always finds her way to family events and you just have to endure her smothering presence. Then, something changed. The world took a deep breath, releasing the pressure on me for an instant. The storm broke. The deluge drenched me in a second. I raised my head to curse at the sky but laughter stopped me. Two girls exited a house, jumping around. They laughed as they ran toward a park around the curb. I listened to the drumming of the rain and the chimes of pleasure and remembered. My sister and I used to do that. “Adults curse the rain.” She said to me every time I was at her place when it rained. “Children know better.” We always yelled the last part together before rushing to the balcony. “Rain is freedom.” One day when I felt particularly down, she told me that rain was the sky letting go of its problem and solving ours. “I guess even you can’t keep it all in,” I murmured. The temperature became bearable and so did the burden of humidity. I closed my eyes. I cried with the sky and let my anger feed the thunderbolts. The rain played the sweetest parting song, all in notes of pavement, roofs and car metal. The girls still laughed and yelled in the distance like a memory. “Excuse me,” a male voice cut through the symphony. I opened my eyes on a charming face topped by an umbrella. “I saw you through my window.” He pointed the house across the street. “You look like you’re having a bad day. Anything I can do to help?” “Are you in the mood to change a flat tire under the rain?” He kneeled in front of me so our eyes met and the umbrella shielded me as well. “Not really.” He replied with a crooked smile. “But I do have a working phone.” He glanced knowingly at my cell phone, soaked on the sidewalk. “How about coffee?” “I don’t trust strangers who are afraid to get wet.” The mysterious man folded his umbrella and offered me his hand to help me up. Here is the list of the blog chain participants: Ralph_Pines: and direct link to his post Aheïla (That’s me!) T.N. Tobias: About Aheïla 41 responses to “AW September Seasonal Blog Chain Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s Get every new post delivered to your Inbox. Join 804 other followers %d bloggers like this:
https://thewriteaholicblog.wordpress.com/2010/09/02/aw-september-seasonal-blog-chain/
robots: classic hostname: ip-10-236-191-2.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-32 operator: CommonCrawl Admin description: Wide crawl of the web for August 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.021434
11
{ "en": 0.970766305923462 }
{ "Content-Length": "82868", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2ROOBPE6MAONNRYMXD4QVZAC6QRNYIQN", "WARC-Concurrent-To": "<urn:uuid:b7dbbda9-c4a5-42da-9beb-5a257efe977a>", "WARC-Date": "2014-09-16T02:54:12", "WARC-IP-Address": "54.208.107.182", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:LLAZCK6E6W7WUYWHCDZTAJSTP2NWHBZD", "WARC-Record-ID": "<urn:uuid:69af6e84-b717-469b-aea7-0b27dad6062b>", "WARC-Target-URI": "http://hockey.knoji.com/what-are-the-minimum-salaries-of-the-nhl-ahl-echl-and-chl/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:083d1aed-8230-4e23-80cd-1970814844c7>", "WARC-Truncated": "length" }
745
Find coupons, reviews and similar sites for any retailer What Are the Minimum Salaries of the NHL, AHL, ECHL and CHL? Is is well known that playing in the NHL is a jackpot. Can playing in the hockey league's that feed the National Hockey League be lucrative as well? It was not all that long ago that National Hockey League players had to work a summer job to make ends meet. Phil Esposito, one of the greatest goal scorers the NHL has ever seen, had been in the league several years, won major trophies and shattered the league’s scoring records before he was able to quit his summer job in Sault Ste. Marie, Ontario, Canada. It is known by all what ridiculous amounts of money today’s NHL hockey players make. It is to the point where you have to question whether they love to play the game or are just in it for the cash. In saying that, there are lesser leagues in North America that serve as farm systems for NHL clubs that provide jobs for hundreds of players. These players truly must love the game because it wouldn’t be hard to find a better paying job. A number of these teams play in front of relatively small crowds with ticket prices substantially lower than that of the NHL venues. Yet, a number of players enjoy long careers in these lesser leagues without ever making it to the show. A fair portion of these players even have full university educations. Is playing a minor league hockey career lucrative? A step below the NHL is the American Hockey League. If you’re playing on an AHL team, chances are there’s an NHL team with a close eye on your performance. For the 2010-11 season, the AHL has a minimum salary of $37,500USD for players on United States based teams and $40,000USD for players on Canada based teams (when the bargaining agreement was set, who would have thought that the Canadian dollar would surpass the greenback in value!). Keep in mind that equipment and travel expenses are provided by the team in addition to that salary. Not too shabby for playing a game for a living. Feeding the AHL is the East Coast Hockey League. In the ECHL, pay standards are on a weekly basis. For a rookie, the minimum weekly wage is $370USD. For a player that has played in over 25 ECHL games before the start of the current season, the minimum is $410USD. Like the AHL, equipment and travel expenses are paid for as well as moving expenses if a player is traded mid-season. Considerably lower than the AHL but keep in mind that this is the bare minimum a player can receive. Once again, this is money being paid to play a game that each player should be passionate about. The Central Hockey League is yet another step lower. The pay however, isn’t that drastically different from the ECHL. Minimum for a rookie in the CHL is $335USD per week and for a ‘veteran’ it is $375USD. Once again, expenses are paid and this number reflects the absolute minimum with players possibly making considerably more. So, what is the minimum wage in the NHL? The poorest player in the league makes $500,000 for a one year contract. It seems like a lot but the odds are so against someone earning a spot in the league, that they do deserve it. In Canada alone, there are 577,000 registered minor hockey players. These players are gunning for one of sixty Canadian Hockey League teams to play at the elite level of junior hockey. From these sixty teams, only a handful will move on to an NHL club each year. Add in the hundreds of thousands of potential players from hockey producing countries like the USA, Sweden, Finland and Russia and you have a better chance of winning the lottery jackpot than playing in the NHL. Need an answer? Get insightful answers from community-recommended in Hockey on Knoji. Would you recommend this author as an expert in Hockey? You have 0 recommendations remaining to grant today. Comments (1) When compared to baseball and football players, seems like this rate is very low. I don't watch sports or follow any teams, but thanks for the interesting look into the salaries of hockey players. : )
http://hockey.knoji.com/what-are-the-minimum-salaries-of-the-nhl-ahl-echl-and-chl/
robots: classic hostname: ip-10-196-40-205.us-west-1.compute.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-41 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for September 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.030296
26
{ "en": 0.964121401309967 }
{ "Content-Length": "11304", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:F3NCWVGTRVYNQZA7ELS7YZMMAY4GVEHA", "WARC-Concurrent-To": "<urn:uuid:e3e570cd-281e-4c37-bfef-1cd6dfd4de5f>", "WARC-Date": "2017-09-21T06:46:25", "WARC-IP-Address": "192.30.252.154", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:V57GOWPIDDXW5YZTDA3M7OJXTDWCFGKT", "WARC-Record-ID": "<urn:uuid:53e007b4-55b1-474a-b52d-87bd2344bd5b>", "WARC-Target-URI": "http://mathman.biz/html/saradivision.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2314500a-a9ce-47e2-b6ee-1fe59f96141e>", "WARC-Truncated": "length" }
838
Sara and Maya find Patterns in division, and AnnEmily adds and multiplies fractions Don had Sara do some division problems the week before her work below. One he gave her was 10 divided by 3,  which Don, as usual, talked about sharing 10 cookies between 3 people, using 3x5" cards for cookies (see sample problems from chapter 2 his worksheet book at ). Sara said each person got 3 cookies with 1 left over. She cut the 1 leftover-cookie into 3 pieces, each 1/3 of the cookie- see the diagram below. So each person received 3+ 1/3 cookies. He also showed her other ways to write a division problem. And Sara had to figure out that when one cuts a cookie into 3 pieces, each piece is 1/3 of the cookie, a key idea! She tried the same problem on a calculator and got 3.3333... Instead of trying to show her how decimals work, Don had the idea of seeing what would happen if she did 10/1, 10/2, 10/3, 10/4, 10/5, 10/6, 10/7, 10/8, 10/9, and 10/10. Don wasn't sure what would happen, but he was almost sure there would be a PATTERN!  After finishing 10/7, her time had run out, but Sara insisted on finishing the last 3. When we got to 10/9 below, Don asked Sara if there was a Pattern in here: Sara saw that going from right to left, the top numbers in the fractions got bigger by 1 and the bottom number got smaller by 1!! Now Don had never seen this before, in 54 years of teaching! Then when they got to 10/5 = 2 the pattern wasn't there; so they changed the remaining answers to 1 and something. The 10/5 = 2 = 1 5/5, then it fit in the pattern!  After a lot of work in renaming numbers by Sara, even knowing what the answers would look like from the pattern, the final results ended up looking like this: Maya's work dividing 9 by different numbers This shows the power of PATTERNS in mathematics! It also shows Don's willingness to try new things, his fearlessness, and his being excited about the unknown and what will happen. Normally Don aims for students finding different ways to solve a problem; for example, if one shares 10 cookies between 3 people, a student might share 3 each, then cut the left-over cookie into 4 pieces, each getting 1/4, then cutting the left-over 1/4 into 3 pieces, each 1/12, so each person would get 3 + 1/4 + 1/12 (which is equivalent to 3+1/3 which Sara ended up with above). OR students, sharing when they can, then cut left-over pieces into 2 equal pieces every time, and end up with an infinite series 3 + 0/2 + 1/4 + 0/8 + 1/16 + 0/32 + ... which  is also equal to 3 1/3!  Notice that Maya worked on The Peg Game and The Tower Puzzle (ch.6) before the division. Maya knew how to do these divisions by cookie-sharing also.  Don left 9/6 = 1 3/6 without reducing the 3/6, in order to continue the pattern. Too much emphasis is placed on reducing fractions to lowest terms, because you also lose the patterns if you do that- which is more important. Great work Sara and Maya ! AnnEmily, 2nd grader, adds fractions using complex fractions and multiplies mixed numbers-WOW! Don gave AnnEmily the problem 2/3 + 1/4 = ? He walked away to work with other students. When he came back, he saw this picture (without 1/8 and so on in black print which he put in after to help him and other people understand what she did). AnnEmily explained the picture to Don (as he remembered it): The whole is a 12x12 square. The red section is 2/3 of that. The blue part is 1/4 of it. The 3 vertical rows at the left, make up 1/4 of the whole. Half of 1/4 is 1/8. So she counted 4/8 for the 4 sections. Looking at the 2 red vertical rows to the right, that was 2/3/8 (2/3 of an 8th) on top and 2/3/8 on the bottom. AnnEmily added the 1/8's to get the red total: 1/8 + 1/8 + 1/8 + 1/8 + 2/3/8 + 2/3/8 = 4/8 + 4/3/8 = 4/8 + 1 1/3/8 = 5 1/3/8 ([5 and 1/3] eighths). The blue section is 1/4 = 2/8, so the total 2/3 + 1/4 = 7 1/3/8 (on the right above), which was her answer. Don was really impressed with AnnEmily's use of complex fractions. He checked her answer for himself, by changing the complex fraction to a simple fraction by multiplying top and bottom by 3 to get 22/24 = 11/12. Then he looked at her picture and got 11/12 also. AnnEmily multiplies 3 1/2 x 2 1/3 See her picture below: First she did 3 1/2 x 2 = 7, then 3 x 1/3 = 1, then 1/2 x 1/3 = 1/6, then added these to get 8 1/6. Simple! Fine job AnnEmily! Don emphasizes using rectangular cookies to share with people, but AnnEmily shows she can handle the circular cookies to share and multiply! One keeps learning from the students, which is great! To other discoveries To order Don's materials Mathman home
http://mathman.biz/html/saradivision.html
robots: classic hostname: ip-10-97-134-90.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-39 operator: Common Crawl Admin description: Wide crawl of the web for September 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.284502
31
{ "en": 0.8298126459121704 }
{ "Content-Length": "4742", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VBVMNSAVSSEZZCDU7LV5VS2OSMNTU2CS", "WARC-Concurrent-To": "<urn:uuid:9d1c13d7-0d2d-48fa-8abb-2369500a0fbe>", "WARC-Date": "2020-08-11T12:28:19", "WARC-IP-Address": "132.148.62.129", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:Q4MHTUAK6UPPKBX4ZROC2CSUMIIVYXIQ", "WARC-Record-ID": "<urn:uuid:9fd0c78e-349b-4042-ae97-3816e145b4fe>", "WARC-Target-URI": "http://www.reftopia.com/dictionary/imputation", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c09fa5ce-582b-4653-8fc1-f439ad5c2325>", "WARC-Truncated": null }
108
1. Noun.  The act of imputing or charging; attribution; ascription. 2. Noun.  That which has been imputed or charged. 3. Noun.  Charge or attribution of evil; censure; reproach; insinuation. 4. Noun.  (theology) A setting of something to the account of; the attribution of personal guilt or personal righteousness of another; as, the imputation of the sin of Adam, or the righteousness of Christ. 5. Noun.  Opinion; intimation; hint.
http://www.reftopia.com/dictionary/imputation
isPartOf: CC-MAIN-2020-34 publisher: Common Crawl description: Wide crawl of the web for August 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-25.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.88675
0
{ "en": 0.9899553060531616 }
{ "Content-Length": "56066", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:R5V2MIWGP2FOHSB5X4H4JDWKK5BDWPVG", "WARC-Concurrent-To": "<urn:uuid:cb4c4607-e055-4755-8e66-08ed041cf4b5>", "WARC-Date": "2017-04-26T01:37:42", "WARC-IP-Address": "66.135.33.54", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:DM2KMMRXQUJQS4AYPSIG3CSYYJAFYSN6", "WARC-Record-ID": "<urn:uuid:45bc1e29-213b-4e1a-b6c7-8a977a614f51>", "WARC-Target-URI": "http://www.protagonize.com/story/singularity/196568", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0bfca889-51ee-4f97-b5df-c7fe68c4ccdd>", "WARC-Truncated": null }
718
A Wife A Life AwayMature Bitter it was. With John concerned about being trailed, the trio had opted on not setting a campfire, which meant that no one got any sleep. Though shifts were designated by John as to who would stand watch, the aforementioned fact made it an exercise in futility. All three were conscious throughout the night, save a few micro naps brought on by sleep deprivation. The suffering didn't end when the sun came up over the valley hills. Waiting for them in the morning twilight was an onslaught of mosquitoes that rivaled the first two nights Michael had spent in the forest. Having little to protect themselves with, the insects had themselves a feast. John left camp to refill his water skin while Andrea prepared food. On his return he offered some to Michael simply on principal. A dehydrated man would do nothing but slow them down and contrary to what John wanted at the moment, they needed Michael alive. Andrea washed her face with what Michael assumed was a wet wipe, after which she tried to retie her cluttered hair; with not much success. Finally, they gathered what gear had been laid out for a measly trail breakfast and got ready to step off. As she fastened the waistband strap of the backpack she was carrying, Andrea turned to Michael. “We should be near a main supply route in a couple of hours. From there we'll catch a ride, hopefully, to a temporary base.” “And what if our hopes don't pan out?” asked Michael. “What? You mean, what if the vehicle doesn't show up?” “Yeah. I guess we continue on walking?” Andrea laughed. “You guessed it fly boy.” Michael hung his head, laughing a little on the inside about the ignorance of his question. He also thought briefly about how long it had been since someone had called him fly boy. Then he thought a lot less briefly about it. It's then that it hit him. The last person to have called him that was Cassandra, his wife. His eyes widened. John looked at him and cocked his head. “You alright?” “She was my wife,” Michael uttered. “What?” John said, looking past Michael to Andrea. “Hey, your boy's having a seizure or something.” Andrea dropped her shoulders and looked up at the sky, then turned around and came back to Michael. “Hey, what's the matter?” “She was my wife,” he said again, a tear breaking over the cusp of his eyelid and tumbling down his cheek. “And now she's dead. She was the last person to call me fly boy,” he said, looking now to Andrea. “Eighty or so years ago,” He continued, another tear racing down through the path the other had broken along his dirt covered face. Andrea sighed, her heart breaking for the man. John watched Andrea's features soften and shook his head. “We don't have time for this crap.” She looked at him, as if scolding him with her glance, then returned her attention to Michael. “Listen, I understand, as much as I can, that you're going through some rough emotional terrain here Michael. Unfortunately, if we don't get a move on, really bad things will start happening. Things that I can promise you will supersede the painful memories of your lost loved ones.” She took his hand, “I need you to put this away for a short while, so we can get out of here safely. When we're back at the shop, I'll make sure you're given time to sort through your feelings.” Michael looked down at her hand, she was unintentionally holding the bruised hand that had been holding the spear when John removed it from his grip. The pain seemed to help him replant his feet in reality and assess the situation with a clear mind. He nodded. “Sorry,” he said, shaking his head and wiping his tears. “Just a little messed up, that's all.” “Aren't we all?” Andrea said, smiling. John sighed. “Speak for yourself.” Andrea let go of Michael's hand, and patted him on the shoulder. “Ok, let's go.” Michael laughed. She had patted him on the sore shoulder. He turned and followed behind her. Looking over his shoulder, he inadvertently made eye contact with John in the rear, who glared at him with all the hatred of a vengeful Shylock yearning for his pound of flesh. The End 161 comments about this story Feed
http://www.protagonize.com/story/singularity/196568
robots: classic hostname: ip-10-145-167-34.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2017-17 operator: CommonCrawl Admin description: Wide crawl of the web for April 2017 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.022158
141
{ "en": 0.9509263634681702 }
{ "Content-Length": "21026", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FLEGLS3RR7KURV3B5F6Q5NOP4RETFIEY", "WARC-Concurrent-To": "<urn:uuid:c53058cf-f422-48a4-9e61-bde8eb563938>", "WARC-Date": "2019-02-21T06:40:32", "WARC-IP-Address": "128.151.77.39", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:NUERM3YREBI3B5PVWUQ5RF5DFY6GE7FD", "WARC-Record-ID": "<urn:uuid:8364c496-c72d-4dad-ad69-f9574e975143>", "WARC-Target-URI": "http://www.rochester.edu/pr/Review/V78N4/0501_frank.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d59fe11e-0a9e-44cf-85bf-db6b55d55fd5>", "WARC-Truncated": null }
1,103
Please consider downloading the latest version of Internet Explorer to experience this site as intended. Tools Search Main Menu Are We Alone?Odds are, we aren’t the first advanced civilization in the universe, says a Rochester astrophysicist.By Leonor Sierra with Karen McCally ’02 (PhD) Tale of Two Equations In 1961, astrophysicist Frank Drake developed an equation to estimate the number of advanced civilizations likely to exist in the Milky Way galaxy. The Drake equation has proven to be a durable framework for research, and space technology has advanced scientists’ knowledge of several variables. But it’s been impossible to do anything more than guess at variables such as L, the probable longevity of other advanced civilizations. In new research, Adam Frank, a professor of physics and astronomy at Rochester, offers a new equation to address a slightly different question: What is the number of advanced civilizations likely to have developed over the history of the observable universe? Frank’s equation draws on Drake’s, but eliminates the need for L. Are humans unique and alone in the vast universe? It’s a question humans have asked for millennia. But it hasn’t been until recently that there’s been any scientific framework in which to even begin to posit answers. In the early 1960s, astrophysicist Frank Drake, now professor emeritus of astronomy and astrophysics at the University of California, Santa Cruz, developed an equation that could theoretically estimate the number of advanced civilizations existing in the Milky Way galaxy. Drake intended his equation to offer a guide for research. At the time, astrophysicists didn’t have nearly the knowledge it would actually take to come up with a value for the elusive N: the number of advanced civilizations (which Drake defined in practical terms as civilizations emitting detectable electromagnetic waves) that were likely to inhabit the galaxy. Among the unknowns was the number of planets in the Milky Way. And as long as that was unknown, it would also remain unknown what percentage of such planets—or exoplanets, as they’re called—would likely have environments suitable for life. Scientists have made enormous progress toward estimating both of those variables, thanks to NASA’s Kepler Mission and other advances in astronomy. The Kepler space observatory was launched in March 2009 with the goal of exploring the Milky Way’s planetary systems in order to find habitable planets. Using data from that mission, astrophysicists can now achieve reliable estimates for both those variables. But roadblocks remain. And in new research, Adam Frank, a professor of physics and astronomy at Rochester, and his coauthor Woodruff Sullivan of the University of Washington have advanced a means to overcome the obstacles. “The question of whether advanced civilizations exist elsewhere in the universe has always been vexed with three large uncertainties in the Drake equation,” says Frank. “We’ve known for a long time approximately how many stars exist. We now know that roughly one-fifth of stars have planets in ‘habitable zones,’ where temperatures could support life as we know it.” But the Drake equation requires an estimate for how often planets suitable for life actually develop life. Second, it requires an estimate for how often life evolves into intelligent life, and how often intelligent life develops into advanced civilization. And most troublesome of all, according to Frank, the Drake equation requires an estimate for how long advanced civilizations are likely to persist. “The fact that humans have had rudimentary technology for roughly 10,000 years doesn’t really tell us if other societies would last that long,” Frank says. Frank and Sullivan respond to these dilemmas by posing a slightly different question. “Rather than asking, how many civilizations may exist now?” says Frank, “we ask, are we the only technological species that has ever arisen?” By restating the question, Frank and Sullivan eliminate the need to know any information about civilization longevity. Frank calls the new question the “cosmic archaeological question”—how often in the history of the universe has life evolved to an advanced state? Of course, that still leaves huge uncertainties in calculating the probability for advanced life to evolve on habitable planets. It’s here that Frank and Sullivan flip the question around. Rather than guessing at the odds of advanced life developing, they calculate the odds against it occurring. In other words, what are the odds that humanity, here on Earth, is the only advanced civilization ever to develop in the entire history of the observable universe? “Of course, we have no idea how likely it is that an intelligent technological species will evolve on a given habitable planet,” says Frank. “But using our method, we can tell exactly how low that probability would have to be for us to be the only civilization the universe has produced.” So how unlikely is it in a universe consisting of an estimated 10 billion trillion stars, or even among the Milky Way’s estimated 100 billion? Applying the new exoplanet data to the universe’s 2 • 10 to the 22nd power stars, Frank and Sullivan find that human civilization is unique in the cosmos only if the odds of a civilization developing on a habitable planet are less than about one in a trillion trillion, or one in 10 to the 24th power. “One in a trillion trillion is incredibly small,” says Frank. “Think of it this way: before our result you’d be considered a pessimist if you imagined the probability of evolving a civilization on a habitable planet were one in a trillion. But according to our results, one chance in a trillion implies that what has happened here on Earth with humanity must have happened a trillion other times over cosmic history. A trillion other civilizations doesn’t sound so pessimistic.” Frank cautions against dreams of extraterrestrial communication. “The universe is more than 13 billion years old. That means that even if there have been a thousand civilizations in our galaxy alone, if they live only as long as we have been around—roughly 10,000 years—then all of them are likely already extinct. And others won’t evolve until we are long gone.” But that reality doesn’t diminish the profound scientific and philosophical significance of the new result. “Given the vast distances between stars and the fixed speed of light, we might never really be able to have a conversation with another civilization anyway. If they were 50,000 light-years away, then every exchange would take 100,000 years to go back and forth. So from a fundamental perspective the question is, has it ever happened before? It’s not just, has it happened recently and nearby? Our result is the first time anyone has been able to set any empirical answer for that question. And it turns out that it’s pretty likely we are not the only time intelligence and civilization has evolved.”
http://www.rochester.edu/pr/Review/V78N4/0501_frank.html
isPartOf: CC-MAIN-2019-09 publisher: Common Crawl description: Wide crawl of the web for February 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-159-135-91.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.772748
0
{ "en": 0.9869284629821776 }
{ "Content-Length": "100636", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:E2LUDUMY2SMMQ2LGPJMI52VDDHSYFVOD", "WARC-Concurrent-To": "<urn:uuid:3c2eef3e-d3b2-47dd-9ba2-59f628a2ecd1>", "WARC-Date": "2021-08-03T10:56:53", "WARC-IP-Address": "151.101.194.159", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:2UJBBM546CYSSHWOQF635AZGKQKNRBZA", "WARC-Record-ID": "<urn:uuid:66d173b5-bdcc-4a92-afb6-33596c8bb059>", "WARC-Target-URI": "https://hmcec.org/testimonies/benno-benninga/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:26f82620-27f1-4f60-8e06-866c67a28e69>", "WARC-Truncated": null }
227
Holocaust Museum & Cohen Education Center Benjamin “Benno” Benninga was born in the Leeuwardern, Holland. Prior to the war the family was very well off due to Mr. Benninga’s shortening company. In 1940, they moved to Bussum and then Amsterdam two years later. In Amsterdam they moved in with friends and were exempt from razzias (the German pick-ups of Jews) due to Mr. Benninga and Benno’s respective employments. But they knew their exemptions were only temporary. In August of 1942, the seamstress of Benno’s mother, Mrs. Helmig, visited the family and offered them shelter. They stayed with her until their safety was compromised. The family considered this house their “safe haven” and was very grateful for their time there. The Benningas then moved in with a different family. This family received compensation. The family of four stayed in the attic of the house for two years. The conditions were very uncomfortable and the host family was moody and neurotic. Appallingly, the Benningas received physical and verbal abuse from their protector. The situation became so intolerable that they left to seek shelter with a minister. Not long after, Holland was liberated. After the war, Benno married a fellow “hidden child,” Carla Meijer. They immigrated to the United States. Benno penned a book about his experiences in hiding. Sign up for Museum E-News Something went wrong. Please check your entries and try again.
https://hmcec.org/testimonies/benno-benninga/
isPartOf: CC-MAIN-2021-31 publisher: Common Crawl description: Wide crawl of the web for July/August 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-157.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.162119
71
{ "en": 0.9786798357963562 }
{ "Content-Length": "85275", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VUGCVNTK2JOYHUSDEM6VWQATZV4INUL3", "WARC-Concurrent-To": "<urn:uuid:69f325eb-dd64-4179-8590-512d853513de>", "WARC-Date": "2022-12-05T01:29:34", "WARC-IP-Address": "13.249.39.32", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:RCMS342HA2O5FWX3TKMEFJYGMOPU5B3H", "WARC-Record-ID": "<urn:uuid:a4da8b22-6352-4013-b6e5-04885171f5c2>", "WARC-Target-URI": "https://encyclopedia.ushmm.org/content/en/id-card/barbara-kertesz-nemeth", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:03212197-68b7-4b7d-8164-2ade30503509>", "WARC-Truncated": null }
267
Barbara Kertesz Nemeth Barbara Kertesz Nemeth Born: March 2, 1911 Hodmezovasarhely, Hungary Barbara and her younger sister, Alice, were born to a Jewish family in the town of Hodmezovasarhely in southeastern Hungary. Barbara married Desider Nemeth, a dentist, and the couple settled in the town of Szentes, not far from the city of Szeged. 1933-39: In 1932 Barbara gave birth to a daughter, Maria. She has been busy trying to find a suitable house for them that would double as an office for her husband. Barbara does a lot of volunteer work. She has taken in a young Austrian woman who lives with them and helps them to perfect their German. 1940-44: It's been five months since German troops occupied Hungary in March 1944. Barbara and her family were among thousands of Jews deported to a makeshift ghetto in Szeged's Rokus sports field and brickyards. Most of the people there were children and the elderly, or women whose husbands had been forcibly conscripted into army labor brigades. A month ago, they were sent by train, via the Strasshof labor camp, to a labor camp in the east Austrian farming village of Goestling an der Ybbs. In April 1945 Barbara and her family were shot to death in Goestling an der Ybbs by retreating SS soldiers, just days before U.S. forces reached the area. Barbara was 34. Thank you for supporting our work
https://encyclopedia.ushmm.org/content/en/id-card/barbara-kertesz-nemeth
isPartOf: CC-MAIN-2022-49 publisher: Common Crawl description: Wide crawl of the web for November/December 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-92 software: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.120411
0
{ "en": 0.972518026828766 }
{ "Content-Length": "130722", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BTY64MDZYU6JJH72KETMWMI4MVHXWFFF", "WARC-Concurrent-To": "<urn:uuid:4a14feb3-40f3-4548-b756-63b0d6d73262>", "WARC-Date": "2022-10-01T04:39:49", "WARC-IP-Address": "172.253.115.132", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HZ66TVHZZWQFR6G2AXIZTFSZ7FIFZ5JP", "WARC-Record-ID": "<urn:uuid:08c11a82-4bd4-4bae-ac92-b0395072e678>", "WARC-Target-URI": "https://blogindm.blogspot.com/2008/04/closing-out-season-with-peeps.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c7489bde-b087-4fbd-8e35-ce018cca78a6>", "WARC-Truncated": null }
498
Monday, April 14, 2008 Closing Out The Season With... Peeps Some peeps to close out the season... The "Demo Freak" The "Demo Freak" is a uniquely annoying peep. This is the peep who has some obscure requests for their event like, for instance, one Ladino tune during dinner. We play Ladino songs occasionally. We haven't yet worked up a demo, though. That's not good enough for this client, who, although looking for a simcha band to play simcha music for the rest of her five hour affair, will base her decision of which band to hire on the basis of which band has a Ladino demo. In the end, she'll opt for a band from outside her community, ironically, one that also doesn't have a Ladino demo, because they "must" do it better than a musician from her community who's actually transcribed and learned a bunch of these tunes because he's interested in them. The band she does hire will wind up trying to sight-read a third generation copy of a chart the bandleader's friend has faxed over an hour before the gig. The saving grace about not having booked the gig is the fact that it means we don't have to deal with this peep at the affair. A joy, no doubt. The "Cud Chewers" These peeps, a middle-aged LI mom and her three married daughters pop in the gum for speeches at their cousin's Bar mitzvah. Dressed to the nines, and chewing with their mouths open, it's easy to see where the kids picked up this lovely habit. Cause gum during dinner is just so classy. The "Tightrope Walker" This peep introduces the guest of honor at an organizational function by "dissing" the guest of honor's choice of occupation. Then, just as it seems that he's about to stumble and insult the guest of honor, s/he "saves" the moment by contrasting said guest to the typical. For example, if the guest of honor is a lawyer, the "Tightrope Walker" might start out talking about how lawyers are sleazy shysters and ambulance chasers and then "save" their comment by saying "our guest of honor is upright and honest." Smooth, no? Well, they think so. Only problem is, if the guest of honor is a lawyer, its likely that a number of the guests are his professional colleagues. All potential long-term donors. Also all offended. Of course, this NEVER happens in real life. We've NEVER heard a "Tightrope Walker" introduce a rabbi by saying: "Rabbis are like horses." Nope, never. Especially not the other night. Especially not in front of members of his shul board. The "Yiddish Speaking Pole" This peep works at the non-standard venue we played at the other night. A Judeophile, when he sees a Jewish musician unloading, he comes out and loads our gear into the venue for us, all the while peppering his conversation with Yiddish. He learned Yiddish from a non-Jewish Russian coworker. He also keeps a sharp eye out for us when the gig is over, helping us to load out. A sheynem dank!
https://blogindm.blogspot.com/2008/04/closing-out-season-with-peeps.html
isPartOf: CC-MAIN-2022-40 publisher: Common Crawl description: Wide crawl of the web for September/October 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-215 software: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.022016
535
{ "en": 0.9680174589157104 }
{ "Content-Length": "183093", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:KIAPDAFE4HWED2JZ2DFIDIHHBDFCZ22N", "WARC-Concurrent-To": "<urn:uuid:30ae0f7f-519d-4dfc-9ab4-5fc43f6c93d1>", "WARC-Date": "2018-06-21T23:22:09", "WARC-IP-Address": "172.217.15.65", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:MPRLBYFN5HMLBHU2QC3UV4KFYWZYXD7Y", "WARC-Record-ID": "<urn:uuid:2c7537e7-461e-4a57-bcc0-746b52a9f4b5>", "WARC-Target-URI": "http://wrongquestions.blogspot.com/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:42dcf246-55e6-44e3-b217-5acbcd34473d>", "WARC-Truncated": null }
11,381
Sunday, June 10, 2018 Valente not only creates a setting where art and music are the most important thing, but also touches on how central culture is to our existence as thinking, feeling people.  Plus, it's a really fun book. Tuesday, June 05, 2018 Review: Lost in Space, Season 1 at Strange Horizons One thing I didn't find space for in the review, but which feels important to note, was my disappointment in the total straightness and cisnormativity of the show.  All of the characters we meet are implicitly straight.  All of the romances presented or suggested on the show are straight.  Though the characters spend a lot of time around other space-bound colonists, who, like them, are divided into family units, none of them have same-sex couples as parents.  All of the children are presumed to be straight and cis, and none suggest that they might be realizing otherwise.  This is particularly disappointing given that Netflix's other big kid-oriented show, A Series of Unfortunate Events, is cheerfully LGBT-friendly, dropping frequent mentions of gay couples into the story, and even featuring a non-binary character.  So it's not a matter of the target audience, but simply the show's creators making no space in their future for queerness, something that we should have long ago moved past. Thursday, May 10, 2018 Infinity Links Somewhat surprisingly for a film that has so little time (and possibly also inclination) to explore any interesting ideas raised by its premise, Infinity War has resulted in a rather vibrant conversation.  I'll say from the outset that most of the links I've collected proceed from the point of view that the film is at the very least flawed, if not genuinely bad.  This is probably my selection bias speaking, but I really haven't seen any interesting positive discussions of the film--any in-depth engagement with it, it seems to me, must inevitably grapple with the film's myriad, foundational flaws.  Also rooted in my own preoccupations is the fact that a lot of these links end up talking less about the film, and more about how it exposes some uncomfortable truths about how Marvel sees its franchise, its long-term goals, and its audience. • Of the mainstream reviews--that is, those prohibited on pain of death of discussing the film's ending, AKA the only thing that is really worth talking about--my favorites are probably A.A. Dowd at the AV Club and Matt Zoller Seitz at  Both manage to address the film's flaws without stepping on a revelation they couldn't address.  First, here's Dowd getting at the heart of the matter: Infinity War is the closest a movie has come to a true comic-book crossover event, those massive arcs that unfold across multiple titles, forcing cash-strapped readers to shell out for books they don’t normally buy just to get the full scope of the narrative. The dirty secret of these heavily hyped ensemble sagas is that they’re usually pretty underwhelming, and Infinity War inherits plenty of the problems endemic to crossovers: the privileging of quantity over quality, of spectacle over story, and of the shock value of major changes to the status quo over just about everything else. And Seitz perfectly capturing the sense of missed opportunity that wafts over the entire film: If only the film were better modulated, or perhaps longer, or more elegantly shaped, or ... well, it's hard to say exactly what's wrong here. But something's not up to snuff. This is, as many have pointed out, one half of a story broken in two, but it feels like less than half somehow. Until pretty recently, MCU films have suffered from collective curve-grading—each film seemed content to settle for "better than expected," as opposed to being really, truly good—and that feeling returns here, unfortunately. "Infinity War" faced so many challenges, many of them unique to this particular project, that it's a small miracle that it works at all. On some level, it feels ungrateful to ask a movie that already does the impossible to do it with more panache. But what are superhero movies without panache really good for? If there was ever a moment to swing for the fences, it was this one. • With a bit more freedom to discuss the disintegrating elephant in the room, Film Crit Hulk masterfully analyzes the way Infinity War--and other Marvel movies before it--try to establish stakes and a sense of urgency.  In "Avengers: Infinity War and Marvel's Endless Endgame", he argues that the film fails at this task long before it gets to its consequence-free ending. If you’re going to kill half the population in the universe, then kill them. Right now these other tertiary characters are "dead," but dramatically-speaking, they may as well have just been kidnapped. But what else should I have expected? These movies have always been about "the texture of consequences" without any real commitment to them. So now phase one heroes are going to have to rally together or go save phase four heroes, and maybe sacrifice themselves, blah blah blah. It's always been promises and deferment. Which means that the MCU has ultimately belied what was the greatest hope for these movies: to use the unique medium of film to tell full stories, full of big, bold, lasting choices in a way that had become impossible within the cyclical bloat of comics. And that's when it hits you. The simple, obvious answer to what the MCU "is." Because these are definitely not movies. And despite all the arguments, they're definitely not a season of television either… They finally just became comic books. After 10 years of unparalleled success they've managed to inherit the same exact problems of critical mass that plague that industry. Endless cycles. Confusing timelines. Continuity issues. Basic bloat. Feints of death. This isn't the infinity war; this is the infinity loop. And the MCU had the opportunity to avoid all that. But thanks to its unparalleled success, they took on the same exact problems of comics instead. • Speaking of Thanos's evil plan, this handy website will let you know if you were among its victims.  I, sadly, didn't make it. • Darren Mooney does a close read of the film's plot--with side visits to Age of Ultron and Civil War--to discuss how not only is there a great big nothing at its core, but how the team-up MCU movies seem perpetually at work dismantling the films that came before them so as to ensure that no consequences or meaningful changes ever trouble their universe. Everything in Civil War is very meticulously calculated and engineered in such a way as to avoid anything that might challenge or upset an audience invested in either Tony or Steve. The films are wary of politicising their heroes even slightly, and so Civil War is stripped of any significance or weight. It is impossible to hate either Tony or Steve for any of the decisions that they make within Civil War, because the film bends over backwards to avoid having them make any decisions at all. Even the climactic throwdown is driven by highly-charged emotion and immediately walked back. Even Rhodey is walking by the end. Unsurprisingly, Infinity War is this "story without meaning" approach extrapolated past its logical extreme. ... Within the narrative of Infinity War, none of the characters make any choice that has any meaning. Tony is reluctant to call Steve for help, which would be a bold character-driven decision. However, he is about to call Steve when he is interrupted by the arrival of Ebony Maw and Black Dwarf in New York. Later, Bruce Banner picks up the phone and makes the call anyway. The two teams created at the end of Civil War are reunited when Captain America takes the team to the New Avengers headquarters. Rhodey has no qualms about working with the people indirectly responsible for crippling him. To that last observation I would add: It's not just that Rhodey doesn't hold his disability against Steve and company (since after all, it was Vision's fault, for using potentially lethal force in a fight where everyone else was pulling their punches).  It's that at the end of Civil War he proudly tells Tony that his maiming was "worth it" because going against Steve was the right thing to do, but in Infinity War he sneers at General Ross and happily welcomes an unrepentant Steve back to Avengers headquarters.  There are multiple other such issues.  Vision tried to kill Sam in Civil War, and yet Sam has no problems working to protect him, and no comment on the fact that his fellow fugitive Wanda has been having an affair with Vision for two years.  Wanda destroyed Bruce Banner's life--something he once felt so strongly about that he promise to kill her "without even changing color"--and yet now he has no reaction to the fact that she was essentially given his old room. The obvious response here is that the characters are dealing with a more pressing crisis.  But there's a vast gulf between putting aside your differences for the greater good and simply not giving a shit about things that were supposedly a matter of life and death just one or two movies ago.  Character interactions in Infinity War overwhelmingly fall on the latter side of the divide.  It couldn't be any clearer that the question we were supposed to find flummoxing and thorny in Civil War is now completely irrelevant, just as Tony's loss of perspective in Age of Ultron ceased to matter by the time we got to Civil War.  Which tells us, I think, all we need to know about how seriously we should be taking anything that happens in Infinity War. • In "Thanos is America", Lili Loofbourow finds some odd resonances in how the film depicts Thanos, and wonders if these might not undercut the audience's ability to feel shock at his actions: Not to disagree with this entirely, but I think it's also important to note how much Thanos acts as a necessary boogeyman that validates the kind of violence Loofbourow describes on the part of the Avengers.  Thanos--on his own or through his agents the Chitauri--has been dogging the MCU since Avengers, and in all his guises he has justified the existence of extra-legal, unaccountable violence that just happens to come wrapped in an American flag.  In a universe where beings like Thanos exist, not only are Captain America and Iron Man necessary, but hobbling them with laws and international agreements becomes an act of, at best stupidity, at worst villainy. • Following up on this article on twitter, Loofbourow adds an interesting observation on how the film completely misses the real import of the relationship between Thanos and Gamora, reminding us again of how poorly-served Gamora has been by the MCU. The fact is, Gamora should have been a perfect reader of Thanos. That's literally the only way she could have survived his fatherhood this long. Instead, in every scene they share, their respective archives of knowledge are reversed. He's portrayed as the one who knows her so well that he can tell when she's lying. She, bizarrely, appears to know nothing at all about him. Gamora should have known exactly what Thanos' vision of love is, and how insistently he applied it to her. She's lived with the burden of his love her whole life. She would, accordingly, have instantly realized that she was the beloved thing Thanos needed to kill to get the Soul Stone. Her speech and tactics should have reflected that. Instead, the scene got garbled into incomprehension, with her raving about him nothing him [sic] while he looked on in omniscient self-pity--ahead of her once again. • Still on the subject of Thanos, there have been a few articles along these lines, but "Thanos Didn’t Have a Point and Someone Should Tell the Writers", by Kylie on Fandomentals, is the most comprehensive, both in how it spells out the errors in Thanos's overpopulation bugbear (and how they connect to racist policies and worldviews), and in how it expresses the feeling that, rather than depicting a villain who is misguided, Infinity War doesn't seem to realize just how wrong Thanos is. For Infinity War? The writers seemed unaware that anything needed to be condemned. Overpopulation…it’s obviously a problem! And a universal one at that, in the most literal definition of the word "universal." Otherwise, why would Thanos, this rather mild-speaking individual who experienced horror thanks to an overcrowded planet, be willing to sacrifice the daughter who he abused loved and take on the mantle of this burden? Sure his solution was too much, but there was suffering, and the test-results of randomly wiping out half the people worked great! Why wouldn't he continue pursuing it? Why wouldn't there be anything but great results? Fewer people means everyone gets more things and that's good! There would have been no recovery period with mass panic and devastation or anything. Also good if you have anyone in your life who think Thanos and Killmonger are the same because "they're both villains with a point". • A brief comedic interlude: a botanist answers the hotly-contested question of whether teen Groot is the original Groot or his son. • And now, the motherlode: hands-down the best essay about this movie, by, unsurprisingly, Aaron Bady, is "Post-Shawarma: On Avengers: Infinity War" at the LARB.  I'm going to quote a whole chunk because it's really that good, but do read the whole thing. Infinity War—as Gerry Canavan observed to me—destroys each of these stories completely. It does not develop them, build on them, or bring them to a climax; it simply eats them up. Thor: Ragnarok ended with the remnants of Asgard sailing bravely into the future in a kind of space ark; Infinity War begins with that space Ark having been blasted to hell (and though Thor later says something about how "half" his people were killed, come on). Peter Parker ended his movie by declining to join the Avengers; in this movie, he joins the Avengers almost immediately. Black Panther is about a place where everyone is black, the white guys are not that important, and Wakanda's survival is the most important thing; Infinity War has T'Challa deciding to sacrifice Wakanda in battle without any trace of the prickly and regal insularity that has been the entirety of his character up to that point. Guardians of the Galaxy was about finding a family and staying together; in Infinity War, Thor arrives and they break up the group immediately. My point is that there's a conflict between the accumulative narrative impulse to see these movies as one continuous story and the sprawling impulse that lets them maintain different styles and themes and even narrative logics. If the MCU has been good because they let different voices tell different types of stories—and to the extent that it is good, it is because of that—Infinity War is bad because it smashes them all into indistinguishable paste. The Collector said that a powerful person "can use the stones to mow down entire civilizations like wheat in a field"; this is a good description of how Infinity War relates to its constituent stories: it harvests them. Let me put it this way: There's an extractive, exploitative relationship between the Avengers "team up" movies and the standalone single-hero stories, the same relationship we see between the Infinity Stone MacGuffins and the stories that the various Marvel movies have built around them. The Infinity Stones are the real story, the big picture, the driving force behind their master-narratives in the same way that capital always thinks it's the "job creator." But this is exactly backwards, in exactly the way extractive relations of exploitation tend to condition their beneficiaries to misunderstand what is happening: The Infinity Stones and the "team up" movies are spending the currency whose value was built out of the sweat and blood and human labor of the standalone movies. Infinity War is the moment when profits are extracted from the richness and depth of their stories, skimmed off and collected and sold: "Look, we killed Spider-Man, Black Panther, Bucky, Gamora, Loki!" they say; "Look how it makes you feel!" • Speaking of Gerry Canavan, he offers his own take: "Why the Marvel Cinematic Universe Can Show Us a Story, But Can't Tell Us a Plot". • Tom Holland ad-libbed his "I don't want to go" death scene.  It seems really fitting that the one scene that keeps being held up as an example for how, even though the film's deaths are clearly going to be rolled back, they still have emotional resonance, wasn't even in the script. • Netflix Breathes Sigh of Relief as Iron Fist Disintegrates During Infinity War Finale • Not content to let their work stand (or fall) on its own merits, Infinity War writers Christopher Markus and Stephen McFeely have gone on the record that the deaths in the film are real and that fans should "move on to the next stage of grief".  This in total defiance of the fact that Spider-Man 2 and Guardians of the Galaxy 3 are already on the books for 2019 and 2020, and that Marvel has been hard at work trying to get Ryan Coogler back for Black Panther 2.  And look, clearly there's wiggle room here--someone on twitter laboriously tried to explain to me that the deaths are "real" in the current timeline, but when it's rolled back using the Time Stone or whatever they will never have happened.  (I am not a lawyer, but I think I'm on solid ground in saying that if a writer ever offers this sort of excuse to your face, you are legally permitted to kick them in the shin.)  But what I find disturbing here is the brazenness of it.  Markus and McFeely are lying.  We know that they're lying, and they know that we know that they're lying.  And yet they still do it.  Why?  Do they have so little confidence in their writing that they think they need to resort to outright, implausible lies to get butts in seats next year?  And if so, what does that say about them as writers, or about the movie they've written? It's not surprising that a lot of the reactions to this interview brought up the comics' HydraCap kerfuffle from 2016-17, in which Marvel turned Captain America into a Nazi sleeper agent, solemnly announced that this was not a trick or a fake, and then revealed a few months later that it was a trick and a fake.  Once again, it's not that anyone--and certainly not anyone likely to be reading comics news--believed the original assurances.  But that just makes this behavior worse.  At best, it feels like a bunch of writers who see genuinely smart works like The Good Place or Jane the Virgin pulling off audacious twists (or even just-OK shows like Westworld whose twists aren't great but are at least totally committed-to) and think they have a shortcut to that kind of delighted, exhilarated audience reaction through bald-faced lies.  At worst, it's something far more sinister, Marvel trying to dictate how its stories are to be read, and whether audiences are permitted to bring their own knowledge and experience to bear when they react to those stories. • A similar dynamic seems to be on Alex McLevy's mind when he asks "How the hell are we supposed to care about Ant-Man And The Wasp now?" and wonders how we're supposed to take an interest in a light-hearted crime caper when we know that, five minutes after the credits roll (the film is apparently set before Infinity War), half the cast will crumble into dust. Thanos may be sitting back and watching the sun rise, content in the completion of his genocidal mission, but the rest of us are left here asking how the remaining Avengers are going to save the day. Yes, it’s just another superhero movie, but when you commit to a shared universe and do as good a job as they have at making it all feel of a piece, you also commit to an audience that expects stories that don't just meander about, dropping one narrative and picking up another to wave in our faces, assuming it's all the same. It's not. This was a huge decision, and it’s the only thing people invested in the Marvel universe have on their minds, for obvious reasons. To expect us to go, "Well, sure, nearly everyone we care about just crumbled to dust, but whatever, let’s see what this shiny thing in the corner is!" assumes that we don't actually emotionally invest in these films. It's a betrayal of precisely what movies should do, even ones that are manufactured to be four-quadrant popcorn entertainment. A lot of people seemed to misread McLevy's argument, assuming that he doesn't understand how light, fluffy stories can coexist with dark ones.  But that's clearly not what he's saying.  If we're to take the ending of Infinity War seriously, then everywhere in the universe has just suffered a calamity that, realistically, will be almost impossible to recover from.  There's no story that can be told within the MCU that doesn't address that fact, unless you're willing to admit that the destruction at the end of Infinity War isn't really supposed to matter.  By which I don't mean that it's going to be rolled back (though clearly it is), but that we're only supposed to take it as seriously as Marvel wants us to, no more and no less. Once again, this is about Marvel wanting to control not just the narrative, but how we react to that narrative.  We're supposed to be gutted by Infinity War, and pay no attention to the 2019 and 2020 movie slate behind the curtain starring multiple characters who have just been disintegrated.  But not so gutted that we can't buy tickets to Ant-Man and the Wasp and laugh at Scott and Hope and Luis.  To me this is disappointing not only because it reveals, as Aaron notes, the mercenary heart beating beneath the surface of this media juggernaut.  But because until this year, this kind of behavior was something the MCU was above.  They didn't try to rope us into seeing their movies through pavlovian loyalty and the sunk cost fallacy.  They did it by making movies we wanted to see.  I'm really starting to wonder whether that wasn't just a way of getting us in the door. • In conclusion: Monday, May 07, 2018 Review: Paris Adrift by E.J. Swift at Strange Horizons My latest Strange Horizons review looks at E.J. Swift's time travel novel Paris Adrift.  I've been hearing Swift's name spoken with admiration for several years now, as more and more readers I trust became absorbed by her Osiris Project trilogy (Osiris, 2012; Cataveiro, 2014; Tamaruq, 2015).  As a standalone, Paris Adrift seemed like a perfect opportunity to hop on, but unfortunately what I found was a classic case of what is good is not interesting, and what is interesting is not good.  Paris Adrift is a rather slight story of a lost young person becoming even more lost when she discovers the ability to travel in time--the sort of thing that would probably have worked very well as a novella but is stretched into shapelessness by the novel length--combined with a political story that doesn't really bear much scrutiny. It's perhaps unsurprising that a novel so rooted in the notion of special people will also filter its politics through the lens of great men and women, whose life or death determine the course of history. I haven't said much about Hallie's adventures in time, but one of them in particular left a bad taste in my mouth. In it, Hallie travels to 1942, and finds herself sharing a crawlspace with a young Jewish woman, Rachel Clouatre, who has just barely evaded the roundup of French Jews by Vichy officials. It's obviously not Swift's fault that the subgenre of "time traveler helps to save a Jew from the Nazis" has been at the forefront of Holocaust fiction's devolution into Holocaust Kitsch, but one might have expected a little more awareness of this fact in 2018. Paris Adrift clearly thinks of itself as a deeply political novel, but its ideas about politics are simplistic and in some cases genuinely dangerous--a charismatic political leader who urges non-specific niceness and is too good to stand for office is a particularly worrying plot point.  I'm sorry that my first encounter with Swift was so disappointing, and I may yet give her earlier books another shot, but if, like me, you were hoping to discover her with Paris Adrift, I wouldn't recommend it. Sunday, May 06, 2018 A Political History of the Future: The City & The City at Lawyers, Guns & Money My latest Political History of the Future column takes the opportunity of the BBC having released a miniseries adaptation of it to discuss China Miéville's The City & The City, a novel about two cities that exist side-by-side but have erected a convoluted mechanism of psychological self-deception to "unsee" one another.  When I reread my 2009 review of the book, I was struck by how much it emphasized Miéville's poking at core fantasy tropes over what feels now like a blatantly political premise.  But as both that review and the miniseries have reminded me, that imbalance exists in the book itself. despite a surface feeling of relevance, the premise of The City & The City doesn’t map to any real-world political situation. Unseeing isn’t a way of ignoring an inconvenient or ugly reality, but a hefty psychic burden that the citizens of the two cities undertake out of ingrained habit and fear of retaliation. And despite multiple attempts to read it as such by reviewers, it is impossible to compare the Besźel/Ul Qoma split to real-world instances of ethnic strife, because that strife doesn’t exist in the book—as, indeed, how could it, given that Besz and Ul Qoman citizens are rarely allowed to acknowledge each other’s existence. The City & The City‘s ability to comment on real instances of political division shading into geography is thus quite limited. More importantly, Miéville’s handling of his setting, once he’s established it, doesn’t push against any of the things we’ve been trained to read as “bad”. The miniseries seems to miss this fact.  It gestures at relevance--though it has shockingly little to say about Brexit--but is ultimately undone by the fact that the ending of the novel takes the story in a direction that most political readings can't accommodate.  It's a disappointing handling of a novel that is much more complex, but also much less immediate, than most readers assume. Sunday, April 29, 2018 Avengers: Infinity War For the last ten years, Marvel Studios has been doing the impossible.  Just look at the list of decisions they've made on the road to total dominance of the movie box office, Hollywood's action-adventure machine, and sizable chunks of the cultural conversation.  Every one of them, at the time it was made, elicited loud cries of "why?", and more importantly, "how?"  How can Marvel create a movie universe without the rights to tentpole heroes like Spider-Man and the X-Men?  How can they launch their new franchise with C-list weirdos like Iron Man and Thor?  How can they create a successful team-up movie combining the heroes of five previous films?  How can they incorporate genuinely out-there concepts like the Guardians of the Galaxy, Doctor Strange, and Ant-Man into their burgeoning cinematic universe?  How can they re-incorporate Spider-Man into that universe, relaunching the character for the third time in fifteen years?  How can they accommodate directors with a more definitive viewpoint and agenda, like Taika Waititi or Ryan Coogler? And yet, every single time we've asked this question, the answer has been "like this".  I don't like all of the MCU movies and I don't think all of them are good, but every single one of them works.  Through a combination of inspired casting choices, a firm grasp of the kind of world they wanted to build and the stories they wanted to tell in it, and sure-footed leadership from mastermind Kevin Feige, Marvel has created a universe that is always entertaining to visit, with characters we can care about, settings we can become attached to, and, even in the worst films of the bunch, moments worth experiencing.  It's all the more impressive an accomplishment when you look at other studios' (and even Marvel's sister division in charge of Star Wars) attempts to replicate it, almost all of which have resulted in half-baked or genuinely unwatchable fare. So even though I wouldn't say that I walked into Avengers: Infinity War with high hopes, I had certain expectations from it.  I'm not a great fan of any of the MCU's team-up movies--I think Avengers is more impressive for being attempted than for its limited success; I get more annoyed with Age of Ultron whenever I think about it; and though I praised Civil War when I first watched it, it has aged very poorly for me, and I now remember mainly its risible politics and the fact that it has made me dislike Steve Rogers.  But for all that, I still believed that the question aroused by the Infinity War concept--how can Marvel rope together dozens of characters from multiple storylines into a battle against a single universe-destroying villain, and make a successful and entertaining movie out of it?--would be answered with the same definitive success as previous ones.  I didn't expect to love Infinity War, but I expected it to work. Instead, it is barely even a movie.  The answer to "how can you give each of these lovingly crafted characters the space and attention they deserve" turns out to be "you can't".  Characters in Infinity War turn up to prop up the plot and move it along, nothing more.  There's barely any space for meaningful interactions or even the occasional revealing plot point.  In fact, there's barely any space for story.  Infinity War is simply non-stop event, one fight scene leading into another with only the minimum of connective tissue.  And if that conjures up images of something energetic and exhilarating like Mad Max: Fury Road, Infinity War is the exact opposite, dutiful and airless.  None of the fight scenes are bad, but they're the same CGI spectacle we've seen many times before, and all so clearly in thrall to the demands of the plot that there's no space to be excited, surprised, or worried. Infinity War proceeds along three storylines.  In the first, the Guardians of the Galaxy pick up Thor, left adrift in space after his crew of Asgardian refugees was slaughtered by Thanos, who was in search of the Tesseract Cube (along the way Thanos kills Heimdal and Loki; Valkyrie's whereabouts are never mentioned).  Thanos is, of course, the estranged father of Gamora, and she reveals that his goal is to kill half of all living beings in the universe, to which end he needs to collect all six of the Infinity Stones, which will give him control over all aspects of reality.  In a second storyline, an advance party of Thanos's henchmen arrives on Earth looking to collect the Time Stone (wielded by Doctor Strange) and the Mind Stone (currently powering Vision).  Strange, Tony Stark, and Peter Parker fend off the invaders but in the process end up trapped on Thanos's ship on its way to his homeworld, where they decide to mount an attack against him.  Finally, nearly every other major MCU player converges on Wakanda, where they hope to detach the Mind Stone from Vision so they can destroy it and foil Thanos's plan, and where they end up in a last stand against Thanos's regrouped forces. The third of these storylines is nothing more than make-work, wasting the presence of such vital MCU players as Captain America, Black Widow, and pretty much everyone from Wakanda.  The emotional crux is meant to be the revelation that Vision and Wanda have been carrying on a secret affair since they ended up on different sides in Civil War, which now turns to tragedy since only Wanda's powers can destroy the Mind Stone.  But introducing a romance half a scene before telling us that it is doomed is a tough sell even if the lovers in question are well-developed characters (as seen with the example of Natasha and Bruce in Age of Ultron).  Doing it with Vision, who is underwritten, and Wanda, who is inconsistently written, is a losing proposition, and so the entire storyline ends up feeling perfunctory, a chance to check in with our favorite characters--here's Shuri showing up Bruce!  Here's M'Baku doing the Jabari war-bark!  Here's Natasha with a new hair color!--without letting them actually be the people we've come to care about. The Tony/Strange/Peter storyline is little more than an excuse for three of the MCU's most inveterate quippers to quip against each other, which is entertaining as far as it goes but not much more than that.  The film's only real weight of emotional significance comes, strangely enough, from Thor and the Guardians.  There's a genuinely touching scene between Thor and Rocket in which the former recounts the losses he's experienced in the last few years and tries to convince himself that he's still up for a fight.  But most of the heavy lifting is done by Gamora, who struggles with her fear of Thanos, her guilt over the role she played in this atrocities, and her terror that he will capture her and learn from her the location of the Soul Stone, the final, lost Infinity Stone. The problem here is that Gamora is by far the MCU's most underdeveloped headliner.  She has an incredibly fraught, complicated backstory, and yet the character who has shown up on screen has always been overshadowed, playing a sensible mom type to her more flamboyant crewmates (and sister).  And that's before we even get to the fact that Guardians of the Galaxy Vol. 2 apparently took place four years ago, and that Infinity War has so little space to fill us in on what's happened to the Guardians since then that it has Peter awkwardly reveal that he and Gamora are romantically involved during a fight with Thanos.  So when Thanos tricks Gamora into thinking she's defeated him in battle and she breaks into uncontrollable sobs, it comes as a surprise in the worst possible way.  We know so little about Gamora and how she feels about Thanos that we have no idea how she'd react to his death, how she thinks she'd react, or how she'd like to react.  Zoe Saldana does the best she can, whether it's urging Peter to kill her if it looks like Thanos is about to capture her, or breaking down when Thanos tortures Nebula to get her to give him the location of the Soul Stone, or multiple scenes opposite Thanos himself.  But she can't get around the fact that we have no idea who Gamora is, and that the writing for Infinity War isn't really interested in changing that, as the first Avengers did for Black Widow and Bruce Banner. And then there's Thanos himself, who has been looming over the MCU since Avengers in 2012, for the most part to very little effect.  Infinity War doesn't quite rescue him from the MCU's villain curse, but there's a solid argument to be made that he is the film's most interesting, rounded character, perhaps even its protagonist (that would certainly be one way to interpret the end title informing us that "Thanos Will Return").  After so much buildup, and with so much hatered registered towards him from Gamora, Nebula, and Drax, it's a reasonably clever choice for Infinity War to depict Thanos as even-tempered, patient, and wistful.  When he listens to Gamora rail against him, or explains to her that in killing half the population of the planets he visits, he's saving them from resource scarcity, it's hard not to feel (despite the absurd purple CGI) that there's a thinking, feeling person in there, however monstrous his reasoning.  In the end, however, the film can't quite make Thanos work.  His relentless pursuit of carnage can't be squared with his oh-so-reasonable demeanor.  Unlike, say, Ego in Guardians of the Galaxy Vol. 2, Infinity War doesn't do the work of building a character whose tremendous power and longevity has led them down a path of destruction that to them feels entirely rational.  One eventually comes to feel that Thanos is pursuing his horrific plan of galactic genocide simply because the plot needs him to (It should go without saying that Thanos's overpopulation bugbear and his proposed solution for it are hideous claptrap.  Reducing a population by half, whether through violence as Thanos used to do, or by making people simply disappear as he wants to do with the Infinity Stones, would result in immediate economic and industrial collapse, and therefore mass starvation and most likely war.  It should go without saying, but because Hollywood continues to linger in the grip of Malthusianism decades after the rest of the world saw it for the racist nonsense that it is, I'm not sure that it does.  After all, we see Thanos tell Gamora that her home planet, whose population he massacred only twenty years ago, is now a paradise, which suggests the film does want us to see merit in his approach.  So, before the first thinkpiece suggesting that "Thanos Was Right" drops, I want it on the record that no, Thanos is a moron.) To be clear, none of what I've written so far is the reason I've come down so hard against Infinity War.  If the movie was only what I've described in the preceding paragraphs, my reaction to it would be a resounding "meh".  Not as good as Avengers, not as bad as Age of Ultron, possibly better than Civil War but mainly because it has no political message with which to infuriate me.  The thing that makes me say that Infinity War is barely a movie is its ending, in which, well, Thanos wins.  The film climaxes with an epic battle between most of our heroes plus the Wakandan armies, and Thanos's forces.  (This would be a lot more exciting if it weren't so painfully dumb; naturally, if one side is invading from space, and the other is surrounded by a force-field dome, the thing to do is to have armies square off against one another on open ground like in The Lord of the Rings.)  The point of this battle is to give Shuri time to remove the Mind Stone from Vision without killing him.  But when Shuri's lab is overrun, Vision convinces Wanda to kill him and destroy the Stone, which she does.  At which point Thanos, who already has possession of Strange's Time Stone, rewinds back a few minutes and retrieves the Stone, killing Vision.  He then completes the Infinity Gauntlet and uses it to remove half the living beings in the universe, including Bucky Barnes, Wanda, Sam Wilson, T'Challa, Peter Parker, Doctor Strange, all of the Guardians except Rocket, Nick Fury, and Maria Hill.  Roll credits. Look, I don't have to tell you what this means, right?  The combination of comics + lots of major character death + an established McGuffin that can and already has rewound time pretty much writes the story for you.  True, some fans are already debating how much of the carnage of Infinity War is going to be rewound in Avengers 4 (personally, I think it's obvious that it's going to be everything, though perhaps some minor characters will die in the new timeline, just for appearances' sake).  But to be honest, if the argument we're having while walking out of the movie theater is "how much of the movie we've just watched is going to be cancelled out of existence by the next one?" I think we can probably agree that we are not the richer for having watched it. One of the reasons that I despise the way pop culture has come to conflate character death with meaningful drama (a development for which I mainly blame Game of Thrones, but which the MCU has happily indulged in) is that even when that death sticks, it never ends up feeling real and significant--more like a gimmick to make people gasp and then move on to the next big moment.  The previous Avengers movies teased us relentlessly with inane "who will die" slogans, only to kill off minor characters (one of whom was revived almost immediately on TV).  Infinity War obviously couldn't take that approach again, so by the time Thanos killed Gamora as a sacrifice to earn the Soul Stone, I was pretty sure that her death, and the ones that had come before it, were going to be rolled back.  The ending of Infinity War virtually guarantees this.  It's not that I want wholesale slaughter, but when characters die, I want it to matter.  When characters suffer, or argue, or even just talk to one another, I want it to matter.  The way Infinity War ends is a promise that nothing about it--the entire 160-minute slog--is going to matter.  That the purpose of the whole exercise was the "gotcha" of the credits rolling on Thanos's victory. You can get away with something like this in comics or TV, where it's clearer that you're telling a chapter in a story.  (In fact I would argue that the excellent second season of DC's Legends of Tomorrow tells a story that is virtually identical to Infinity War, to the extent that I'm pretty sure the Avengers will use the same tactic as the Legends did to defeat Thanos.)  But those formats usually have enough space to make the journey worth the readers' while, even if parts of it are going to be erased.  Infinity War, as I've written, is nothing but forward momentum, so to discover that the only thing that momentum was leading us to was its own cancellation--and that we're going to have to wait a year before the actual story happens--feels very much like having been cheated.  It certainly doesn't help that Marvel has been insisting for years that the Infinity War story hasn't been split into two, even changing the names of Infinity War and Avengers 4.  As the saying goes, you can trick your readers, but you can't lie to them, and pretending that Avengers 4 isn't Infinity War 2 was a lie. A lot reviewers are going to praise Infinity War for having a "brave" downer ending, but that's not what we've gotten.  A downer ending has weight.  It leaves you feeling something besides shock.  But shock is all Infinity War has to offer, bolstered by the freedom to do whatever it wants with its world, because none of it is really going to matter.  It's the kind of emptiness I've come to associate with the DC movies (Wonder Woman excepted), where grandiosity and melodrama are allowed to stand in for genuine emotion and meaning--something I thought the MCU knew instinctively to avoid.  There's no substance to Infinity War, only spectacle, and the fact that this was the capper that the remarkable ten years of the MCU have been leading up to leaves me thinking that I have massively overrated this entire effort. Thursday, April 26, 2018 Recent Movie Roundup 29 Avengers: Infinity War is just around the corner, which in some way feels like the true beginning of 2018's movie year.  We've mostly wrapped up last year's Oscar hopefuls, and the more experimental action-adventure fare of the year's early months, and now it's time to get down to business.  I'm not feeling terribly hopeful about Marvel's fourth attempt to wring a coherent dramatic work out of mashing all of their characters together (on twitter, I did the traditional thing and ranked all the MCU movies, and the team-up movies all ended up in the bottom half of the list) but I do think it offers a useful opportunity to sum up the last few weeks' movie-watching.  This is probably the last batch of "grown-up" movies to reach my part of the world for several months, so this is also an opportunity to look fondly back before world-destroying mayhem takes over our screens. • I, Tonya - A semi-mockumentary about the rise and fall of competitive figure skater Tonya Harding, who was embroiled--to a degree that has never been fully established--in a plot to assault her competitor Nancy Kerrigan in the lead-up to the 1994 winter olympics, the most surprising thing about I, Tonya is that deep down, it is a straight-up sports movie.  Though the climax it's leading up to isn't victory or honorable defeat, but humiliation and ignominy, the beats of I, Tonya are familiar, predictable, and best of all thrilling.  We see Tonya start training as a child, until by the time she's in her teens (at which point she's played by Margot Robbie, very good in the role but also far too old and imposing to play the slight, young-looking Harding, who was only 24 when her saga ended) her entire life is devoted to skating.  We see the key figures in her life, who spur her on but also hold her back with their tangled emotional connections--her mother LaVona (Allison Janney), physically and emotionally abusive but also very perceptive in her judgments of Tonya and the people who latch onto her; her on-and-off husband Jeff Gillooly (Sebastian Stan), who initially seems like a perfect, loving counterpoint to the harshness of Tonya's home life, but quickly reveals himself as abusive; her coach Diane Rawlinson (Julianne Nicholson), who nurtures Tonya as hardly anyone else in her life does, but also keeps trying to push her to embody a genteel ice princess type that doesn't suit her rough-and-tumble personality.  Most of all, there are the skates, thrilling sequences at which every bit of work and suffering that Tonya has endured are summed up in a few minutes of performance, encompassing triumph--when she becomes the first American woman to land a triple axel in competition--and defeat--when she can barely make it through her program in the 1994 Olympics. It's interesting to note how similar I, Tonya is to Molly's Game, and how different their approaches to their subject matter end up being.  Both movies are about high-powered, talented women who discover very quickly that the line between fame and infamy is razor-thin, who are not innocents, but who also probably didn't deserve the harsh punishment they received for, essentially, being a Bad Girl.  But whereas in Molly's Game Aaron Sorkin runs in horror from the very thought that his heroine is not a completely admirable person, in I, Tonya screenwriter Steven Rogers revels in Tonya's contradictions.  In his hands, she is at once a badass, who trains with total determination and literally marches to her own drum, performing routines to ZZ Top when everyone expects her to be gentle and demure, and an emotionally unstable fuckup, incapable, even in the most charitable reading of her story, of disentangling herself from toxic relationships and habits.  But it's not just Tonya who gets this treatment.  Everyone in the movie is at various points lovable, hateable, pitiable, and kind of a moron.  (This is a bit of a problem in the case of Jeff, whom Stan plays as a soft-spoken nebbish even as he's tossing Tonya across the room.)  None of them deserve a happy ending, but it's also made clear that the bad ending they do get is rooted as much in circumstances outside of their control--in the prejudices of the skating world, the authorities' tolerance of domestic abuse, and the public's need to tear down and hate women who don't live up to an image of perfection--as in their own actions. The problem that I, Tonya eventually bumps up against is the one that almost any attempt to depict or sum up the Harding/Kerrigan scandal encounters--there is, ultimately, no lesson that can be taken from this story, because everyone in it is wrong in one way or another (except, obviously, Kerrigan, who is instead a victim).  It is undeniably true that Tonya Harding was unfairly dismissed by the public, the press, and skating authorities because of her looks, her demeanor, and her lower-class background.  It is undeniably true that the public outrage that built around her after the assault was completely out of proportion to what she actually did (if indeed she did anything), and had more to do with her gender, her appearance, and a ravenous press cycle.  But against all that, there is the simple fact that a woman got her knee bashed in.  I, Tonya soft-pedals its condemnation of both Tonya and Jeff, somehow arguing that both of them stumbled into the attack on Kerrigan.  Though at the same time it also pokes at its own assertions by constantly breaking the fourth wall, having characters in the midst of scenes of great emotion and violence turn to the camera and complain that these events didn't happen, that the person telling the story is lying to make themselves look like the victim and everyone else look like a villain.  It's a clever conceit, but the end result is that the film can feel a little centerless, uncertain about what it wants to say about its heroine or story except perhaps that there is nothing to say.  This, however, doesn't change the fact that I, Tonya is massively entertaining, cleverly constructed (it is genuinely baffling that Molly's Game and Three Billboards received best screenplay nominations while Rogers didn't), and truly moving.  Whatever you end up thinking about Tonya Harding and the people around her when you leave the movie theater, I, Tonya wants you to remember that they are people, and at this it handily succeeds. • The Shape of Water - Guillermo del Toro's latest dark fantasy is an homage to old Hollywood, mashing up mid-century romantic melodramas and monster flicks to produce a tale in which the doe-eyed, beautifully emotive heroine falls in love with a fish-monster.  Working as a cleaner in a military research laboratory in the early 60s, mute Elisa (Sally Hawkins) befriends the lab's latest subject, an amphibious anthropomorphic creature (Doug Jones) retrieved from the Amazon.  As their friendship deepens, the lab's security officer, Strickland (Michael Shannon) agitates to have the creature vivisected, prompting Elisa to mount a daring rescue.  The film is, as is typical with del Toro and in keeping with his obvious inspirations, a lush visual and auditory experience.  The rich shadows and colors, the evocative imagery (such as Elisa living over a movie theater whose sounds penetrate her dreams), the constant presence on the soundtrack of music, from show tunes to jazz, all combine to create the impression of a setting that is half dream-world, of a movie that knows that it is a movie, whose characters see themselves as movie characters. Describing The Shape of Water as a mashup, however, creates the expectation of something that pushes against boundaries, and instead the film feels much more like a retread than the sensational terms of the conversation around it suggest.  The problem, as it has been for several of del Toro's recent projects, is in the script, and while the one for The Shape of Water isn't as underdeveloped as, say, Crimson Peak, it is a story that substitutes bald declaration for any hint of subtlety or complication.  The film is a lovely, surprisingly hopeful (and refreshingly sexually frank) story of seemingly impossible love, but it never suggests what it can loudly say.  Whether it's the parallel between Elisa's muteness and the creature's difference (something that has left disability activists divided), which the film has Elisa spell out in a pivotal moment.  Or the fact that Strickland is literally every sort of evil you'd imagine from a character like him, and spends his every moment on screen reminding us of this fact, from pointlessly browbeating his underlings, to making racist comments to Elisa's friend and colleague Zelda (Octavia Spencer), to drooling over his latest status-symbol-slash-phallic object, a new Cadillac.  Or a subplot about Elisa's neighbor, an aging gay man (Richard Jenkins), who declines to help her because he still hopes to claw himself back to respectability, only to come to her aid when the young man he's been lusting over turns out to be a homophobe and a racist.  The closest The Shape of Water comes to offering a mixed, challenging message is when the only scientist in the lab who sympathizes with the creature (Michael Stuhlberg) is revealed to be a Soviet plant, but even then, we're quickly reassured that his handlers are just as eager to exploit the creature as the American military. Of course, subtlety isn't always something to strive for.  I've seen some reviewers complain about the unmitigated awfulness of Strickland's character, for example, when to my mind he feels like the perfect villain for this moment, in which there's value in reminding people that racism and homophobia and authoritarianism and a complete disrespect for the rights of others often go hand in hand, without any redeeming characteristics.  (If there's a complication of Strickland's character, I'd say it comes from outside of him, in a scene in which his superior makes it clear that there will be no tolerance for his failure to reacquire the creature, and we watch Strickland realize that the toxic system he's bought into has no qualms about treating him as badly as he's treated others.)  But when I compare The Shape of Water to other best picture nominees like Call Me By Your Name or Phantom Thread, it feels thin despite its visual and textural richness.  In a way, the film feels of a piece with other recent "Hollywood does Hollywood" Oscar nominees like La La Land or The ArtistThe Shape of Water is about more than either of these other movies, but its obviousness means that it doesn't quite escape their gravity well.  It's a film that is luxurious to watch, but didn't leave me with very much when I left the movie theater. • Mudbound - Dee Rees's historical drama unfolds on a Mississippi farm in the 40s, and charts the growing, racially-charged tensions between two families, one white and one black.  The McAllans, Henry and Laura (Jason Clarke and Carey Mulligan), buy the farm on a whim, to indulge Henry's fantasy of being a landowner.  The Jacksons, Hap and Florence (Rob Morgan and Mary J. Blige), have been sharecropping the land for generations, with no hope in sight of climbing out of subsistence living.  The early parts of the film skip nimbly between different characters' points of view, letting them narrate to us the subtle currents of power and prejudice that govern the two families' interactions--the fact that Henry feels entitled to call on Hap for help at any moment, and to dictate the terms of their financial relationship; Florence's reluctance to help Laura at home, born partly out of a desire to care for her own children, and partly out of a recognition that if anything were to happen to Laura's children, she would be blamed; Laura's mingled insight and detachment, her refusal to take an active role as a white landowner's wife that might allow her to mitigate some of the injustice she observes. Things come to a head when WWII ends and the two families' soldiers return home: Henry's brother Jamie (Garrett Hedlund), a rakish pilot, and eldest Jackson son Ronsel (Jason Mitchell), a decorated tank commander.  Both are having trouble readjusting to civilian life, and they find in each other a sympathetic ear, someone who understands the traumas they've experienced.  Jamie is also struggling with his feelings for Laura, and with his bullying, racist father (Jonathan Banks), while Ronsel chafes against a society where he is seen as barely human after having been lauded as a hero in Europe.  The small oasis from intolerance and inequality formed by their friendship is compelling, but clearly also doomed. Even ignoring the long stretches of voiceover, it's easy to see that Mudbound is based on a novel (by Hillary Jordan), and while this might sound strange given that I haven't read it, the adaptation (by Rees and Virgil Williams) feels respectful and faithful.  The way the film slowly develops each of its wide cast of characters, and follows them along tangents that expose their unique point of view, feels novelistic, and unlike what you often find in feature films.  Sometimes the result can shade into melodrama--a scene in which Jamie reveals that his racial prejudices were exploded after his life was saved by the Tuskegee Airmen might have worked on the page, but feels hopelessly mawkish on screen--but for the most part it makes the film's world and characters feel vivid and lived in.  It helps that the film gives its actors a chance to shine, with Blige, Morgan, and Mulligan in particular giving deeply human and touching performances as complicated people hoping for better but not sure how to achieve it, and whether a path is even available to them. As Mudbound approaches its climax, however, one becomes more and more cognizant of the fact that there is only one way for this story to conclude, with tragedy, and it's hard not to resent the film for this--for introducing us to strong, hard-working, hopeful people like the Jacksons only to tear them down, because that's how historical dramas about black people in the south have to end.  It feels a little as if Rees shares that frustration, because Mudbound's final act is rushed and more than a little confusing, as if the film were trying to quickly get through the horror that it knows it has to depict.  That this horror is ultimately mitigated, and that the Jacksons find a way to build a better life for themselves in spite of it, is a tremendous relief, but nevertheless Mudbound is stronger in its beginning and middle than in its end. • Pacific Rim: Uprising - I wasn't a huge fan of the original Pacific Rim, which seemed made up of really compelling pieces that never really cohered into an interesting whole (again, see Guillermo del Toro's perennial problems with scripts--the one for Pacific Rim just gives up the ghost in act three).  But it's genuinely fascinating to see what happens when that film's universe and core concepts are handed to a more conventional director (Steven S. DeKnight, mainly known for TV stuff like Daredevil) and writers.  It's not just that the fleshy weirdness of del Toro's visual worldbuilding is gone, but so is the weirdness of some of his core concepts.  The idea of drift compatibility, for example, which in the original Pacific Rim was such a rich metaphor for empathy and connection, is here turned into just another skill that people need to develop, at which point they can drift with anyone--a way of proving individual fitness, not a connection to a specific person.  (It's not surprising that the first Jaeger we see in the movie is a small model piloted by a single person.)  There are other ways in which Uprising streamlines the original Pacific Rim's messiness, moving it in line with Hollywood's standard template for heroic movies.  Introducing a heretofore-unheard-of son for Idris Elba's character from the first movie, who is a hotshot who doesn't follow orders well, is particularly old hat.  So is a subplot that someone on twitter aptly summed up as "Jaeger Hogwarts", in which a group of aspiring young Jaeger pilots squabble and eventually learn to put their differences aside and work as a team. None of this is to say that Uprising is a bad movie.  It's just that it's good (for a given, limited value of "good") in very different ways than the original Pacific Rim, conventional and fun to its predecessor's charming but messy.  And it is a lot of fun, precisely because it wears its conventional plot lightly, and spruces it up with a lot of forward plot momentum.  Not to mention Jaeger and Kaiju fights, which continue to be this series's not-so-secret weapon, cheerfully bashing giant robots and monsters into buildings and each other with utterly delightful abandon.  Tying it all together is John Boyega, without whom this film would totally fall apart (proving this point is Scott Eastwood as Boyega's rule-following counterpart, who barely even registers on screen).  Boyega's charisma is so instantly engaging that he manages to make an underwritten character in an unconvincing situation completely engaging, and that in turn powers the rest of the movie.  Between that, the Jaegers and the Kaiju, Uprising makes for an utterly enjoyable evening out, even if it isn't nearly as soulful as its predecessor. • The Death of Stalin - Armando Iannucci's latest black comedy brilliantly dramatizes the days before and after the death of the Soviet tyrant, and the chaos into which the Politburo, the NKVD, and the Russian army are thrown by the sudden removal of a figure who had not only consolidated a horrific amount of power into his own hands, but who erected such a monumental cult of personality around himself that even the people he hurt most don't know how to go on without him.  The historical details are no doubt fudged or even outright invented, but Iannucci's clever script wastes no time in establishing the complex political web that exists around Stalin, and how it's overturned by his death.  We meet Malenkov (Jeffrey Tambor), Stalin's devoted deputy who initially balks at but is quickly won over by the idea of taking over as dictator.  Beria (Simon Russell Beale), the venal, cynical head of the secret police who immediately starts scheming how best to position himself in the new reality, including trying to reinvent himself as a reformer and a friend of the people.  And our point of view character, Khrushchev (Steve Buscemi), who scrambles with Beria for survival before realizing that he's in position to grab the entire pot.  The cast is rounded-out by a who's-who of British and American comedy actors, all in top form, but standouts include Stalin's drunken wastrel of a son Vasily (Rupert Friend, suddenly reminding everyone how wasted he's been in dour action hero roles like Homeland) and Marshal Zhukov (Jason Isaacs, magnificent), whose WWII heroism is perhaps the reason that he's the only one willing to admit that what's happening in the wake of Stalin's death is not an orderly transfer of power in which everyone has the best interest of the people and the Communist ideal at heart, but a plain and simple coup. I'm not sure what Iannucci's reasons were for embarking on this project, but in our current political moment it ends up feeling utterly essential.  At the heart of the film's comedy is the denial, sometimes necessary and sometimes self-serving, that the characters need to deploy in order to survive and advance in their increasingly irrational world.  They must pretend to live in a worker's paradise, because to acknowledge Stalin's tyranny, the cruelty of his whims, and the capriciousness of the state's organs of policing and punishment, might be more than their lives are worth.  After Stalin dies, the Politburo pretend to be working together to stabilize the Union, even though they all know that a purge is coming, either from the people or the military or each other.  When they gang up against Beria, they pretend to be rooting out a cancer afflicting the purity of Communism, even though, as he indignantly insists, they've all committed atrocities and abused their positions.  Most importantly, they pretend that this latest round of violence is the last one, and that after it they'll be able to set things right, and put a stop to the arrests, executions, purges, and gulags.  It's all very, very funny--standout scenes include a Politburo meeting in which the veneer of free discussion quickly crumbles under the need to make every decision unanimous; or a scene in which Khrushchev and a barely-hanging-on Molotov (Michael Palin) compete to see which one of them can more fervently denounce Molotov's wife, imprisoned for allegedly plotting against Stalin, while Beria keeps trying to interrupt them so he can spin the new narrative in which she was wrongly accused; when we meet Vasily, he's desperately trying to whip into shape a Russian hockey team made up of replacements after the previous team was killed in a plane crash, which he can't acknowledge because Soviet planes aren't supposed to crash.  But underlying it all is a deadly serious, and horrifying, truth: that all it took to erect and maintain this system of abuse and oppression was the cowardice and selfishness of these thoroughly unimpressive men, and that none of them will do anything to make things better. The Death of Stalin also feels essential in the context of the conversation about how comedy can function in the era of looming fascism, and whether mocking dictators does anything but normalize them and minimize their potential harm.  Iannucci offers a master-class in how to ridicule totalitarianism without losing sight of its dangers, as well as a demonstration of how hard that is to do.  The film doesn't always keep a steady grip on its tone.  It occasionally slips from exposing its characters' absurdity to a more generalized gawping at the Russian people's acceptance of their deranged situation--as in a minor subplot about a young man who directs the secret police to his father's location to save his own skin, only for those prisoners to be released as part of Beria's attempted reinvention.  But in its best moments, The Death of Stalin knows who it's meant to be laughing at, and it laces that laughter with palpable anger and disdain.  Its primary focus is in revealing its characters' paltriness, their desperate need to have someone to blame for everything that's gone wrong around them--Stalin, then Beria, then Melankov, and eventually Khruschev--in order not to see that it's the system they've created and are propping up that is to blame.  Even as it mocks their weakness, The Death of Stalin keeps reminding us that we allow such weak people to rule us at our own peril.
http://wrongquestions.blogspot.com/
robots: classic hostname: ip-10-168-124-187.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.14476
63
{ "en": 0.9109947681427002 }
{ "Content-Length": "161561", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:N6J5J3TA4VDZHNCPMLE2N6IORVTMGPLA", "WARC-Concurrent-To": "<urn:uuid:f71ff85c-ba4b-4f11-897d-52aee72efcd5>", "WARC-Date": "2019-04-25T00:07:27", "WARC-IP-Address": "192.0.78.24", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:IGEUTOTIMJGCQE4D2MNVCTZIZQJUN6CI", "WARC-Record-ID": "<urn:uuid:5c32b813-1845-4fc1-9fde-54c76b63a67f>", "WARC-Target-URI": "https://wicked-solutions.blog/2019/03/27/green-new-deals-plan-for-planes-trains-and-automobiles-wont-work/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b914807d-9554-4134-91d4-91a38de2cd3b>", "WARC-Truncated": null }
950
Green New Deal’s Plan For Planes, Trains, And Automobiles Won’t Work This piece first appeared on Rep. Alexandria Ocasio-Cortez (D-NY) and Sen. Ed Markey (D-MA) recently introduced a Green New Deal resolution (earlier draft here) that calls for a host of policies, including free education, guaranteed jobs, and a nationwide mandate for 100% renewable energy, all within a 10-year plan. All of this may sound great, but like many grand resolutions it lacks specific details and ignores economic reality, especially when it comes to transportation policy. The earliest version of the resolution provides more details than the final version and gives us a better sense of what Rep. Ocasio-Cortez really wants. For example, one point regarding infrastructure reads: It’s far-fetched to think this could all be accomplished within 10 years—especially under government management—and the points contradict themselves; why do we need electric vehicles and charging stations everywhere if everyone has access to affordable public transit and high speed rail? Contradictions aside, the plan is an expensive disaster waiting to happen. Green New Deal supporters may like public transit, but many of America’s cities are not set up for it—especially rail—on a grand scale. Cities have two basic forms, monocentric and polycentric. A monocentric city has a clear downtown that contains a significant amount of the city’s jobs and is an obvious commuting destination, while a polycentric city has several scattered employment centers. While the U.S. has both types of cities, many large U.S. cities are more polycentric than monocentric. For example, New York City, where Rep. Ocasio-Cortez is from, has a more monocentric layout: many of the jobs are clustered in and near Manhattan. This is seen in the figure below which shows jobs per acre (darker colors mean more jobs) in the New York City area (figure from the EPA’s smart location map viewer). Jobs per acre in New York CityEPA’S SMART LOCATION MAP VIEWER Alternatively, in cities like Phoenix and Atlanta jobs are more evenly spread out and there are no really dark clusters signaling an especially high density of jobs (figure below). Jobs per acre in Phoenix and AtlantaEPA’S SMART LOCATION MAP VIEWER A city’s form matters because as urban planner and researcher Alain Bertaud points out, rail “…is incompatible with low densities and urban spatial structures that are dominantly polycentric.” A subway works in New York because a lot of people commute to the center for work and for the amenities, such as shopping and restaurants. But it’s difficult and expensive to retrofit more polycentric cities like Atlanta and Phoenix with rail because there are several employment and amenity centers and commuting patterns are more irregular as a result. In fact, Atlanta’s attempt to establish rail in the city has been a failure. Ridership for its streetcar was projected to be 2,000 people per day but has halted at only 700 per day and the system isn’t making enough money to cover its operating costs. In general, Bertaud says a city needs about 7,700 people per square mile to make a transit system financially feasible, which exceeds the densities in Columbus, OH (3,960), Denver (4,530), Tampa (3,326), Atlanta (3,549) and many other cities. Buses are more flexible than rail, but even they are tied to city-defined routesthat can be slow to adjust to economic changes. And if they rely on priority lanes to increase their speed, route adjustments are likely to be even slower. Cities are also becoming more polycentric, meaning it’s a bad time to use scarce resources to build or expand rail systems. U.S. Census researchers Matthew Marlay and Todd Gardner show that the number of employment clusters in metro areas increased substantially from 1960 to 2000. Their figure below shows this for several U.S. metro areas. Employment centers 1960-2000 Some may claim that expanding rail would halt the process of employment decentralization, but any improvements in transportation technology, including subway expansion, cause people to spread out and decentralize. Rep. Ocasio-Cortez’s fascination with expanded public transit may be due to her experiences in New York City, a place where the subway—though a mess—is a large part of the transportation system. But much of the rest of the country is not built for subway or above-ground rail and drastically reshaping cities would be expensive—infrastructure and buildings are very durable—and disruptive for tens of millions of people. Economic forces are working against the Green New Deal’s infrastructure plan and its supporters don’t seem to understand this. Smaller local initiatives, such as reforming land-use regulations to encourage more density, the elimination of parking requirements and free parking, and congestion taxes, would reduce driving and carbon emissions and can be tailored to individual communities in a way that grandiose national plans can’t. The federal government can’t mandate these changes, but creative use of federal rules—such as HUD secretary Ben Carson’s idea to tie HUD grants to zoning reform—can incentivize communities to make reforms. These smaller changes aren’t as attention-grabbing as a Green New Deal, but they are consistent with reality and feasible instead of fantasy. Adam A. Millsap is the Assistant Director of the L. Charles Hilton Jr. Center at Florida State University and an Affiliated Scholar at the Mercatus Center at George Mason University. The feature image is from Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
https://wicked-solutions.blog/2019/03/27/green-new-deals-plan-for-planes-trains-and-automobiles-wont-work/
isPartOf: CC-MAIN-2019-18 publisher: Common Crawl description: Wide crawl of the web for April 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-141-34-30.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.057669
0
{ "en": 0.9841521978378296 }
{ "Content-Length": "131458", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:N6O3SZTXRDE7YHS5KZ5Z6OHEWF5YUGBN", "WARC-Concurrent-To": "<urn:uuid:6d8a2b39-63be-4813-a292-247c34c88379>", "WARC-Date": "2020-09-20T00:42:47", "WARC-IP-Address": "172.217.13.243", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:3OUSJHSDOKAP25IIZ34KUHURV657LN66", "WARC-Record-ID": "<urn:uuid:f14083c0-c380-4e4c-b77d-ef98d54daa7d>", "WARC-Target-URI": "http://www.ruthierolo.co.uk/2012/07/14-hours-in-jeongdongjin-part-2.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0060c16f-b8e8-4208-91cd-25c6e2f20a8d>", "WARC-Truncated": null }
1,076
Monday, 23 July 2012 14 hours in JeongDongJin Part 2 I sat in the train waiting room for a while, reading and watching people coming and going. It was coming up to 7am. Which felt more like lunchtime to me as I'd been at Jeong Dong Jin since 3.15am. I asked at the station desk about the bus to one of the main sights Unification Park (Tongil Gongwon). Unification park is a small area by the sea where the Korean government have exhibited three sea faring vessels. All of them have some connection to North Korea. The largest is a warship, built in the US and used briefly in WWII, then the Korean War and the first Gulf War. The Korean Navy used the ship for 27 years until it was retired in 1999. It is (apparently) the only warship on display on land in the world. (Korea loves facts like this.) The second thing to see is a North Korean submarine, captured just off the coast of Jeong Dong Jin in 1996. It was making a reconnaissance mission and carried 25 'Red Guerrilla' from the DPRK. The vessel allegedly holds a maximun of 27, and I know that North Koreans are small, but having been inside I have no idea how these 25 men were able to function inside such a small space. I'm sure they must have accidentally hit a few switches when they were moving around! Finally there is a small wooden boat to see. This is the newest addition to the park, having been used in 2009. One night in September, 11 North Koreans entered the boat on their escape course to the south. It took them 4 days to get from Gimchaek City to Jumunjin (up the coast from Jeong Dong Jin.) It took them a year to organise the escape, of which I'm sure every day they were worried about being uncovered by the authorities and sent to a prison camp. Before I could get to Unification Park however, I had half an hour to wait for the bus, so I headed to the bus stop to wait there. The rain was still coming down, and a swarm of Korean women wearing plastic raincoats were standing at the bus stop. No one was sitting down because the seats were wet, so I squeezed through and popped down my polystyrene seat-mat. (The best 2,000won I've ever spent!) I read for a little longer until the bus came. A fifteen minute bus ride later I arrived at Tongil Park, only to find the site empty and a sign saying opening time was 9.00am. Great! It was wet, cold and blustery! As I walked along the road to take a picture of the ship, I spied a car driving into the car park. So walking back in I knocked at the small ticket booth to beg a place to wait out of the rain. The lady inside took pity on me and I was soon sitting on the sofa with a small cup of coffee in my hand. As I sat there, other workers began to filter in. A couple of guys in military uniforms walked past and a stern looking ajumma with a mop gave me the once over. I was lucky and the kind ticket lady let me go into the ship 1/2 hour before official opening time. Inside the empty warship, alone, it was pretty creepy. I have a huge fear of mannequins, seriously I really hate them and they scare me to death. So walking around the boat, I must have looked like sniper. I approached each window and room slowly, slowly inching in stealthily, to make sure there were no weird fake humans. I can happily report that there are no mannequins at the unification Park. ^.^ Inside the boat there are numerous displays but as the information is all in Korean, I whipped around pretty quickly (ok it was also because I'm a wimp and was scared). At the front of the boat, because this is Korea, there was a life-size picture of Kate Winslet and Leonardo DiCaprio in the famous pose from Titanic, their faces removed so that you may recreate it yourself (from an ex-warship...?! Oh Korea.) The rain had started to drizzle again so I only spent a small amount of time on deck, my umbrella blowing inside out over and over. Next I donned my hard hat to take a peek inside the submarine. Boy it's small in there! I almost didn't go all the way through because it made me feel a little claustrophobic, but after a stern word to myself 'Stop being such a wimp!' I squeezed through. The equipment was really old fashioned (I'm not sure if this is because it's from the 90s or because it is North Korean). I was at the end in about 30 seconds, and there was a definite lack of periscope. I was very disappointed about this! I even walked back through to double check I hadn't missed it. I'm not sure if there was another level in the sub, because there certainly didn't seem anywhere for the sailors to sleep or rest.  The small wooden boat is not much to see, you can peer into the top window. But the size of the boat and the story behind it is more interesting than the vessel anyway. Along to the end of the park was a large staircase leading to a military lookout tower. When I saw the soldiers walking along earlier, I assumed they worked at the park and were there to have your picture taken with, but then it dawned on me that this was a working military post and they were stationed there to make sure there were no more infiltrations from the north. A little reminder that tensions still exist between the two nations. After my early morning sight seeing I made it back to the main town to hunt out some breakfast. A little bit scared before going through the submarine Old TVs Hmm what's this? The boat used by the North Korean defectors Military Lookout at the top of the hill. The best waffle I've ever eaten My new panorama app on my phone. The train station, right next to the sea To read about part one of my Jeong Dong Jin Adventure click here Best Blogger Tips Blogger Tips - Get This Gadget 1 comment: 1. Naughty girl carving your name on private property, especially with guards about!!
http://www.ruthierolo.co.uk/2012/07/14-hours-in-jeongdongjin-part-2.html
isPartOf: CC-MAIN-2020-40 publisher: Common Crawl description: Wide crawl of the web for September 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-234.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.018958
1
{ "en": 0.9519301652908324 }
{ "Content-Length": "47359", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:ZKG4VSEPQWBUXERWA3TVNLN27MRWJPO2", "WARC-Concurrent-To": "<urn:uuid:3322e2dc-f88f-4769-8cbb-34f2585c8567>", "WARC-Date": "2020-09-28T22:45:06", "WARC-IP-Address": "104.18.27.119", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:YH3H5IA4VXUMTPODMRRVMNK5CPSQFGAD", "WARC-Record-ID": "<urn:uuid:0f57d6f7-bbcc-4c7c-9b8b-4e00672d85b2>", "WARC-Target-URI": "https://dryeyeandmgd.com/the-diagnosis-myth-is-it-dry-eye-or-is-it-mgd/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:eb4284e7-e22f-43eb-aa53-c7baea18c133>", "WARC-Truncated": null }
549
The Diagnosis Myth: Is it Dry Eye or is it MGD? For well over fifty years, when Dry Eye became a recognized eye disease state, eye care professionals have associated symptoms of consistently tired, irritated, scratchy, burning or watery eyes to this condition. In fact, Dry Eye has long been the “catch-all” diagnosis for what was believed to be a lack of tear production. Dry Eye Syndrome leaves the surface of our eyes susceptible to increased discomfort when exposed to wind, dry climates or air conditioning. Normal everyday activities such as reading, watching TV, using computers, tablets and smartphones can also lead to increased irritation. Dry Eye is a problem for an estimated 300 million people around the world. Today, aside from some advances in eye drops, treatment options for Dry Eye are as limited as they were fifty years ago. As frustrated as millions are with the bothersome and sometimes lifestyle-hindering affects of Dry Eye, eye care professionals have been equally as frustrated trying to offer an effective treatment for their patients. Fast-forward to 2014 and my how things have changed. Could it be that this nefarious diagnosis for millions of Americans called Dry Eye is not in fact 100% correct? After 40 years of research, it has now come to light that Dry Eye sufferers may have a contributing problem that can be treated. We now know that the most common culprit for these constant, annoying Dry Eye symptoms are blockages in tiny glands in the eyelids. These tiny glands are important as they produce oils ensuring sustainability of the protective watery layer in the eyes. This condition is known as Meibomian Gland Dysfunction (MGD) and is the root cause of Dry Eye in roughly 90% of patients. As many in the eye care profession begin to embrace MGD and diagnose a lack of oil production (MGD) verses lack of tear production (Aqueous Dry Eye), the blanket dry eye diagnosis is now being challenged. The fact is that Aqueous Dry Eye conditions only affect a small percentage of the Dry Eye population and MGD affects the largest portion. Both are chronic and progressive diseases, but there is a major difference with MGD in that we can now interrupt MGD progression by unblocking the oil producing glands with revolutionary new treatment capabilities. But first, an accurate and timely proper diagnosis of MGD is necessary. Today over 250 eye care professionals in the United States offer the most innovative diagnostic instruments on the market today for properly diagnosing MGD. These tools include the Korb MGE and LipiView. These instruments provide the metrics necessary to precisely determine Meibomian Gland health and whether the LipiFlow treatment may be the answer to annoying Dry Eye symptoms. As the number of practices with the latest in MGD diagnostic capabilities rapidly expands, Dry Eye patients and eye care professionals everywhere must ask themselves a simple question that could be life-changing for millions who have been told they have dry eye: Is it Dry Eye or is it MGD? If you have Dry Eye symptoms or have been told you have Dry Eye, ask your eye care professional about MGD. Find a qualified eye care professional near you with the latest in MGD diagnosis and treatment capabilities.
https://dryeyeandmgd.com/the-diagnosis-myth-is-it-dry-eye-or-is-it-mgd/
isPartOf: CC-MAIN-2020-40 publisher: Common Crawl description: Wide crawl of the web for September 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-17.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.046977
25
{ "en": 0.7402858138084412 }
{ "Content-Length": "44954", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3QXY64WXVHDEDH3GDQTXJNM2VQT2FRWQ", "WARC-Concurrent-To": "<urn:uuid:e729d17b-ae87-4c44-a46f-ff9594718683>", "WARC-Date": "2018-06-21T10:29:28", "WARC-IP-Address": "192.124.249.7", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:56Z3P4HQPQIDKF6XJK6PAHA275OQWYCL", "WARC-Record-ID": "<urn:uuid:627e7eea-b76e-4672-a708-91dc9306d447>", "WARC-Target-URI": "https://hyenacart.com/category/9/aboutme.php", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:921c40f7-e33e-4b00-857b-434022a3e220>", "WARC-Truncated": null }
203
Open your own handmade shop! Set up my shop 314 listings found Unicorn Hooded Towel- Rainbow Poop Emoji Hooded Towel Fox Bib Blue Blue Llama Bib Giraffe Bib Grey Monster Baby Bib Basketball Bib Soccer Bib Love Mommy and Daddy Bib Girls Llama Bib Girls Owl Bib Giraffe Print Bib Turtle Bib Cactus Bib Avocado Baby Bib By the Sea Bib Arrow Bib Popsicle Bib Mermaid Bib Rainbow Arrow Bib These stores carry Handmade Eco-Friendly Accessories for Children and Babies and Baby Nursery Decor including soft shoes, hair bows, baby bibs, shopping cart covers, baby quilts, baby blankets, swaddlers, nursing necklaces, lovies. Click on any of the store names to browse that shop's offerings. Why Hyenas? Where are the Hyenas? 1. inspiredbyfinn (8) 2. BubuBebe (6) 3. CreakingWood (3) 4. BCD (3) 5. WindyWillowPond (3) 6. Spots_corner (2) Recent Favorites 1. Owen and his kids Cloth Diaper Pocket/AI2 2. Inception Blue Minky Newborn PC Duet 3. Rainbow Mums Minky Newborn PC Duet 4. Gelato Aqua Sea Minky Newborn PC Duet 5. 9 Inch Wine Cotton Velour Cloth Pad Light to Medium Flow
https://hyenacart.com/category/9/aboutme.php
robots: classic hostname: ip-10-142-11-34.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.314009
0
{ "en": 0.915900707244873 }
{ "Content-Length": "2923", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:R2DHCKBBQTY66AEOW6GIB7ZLVEYFOPCK", "WARC-Concurrent-To": "<urn:uuid:25360b14-9a92-45dd-bb82-1d64115945ab>", "WARC-Date": "2013-12-07T05:05:55", "WARC-IP-Address": "209.197.123.153", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:RTZYQYDFYRUSZK6WTB2INFPT6774LQU2", "WARC-Record-ID": "<urn:uuid:bb12f9cf-b0fd-4249-8ff8-ecf7ed6fdee9>", "WARC-Target-URI": "http://www.perlmonks.org/?displaytype=xml;node_id=107102", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:20df9a31-bbca-490c-959f-fb00e4451f92>", "WARC-Truncated": "length" }
385
note tilly I am going to suggest a completely different way of doing this.<p> You know what the script is used for, don't you? Well define your task into 2 interacting jobs: <ol> <li> To write a library or libraries that make it easy to write acripts that do its task or tasks. <li> To simplify this script by having it written in terms of that library or libraries. </ol> If you were to take these two jobs to completion, you should have a clean library and a simple script. At present you are nowhere near this goal and have no idea how you are going to get there.<p> Relax.<p> What you want to do is look at the script and identify something simple which might belong in a more general library that you can easily drop into the script. Found it? Good. Now start a simple module. You can use the following template: <code> package My::Module; # Magical export invocation. use Exporter; @ISA = 'Exporter'; @EXPORT_OK = qw(); # Will fill in # Rest of header section. use strict; # Body here. # Will fill in 1; __END__ =head1 NAME My::Module - Will fill in =head1 SYNOPSIS use My::Module; # Will fill in =head1 DESCRIPTION Will fill in =head1 BUGS AND LIMITATIONS None known. </code> Note that the name of the module should match the package name, in this case My/, and where it goes depends on your current development setup.<p> Now go to the hideous, ugly script and have it [use] your module. Next take that simple function or bit of functionality which you identified, and put it in your module. Put the name of it in @EXPORT_OK, describe it and then put it in the import list in your script. In other words put a bit in all the things which are, "Will fill in" above. Then replace a bit of the script with your brand new function.<p> Wash, rinse, and repeat, developing tests, refactoring your library, etc as necessary. At no step are you writing the script from scratch. But you are eating away at it, and eventually there will be little enough left that you can do the rewrite easily. Plus when you get done you have this convenient library.<p> Note that this approach is not doable with all kinds of scripts. But when it is appropriate, it can be a good path to know about from ugly legacy code to a cleaner design. 107060 107060
http://www.perlmonks.org/?displaytype=xml;node_id=107102
robots: classic hostname: ip-10-33-133-15.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2013-48 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for Winter 2013 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.096064
0
{ "en": 0.963070034980774 }
{ "Content-Length": "252110", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EDB7JLQ2TDSYMFEDIIJ6CNA4HYKAZIU5", "WARC-Concurrent-To": "<urn:uuid:d78bef5f-6022-49e6-9418-d842142a1820>", "WARC-Date": "2015-07-04T06:14:35", "WARC-IP-Address": "64.30.228.105", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:3DTIMJXFVNLLY3LUXCFS6O6AYSP2GD46", "WARC-Record-ID": "<urn:uuid:375c773e-feb9-480d-b1b7-106412023dc1>", "WARC-Target-URI": "http://chowhound.chow.com/topics/902185", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0ec1c0e3-a436-4416-a30f-ea8a552a632e>", "WARC-Truncated": null }
1,964
HOME > Chowhound > Home Cooking > May 16, 2013 05:52 AM What's for Dinner #217 - The Spring has Sprung Edition - Bunnies, Cicadas and Commencements (5/19/13) Well, it seems that spring has sprung for many of us - nature is finally blossoming, cicadas will be back in the East to drive us all bonkers and Saturdays and Sundays are filled with caps and gowns. Today, I find myself in a 7 hour computer training which is as exhilarating as you might expect. Luckily, I should be home early and so dinner will be another surf and turf this time with grass fed sirloin and lobster tails which are kind of small but I couldn't resist at Whole Foods. Can a lobster tail be too small? Hopefully in the next few weeks I will acquire some proper ginormous lobsters for a nice spring seafood dinner. 1. Click to Upload a photo (10 MB limit) 1. Surf and Turf! Sounds great. Our WF doesn't carry live lobster because it is "inhumane”. Thankfully the fish mongers around here don’t agree! Heading to ME soon and anticipating my lobster feast of the season 11 Replies 1. re: foodieX2 Interesting, perhaps I'll ask them about this. I look forward to the bigger guys as the small tails are a pain in the rear to de-shell. 1. re: foodieX2 I thought *all* WF didn't carry lobsters because it was "inhumane" in the way they had to be killed. I always thought "well, lobsters aren't human, so how can it be inhumane?" ;-) 1. re: LindaWhit Its not the killing, its the transport of and storage of a "live" animal <<Customers craving fresh crustaceans will have to look beyond Whole Foods Market Inc. after the natural-foods grocery chain decided Thursday to stop selling live lobsters and crabs on the grounds that it's inhumane. The Texas-based grocer spent seven months studying the sale of live lobsters from boat to supermarket aisle, trying to determine whether the creatures suffer along the way. In some stores, they experimented with "lobster condos," filling tanks with stacks of large pipes the critters can crawl inside. And they moved the tanks behind seafood counters and away from children's tapping fingers. Ultimately, Whole Foods management decided to immediately stop selling live lobsters and soft-shell crabs, saying they could not ensure the creatures are treated with respect and compassion.>> 1. re: foodieX2 They never have live lobsters or crabs but usually have lobster tails. 2. re: foodieX2 Totally agreeing with you and adding that WF does not carry live lobster because it is not a high profit margin item for them. But that is just what the local Manager of WF told me. Lobsters also do not have a nervous system which means they do not feel what we as humans know of as pain. WF is trying to play the "we are more sensitive" card by claiming they do not sell them because it is so terribly "inhumane" to the poor lobsters. 1. re: Fowler They'd have fit seeing how the fishermen man-handle them then. 1. re: Fowler Fowler - fact-check / source? I'm hearing from my in-house biology expert "of course lobsters have a nervous system!". 1. re: MidwesternerTT The type of "nervous system" which is capable of letting them feel what humans know as pain? 1. re: Fowler There was a fantastic DFW essay in Gourmet many years back called "Consider the lobster". It was interesting and, of course, incredibly well-written. 2. re: MidwesternerTT I think they have a nervous system as they move, but I'm not sure if they have awareness or all of those higher level functions that us humans are blessed with..or challenged by depending on your outlook. 2. Tonight will be the grilled ham steaks that never came to be last night. And tomorrow, this: I saw the pic on my facebook feed this morning, and it was like "yowza!!". I love pistachios, and can't want to give this a try. 17 Replies 1. re: alliegator Love the sound of that pasta dish - except I can't find the Mediterranean pine nuts that won't give me pine mouth. I'm going to have to renew my search (other than from nuts.com) 1. re: LindaWhit I really think it would be ok if you just omit. I don't have much advice for sourcing pine nuts, as I'm a huge fan. I'll report back over the weekend on the recipe :) 1. re: LindaWhit Oh, I was just talking to a friend about this as I discussed my hate of spinach teeth. 1. re: LindaWhit I was thinking about that myself the other day...where DOES one find pine nuts that won't give you the dreaded "pine mouth". I can't remember if Trader Joe's pine nuts cause PM or not. 1. re: littleflower TJs pine nuts are from China, Russia and Vietnam - those are the inferior nuts, so yes - they would. And yes, they did. That's where I discovered pine mouth affects me. 1. re: LindaWhit That is a shame...Trader Joe's needs to seriously upgrade their selection of pine nuts! They are too quality of a store to be selling an inferior product. I guess the search continues... :-). 1. re: littleflower knock on wood, i've never had pine-mouth - and i don't know enough about it to know if it's just a matter of time, or if it just happens to some and not to others (i buy mine there, and luckily have never had pine mouth)... i think if TJs sold the "good" stuff it would be even more expensive than it already is. it would be nice to have the option, though, for people who are afflicted. 2. re: alliegator Still doing the ham steak, but I'll do some instant steamed green beans and steam in bag potatoes from the produce section. After a month of guests, the man's wreck, and some, uh, cosmetic injections to the forehead today that left me with a blinding headache, I think easy is the way to be. You really can't go wrong with ham, beans & taters!! 1. re: alliegator Sounds like a great meal. I had its counterpart meal this week. Hamsteak, mashed taters and smothered green beans. Potatoes and green be and are great with ham. I hope that your honey isn't to sore. How has he been? Hoping he is doing well. 1. re: suzigirl Thanks so much, suzigirl. He is fine and unfazed. We're looking forward to a little time alone now that the Thainamic duo has departed, and getting ready for my brother's wedding in Hawaii on June 1. Yup, he's basically bleeding money--but we'll fix it. He's a positive guy, and I'm a lucky gal. 1. re: mariacarmen That's exactly what I was thinking. What a hoot 1. re: mariacarmen Hehe, glad you like! We had to refer to the both of them as something humorous! Love and miss those girls, but Hawaii awaits. As Jay Z (I think) said "on to the next one..." I'm exhausted, but looking forward to some Hawaii food! After that, you'll find me on some tacky pool floaty drifting aimlessly in one of a bazillion Phx overly landscaped pools. Oh course hounding from the phone. I'll give that a :/ Sun good, skin cancer bad. 1. re: alliegator Urgh, the ol' man still has not arrived. I really want to grill those purdy ham steaks, but may just broil. Plus, lots of kids in the grill area---love the apartment living!! Either way will still be tasty and I can spend some time on Zillow seeing if there is an acceptable standing home 'round here. 1. re: alliegator All of this talk about ham steaks, I might just have to ask the deli counter to cut me a hunk of black forest ham tomorrow and join the club. It's just as simple as a a few minutes of grilling or broiling? I love ham, why not a ham steak? 2. re: alliegator Really liking that pistachio-asparagus pesto--wow. Must try. 1. re: ChristinaMason +1! I am making that this weekend - tho will sub prosciutto for the bacon, me thinks :) 3. It has been SO nice here (finally!) this week, that we have been having porch meals! Last night was grilled chicken sausages with sauteed peppers and onions and mozzarella chees, oven baked fries and salad. With a couple of cold beers on the side. Tonight is a no-cook meal of avocado and chickpea tacos and mango salsa. A few more beers and some lounging on the screened in porch. Enjoying the lull before the storm that is graduation next week. Yikes! 1. Have a already grilled chicken breast to use so I think I'm going to take the suggestion of valerie in my "what to do with this" thread and make fajitas. I've never actually made them at home before! Or, I might do something with brown rice, some kind of warm brown rice salad with the chicken... I dunno. Probably will end up doing the fajitas since they'll cook quickly. We have a busy weekend planned so I need to start working on my usual weekend chores tonight. 7 Replies 1. re: juliejulez Fajitas are such a fun dish to make at home. And easy! 1. re: juliejulez We love fajitas at home and they are so simple though I do miss that whole restaurant served on a sizzling cast iron platter show. 1. re: fldhkybnva Yeah I guess I could eat them out of my skillet haha! 2. re: juliejulez I ended up doing the fajitas, and they were delicious. I feel a little silly that I've never made them before. It wasn't something my mom made growing up and it's not something I order often in restaurants so it doesn't even pop in my head. They're a good "cooking for one" dish and are pretty low calorie too. I put some olive oil in my cast iron, threw in the onions and peppers, then seasoned with ancho chile powder, cumin, cayenne, onion and garlic powders, and some salt. I didn't have flour tortillas but they were still good with corn. Also threw on some shredded chihuahua cheese. These will probably become a normal dish for me, especially in the summer... might try doing it on the grill w/ the cast iron on the really hot days. Also put together my lunch for tomorrow... just cooked up some penne and a jarred arrabiata, and the last of the cheese stuffed chicken meatballs from the freezer. 1. re: juliejulez They are so quick and delicious and a nice spin on tacos. I like to add a few diced chipotle peppers in adobo sauce if you like some heat. 1. re: fldhkybnva Ooo that sounds good. I love heat, I should have done that, I have an open can in the fridge. 3. Blackened New York strips with mushrooms seared in sherry and butter, sauteed asparagus w/parmesan cheese, Caesar salad and a nice Syrah--cooked and served on the back deck. A little weekend before the weekend. 5 Replies 1. re: flavrmeistr Steak and shrooms with asparagus and Parmesan is the most frequent go-to dinners in our house. This is quite the classic and perfect meal for us at any time. Do you use a particular blackening seasoning? 1. re: fldhkybnva I use Paul Prudhomme's Redfish Magic with a pat of butter on each steak and a black iron griddle on the outdoor gas burner. It's so good I can't bring myself to grill a steak anymore. 1. re: flavrmeistr Wow it sounds great and perhaps might work with the vent on high inside on a cast iron pan? 1. re: fldhkybnva I wouldn't, especially if you have a sprinkler system. The average household stove burner doesn't generate enough heat, nor does the average stove vent move enough air to stay ahead of the smoke. There's a lot of smoke. Blackening, barbecuing and deep-frying are safer and better done outdoors, in my opinion.
http://chowhound.chow.com/topics/902185
robots: classic hostname: ip-10-179-60-89.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-27 operator: CommonCrawl Admin description: Wide crawl of the web for June 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.130693
1,155
{ "en": 0.9678495526313782 }
{ "Content-Length": "341720", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2CK4W4EESMZS6RGQDAOBPDKTLVAMI3LZ", "WARC-Concurrent-To": "<urn:uuid:44a65278-54e0-4955-b582-ac7a1d888a24>", "WARC-Date": "2018-06-24T09:24:30", "WARC-IP-Address": "172.217.7.225", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:TL27NSPIZYHMC56KJYJSECPO7AXUAFL5", "WARC-Record-ID": "<urn:uuid:6f594684-e71a-4308-8843-6e01c5eedb56>", "WARC-Target-URI": "http://roystonvassey.blogspot.com/2011/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:73ec5d8d-bf43-4526-925f-691ac57f58ba>", "WARC-Truncated": null }
7,546
Wednesday, 7 December 2011 Winter Madness It's all happening in digital. Everyone is super stacked. Yet every day I read about the doom and gloom in the Metro on my way in to work. As I walk along Knightsbridge Green to go home, I make my way through a sea of Harrods bags. I get to the Tube Station and pick up an Evening Standard to read about the retail crisis. To be honest I know it is real, but it just doesn't feel like it most days. Then I get the Gas, Electric and Telephone Bills or look at the bank balance and see how much we're spending on Groceries (not in an OCD way of course). Then I think to myself, how are we going to survive this? Taxes go up, on everything, all the time, and now the stuff like food or petrol, which, I used to take for granted, is as well. I guess the early part of the 20th century was spent finding cheaper more plentiful sources of natural resource and the 2nd half will be spent on finding innovative ways to get to them, and then better utilise them. All this contradication and massive change to the world is just a little bit too much when combined with the madness of Chritsmas and Winter in the UK. Back to my little digital bubble I go... Wednesday, 23 November 2011 Hacked Again! No access to Hotmail as I've been hacked again. Apologies to all who have been affected. I can only say I genuinely have changed the password (twice) and this account has always had a strong password. Monday, 21 November 2011 Thought for the week Mahatma Gandhi I've been hacked - apologies to anyone who might have been affected. I had a strong password but failed to update it on a few services recently. Lesson (re-)learnt. Thursday, 17 November 2011 The importance of detail I've had lots of debate today about the detail of various digital initiatives. I find days like this really inspiring. People asking the questions that really matter. For example, finding the right words to use. As things like language changes and evolves, so should the words we use to engage and motivate people. And social media becomes a really powerful source in understanding this. This sort of detail can really bring an interaction to life. As people's expectations of the services they use online grow and grow the new battle ground between competing companies can often be found in providing users with those little moments of delight. Giving them something that provides a little more utility, or just making it a little easier to complete a task. These little moments are found in the detail. Often we think of things like channel neutral services or marketing campaigns as big strategic initiatives, which they are, in these tasks the detail actually becomes more important. Even though we find these initiatives second nature in the agency, when thinking about human interaction we still strive to make sure things really come together. This is all in the detail. If you have a slight twist to your brand message, even the slightest shift, on a TV ad and someone 2nd screens it (c.17%), you would be surprised at how let down they will feel if this 2nd interaction doesn't reflect the brand in the same way, or better still identify that they are probably responding to a TV ad in the first place! Why not spend a little time tomorrow thinking about the detail - I'd be surprised if it doesn't spark a useful thought or two. Thursday, 10 November 2011 Thought for the week “Friendship is unnecessary, like philosophy like art. It has no survival value;rather it is one thing that gives value to survival." CS Lewis Tuesday, 1 November 2011 Thought for the week Wednesday, 26 October 2011 Donating my face This November I'll be donating my face to a good cause: Please do what you can to support me and others and help us raise awareness. Much Appreciated, Rory Monday, 24 October 2011 The mobile internet needs to get more mobile One of the major things I can still see hindering the utilisation of mobile devices to access the internet is two network operator level issues: 1. The network coverage is still rubbish. It seems wherever I go I'm rarely on a 3G signal (across multiple devices). 2. The country-to-country connectivity either fails or is so cost prohibitive it renders using it to only the most critical tasks. Whilst I also see massive increases in public wi-fi this is still too low to make a real difference. And often indirectly costs us anyway - "would you like an over-priced coffee with your 'free' wi-fi sir?". The mobile Internet is shifting to a cloud / integrated model across most platforms, this is likely to make this problem amplify for users. The network operators therefore need to step up. The irony is that I wrote this on my iPhone whilst travelling on a train, and I absolutely recognise how marvellous mobile has become in recent years (I just wanted to put this balanced perspective forward). Wednesday, 12 October 2011 Thought for the week As people are walking all the time, in the same spot, a path appears. John Locke Thursday, 29 September 2011 Building Windows 8 - the follow-up Tuesday, 27 September 2011 Thought for the week "Logic For The Millions" by Alfred Mander (1947) Sunday, 18 September 2011 Thought for the week Hungarian scientist, Albert Szent-Gyorgyi (1893-1986) Wednesday, 31 August 2011 Thought for the week Monday, 22 August 2011 Thought for the week "You need to be first, best or different." - Loretta Lynn Tuesday, 16 August 2011 Building Windows 8 - The Blog The site in question: Building Windows 8 - The Blog The initial post / introduction on the blog represents a rather boring and dry start (sorry Steven Sinofsky) to what seems to be a good idea (allowing people involvement / a behind the scenes look), and to what sounds like a hugely ambitious project given a sub-strapline like 're-imagining Windows'. Around a billion people could end up using it, so you would have thought people might be interested in this blog. I'd actually argue that only a very specific set of people should be interested in it though. OS's, in my opinion, are better when they are simply behind the scenes doing what the users of them want them to do. I realise this is rarely the case and they are often over engineered for most people, and very likely to fall down on a number of key requirements. I wonder then that the real motivation 'to get involved' will be an early glimpse of the pain to come - with a little chance to stop it from happening. When it's appropriate I'm going to post on the blog that I'd like to be able to tailor my operating system for my needs at the point of install and throughout it's time on my machine. Basically I'd like to be able to switch on and off a load of juice heavy things as and when I do and don't need them. And I know that most of this is possible via a mass of administration windows etc. but I'd like it to be on a single screen that's easy to use and has needs based options that a non-techie can easily understand. I'll keep dreaming, and wondering, I expect. Monday, 15 August 2011 It's not new - you know that right?! Q: When was the first email sent? A: 1971 Q: When was the first smartphone sold? A: 1993 Q: How old is Amazon? A: 16 years old Q: How old is MySpace. A: 9 years old Monday, 8 August 2011 Thought for the week "The only thing that does not change is that everything changes." "Watching The Tree To Catch The Hare" by Adeline Yen Mah (2000) Wednesday, 3 August 2011 How do writers create a great story? - Part 1 How can the approaches writers take to create stories apply to creating web experiences? What makes people want to read or experience something from the very beginning to the very end? Recently I've been giving some thought on how useful it is to apply some well honed practices in story-telling and novel writing  to creating web experiences. I'm not sure where this came from to be honest, but I found it in my head and I've been unable to shake it. In having these thoughts I have come to a perhaps obvious conclusion that from what I understand of the techniques writers use there is indeed a benefit to this approach. So I've decided to pull together some quick summaries of my 'story-telling' approach to creating web experiences, and you're reading part 1. A great story grabs you from the beginning, perhaps even the title or first sentence, and makes you want to keep reading, listening or watching to the end. In my opinion it's about more than just a series of 'hooks', and its creation often starts with some basic steps. The following is a summary of how I think a writers approach can apply to the initial process of creating a web experience: 1. First you need to establish a clear picture of the (story you are about to write) journey you need to create - the vision or plot. This needs to clearly set out the end goal(s). Keeping a parallel with writing techniques I believe this step is similar to what writers call setting. It's at this stage that you need to establish your initial view on the success crtieria for the journey as well. 2. Then I think it is important to write a summary of this - a single sentence or paragraph that explains what your journey is about and perhaps it's over-arching goal (key business and/or user objective). This is rather like an early process of synthesis following idea generation. This summary is possibly something that comes first in writing practices. The aim here is to be able to refer quickly and easily to this summary when dealing with the detail / problem solving tasks - it should also help keep a greater continuity and focus throughout the team involved. 3. Then we need to create a flow - what are the steps in the journey that we need to take our audience through? This step may involve some initial information architecture planning and early user task modelling. 4. Now we can build a list of the elements that make up this story - the features and attributes that are needed to make the story work. This may include some of the technical aspects of the process as well, and perhaps at this stage we may even need to shape the flow that we've already created. 5. Now we can bring the flow and list of attributes together so we can understand what is needed to tell this story / create this journey, and document this as the initial model. I'm sure for many this is the sort of process that is used all the time, it certainly has a lot of parallels with approaches I've taken over the years and to those in the many textbooks on my office shelves. I do however think there's benefits in giving another perspective like this, and I feel that a lot of the detail in writing techniques that I've read about could help support people through each of the steps above. After this initial process is completed a next step might be to create a prototype (draft) and start asking some questions about user acceptance and how best you can use real-people (the end consumer) to help edit the story / shape the journey. And start to make it work for everyone who is likely, or who you'd like, to consume it (UCD). So, I'll be exploring this in part 2. Monday, 1 August 2011 Thought for the week "The trouble with the rat-race is that, even if you win, you're still a rat." American comedienne Lily Tomlin Thursday, 28 July 2011 What's it all about Google? Recently I've been reading a lot about Google+ and how it compares to Facebook etc. and I can't help feeling most of it seems to be missing the point a little. I'm not sure Google+ is all about being a social network, its certainly not its only purpose, and most of the comparisons in some way seem a little unfair. In the main they don't highlight the fact that Google+ has the potential to really cement other Google services and has the overarching potential benefit of making it even more likely to be the 'homepage' to the internet (a status Google have been struggling to hold on to recently). For example, iGoogle is a setting you create against your profile, Google Groups uses your profile, Gmail...etc. This means that when making a real comparison between the two services Facebook falls someway short in providing this breadth and certainly it doesn't offer the search capability. Given all of this I thought I'd take another look at Google's 2011 strategy (what has been publically revealed any way) and see if this can explain anything. Unfortunately my quick review hasn't exactly helped explain what Google+ is all about or where it is heading. First of all Eric Schmidt spoke to Harvard Business Review and said all of their strategic initiatives for 2011 are about mobile. That's ALL of them. This could make some sense when you think about how much of mobile usage is related to mobile social activity but it doesn't completely explain things. Having thought about the services Google has launched over the years and how it has extended its operations away from 'search' you start to piece together some sort of journey that perhaps naturally leads to Google+. As I mentioned before your Google Profile or A/C allows you access / the ability to fully utilise all sorts of services. You Tube by all accounts is already one massive open social environment where video is shared. Services like the now deceased Wave were about having a shared space on the web where you can discuss things and even work together, other services like Google docs is largely about the same thing as well. Considering this an important question emerges. Is Google+ perhaps more about offering a way of collaborating and sharing in a single platform that can be utilised across all of the Google real-estate? If this is the case does it matter if you have lots and lots of populated circles and operate it as a fully functioning Facebook replacement? I think it doesn't. I think its a way of sharing that means you can just target groups of people or even select them afresh when it's appropriate to share something. Whether this view will be shared by the masses, I'm not sure, but I think this is down to Google as much as anything. Some of this isn't a complete revelation, but I think that it highlights Google+ as a real strategic development and one that perhaps isn't that much to do with Facebook. I'm eager to see if Google can really draw Google+ into its overall capability in a way that will make it a truley powerful tool. And I'm also excited about its marketing potential, although I do hope that Google are prepared to play nicely, that way we can all help make it a great 'space'. Wednesday, 27 July 2011 Thought for the week "I believe that a lot of our striving after the symbols and levers of success is due to a basic insecurity, a need to prove ourselves. That done, grown up at last, we are free to stop pretending." Charles Handy in "Masters Of The Wired World", edited by Anne Leer (1999) Monday, 18 July 2011 Friday, 15 July 2011 The Evolution of E-business? If this is the evolution of man (and I'm not saying it is): Is this the evolution of most large organisations E-business? One to discuss and debate I'm sure. Images produced by Lucy Yates. Monday, 11 July 2011 Spammed by thicky's The title of this short article is perhaps a little harsh, but it is how I feel occasionally. It's not referring to the inappropriate marketing messages I get, it's actually about friends & acquaintances (as Google+ would refer to them). It seems to me that (at a very high-level) there are broadly two camps of internet users in my extended friendship group. Those who use the internet, but aren't particularly computer literate or web savvy (some of these people actually wouldn't think of themselves in this way), and those who use it and are reasonably computer literate and web savvy. The former spam me a lot, the latter don't. Why? The obvious reason isn't exactly a genius conclusion to arrive at, but it seems that those who have a little bit more knowledge and experience, use the internet and its various services more efficiently / effectively... • They only use it if it's going to make things easier / better. • They try to use as few communication / hosting options as possible e.g. I want to collect some information from a range of people, so I'm going to create a central repository for that information, which I will email people about, and then they can add their information to it. • They present the information / request very concisely and offer directions and instructions where needed. Perhaps demonstrating that they understand how people are typically helped and aided when online. • In their communications there are usually follow-up mechanisms which are equally as well thought through, and there is often a way of communicating back in a 1-2-1 interpersonal interaction if it was originally 1-to-many. I understand that the differences in these two groups simply reflect the skills and knowledge of the individuals. However, I wonder if the more savvy group are going to increasingly find the modern world a far more simple place. Or if the less savvy group are likely to get the right feedback over the coming years and become far more effective online users. I suspect some will just become (more) disillusioned and frustrated. Either way I think, like others I know, that this is another element of an increasingly polarised society where those who can move quickly and effectively online are [will] moving [move] away (in various terms) from those who are less able. Thought for the week Monday, 4 July 2011 Thought for the week To the crew of @frt90 / when reflecting on the success of the Farnham Charity Bike Ride. "Never doubt that a small group of thoughtful, committed people can change the world. Indeed it is the only thing that ever has." Anthropologist Margaret Mead (1901-1978). Tuesday, 28 June 2011 Energy and Enthusiasm Possibly the most essential (and perhaps admired) qualities in E-business? Harry S Truman David Viscott Isaac Disraeli Oliver Wendell James Witcomb Riley Charlotte Bronte Edward G. Bulwer-Lytton Tuesday, 21 June 2011 Thought for the week Thursday, 16 June 2011 Thought for the week Monday, 6 June 2011 Thought for the week Tuesday, 31 May 2011 Thought for the week "Enthusiastic people are the ones who actually get things done in this world. Enthusiasm is what turns any idea into reality. And enthusiasm is linked closely with happiness." "Your Personal Survival Guide To The 21st Century" Monday, 16 May 2011 Thought for the week "It's no longer about the big beating the small; it's about the fast beating the slow." Larry Carter, Chief Executive Officer of Cisco Systems, quoted in "The Economist", 26 June 1999 Monday, 9 May 2011 Thought for the week "The wealth of the three richest people in the world exceeds the combined GDP of the 48 smallest countries." Guardian", 12 June 1999 This is slightly out of date, but I suspect the polarisation of wealth has increased since this time any way. As I get more and more involved in charities and supporting my local community snippets like the one above, whilst I'm aware of these things, still always surprise me. It is becoming clearer to me that it is individuals who are increasingly capable of changing things for the better, not necessarily governments and companies, this scares me a little bit. However, I remain positive and hope that everyone realises (or starts to realise) that we should all take responsibility for the world around us in whatever way we can. Tuesday, 3 May 2011 Thought for the week Monday, 18 April 2011 Thought for the week "Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity." - General George S. Patton, Jr. Monday, 11 April 2011 Thought for the week "Statisticians know that if you put a man's head in a sauna and his feet in a deep freeze, he will feel pretty good - on the average." Friday, 8 April 2011 It's sunny! When it's sunny, which it is at the moment, do more people buy via their mobile vs. their desktop? Watch this space! Tuesday, 5 April 2011 Monday, 4 April 2011 Visualising stuff I have some feelings and views on why this is happening: Monday, 28 March 2011 Thought for the week Monday, 21 March 2011 Thought for the week "Your legacy should be that you made it better than it was when you got it." - Lee Iacocca Wednesday, 16 March 2011 Thought for the week "People are not against you; they are merely for themselves." - Gene Fowler Thursday, 10 March 2011 Using Data to Drive Online User Experience (a quick look at some of the opportunities) Cloud Computing, the Semantic Web, Linked Data, Web 2.0, Web 3.0... ...all this coupled with other data you've got e.g. web analytics, BI, MI, Research etc. means that there is probably increasing amounts of data available to you and your E-business team. Unfortunately there probably isn't that much increasing insight. Why this is the case is for another article, perhaps by someone else. For my part I'm just interested in talking a little bit about tapping into this data (how) and doing something with it (what/why) to improve user experiences (UX) and/or to sell a bit more online. Lets start by chucking all the data sources you can think of at this point into one data pot, and perhaps ignore data sources completely. I'm not just suggesting this to make it easier to write this article. I'm also doing it because that's all it is, really - a big load of data. Until you start to work out what it means that is. How you get at this data is through technology (services, API's etc.) but from an E-Business perspective that is just a necessary mechanic (albeit a very important mechanic and one that that will require very smart people to be involved). For me though it all starts to get a bit more exciting when we start to explore how we can turn the data into insight or start to put further mechanics in place for using insight to shape an online presence for prospects & customers. An obvious starting point (but surprisingly little used in E-Business) is to explore your data world without looking at the data first. For example, taking a look at how it is already being put to good use in other channels, and thinking about how you might do the same. Or by taking a further look at your customer and your 'total customer experiences' (e.g. a multi-channel, full life-cycle view). You probably do this all the time in your organisation. If your not already, perhaps this time make sure that instead of looking at the 'what' start to explore the 'why'. If your customers are doing certain things when you ask them to, it is important to know this, but perhaps more important is to know why, so that we can think about how we might apply this to your digital opportunities as well. For example, if in a DM campaign customers are successfully taking up a second credit card when a particular promotional APR is applied across both. Is it the offer that makes the campaign successful or also because it is aimed at people who are more likely to be in a relationship, or who have a good 'referrer' profile? If it is both then you can think about how you might identify these people when they are browsing online and target the same message at them. This will have a few benefits: 1. Maybe obvious - but you will improve the relative performance of that campaign. 2. You should improve your cost per acquisition (CPA) and possibly budget for other campaigns. 3. You'll reduce the noise for people who are more unlikely to be interested / be able to take-up the offer. 4. By virtue of 2. & 3. you will be able to offer those people something that's more relevant to them WIN WIN. From a purely customer or user experience perspective this use of data can be applied in different ways. For example, if your business objective is to only drive calls where they can be defined as 'value adding' (generating some kind of value contribution) then to achieve this perhaps only offer this channel at particular points in a journey e.g. when a difficult purchase decision needs to be made. Or perhaps offering this service to different people at different times, where you know there are likely differences in these types of people e.g. people of xyz demographic exit at this point online but we know they buy this successfully offline. These sorts of solutions can also be put in place until you have properly identified 'why' certain things are happening, and until you can change the experience online to overcome those problems. Until then though, making the sale can still be achieved using the data in this way. To supplement this, digital channels can provide even further data/insight opportunities and to a degree 'self optimise' using various technologies e.g. Omniture Test & Target. These optimisation tools are often used to help determine optimal outcomes e.g. web pages, that generate the best KPI's. This is good at telling us 'what' works best, but it often doesn't really tell us 'why'. It therefore becomes important to start to look at why. Who is it working for and who isn't it working for? What could be driving this? These are the sorts of questions we answer all the time in User Centred Design (UCD) and through various research studies, and this insight is essential to driving the best outcomes. It then also becomes really important to identify all of the relevant moments in your user experience and start to optimise them all, but also to move the experience forward we perhaps need to make web experiences more semantic and start to offer different people, at different times in different places different things. The potential of infinite combinations of outcomes is scary, and I'm not suggesting this end point is easy, or always necessary to get to, but to a degree it is already happening in sites like Amazon and will be become increasingly common and should be a consideration when thinking about data and online experiences. These are just some of the ways we can start to apply data to improve user experiences online. And perhaps thinking about it in these terms rather than as a full blown, company wide, fully intelligent use of data (and the 'cloud') from day one, we can just start to use some of the insight data can generate a little bit more often and build our E-data world to further improve online experiences. Monday, 7 March 2011 Thought for the week "Your most unhappy customers are your greatest source of learning." - Bill Gates, Chief Systems Architect, Microsoft Monday, 28 February 2011 Thought for the week British philosopher Bertrand Russell (1872-1970) Wednesday, 23 February 2011 e to E I've just decided to update my Linked in profile and I've turned all the e's to E's. It seems like a small shift but in my line of work I've noticed a lot more E's these days e.g. Head of E-Business. I think it is perhaps a lot more significant than it first appears. I think people used to define themselves more by their function or level and the 'e' was a simple gesture or nod to the fact that they were ultimately responsible for 'e'. Now people are a little more proud to be 'E' and it's showing. In a way it seems like a step back because it separates the 'E' functions even more so, but in another way it makes the point that this thing has gotten big and deserves this focus and recognition. There is of course another alternative view - that I am in fact looking into this way too much. My Linked in profile > Monday, 21 February 2011 Thought for the week “Between the optimist and the pessimist, the difference is droll. The optimist sees the doughnut; the pessimist the hole.” Irish writer Oscar Wilde (1854-1900) I think this is what digital people do well. We see the doughnut. It is how we get others to see it as well, that's the real trick. Monday, 14 February 2011 Thought for the week “You make a living by what you get, but you make a life by what you give.” British statesman Winston Churchill (1874-1965) Monday, 7 February 2011 Thought for the week “Ever tried? Ever failed? No matter. Try again. Fail again. Fail better.” Irish writer Samuel Beckett (1906-1989) Thursday, 3 February 2011 Mixpanel - analytics in real-time Watch this space for updates on how I get on. Tuesday, 1 February 2011 Thought for the week "Everyone is entitled to their own opinion, but not their own facts.” American politician Daniel Patrick Moynihan (1927-2003) Monday, 31 January 2011 The social and mobile impact on online user experience (UX) development Social media is a phenomena and I'm sure you don't need me to spew out the stats to remind you of this (I suspect we are all getting bored of hearing about them anyway(?). Mobile phone adoption, and now mobile internet usage and the use of applications in fulfilling functions once exclusively internet based has also grown, gradually at first but much more rapidly over the past 5 years. Rather than talk about these opportunities themselves I'm just going to spend a couple of minutes writing down how I feel they are or should be impacting the user experiences (UX) we develop, and perhaps how we develop them. A short potted E-history first (my version of it anyway)... In the early days screen real estate, end-user bandwidth and generally what was possible meant that E-Business professionals had to be become ruthless at prioritising content. This required both 'horizontal & vertical' information architectural challenges to be overcome. Especially as users seemed to be predominantly lazy and or reluctant to spend a long-time waiting for something to load if it was put behind a link. This apparent immediate laziness coupled with impatience when put in-front of new technology is understandable - the challenge for this sort of technology is after all to make our lives easily easier. As a result of this there were actually many examples of great user experiences in the early years but in around 2000 things started to improve and the increased adoption of user centred design (UCD) techniques and dramatically improved web analytics started to push the user interface (UI) boundaries and we started to explore smart ways of presenting content, and generally helping users to get to their goals (or more importantly persuade them to get to our goals). Then the band-width opened up for most people and the screen real-estate we had to play with also increased. This meant we could do even more than before and once again start to push the boundaries even further. And then it seemed to start to fall-apart or fragment (in my opinion). Lots of 'cool' individual or one-off pieces of interaction could be found on different sites but there were very few completely polished experiences and a lot more usability challenges than ever before. This coupled with the fact that users expectations increased even further as they gained a wider peer group or reference set meant that we were now more often than not further away from delighting the customer than ever before. Now multi-channel service opportunities have started to be properly realised and expectation has once again grown. And now most businesses really are playing catch-up. So, social and mobile, how is this impacting UX online? The widespread use of social media and mobile internet / application usage has now started to shape users needs and expectations even more. Social media offers users the ability to communicate with a wide range of people efficiently and as a result has exponentially increased consumer power. People are now referring to their network for advice and recommendations as well as providing this service themselves, and for most they are doing this more than ever before. This means the user experiences we create have to tap into this way of consuming information and products, and hopefully we can form a trialogue with our consumers (to truly do this there must be a quid pro quo - another article perhaps). This also means that the interfaces we create need to offer similar interactions and functionality where appropriate. This is because these sites are the grazing ground of the internet and no matter how frequently we get a customer to buy on our website, for example, they will probably still be spending more time in their social media spaces. The impact of mobile use is slightly different but has had an equal impact on needs and expectations. For a lot of consumers the mobile is a 24/7 always on device and it is also a way of staying connected and using their social media spaces to full effect. They are also increasingly using it to browse and even buy over the internet. All of this means that they are used to interacting with the web in a new and different way. Given the screen real-estate (even on the largest smart phone screens this is relatively limited) E-Business professionals have had to become even better at prioritising content, but this time even better at breaking down the information and/or interactive stages of a path-to-goal process into optimal & efficient chunks. There are some great examples of very complex processes actually being made even easier than they were on the full website versions. And perhaps this is another benefit of facing the challenge & opportunities the mobile internet offers - we just need to be ruthless and focused sometimes! How has or should this impact the UX development process? Firstly, I feel there is a need to understand the usage and impact these things have had on our visitors and customers. Some good old analysis and research would therefore be a good starting point. We perhaps also need to explore these elements in things like our persona based exploration of the UX. And importantly bring this perspective in to every UX development step. It is also vital that we explore this in user tests (depth interviews, remote studies, focus groups etc.) where appropriate. We also perhaps need to practice the idea of designing for mobile usage and social interaction first or at least in a separate work-stream. That way we can challenge the traditional perspective some might have on what makes an optimal user experience but equally we can prove its benefit or optimise it through our user centred design process. By taking this one step further, or to its logical conclusion, we perhaps have the opportunity to better understand our customers and optimise content, and to a certain degree experiences, for mobile as well as computer based internet use. This will increase our chances of achieving an optimal mobile, social and overarching online UX. Surely that must be an appealing prospect? Also posted on: The Viewpoint Monday, 24 January 2011 Thought for the week “Nothing worthwhile was ever accomplished without the will to start, the enthusiasm to continue and, regardless of temporary obstacles, the persistence to complete.” American businessman Waite Phillips (1883-1964) Monday, 17 January 2011 Planet Water Foundation (PWF) A friend, Mr Nick Hill, is the Executive Chairman of the Planet Water Foundation. And I'm writing this blog entry because I feel that what they are doing is important and I want to help spread the word. This is an organisation which works to alleviate waterborne disease, illness, and death through providing access to clean drinking water and improved sanitation facilities in Asia's most disadvantaged communities. The PWF website provides far more information on what they are doing and how you can help. Here's some extracts to get you thinking... Over 60% of the world’s 1.1 billion people who don’t have access to clean drinking water live in Asia. Issues include: - Inadequate supply - Increases in urban population - Pollution - Poor infrastructure - Corruption The situation is worst for Asia's children, where: - More than 125 million children under five years old live in homes without access to clean and safe drinking water. - Each and every day, 450 of Asia's children die namelessly without public comment with most people unaware of their daily struggles for survival and of the vast numbers of impoverished people around the world who lose that struggle. The Asia Development Bank warns, “If conditions do not improve, Asia will face a water quality crisis unprecedented in human history” With the PWF solution, just $20 can provide a person safe, clean water for life! Inclusive in this cost is the water supply and purification system, water access / hand wash infrastructure, and basic hygiene education, with funds left over for maintenance and spare parts. DONATE > Thought for the week “We do not need magic to change the world, we carry all the power we need inside ourselves already: we have the power to imagine better.” British author J.K. Rowling in an address at Harvard, 5 June 2008 I wholeheartedly agree that we all have the power to imagine better. Unleashing that power is often a big part of my job, and it never fails to amaze me that when you give people the opportunity and the right motivation they will always give you back great ideas that really do change things for the better. Tuesday, 11 January 2011 Thought for the week “Never apologize for showing feeling. When you do so, you apologize for the truth.” British Prime Minister Benjamin Disraeli (1804-1881) Monday, 3 January 2011 Thought for the week “You can't control the wind, but you can adjust your sails.” Yiddish proverb
http://roystonvassey.blogspot.com/2011/
robots: classic hostname: ip-10-30-196-115.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.020777
0
{ "en": 0.8693847060203552 }
{ "Content-Length": "376307", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RAKJ57ANWCLZ54VDZICMFDVKG6ORLJZ7", "WARC-Concurrent-To": "<urn:uuid:430bb51f-dd6d-4bac-a392-9cb3d48cd54b>", "WARC-Date": "2021-05-09T12:54:45", "WARC-IP-Address": "185.230.60.177", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PKDD55HMKNZ25S4YAPCCOBT5UVAB6X6D", "WARC-Record-ID": "<urn:uuid:27d2a361-db15-479d-a7c9-b054f6a24763>", "WARC-Target-URI": "https://www.lolhiller.com/vocal-coaching", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:3a87002e-ca91-405f-a1e8-4c1d0a031ac4>", "WARC-Truncated": null }
66
Vocal coaching/Recording/Songwriting/Performance kid singing.jpg Vocal coaching/recording Southend area Interested in singing/recording/writing/production? I can help with all aspects. Come along for a free appraisal I'll listen to you sing or hear your song ideas, check out your voice and discuss how I can help improve it. I can take your basic song ideas  and we can work on them together. turning them into professional recordings in my home studio
https://www.lolhiller.com/vocal-coaching
isPartOf: CC-MAIN-2021-21 publisher: Common Crawl description: Wide crawl of the web for May 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-188.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.044554
43
{ "en": 0.9259450435638428 }
{ "Content-Length": "39403", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UGEYE4IQ5M7HRQUNMQQZ42BNZW3CCUFV", "WARC-Concurrent-To": "<urn:uuid:cbd36db3-46b7-4bea-92c6-dff798678b52>", "WARC-Date": "2017-02-21T23:19:41", "WARC-IP-Address": "23.227.38.32", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:PYU2LSVIEP45RWOTK4C5SPXQBEKVK5SC", "WARC-Record-ID": "<urn:uuid:d03e1a14-fca3-41c7-aceb-05f94f160417>", "WARC-Target-URI": "http://www.mysteriousbookshop.com/products/jakes-john-johnny-havoc-havoc-for-sale-holiday-for-havoc-and-johnny-havoc-and-the-siren-in-red", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2d88a0b5-5eb3-43c8-ac70-be1bc1e4a643>", "WARC-Truncated": "length" }
138
The Mysterious Bookshop Jakes, John, Johnny Havoc, Havoc for Sale, Holiday for Havoc and Johnny Havoc and the Siren in Red N.Y., Armchair Detective Library, 1990-91. First hardcover editions; originally paperback originals published in the 1960s. These semi-hard-boiled private eye novels were written before Jakes became a huge best-seller. The complete series of four volumes, each with an original introduction by the author, all very fine in dust jacket. The set: $45.00
http://www.mysteriousbookshop.com/products/jakes-john-johnny-havoc-havoc-for-sale-holiday-for-havoc-and-johnny-havoc-and-the-siren-in-red
robots: classic hostname: ip-10-171-10-108.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2017-09 operator: CommonCrawl Admin description: Wide crawl of the web for February 2017 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.029068
0
{ "en": 0.9832520484924316 }
{ "Content-Length": "77472", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WPUAJ4XWLXLLAPKLUDJMQNWHNVUN2IPY", "WARC-Concurrent-To": "<urn:uuid:01cbbf09-a8bf-4f37-83f1-d2a26c076914>", "WARC-Date": "2019-07-20T07:25:28", "WARC-IP-Address": "104.25.70.100", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:UDBVX44G2IWILNNI77I4A726N2LOD26L", "WARC-Record-ID": "<urn:uuid:f3aef99a-d1bf-4156-b2c3-422a001304dc>", "WARC-Target-URI": "https://www.americanwhitewater.org/content/Accident/detail/accidentid/93", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a010e39f-2e01-4ddb-9cf6-9e4cfa7d3cd3>", "WARC-Truncated": null }
1,977
Victim Age Water Level Cause Code(s) Injury Type(s) Factors Code(s) Boat Type Group Info Other Victim Names Accident Description Arroyo Del Valle near Livermore, CA : February 23, 1993 DESCRIPTION: The Arroyo Del Valle is a small creek that runs only at the peak of the rainy season in a wet year. It was probably last run in 1987, before the current drought. I had very little information, but expected a 15 mile long class IV+ run with a lot of brush. On Saturday morning February 23, 1993 myself, John Dunlop, and Bob Booth met in Livermore and drove to the take-out at Del Valle Lake. At the put-in I noticed that John had a loose flap on the back of his life jacket. This was part of a pocket used to carry a short throw-bag for quick access. He had ripped the pocket the previous weekend and meant to fix it, but never got around to it. We put in at about 10:30 on a slow-moving river crossed by several barbed wire fences. About three miles downstream two creeks came together. The combined flow was 400 cfs and had the feeling of a full river. The next seven miles ere easy class II-III. Most of the river was clean; in some places it was choked with brush but always had one or more runnable channels. Then we encountered some Class IV rapids with trees growing behind boulders. We could scout the rapids from our boats and pick the safest route. I usually ran first, then  eddied out below any particularly dangerous, tree infested stretch. Everything was going well except that John had flipped a few times and missed his first roll. He should have gone to roll practice, but couldn't because of night classes. After lunch the tempo increased, with many IV's and an occasional class V. As the river began to gorge up the rapids consisted of more boulders and not as many trees. In the heart of the gorge where a powerline crosses the gradient increased to 120 feet per mile. Here we encountered several Class V rapids; we ran some and portaged others. It was around 4:00 PM. The sun had set over the ridge an hour earlier, but we still had a couple of hours of daylight left. As we crossed under a bridge I remember saying that we must be getting close to the take-out. At around mile 16 of what turned out to be a 20 mile trip we encountered a class III rapid cluttered with live trees 2-8 inches in diameter. I ran down the center, then worked towards the widest channel on river left. The current was pushing towards the center and left, into the trees, making the move more difficult than it looked. After making it through, I turned around to see Bob braced downstream between two trees. I eddied out and paddled upstream. John was coming around the corner floating upside down. Bob could not get free and John was heading for trouble. I jumped out of my kayak, grabbed my throw rope, and scrambled upstream on river right. Bob saw me with the throw rope and shouted that he was OK. John was now pinned against two trees set close together, making a V, about 25 feet upstream of Bob. His hand was gripping a tree limb coming from below the capsized boat; I assume he was trying to right himself and get some air. The way the water was rushing around him the possibility of an air pocket seemed remote. I waded out into the river in a futile attempt to reach John's boat. The river was only 3 feet deep but it swept me off my feet and broke my grip on a tree limb. As I scrambled back to shore Bob, watching me float by, yelled for me to stay calm, and that he was OK. After a few minutes I saw John's grip on the tree limb falter. I knew he was losing consciousness. My body trembled in frustration and fear, and I wanted to throw up. The remaining options were dangerous to all of us. I could swim or paddle into him from upstream, hoping to pivot around the trees. Either way I was risking becoming pinned or making the situation worse. I realized that I was losing hope. My best friend and kayak buddy was drowning 25 feet from me and I was helpless. All my emotions surfaced at once: frustration that there was nothing more I could do; anger that he put himself in this situation; guilt from being unscathed while John died; responsibility from being the group leader and from choosing this run; anxiety and confusion about what to do next. I watched, helpless, as he let go. Those few moments seemed like an eternity. I relive them still, months after the accident. Now I focused on saving Bob. I went downstream, ferried my boat across the river and carried it upstream. I ferried across with my kayak, close to him, shouting for instructions on what to do next. He replied, "What? I can't hear you!"  I forced my boat into a group of trees just downstream where a boulder created a small pillow. This protected me from pinning as I vaulted out of my boat and wedged it into the trees. Clinging to willow branches, I waded along the shallow river bottom towards Bob. By this time Bob had popped his sprayskirt in an attempt to work loose. He was hoping that swamping the front end would pivot the kayak free, but it made the situation worse. I tried lifting the tail end, and on the third attempt we hoisted the kayak around the tree. We worked the boat into an eddy just below. Bob asked me where John was. I said,"Don't worry about John" and glanced upstream, trying to hold back tears. Bob looked upstream and let out a wailing "No...!" We could both hardly believe it was true. Bob said he would save John but I knew that 30 minutes had elapsed, and it was probably too late. Once ashore we emptied our boats and carried them upstream, 50 yards above where John had broached. The plan was to catch an eddy below a large boulder just upstream of John. Originally we were both going to get out on the rock. I caught the eddy, bounced out of my boat, and pulled it up on the rock. Bob missed the eddy and washed backwards into some trees. He was in a good position for me to pay out a rope with a carabiner attached for him to clip into John's bow grab loop. Bob managed this feat, then wrestled his kayak free and paddled to river left. I ran the rope  around some trees just upstream of the rock. Bob climbed back upstream, dove into the water, and swam out to me.I reached my paddle out and pulled him into the eddy. We tried to pull the boat free using a prussik for a brake, but after a half-dozen heaves knew it was time to construct a Z-Drag. As we were setting the Z-drag the line went slack; the boat had floated free of the trees and John's body was free of the kayak. I scrambled into my boat and chased him for over a mile before getting him to shore. Bob, who had stayed back to retrieve the line, arrived 20 minutes later. We placed John under a tree on a grassy terrace. We stuck his orange life jacket high in a tree where it would be visible to a search party. We headed downstream and paddled for about fifteen minutes in fast moving water before reaching a ranch house where we called 911. The local police arrived first, followed by paramedics, rescue teams, and a reporter. We pulled out maps and showed them where the body was located. At 2:00 the search team had retrieved John's body and brought it to the house. Only then could I assemble the nerve to drive his car to my brother's house in Berkley . SOURCE: Ken King, in the Paddlers News Bulletin of the Sierra club River Touring Section. EPILOGUE: Joe the caretaker of the ranch, set a date two weeks after the accident to retrieve the boat. But after they spoke with the owner, he told me it was too dangerous. They would not let me sign a liability waiver, drafted by my lawyer, accepting all responsibility while retrieving the boat. They told me to contact the Sheriff's Rescue Team, who told me to contact Alemeda County Park Service Search and Rescue, who in turn told me that if they retrieved the boat it might cost $1000 or more. They would not let me be there while they retrieved the boat for liability reasons. Three weeks later, despite the landowner's objections, two friends and I retrieved John's boat. To prevent a confrontation we walked up the road, then bushwhacked along a hill when the house was in sight. Beyond the house we came back to the road and continued until we saw the kayak. It could have been recovered by a couple of boy scouts; we did not require ropes or difficult climbing. We took photos and video of the accident scene, then searched for the kayak paddle. We found a prussik loop on the boulder where the recovery took place. We roped the boat up the hill for safety, then carried it out the road. We decided to risk being arrested for trespassing and stayed on the road during the walk out. Close to the house a truck and bulldozer passed; we waved at them, and the drivers waved back. Other ranch hands stared as we came into view. Again we waved, then they waved back and went about their business. It was finally over. So one outside of family and friends understood how important it was to retrieve that kayak. As long as it was there I could not get on with my day-to-day routine. It was as if part of John was left there and the landowner and authorities didn't care. 1) (King) Looking at the pictures and thinking about the accident many things don't make sense. John had a death grip on a tree limb, but why couldn't he bail out or pull himself up? Could it be that the torn pocket on his back acted like a parachute in the current, or was the power of the water itself sufficient. Why did he flip? Did he see Bob pinned and panic? The only rock he could have hit was 200 yards upstream. According to the pathologist's report he died from a blow to the head. Did this happen in the rapid above, while he was pinned, or in the long swim after the recovery. The report also found no water in the lungs or stomach, indicating a "dry" drowning. Did he hold his breath too long, or did the blow to the head cause his throat to shut down? Did his unrestrained camera choke him, hit him, or contribute to the difficulties in another way? Watching him slowly lose his grip leads me to suspect that the blow occurred sometime during or right after the pinning. Many questions have haunted me since the accident that will probably never be answered. But one thing could probably have prevented the accident - a fast first-time roll or a solid brace to prevent a flip. Please keep that in mind the next time you decide to run a Class V river. 2) Ken King did an excellent job in keeping his head and making a series of difficult, but correct decisions that allowed him to safely rescue one of his two trapped friends. (CW)
https://www.americanwhitewater.org/content/Accident/detail/accidentid/93
isPartOf: CC-MAIN-2019-30 publisher: Common Crawl description: Wide crawl of the web for July 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-99-166-38.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.02777
18
{ "en": 0.9441097974777222 }
{ "Content-Length": "211474", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RLODCNPR5AIKWMTOLAVAYQ3M7LC6N5QY", "WARC-Concurrent-To": "<urn:uuid:dce9aba3-8442-4501-a7fd-1631cd09c6d2>", "WARC-Date": "2022-06-25T22:32:42", "WARC-IP-Address": "172.67.155.118", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:NX5TJ7YMBHN7CRR3WERIPA2ZYMCV7PLN", "WARC-Record-ID": "<urn:uuid:47fdd8ba-40ce-466b-8a14-90ab35a304c7>", "WARC-Target-URI": "https://ptpwallet.com/breaking-blockchain-news/gaming-industry-blockchain-technology-reformation-and-revitalization/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ef1722e5-daf4-4e15-be3e-bb23b9d7a782>", "WARC-Truncated": null }
1,266
Gaming Industry: Blockchain Technology Reformation and Revitalization When you look into the gaming industry, you will accept that in-game purchases of items, tools, or weapons are a popular concept, and players have accepted them totally as a norm. This concept is known as microtransactions, and they have become a part of free-to-play games. With this, players buy virtual items to unlock new levels or enhance the function of their characters in the game. But the blockchain technology is disrupting the gaming space and introducing new gaming models. With blockchain technology, play-to-earn video games emerge daily and become famous. Likewise, innovative services are reducing the entry cost for players. And this innovation is creating a path to establish the real vision of Metaverse. A New Way to Earn as You Play Modern video games are well associated with microtransactions. These in-game purchases vary from accessories and costumes to more complex offers such as characters and weapons. As a result, the gaming community has different sects within it. But the right engaging mentality can make them offer fair-price new content or manipulations to a pay-to-win gaming mentality. This resulted from game abuse. This may result in personally created pay barriers to the success of some players who cannot employ their money to purchase things within the game they bought already. Likewise, continuing a game or moving to the next level will make a player lose any specific title earned with payments. But we are experiencing a new era of “play-to-earn” schemes in the video game industry due to the massive adoption and development occurring in the blockchain-based gaming space and the non-fungible token (NFT) community. With this, the whole scheme is modeled on absolute asset ownership in the industry. A significant example is Axie Infinity. Axie Infinity is a play-to-earn online game with the emerging NFT reward model. This NFT-based online game is the leading decentralized application (DApp) in the Ethereum blockchain space. This revolution happening in the gaming industry is regarded as “GameFi.” The idea behind the GameFi concept interprets that gamers should instead have their money as investments in digital asset resources instead of just spending their money on non-rewarding in-game content. As such, those digital assets will increase in value and can be sold to another exciting market. This income generation model from the online game is a result of NFT technology. With the underlying blockchain technology, gamers can make real-world currency associated with digital currencies. Due to this, we have a new digital economy that rewards users’ engagement with financial services that can be lucrative to receive exciting offers. Innovative In-Game Subscription Model It is essential to acknowledge that money is required to make more money. But these NFT-based games are changing the narratives with their value creation scheme while having a “buy-in” price. A “buy-in” price is an initial payment required for a gamer to obtain a unit of an NFT or a token. This model is essential to establish the play-to-earn mechanism. Despite the emerging promises of this new development, there is a stumbling block similar to the “pay-to-win” game model. Due to the inability of newcomers to spend meaningfully on in-game purchases while engaging the game, we may experience another era of the “pay-to-win” model. A prominent example is the Axie Infinity game. This game, modeled after the Pokémon gaming style, presents gamers with difficulties to earn tangible rewards for playing. As with the case of this game, a new user needs to obtain a minimum of three virtual creatures before they can begin to play. Whereas these virtual items have a minimum purchase price of $70 on the marketplace. This sums to a total of $210 as a starter for newcomers. Meanwhile, that might be expensive for interested gamers looking to be involved in this innovative game. On the other hand, there is some good news for extended engagement from guilds’ games such as Yield Guild Games. This game is creating innovative ways for extensive engagement from everyone interested. And one of those ways is lending assets—such as Axie—to new players for a percentage of their profits. This translates to individuals with less money sources having access to the game and others with enough capital to make passive income. With this illustration, we clearly explain an achievable Metaverse that boosts the virtual economy within players and enables absolute inclusion for the Metaverse that everyone is looking forward to the experience. Blockchain and Metaverse Intersection with the Game Industry Hearing the term “Metaverse” for the first time may sound complex and confusing. But it is a term describing the big concept related to compounding digital services and digital worlds while being interconnected and interoperable. As a result of its ambition to connect the new digital world, struggling traditional platforms are working towards adaptability to become compatible. The icing on the cake is how blockchain makes this easier than preconceived. With NFTs and other decentralized assets, you can successfully transfer your assets across multiple networks without stress in as much as they are attached to a blockchain. Meanwhile, the general digital currencies utilized in this regard will become the widespread virtual cash you can use for future services. This will cause a revolution in the gaming industry, and it will specifically base on gamers’ interaction in cyberspace. As such, they are building an innovative functioning economy that is primarily spread across the digital world. This will lead to creating a new ecosystem with actual benefits to worldwide users wherein individuals earn as they explore the entertainment world. This will come majorly from a single access point made by the Metaverse. And it will lead to the removal of barriers that dictate value creation and transfer. Optimization Is a Needed Tool While all these may sound exciting as a form of empowerment and lucrativeness, there is a need for blockchain developers to optimize the whole network for this functionality. This means that they should balance the kinds of available items for purchase, enhance players’ experience and their interactions with games or other markets. If such optimization is not done, we could still have blockchain to address the development’s pay-to-win issue fundamentally. However, one way to address this is ensuring that newcomers cannot buy their way up to some ranks. They have to earn it by playing and unlocking some items associated with specific levels. And they must not be able to skip each level. Ultimately, we can agree that blockchain and NFT ecosystems create the new model gamers expect via the Metaverse. Although the development is taking a slow path, developers are noting details to ensure that the whole process is optimized. Just in time, we will have the number one “killer app.” However, lagging companies will have to catch up with the innovations. Share on facebook Share on twitter Share on linkedin Share on whatsapp Share on telegram Share on reddit More to explore What is WazirX (WRX)? WazirX is the world’s first auto-matching P2P engine in India and the by-product of crypto regulation and a ban on dealings with What is WeWay (WWY)? WeWay is a new blockchain entertainment startup that focuses on monetizing content, delivering exclusive experiences, and empowering creators. The WeWay platform allows What is Ulti Arena (ULTI)? Ulti Arena (ULTI) is a community and NFT marketplace for gaming artists, developers, freelancers, and professionals that was developed to empower artists Get on the VIP list! Get on the VIP list!
https://ptpwallet.com/breaking-blockchain-news/gaming-industry-blockchain-technology-reformation-and-revitalization/
isPartOf: CC-MAIN-2022-27 publisher: Common Crawl description: Wide crawl of the web for June/July 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-185 software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.129909
0
{ "en": 0.7997634410858154 }
{ "Content-Length": "36644", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:47HIHF6RVU5GZR3B7J4UODHW4JSZPK5T", "WARC-Concurrent-To": "<urn:uuid:671dbcbb-6b71-4a70-a355-9b5c70339418>", "WARC-Date": "2016-06-26T10:08:05", "WARC-IP-Address": "67.225.146.191", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:CJLIUV5TGSQW3IKX6MZGGKGDQHIQDR3V", "WARC-Record-ID": "<urn:uuid:9dc0b5aa-156d-4d6d-bc48-f2d457883454>", "WARC-Target-URI": "http://www.momswhothink.com/4-to-7-ingredient-recipes/the-magic-pancake.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ee14450e-185b-4f9b-be99-f57fae66d77f>", "WARC-Truncated": "length" }
99
The Magic Pancake 4 eggs, slightly beaten 2/3 cup all-purpose flour 2/3 cup milk 1 cup finely shredded Swiss, cheddar or Monterey Jack cheese (4 ounces) 2 Tablespoons cooked bacon pieces 1. Grease 10-inch oven proof skillet with shortening. 2. Heat skillet in a 400°F oven. 3. In medium bowl combine eggs, flour, and milk. 4. Pour batter into hot skillet. 5. Bake, uncovered, about 20 minutes or until pancake is puffed and golden brown. 6. Sprinkle pancake with cheese and bacon pieces. 7. Cut into wedges. You might also like: Baked Apple Pancake Breakfast Baked English Omelet
http://www.momswhothink.com/4-to-7-ingredient-recipes/the-magic-pancake.html
robots: classic hostname: ip-10-164-35-72.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-26 operator: CommonCrawl Admin description: Wide crawl of the web for June 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.924696
18
{ "en": 0.9097607135772704 }
{ "Content-Length": "36259", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:W7KZDJHFS6CMURPOZ2BQTVX3DXI2LM4V", "WARC-Concurrent-To": "<urn:uuid:9f737a89-25f9-4376-b5d3-7a53535012f2>", "WARC-Date": "2014-10-23T03:47:51", "WARC-IP-Address": "216.139.211.105", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:EWNCCAW6BFDO2URHRFDVY3LT5SPKIW3U", "WARC-Record-ID": "<urn:uuid:0cc47656-dcad-4cf7-b82e-56cf121ff792>", "WARC-Target-URI": "http://www.investorwords.com/1068/contingency.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:72c8280e-5d01-49d9-be53-e1516542765b>", "WARC-Truncated": null }
157
Definitions (3) 1. An event that may or may not occur. 2. A condition that must be met in order for a contract to be legally binding. 3. Real Estate: A provision or provisions in a contract that must be met for the contract to be considered enforceable. For example, a buyer may offer a contract that is contingent upon the buyer's obtaining suitable financing; if financing is not obtained, the buyer may back out of the agreement without penalty. Use contingency in a sentence Most companies have a contingency plan that would prepare them for when revenues fall short or there are unexpected expenses. ​ Was this Helpful? YES  NO 1 out of 1 people found this helpful. Show more usage examples... Featured Advertiser contingent convertibles (CoCos) disclosable event
http://www.investorwords.com/1068/contingency.html
robots: classic hostname: ip-10-16-133-185.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-42 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for October 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.118933
4
{ "en": 0.7438289523124695 }
{ "Content-Length": "32168", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:HTXLMI7DNRIMK4OPG3XCEQGWQTO654X4", "WARC-Concurrent-To": "<urn:uuid:1a808148-12c3-400c-a6f5-573013f89555>", "WARC-Date": "2019-07-23T11:22:34", "WARC-IP-Address": "195.181.169.24", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:AOJHR6BR3DDASYPOVJO5BKZS3DGS5ZEV", "WARC-Record-ID": "<urn:uuid:67eb876b-77c0-49bd-ba0a-1078211d8311>", "WARC-Target-URI": "https://docs.plesk.com/en-US/onyx/api-rpc/about-xml-api/reference/before-using-the-reference/data-types.45023/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a96b29ab-0ad0-43a0-b044-ad8547c8aa51>", "WARC-Truncated": null }
262
Each node of the XML schema is of a specified type. For details on XML data types, visit the following URL: http://www.w3.org/TR/2001/REC-xmlschema-2-20010502/. In API Reference, a node can be of a simple or a complex type. If the type of the node is complex and has a name, the name of the type is followed by a file name. The file name specifies the file where the type is located. If the type is not named, it is called complex in the reference. If the type is simple, it can be a standard type or its modification. A list of standard simple types is presented in the following table. Type Definition Examples string Sequence of 1..255 characters mytext, a, ppp short Integer numbers from -2^15 to 2^15-1 * -167, 2880, 310 integer Integer numbers from -2^31 to 2^31-1 -16007, 211880, 310010 unsignedInt Integer numbers from 0 to 2^32-1 1670031, 3321455232 unsignedLong Integer numbers from 0 to 2^64-1 44322344432 long Integer numbers from -2^63 to 2^63-1 184467440737095516 base64 Base64-encoded arbitrary binary data GTrRddxXRGgh== boolean Binary-valued logic legal literals true, false, 1, 0 byte Integer numbers from -128 to 127 1, 0, 126, 100 date Calendar date. Format YYYY-MM-DD May the 31st, 1999 is: 1999-05-31 dateTime Specific instant of time. ISO 8601 extended format YYYY-MM-DDThh:mm:ss 1:20 pm on May the 31st, 1999 for Eastern Standard Time which is 5 hours behind Coordinated Universal Time (UTC) looks as follows: none Nodes of this type do not contain any data (so-called blank nodes)   anySimple Any simple type except none 123, mytext, example123string * - the number y^n is the number y raised to the n-th power.
https://docs.plesk.com/en-US/onyx/api-rpc/about-xml-api/reference/before-using-the-reference/data-types.45023/
isPartOf: CC-MAIN-2019-30 publisher: Common Crawl description: Wide crawl of the web for July 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-166-45-251.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.794531
89
{ "en": 0.9791313409805298 }
{ "Content-Length": "94764", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:IKMY7J5VXXSOCFAJDSFP32ZCDGIXNIIU", "WARC-Concurrent-To": "<urn:uuid:2e3e86cc-901e-4ed6-a340-f3addad4a5d9>", "WARC-Date": "2017-06-26T05:23:23", "WARC-IP-Address": "172.217.7.129", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:DPZAVJXYPOMEVAL6H2RYHA5WNRMMPOP6", "WARC-Record-ID": "<urn:uuid:e0268e6d-db38-4edc-99d5-6b7995410c4b>", "WARC-Target-URI": "http://edsfalliblethoughts.blogspot.com/2008/05/why-trust-bible-2.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:016bcc1d-71f2-412e-84c4-1f091866d8cd>", "WARC-Truncated": null }
1,299
Friday, May 30, 2008 Why trust the Bible (2) How was the Bible put together? The idea of a canon or collection of texts constituting one text comes very early. Even from Moses coming down the mountain with the 10 Commandments and writing the first five books of the Bible. These books were then added to, as we see in Joshua 24:26 ‘Joshua wrote these words in the book of the law of God’ as well as 1 Samuel 10:25, 1 Chronicles 29:29 and Jeremiah 30:2. All these verses speak of words being written in a book, as commanded by the Lord, or laid up before the Lord. This idea is even more remarkable given the command given in Deut 4:2 ‘you shall not add to the word I command you’. In order to have disobeyed such a specific command the authors must have been sure that what they were writing was indeed from God. The collecting of separate texts, often kept together in scrolls continued until about 518BC when the prophets stopped and 435BC when Esther was written. So why the near five hundred year gap between testaments? Well, given that God’s Word always records God’s redemptive work on behalf of His people, and since the end of Malachi points towards the belief that something was ending but that something new was on the horizon, it’s not that surprising that no words were given between Malachi and Jesus. There was of course Jewish writing in between these times, but when we look at that, we actually see more evidence against their inclusion in the Bible. The author of 1 Maccabees can speak of distress of the Jews ‘such as not been seen since the time that prophets ceased to appear among them.’ The historian Josephus spoke of the ‘failure of the exact succession of the prophets’ Other religious leaders said: after the latter prophets Haggai, Malachi, and Zechariah had died, the Holy Spirit departed from Israel.’ So there is plenty of contemporary evidence against the inclusion of these writings, what we now call the apocrypha. More tellingly, perhaps, there was no dispute between Jesus and the authorities of His day as to which books were in the canon and which weren’t. Jesus quotes the OT 295 times in the Gospels but not once from the apocrypha. The OT apocrypha was never really regarded in the same light as the OT itself, more a book of the church than books of the Bible. And, perhaps more tellingly for us, despite the existence of the apocrypha, the earliest post Christ list of the OT lists the books that we use today. Which is very encouraging. So we can say no to the inclusion of the Old Testament apocrypha in the Bible for the following reasons: 1) They do not claim the same authority as the OT does. 2) Jesus does not regard them in the same light as He regards the OT 3) Neither do 1st century Jews 4) They contain teaching inconsistent with the rest of the OT, and historical and geographical errors. What about the New Testament? Why did the Bible suddenly start again? It shouldn’t surprise us that when God sent His Son he would also send upon the Apostles the gift of scripture writing, and therefore easy to see why the NT is placed alongside the OT. God’s activity historically was always accompanied by scripture writing. We’ve already spent time looking at whether we can call the NT scripture in the same way as the OT, and we’ve seen that the clear understanding of the authors was that we can do. How were these books recognized as part of the canon? We must say recognized rather than decided upon. It is the authority of the Apostles that means we recognize some books and not other. As we’re already seen, those books written by Apostles which the Apostles wanted preserved were recognized straight away as scripture as we see in 2 Peter 3: 1 Corinthians 14:37 and 2 Corinthians 13:3. Details as to how the books not authored by Apostles came to be recognized is sketchy. They needed authorizing, and we assume that Luke and Acts were recognized early on because of Luke’s association with Paul, Mark was recognised because of his association with Peter. Jude because he was Jesus’ brother, and because of his association with James, who by that time was considered an Apostle (1 Cor 15:7 and Gal 1:19). Hebrews was recognized because of the intrinsic qualities of the book which convinced, and continue to convince believers that whoever the human author was the ultimate author must have been God. It shouldn’t surprise us that the early church should be able to recognize what was divinely inspired and what wasn’t, if we consider that John 10:27 ‘my sheep hear my voice’ The books we now recognize as the NT were circulated by Athanasius in 367 and accepted by both east and western churches within the next thirty years. Should we expect other books to be added to the Canon at this late stage? What would we do if an Apostolic letter from Paul turned up today? I think there are two reasons why we can reject this hypothesis. The first is Hebrews 1:1-2 Long ago, at many times and in many ways, God spoke to our fathers by the prophets, but in these last days he has spoken to us by his Son, whom he appointed the heir of all things, through whom also he created the world. Jesus is God’s final word of revelation. And Revelation 22:18-19: I warn everyone who hears the words of the prophecy of this book:(A) if anyone adds to them, God will add to him the plagues described in this book, and if anyone takes away from the words of the book of this prophecy, God will take away his share in(B) the tree of life and in(C) the holy city, which are described in this book. Given the position of Revelation in the canon and what it concerns we can legitimately assume that ‘this book’ refers to the whole Bible. Alongside this historic data we must consider the Fatherhood of God. Would God who loves to give us everything we need really hold back part of the Bible for two thousand years? Ultimately we must base our confidence on the completed canon on the love and faithfulness of God. Just as with the OT, there is a an NT apocrypha that has built up. The suggestion, made by Dan Brown in the Da Vinci code that the books of the Bible were voted on by the early church fathers could not be further from the truth. There are four reasons why we can be confident about their lack of inclusion in the Canon. 1) Some of the letters do not the claim that authority for themselves like Ignatius’s letter to the Romans ‘I order you not as Peter and Paul, they were Apostles.’ 2) Other parts of the Apocrypha are absurd, as we see from the end of the Gospel of Thomas: ‘Simon Peter said to them: ‘let Mary go away from us, for women are not worthy of life’ Jesus said ‘lo, I shall lead so that I may make her male that she too may become a living spirit, resembling you males. For every woman who makes herself a male will enter the Kingdom of heaven’ 3) Like the OTA there are historical and geographical errors in the NTA that disqualify it. 1 comment: Tom said... The main reason we know that Dan Brown is mistaken on the canon, is that the canon was a protective, rather than selective mechanism, to protect the books and letters that had already been accepted as scripture by the early church. See my article on 'Who Chose The Books Of The Bible'
http://edsfalliblethoughts.blogspot.com/2008/05/why-trust-bible-2.html
robots: classic hostname: ip-10-166-82-115.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.035249
5
{ "en": 0.9709917902946472 }
{ "Content-Length": "148051", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:IMCXZD5FID3H4ITSFCP4EMVWXB4O4ORC", "WARC-Concurrent-To": "<urn:uuid:f3f53fa7-b4e5-4735-a12d-bce750db43df>", "WARC-Date": "2018-03-18T10:21:39", "WARC-IP-Address": "192.229.173.158", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:3VZ74S3IQUU5ISQIJIJQVMO7TOSCX4Y4", "WARC-Record-ID": "<urn:uuid:fd4feacc-2bf8-40b2-bed3-c4f66b68aa2b>", "WARC-Target-URI": "http://www.philly.com/philly/blogs/moving_the_chains/Washburne-effect-.html?i=2&jCount=1", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ff24144e-f8c7-4e52-8319-a99424806880>", "WARC-Truncated": "length" }
788
Washburn effect: Should Eagles blitz more? Bears quarterback Jay Cutler throws against Eagles' Brandon Graham. (Yong Kim/Staff Photographer) As I mentioned earlier this week, there were several reasons the Eagles failed to get pressure on Jay Cutler last Monday night. The Bears kept extra blockers in. They moved the pocket and rolled Cutler away from Trent Cole. Cutler showed great pocket awareness and was able to escape pressure and make plays. And Chicago's offensive linemen won one-on-one battles when they needed to. Eagles cornerbacks were unable to stick with the Bears receivers when Cutler had time, and the result was a 30-24 loss. Keeping that in mind, here's the breakdown of how Jim Washburn's defensive line is performing, as always, starting with snap counts from last week: Player Pct. of Snaps Trent Cole Jason Babin Cullen Jenkins 68.7% Mike Patterson 67.2% Trevor Laws 34.3% Derek Landri 34.3% Darryl Tapp 31.3% Brandon Graham 31.3% For the second week in a row, Washburn was able to go with a pretty true rotation. Cole played the most snaps, followed by Babin, Jenkins and Patterson. The second group featured Graham for the first time. He played 21 snaps. Juqua Parker did not play last week and was listed as a limited participant in practice Thursday. We'll see what Washburn's plan is when all five defensive ends (Babin, Cole, Tapp, Graham, Parker) are healthy. Here's a look at sacks and hurries:   Sacks Hurries Cole 0 2 Babin 0 7 Jenkins 0 0 Patterson 0 2 Laws 0 0 Landri 0 0 Tapp 0 0 Graham 0 0 No one had a sack, but Babin was still pretty productive with seven hurries. He and Cole both saw a lot of extra attention. It seemed like when the Bears had a tight end or running back outside to help against Cole, he would try to rush inside, but wasn't very effective. The Eagles got very little from their interior pass rushers. Patterson had a couple hurries, but the other three defensive tackles were completely shut out. Jenkins has gone without a sack in three straight games and four of the last five. As always, it's good to look at opportunities. Below are percentages on how often each defensive lineman has notched a sack or hurry, based on number of chances to rush the quarterback (provided by Pro Football Focus).   Sacks+Hurries Pass-Rushing Opportunities Pressure Pct. Cole 21 172 12.2% Babin 38 212 17.9% Jenkins 14 208 6.7% Patterson 14 190 7.4% Laws 11 105 10.5% Landri 2 44 4.5% Tapp 12 81 14.8% Parker 5 63 7.9% Hunt 5 45 11.1% Dixon 1 42 2.4% Graham 0 11 0.0% Babin has been the Eagles' most productive pass rusher. Cole has one sack and four hurries in two games since returning from injury. He hasn't looked like his usual self just yet. Jenkins has five sacks, but if you look at pressure percentage, Patterson and Laws have actually been getting to the quarterback at a higher rate. I was somewhat surprised to see the Eagles' coaching staff have Graham down for zero hurries. I thought there were a couple instances where he got pressure. Against the Redskins and Cowboys, the Eagles didn't blitz a lot, but when they did, they were effective. Those two opponents were just 4-for-9 for 43 yards (4.78 YPA) when the Eagles blitzed. But when Juan Castillo dialed up extra pressure against Chicago, Cutler burned them. The Eagles blitzed on seven of 32 Cutler dropbacks, or 21.9 percent of the time. On those plays, he went 5-for-6 for 78 yards (13.0 YPA). The Bears also drew a 17-yard pass interference penalty on Nnamdi Asomugha on one of the blitzes. Keep in mind that for our purposes, blitz is defined by more than four pass rushers. On two occasions, the Eagles lined up with five defensive linemen. Once, they ran a zone blitz, dropping Cole back into coverage. On the season, the Eagles have blitzed on 42 of 274 dropbacks, or 15.3 percent of the time. Opponents are 20-for-38 for 334 yards (8.79 YPA) against the Eagles' blitz. In other words, the extra pressure has not been effective. The Bears found success keeping extra blockers in and letting what has looked like a mediocre receiving group get open against the Eagles' secondary. We could very well see other teams follow a similar formula to neutralize the Birds' pass rush, which has been the strongest part of the defense through the first half of the season. But clearly, extra pressure has not exactly confused opposing quarterbacks, so more blitzing is unlikely to solve the Eagles' issues.
http://www.philly.com/philly/blogs/moving_the_chains/Washburne-effect-.html?i=2&jCount=1
robots: classic hostname: ip-10-16-230-89.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-13 operator: Common Crawl Admin description: Wide crawl of the web for March 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.023117
1,400
{ "en": 0.9477240443229676 }
{ "Content-Length": "212873", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:B5SPFY6VOOEVCNA54G75RVJB35QPKI55", "WARC-Concurrent-To": "<urn:uuid:427e74bd-b80a-48fb-a229-285d424c77c6>", "WARC-Date": "2014-04-19T02:21:04", "WARC-IP-Address": "208.80.154.224", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:ABNZEPCLRIM24NZZECS6JNO53P3OLO5H", "WARC-Record-ID": "<urn:uuid:100d6974-c5fc-4591-8023-f4ef9a9f282d>", "WARC-Target-URI": "http://en.wikipedia.org/wiki/First_Coalition", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c2c27a06-dd54-4458-b841-a794dade7cc6>", "WARC-Truncated": null }
2,096
War of the First Coalition From Wikipedia, the free encyclopedia   (Redirected from First Coalition) Jump to: navigation, search War of the First Coalition Part of the French Revolutionary Wars Valmy Battle painting.jpg Date 1792–1797 Result French victory; Peace of Basel, Treaty of Campo Formio First Coalition:  Habsburg Monarchy  Holy Roman Empire[1]  Prussia (until 1795)[2]  Great Britain Kingdom of France French Royalists  Spain (until 1795)[3]  Sardinia (until 1796)[4]  Naples and Sicily Other Italian states[5]  Ottoman Empire  Dutch Republic (until 1795)[6] France French Republic  Spain (from 1796)[7]  Batavian Republic (from 1795)[8] Kingdom of Italy (Napoleonic) French satellite states POL COA Ciołek.svg Polish Legions (from 1797)[9] The War of the First Coalition (1792–1797) was the first major effort of multiple European monarchies to contain Revolutionary France. France declared war on the Habsburg monarchy of Austria on 20 April 1792, and the Kingdom of Prussia joined the Austrian side a few weeks later. These powers initiated a series of invasions of France by land and sea, with Prussia and Austria attacking from the Austrian Netherlands and the Rhine, and Great Britain supporting revolts in provincial France and laying siege to Toulon. France suffered reverses (Battle of Neerwinden, 18 March 1793) and internal strife (Revolt in the Vendée), and responded with extreme measures: the Committee of Public Safety formed (6 April 1793) and the levée en masse drafted all potential soldiers aged 18 to 25 (August 1793). The new French armies counter-attacked, repelled the invaders, and moved beyond France. French arms established the Batavian Republic as a satellite state (May 1795) and gained the Prussian Rhineland by the first Treaty of Basel. With the Treaty of Campo Formio, the Holy Roman Empire ceded the Austrian Netherlands to France and Northern Italy was turned into several French "Sister Republics". Spain made a separate peace accord with France (second Treaty of Basel) and the French Directory carried out plans to conquer more of Germany and northern Italy (1795). North of the Alps, Archduke Charles of Austria redressed the situation in 1796, but Napoleon carried all before him against Sardinia and Austria in northern Italy (1796–1797) near the Po Valley, culminating in the peace of Leoben and the Treaty of Campo Formio (October 1797). The First Coalition collapsed, leaving only Britain in the field fighting against France. Revolutionary violence in France[edit] Early setbacks for France[edit] Dumouriez prepared an immediate invasion of the Austrian Netherlands, where he expected the local population to rise against Austrian rule. However, the revolution had thoroughly disorganized the French army, which had insufficient forces for the invasion. The soldiers fled at the first sign of battle, deserting en masse, and in one case murdering Théobald Dillon, their general.[11] Tide turns in France's direction[edit] On 21 January the revolutionary government executed Louis XVI after a trial.[15] This united all European regimes, including Spain, Naples, and the Netherlands against the Revolution. France declared war against Britain and the Netherlands on 1 February 1793 and soon afterwards against Spain. In the course of the year 1793 the Empire, the kings of Portugal and Naples and the grand-duke of Tuscany declared war against France. Thus the First Coalition was formed.[16] After seizing the Netherlands in a surprise winter attack, France established the Batavian Republic as a puppet state (Hannay 1911, p. 204). Even before the close of 1794 the king of Prussia retired from any active part in the war, and on the 5 April 1795 he concluded with France the Peace of Basel, which recognized France's occupation of the left bank of the Rhine. The new French-dominated Dutch government bought peace by surrendering Dutch territory to the south of that river. A treaty of peace between France and Spain followed in July. The grand duke of Tuscany had been admitted to terms in February. The coalition thus fell into ruin and France proper would be free from invasion for many years.[18] Strategic situation in Europe in 1796 The French prepared a great advance on three fronts, with Jourdan and Moreau on the Rhine, and Bonaparte in Italy. The three armies were to link up in Tyrol and march on Vienna. Jourdan and Moreau advanced rapidly into Germany, and Moreau had reached Bavaria and the edge of Tyrol by September, but Jourdan was defeated by Archduke Charles, and both armies were forced to retreat back across the Rhine.[22][23] Napoleon, on the other hand, was completely successful in a daring invasion of Italy. He separated the armies of Sardinia and Austria, defeating each one in turn, and then forced a peace on Sardinia while capturing Milan and besieging Mantua. He defeated successive Austrian armies sent against him under Wurmser and Alvintzy while continuing the siege.[23][22] The rebellion in the Vendée was also finally crushed in 1796 by Louis Lazare Hoche,[23] but Hoche's attempt to land a large invasion force in Munster to aid the United Irishmen was unsuccessful.[17] On 22 February French invasion force consisting of 1,400 troops from the La Legion Noire (The Black Legion) under the command of Irish American Colonel William Tate landed near Fishguard (Wales). They were met by a quickly assembled group of around 500 British reservists, militia and sailors under the command of John Campbell, 1st Baron Cawdor. After brief clashes with the local civilian population and Lord Cawdor's forces on 23 February, Tate was forced into an unconditional surrender by 24 February. See also[edit] 12. ^ Holland 1911, The revolutionary Commune of Paris. 17. ^ a b Hannay 1911, p. 204. 19. ^ Holland 1911, Progress of the war. 20. ^ Holland 1911, Insurrection of 13 Vendémiaire. 21. ^ Holland 1911, Character of the Directory. External links[edit]
http://en.wikipedia.org/wiki/First_Coalition
robots: classic hostname: ip-10-147-4-33.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-15 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for April 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.040239
32
{ "en": 0.9686358571052552 }
{ "Content-Length": "292686", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:XQIDWYGYWXY2N2SUZV5PTHOENZLQEJH6", "WARC-Concurrent-To": "<urn:uuid:dad4d4ec-373a-4c3b-8878-3a312710a92c>", "WARC-Date": "2017-05-30T03:26:57", "WARC-IP-Address": "172.217.7.161", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:A35FM5GULZI7GZBBTJJUEQWT5PV2IOWF", "WARC-Record-ID": "<urn:uuid:85509d0b-7e1d-4c00-87ad-dac33ebb173e>", "WARC-Target-URI": "http://firejaymariotti.blogspot.com/2009/03/gene-wojciechowski-is-braindead.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:30eb8c0a-40a0-4d52-80e5-cc4e5558fe6d>", "WARC-Truncated": null }
2,130
Thursday, March 19, 2009 Gene Wojciechowski is Braindead Thirty-three games this week (hey, the opening round counts), so 33 reasons we love the NCAA tournament: Thirty three pieces of evidence that Gene is a mental (and comedic) midget. 1. The leader of the free world hates the BCS but loves the playoff format of March Madness. President Barack Obama even filled out a bracket for us. (I'll give him this much: He's no homer. The prez didn't pick Washington, D.C.'s, very own American University of the Patriot League over Villanova.) He has no connection to American. He never went there. Why is Patriot italicized? I'm hoping it isn't a Patriot Act reference. I'll assume it's not. Watch -- he'll win the White House office pool but have to give all the cash to AIG. 2. Verne Lundquist. I could listen to Lundquist do play-by-play of U.S. tax code. He understands the game is the star, not he. 3. Screamin' Gus Johnson. The exception to the rule. So what Gene is probably saying is that he's friends with both these guys, so the fact that their styles are so different is OK. He loves them both. Because he knows them. 4. Redemption. Banished eight long years by the NCAA for money-whipping a recruit's family, former California Bears coach Todd Bozeman is back on the sideline and back in the Big Dance. Weird how it works out. Ain't sports beautiful? How Reillyesque. Looks like Rick is rubbing off on his ESPN colleagues. Although this is not really an uplifting story. Bozeman was definitely a grade A asshole. In addition to paying at least one player, he was also the subject of a sexual harassment complaint (filed by a student) shortly before leaving Cal. 5. Kobe and KG have won NBA championships, but they'll never know what it was like to do what MJ did -- play in (and win) an NCAA tournament. Some current NBA stars never played in the NCAA tournament, but others from the past did. Therefore Gene is excited to watch the 2009 tournament. QED. 6. The 10 members of the selection committee probably will never admit it, but here's guessing they're sweating bullets over No. 12 seed Arizona's first-round game against No. 5 seed Utah. The committee invited the Wildcats but stiffed Saint Mary's, which on Tuesday beat Washington State by 11 points in the NIT -- the same Washington State team that beat Arizona by 16 points on Feb. 26. Gene is very excited to see if Arizona doesn't embarrass itself. Now THAT'S a reason to watch. Also, if team A beats team B, and team B beats team C, then team C should not be in the tournament over team A. Gene will imply this to you as sublty as possible. Patrick Mills, who would have looked good on CBS air, scored 27 points for the Gaels. He's a sexy man! Arizona doesn't have any such players, certainly not future NBA first rounders like Jordan Hill or Chase Budinger. 8. Bruce Pearl's orange sport coat. (Because it's the Big Dance, it'd be nice to see Pearl unveil an orange tux.) 9. Rick Pitino's salute-to-the-Bee Gees white suit. Although idiotic, at least these are literally reasons why someone might be excited about the tournament. As opposed to, say, the fact that Michael Jordan once played in one. 10. Sleeper picks. 11. Boss buttons. You are a lazy journalist. 12. Planting yourself and your school flag in a Vegas sports book Thursday through Sunday of opening week -- just to hear the groans. And suddenly, without warning, we've entered a Dane Cook routine. 13. Bill Raftery. "And the kissssss." No one likes Raftery. No one. 14. The satisfying feeling that comes with knowing that Kentucky is an NCAA tournament no-show, but the coach it all but forced out -- Minnesota's Tubby Smith -- is in. Apparently Gene and I have something in common- we both enjoy schadenfreude. Still, I'm not sure you can cite the fact that a team didn't qualify for the tournament at all as a reason you're excited to watch it. Unless that team is Duke. Take that, team everyone loves to hate! I hate you too! 15. The microscopic odds of a No. 16 seed's beating a No. 1 seed. It has never happened, which means the newest 16s -- Morehead State, Chattanooga, Radford and East Tennessee State -- are on the clock. Lazy. So- something crazy could happen. This logic can be used to watch pretty much anything. Hey, you never know when Larry King might keel over and die while doing a broadcast. I think that's reason enough to watch his drivel. 16. Picking Kansas to advance, yet rooting for first-time Big Dance entry North Dakota State to upset the Rock Chalks. Personally, I picked Gonzaga to get to the sweet 16, but I am FUCKING PUMPED to watch Akron take them on tonight. Totally stoked. (Insert similar logic for any of the other 20-some possible big upsets in the first round.) 17. Figuring out the over/under on how many times UNC coach Roy Williams will cry. I bet Simmons and House could nail that line before Vegas releases it. 18. Always persuade your ball and chain to fill out a bracket. Mention how many "units" are at stake. She'll become instantly interested in the tournament (even though she doesn't know Robert Morris from Van Morrison) and, in a once-in-a-lifetime phenomenon, actually encourage you to watch more sports on TV. So Gene is excited to watch the tournament because he might get permission from his "ball and chain" to do so. Oh, the thrills of marriage! 19. Pep bands, good … male cheerleaders, bad. Because Gene is a dude, and he likes chicks! Why would he watch dudes... when he could be watching chicks? Or bands? He's totally not gay. And likes bands. 20. Picking the annual 12 versus 5 upset. But only if his ball and chain lets him! 21. Sixty-four games of hoops heaven. 22. Crammed into a combined 11 days. Easily the laziest, stupidest items on the list yet. Hey, you know why I enjoy watching the World Series? Between four and seven games of baseball euphoria. 23. There's the 'Cuse, as in Syracuse. But during the Madness, there's the ex-cuse, as in, "What kind of excuse am I going to use to call in sick so I can watch the tournament?" First the ball and chain, now the boss. It never ends! Also, some words sound like other words. Some time-honored favorites: grandmother died … You're a bad person. stomach virus … caught my neck in the car door. 24. It helps the economy: Snack foods, pizza and HDTV sales spike. 25. The mascot box. See how creative mascots can be in their NCAA-designated areas. This is a great reason to watch sports- to check out things unrelated to sports. 26. To all those BCS honks who insist fans can't make travel arrangements on short notice, I'd like to remind them of the Sunday regional final, followed by the national semifinal the next Saturday. Always seems as though plenty of fans make the trip and fill up those huge indoor stadiums. Much as I support the idea, 1) short travel arrangements for a football playoff would take place during the holidays as opposed to March and 2) putting 17,000 people in a basketball arena for the regional final is a whole lot different than putting 85,000 people in a football stadium. (His point about the national semifinals and capacity crowds is legitimate. I guess.) 27. It's a bargain: At the regional in Minneapolis, your $180 ticket is good for six games. So as long as you have the money and time and means to travel to one of the sites, you're in great shape! Gene does (as long as his "old lady" lets him)- so why shouldn't you? 28. Here's what the tournament does to you: Before it's over, there will be a team you've never watched, coached by a guy you've never heard of, played by kids you'll never see in the NBA -- yet you'll be on your knees in front of your plasma rooting … begging like an alumnus for it to pull off the upset. Alright, you know what, I will non-sarcastically give him this. I went pretty apeshit for George Mason back in 2006, as well as Davidson last year. So I guess this list's retardery only extends to 32 items rather than 33. 29. It's the tournament of guards. But if it were the tournament of power forwards, no way would Gene be watching. Lazy, lazy, lazy. 30. Other than maybe when the NFL plays its two conference championships on the same day, there isn't a better sports day than the first Thursday and Friday of the tournament. Check that: Semifinal Saturday is the best day in sports. I can't make up my mind! Help! Or what if it's the first weekend, when the sweet 16 gets finalized? Also, note the logic here: Gene is excited to watch this tournament because it has some pretty great days. And those great days are probably why he's so excited to watch it. Etc., etc. 31. Legends are made. You think Bryce Drew will ever have to buy a meal in the greater Valparaiso, Ind., area again after his buzzer-beater gave 13th-seeded Valpo the improbable win against No. 4 seed Ole Miss in 1998? Yeah. I bet he does. BECAUSE THE ECONOMY IS BAD, REMEMBER? No, but seriously, I really don't think hitting one first round buzzer beater for an unremarkable school is a ticket for free food for life in that school's town. Christian Laettner probably won't pay for as much as a parking meter when he visits Durham. Slightly more plausible given that Duke is actually a basketball school and that happened late in the tournament. Still probably not happening. 32. Disturbing body painting. 33. A tradition like no other? It isn't the Masters, Turned that one around on you, didn't he? You'll think twice before coming up with your next slogan, Masters people. "I'm lovin' it?" Fuck you, McDonalds. The only thing I'm lovin' right now is the NCAA basketball tournament. it's net cutting and "One Shining Moment." Gets me every time. This sums up Gene's interest in the tournament: he really likes the montage they play at the end. Please, ESPN, I'm asking nicely. Tell this asshole to hit the bricks. Use the money you save on his salary to get Kenny Mayne (or someone else who has a sense of humor) to do more stuff. Bengoodfella said... I am the one person that likes Bill Raftery. I am that guy and I am not ashamed...yet. Patrick said... This comment has been removed by the author. pnoles said... Ben....any relation to this "Big Fella" of whom Raftery often speaks? Jack M said... This comment has been removed by the author. Jack M said... Gene Wojciechowski <<<<< Steve Wojciechowski <<<<<< A steaming pile of wojo Bengoodfella said... No relation. He gets excited when he talks and sometimes is hard to understand. For some reason I enjoy him calling a game...I like Jay Bilas too, so I am probably way off base with everyone. Tonus said... Question: is Gene one of the people who have been ragging on steroid abusers and telling us that they shouldn't get into the hall of fame? That they've tarnished the sport and deserve nothing but scorn, for being, you know... cheaters? I really hope not, because it's kinda hard to square that with his comment above, where he says that a guy who got caught cheating has now been redeemed by virtue of an appearance in a tournament. Martin said... I like Raftery too. I think he's perfect for announcing college basketball. He'd drive me nuts doing pro games, but I like his work during the tourney. Bengoodfella said... Tonus, I think Gene was one of those who was pistol whipping those steroid users for doing what they did and tarnishing the sport. It doesn't square with his comment at all. I am sure he would argue it is different...I am not sure how it is different but it just is. I don't know why I like Raftery, but I do like it when Bilas is there to offset his excitement a little bit. Andrew said... It's kind of upsetting how much better your blog was even few months ago. Hope you can recapture past glory. Jack M said... You imply that at some point we had glory. Clearly you have us confused with some one else.
http://firejaymariotti.blogspot.com/2009/03/gene-wojciechowski-is-braindead.html
robots: classic hostname: ip-10-185-224-210.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2017-22 operator: Common Crawl Admin description: Wide crawl of the web for May 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.119801
134
{ "en": 0.9722052216529846 }
{ "Content-Length": "96266", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EQUQPGYVM3LDX577MHPQ27463KLS26VU", "WARC-Concurrent-To": "<urn:uuid:20c27d78-14c2-4472-92b0-be7588e57cd7>", "WARC-Date": "2018-03-23T18:44:19", "WARC-IP-Address": "192.0.78.12", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:5CCMHPUAVT3U5PHEQVWR34PE2GJ6UZDE", "WARC-Record-ID": "<urn:uuid:58fd28b0-a7a8-453d-af6b-07e4e75c6185>", "WARC-Target-URI": "https://danielibnzayd.wordpress.com/2013/11/24/is-it-okay-to-not-provide-citizenship-for-an-adopted-child/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:cf106d11-29a9-43d8-bc7e-bb636c545248>", "WARC-Truncated": "length" }
3,603
Is it okay to not provide citizenship for an adopted child? This is the 24th question in the series: “Anti-adoption month: 30 answers to 30 questions on adoption” [link]. The following question originally appeared on Transracial Eyes: I came upon your website today and found several thoughtful comments. Perhaps this is the place to pose my question. Is it ever okay to not get U.S. citizenship for an internationally adopted child? I have read the horror stories of deportation and know that no one seems to question the necessity of getting U.S. citizenship. In fact adoptive parents are urged to make sure this is done before the child reaches adulthood. My child was adopted at age ten and doesn’t like a lot of things about American culture. He has stated he does not want to be a citizen of the U.S., yet he does not see himself going back to his country. I hope I am not a terrible parent for questioning this issue. Dual citizenship is not permitted in his case. I figure I could let him make the decision after he is 18, but there is always a chance something could go wrong and end in deportation between the time he turns 18 and the time he decides for himself. I also considered that he may be able as an adult to reject his U.S. citizenship and apply for citizenship of his own country. Most likely I will get his U.S. citizenship. I always tell him that it is okay to not like aspects of this country and that others would agree with him, even those immigrants who moved here of their own choice. Answer: I would agree with what has been posted so far, castigating as it were (and given the limited amount of information we have) the negligence on the part of a parent who does not provide for a solid grounding in this child’s new-found place, especially after dispossessing the child from his land of birth. I was naturalized a citizen when I was five years old; what were/are you waiting for? How did this happen? How often does this happen is perhaps the bigger question. Having said that, the question opens up a much bigger discussion concerning place/non-place, belonging, and the rights afforded us by virtue of being citizens. In an ironic way, I can imagine the “non-place” of this child between his land of birth and the place he was adopted to, because I am more and more familiar with it, as an adoptee returned, with no will to return (like this child) or no ability to truly assimilate (as has been mentioned). To gain insight into what the reality is of those who actually live this way, we can look at those who are truly “stateless”–for one example, the Palestinian people, or that of the Bedouin populations, the Roma in Europe, or the case of immigrants to the United States who are now facing deportations that are breaking up their families, because the children were born in the U.S. This idea of jus soli, or right of citizenship based on birth, is a “New World” right, based in economic and political decisions having to do with cheap labor and public relations concerning “freedom” more than actually investing immigrant groups as citizens. But the “New World” is getting rather old, and the “Old World” is reverting to a “wall them out” mentality as well. Because of the way that U.S. law works, deportation is seen as a punishment, and therefore does not extend to family members, just the individual. It is becoming easier to be caught up in the grinding gears of immigration bureaucracy these days; this can involve overstaying one’s visa, speaking out on campus or online, or simply (these days) having an Arab-, Hispanic-, or Muslim-“sounding” name or surname and being in the wrong place at the wrong time. We can see in American law vestigial elements of a mimicked Greek Athenian philosophy which bestows citizenship on some, while pauperizing others in this regard. It’s a cruel system, and the greater goal should probably be not to run afoul of it. In terms of adoptees’ rights in their lands of birth, a lot depends on the originating country. Lebanese adoptees like myself have a chance at citizenship here, but this is based on our bogus paperwork and the class status afforded by our bourgeoisification and acculturation in our adoptive country. This is hugely ironic, given the inability of local immigrant populations or refugees to gain citizenship. This is painful when these populations end up one’s friends—how to explain such a disparity? The Lebanese population is currently one-fourth Syrian refugees and migrant workers, for example; they have no hope of becoming part of the body politic. Similarly, Lebanese adoptees taken during the war without this paper trail have no such right; nor adoptees with fathers unknown (Lebanese nationality is patrilineal). All laws and all rights lean toward those who “have”, and so to be of this class and not provide such privilege to a child you are caring for is rather disturbing. This brings up a point being discussed, which is the idea of “dual citizenship”. To note is that like jus soli, hosting countries take advantage of certain immigrant groups by “claiming them”, especially if they represent an important brain drain on the supply country (India or Germany, for example) or if their supply country allows for the voting of foreign nationals—who tend to be much more conservative in an attempt to assimilate—in which case the hosted population acts as an agent of foreign policy (Lebanon or Korea, for example). And whereas the United States nominally since a 1952 Supreme Court decision allows for dual nationality, it maintains the “right” to renounce American nationality based on its assumptions as to intent vs. the national interest: Adoptees beware, especially if you currently belong to a group targeted by the U.S. State Department. The child in this case should weigh things carefully as he grows up. United States laws are increasingly aiming to marginalize, deport, and eliminate groups seen as posing any kind of internal “threat” however defined by the United States (the political “reverse” of reservations, internment camps, and prisons). This child does not have “free speech” to air his views concerning how he feels about his American acculturation. Were the Patriot Act II to be passed, no one would have even this as birthright or, indeed, as a right in general. Those of us who are naturalized who “run afoul” of increasingly restrictive laws risk losing our bank accounts, our ability to travel to and from the U.S., and/or our citizenship based on this as well as a variety of bills either under consideration or passed into law that forbid advocacy for or contact with so-called terrorist groups, even though locally said groups may indeed be valid political actors, democratically elected, etc.; or the vagaries of American politics might see all of a sudden former foes as friends. I state this emphatically as a warning because greater freedom of speech in a foreign country for a U.S. national becomes a trap and a double-edged sword. For example, television stations, newspapers, etc. here in Lebanon are politically affiliated; I have to weigh what the consequences are of appearing on a particular television station or taking part in a newspaper interview when discussing the social welfare, for example, the trafficking of children in Lebanon. I have to ascertain what the perception of this appearance will be by the U.S. State Department. Activism on behalf of Palestinians, for example, requires dealing with a full spectrum of political actors in varying degrees; that the U.S. should focus on a few of these and make determinations about one’s status as a citizen thereof is a twisted and egregious misuse of the notions of citizenry of supposedly “free” nations. And thus we are silenced. Perhaps it is a good point to explain to this child that to be naturalized as a minor requires a sworn statement of the petitioner of citizenship, not s/he being naturalized, if I’m not mistaken. Once he is 18, then he will be required to make this oath, and this might make a difference in how he views it. Personally, I am glad that my adoptive father made this oath on my behalf, especially now that I’ve lived through wars funded and armed by the U.S., and am currently living through the counter-revolutions sponsored by the U.S. and its allies. It was my father’s will, and not necessarily mine, that resulted in American citizenship, and this is a consolation of sorts. I make these political comments as statements of fact, not to enflame or annoy. Because for any adoptee traveling back or moving back to their originating place, there is a need to acknowledge the politics of the Empire that preceded them. This has made it often difficult at times to connect with people here, and I understand why. It also makes it more and more difficult to connect with those left behind. And this is the psychological counterpart to physical statelessness, and I am not sure which is worse. In this regard, my acculturation in the United States and my American passport are albatrosses around my neck, despite my friends telling me they allow me to go “anywhere”. This isn’t necessarily true; to travel locally in this region or the Global South is much easier with a Lebanese passport which I am trying to obtain via a re-established nationality. My students who not so long ago had no problem obtaining a visa for their studies abroad are now being rejected simply for being Lebanese and/or of a particular sect; they are refocusing their future on other places more welcoming to them—an increasingly shrinking venue. And thus my re-entry to the United States each time I visit becomes more and more a painful reminder of the rejection afforded to the adults who, as children, are seemingly welcomed in with open arms. I now see these as deceptive arms, and their reach is long, and their judgment is final. Caveat emigrator; especially when s/he is migrating against his or her will. The concept of citizenship, its relation to the formation of nation-states many of which (like Lebanon) were created wholly out of the foreign policies of the adoptive country and its “First World” allies, the concept of travel as opposed to displacement and dispossession, and who is effected by these and why, all paint a damning picture of adoption when we analyze them thoroughly. The simple answer is that you should have naturalized this child if only to provide a more solid and stable base for him, especially after destabilizing him from his origins in the first place. Adoptive parents are a microcosm of the country that allows them to dispossess others, and for them to “lord it over” the destiny of the child temporarily in their care is horrifying when mapped onto the greater culture’s insouciant disregard for concepts of citizenship or belonging. Consenting Muslims in America , by Hamid Dabashi. Public Power in the Age of Empire, by Arundhati Roy. Rough Music: Blair, Bombs, Baghdad, London, Terror, by Tariq Ali. Civil Rights in Peril: The Targeting of Arabs and Muslims, edited by Elaine C. Hagopian. You Have No Rights, by Matthew Rothschild. No One Is Illegal, by Justin Akers Chacon. Exploited, by Toby Shelley. Debate Tactic: This discussion is almost certain to elicit the “Love It or Leave It” immune response of Americans. And so there is some consolation in having “left it”. All the same, my time spent with those who are literally “without state” has shed an entirely new light on the notion of who belongs and who doesn’t; I imagine this must be similar to the sentiment of those belonging to Indigenous Nations in North America. Similar to adoption discussions which get past the status quo idea that adoption is a “given” and a “starting point”, this discussion similarly need call into question our comfortable concepts of the nation-state, and what it means to be afforded “belonging”, especially when this can be taken away at any moment. Everything about the capitalist system focuses on removing connections to place and property, and as such the definers of these concepts control the shots. For parents who adopt, to be unaware of this is a criminal act of dispossession, on top of that which was our adoption. About Daniel Drennan ElAwar Adoptee, rematriated. 5 Responses to Is it okay to not provide citizenship for an adopted child? 1. I don’t understand the motivations of adoptive parents who don’t finish necessary paperwork and tasks, once the child is procured. It’s so distressing and seems once more a failure of responsibility. “Is this child a member of the family, or not?”, the ambiguities scream out at me. It’s possible to honor and support a child while providing that protection you said you were going to give. I think it’s a positive option that parents can take the oath for a child, and have the child decide at the age of 18 to renew or renounce U.S. citizenship. My husband is a U.S. citizen because he was born in New York, but he has German parents who returned with him to Germany when he was less than six months old. Odd thing: they never bothered to get him German citizenship, which he just discovered last year, at the age of 43. He immigrated back to the U.S. at the age of 24, and always traveled with his U.S. passport; he realized at some point he didn’t have a German passport. He had to go to the German consulate and prove that he was German with all kinds of paperwork that his 90-year-old father sent over: birth certificates, marriage licenses, etc. Our sons are dual citizens, which is good for them; they somehow had confirmed German citizenship, but he didn’t. The person at the consulate told him, “They cannot be German, because you aren’t.” He said, “But you issued them passports. Here they are.” Beamter: “No, we didn’t.” My husband, “Yes, you did.” The battle of German wills was sorted out, but again, the relative ease of the process made me feel sad: my husband is German, can speak fluent German, understands German bureaucracy and can readily yell back at the Beamter as necessary. He belongs, and he *knows* he belongs. I am extremely envious of his family trees going back centuries (thanks to Nazi homework), and how he knows who he *is*. His situation reminded me of the stories I’ve read about international adoptees who get off the plane to reunite with families, or to visit in countries where they belong, but don’t, thanks to time and language barriers and the original work of the pyromaniac firefighters. The pressures of loss and limbo are beyond painful. The non-adopted don’t understand. As a parting note, I remember the headline of the paper in Hamburg on New Year’s Day, 2000, the first year that they decided to grant citizenship by birth to the children some Turkish “guest” workers and other immigrants who had lived in Germany for generations. Up to that point, being born in Germany didn’t grant you citizenship. You had to have German blood (read: be white): Jus Sanguinis. Anyway, my husband and I were horrified by the headline: “First Baby of the Millennium: Turk with German Passport.” What?!? If you have a German passport, doesn’t that make you German? No, no, no. Apparently not. You can be there, but you don’t *really* belong. Moreover, they won’t let you forget it. Ah, being marginalized is such a “gift.” 2. dmdezigns says: I’m amazed any time I hear of APs who didn’t finish the process. I’m also disgusted. It’s just not fair to the kids. Of course if you bring a child from another country you need to finish the paperwork and provide citizenship for them. Where do these idiots get these ideas? It also angers me when people adopt children from another country, don’t learn the language of that country, immerse the child in a new culture, new language and refuse to allow the child to keep the culture of language of their birth. We didn’t adopt internationally, but if we had, I would have learned the language. The child would get to speak that language. I would learn about the culture, the food, the history of the where the child came from. They would have been granted US citizenship and if possible, had dual citizenship with their home country. I would be planning for visiting their home country in the future with them. Too often I think people adopt internationally thinking they can go back to the old idea of “as if born to” meaning no other family, no other history. We can’t erase our children’s heritage. It’s part of their identity. We can pretend they don’t have original families, but that’s not reality. I wish more APs understood that adoption isn’t a substitute for having a baby, it isn’t just a different way to create a family. It’s complicated. These are children who are going to grow into adults. They are people with heritage and histories, even if adopted at birth. They have a right to that knowledge. And as Mirren pointed out, they should be able to still feel connection to that heritage. When we remove kids from their culture, we seperate them from a part of themselves. We should be doubly sure that adoption to a foreign country is necessary for the child and not just completing a family in the US. • I have a good friend—we were in the orphanage together, and we are frighteningly similar in many ways (we want to do DNA testing)—who was raised in a Lebanese adoptive family. My hometown in NJ had a very large Lebanese community. Neither her family, nor those of my hometown, reflect in any way the “culture” I’ve managed to return to, for various class-based, religious, and regional reasons. I just wish to caution us as to a kind of reductive trap that is easy to fall into. It would have been great to have learned, say, classical Arabic as a kid; this would have given me an avenue of entry into a culture here. But it would not have been my “local” culture regained. The places locally where I feel the most resonance are exactly those that are likewise denied by the “national” culture, which pulls from a particular class and a particular worldview. All this to say that the effort to keep a child “in” his or her culture is like pounding a screw down with a hammer: The seeming solution is often more problematic and more extensively damaging. • dmdezigns says: I absolutely agree. And it’s important to not think that culture camps or even local communities take the place of an adoptee’s original culture. But I’m thinking of situations where an older child who already speaks a language other than English is forbidden to speak it and forced to choose only English. They never get to eat anything even similar to the tastes that were familiar prior to the adoption. They are immersed in a new culture and told to be grateful. You’re right that when you take a child from his homeland, you cannot recreate the culture that is now lost. You can however accept what they bring. It’s part of who they are. It’s another reason that international adoption – meaning taking a child from their country to a different country regardless of which one- should be a last resort. (actually, all adoption should be a last restort). If I move a child from one family to another within the same country/state/region they still suffer a loss, but that loss is compounded when they also lose their familiar surroundings, the language, possibly their religion (if they are being “saved” from “heathens”). I didn’t grow up in just one place as we moved a lot. I find myself yearning at times for the types of stories/memories of home that so many have. I can only imagine how that might be magnified for one who lost not only their family, their heritage, their homeland, their language. . . . I just think that APs who are going to adopt internationally should embrace as much as the adoptee wants them to embrace and to be not just be accomodating of the differences but accepting/embracing. Too many times, these adoptions fail not because the child has “soooo” many issues but that they are dealing with loss and grief which is not only unacknowledged but dimissed. After all, they’re supposed to be grateful right? I’m enjoying the conversations with you. You give me things to think about. And my kids will only benefit from these discussions and the perspective that you share. 3. And that makes it all worth it somehow. Thanks. Your thoughts, comments, remarks, additions.... You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
https://danielibnzayd.wordpress.com/2013/11/24/is-it-okay-to-not-provide-citizenship-for-an-adopted-child/
robots: classic hostname: ip-10-137-174-210.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-13 operator: Common Crawl Admin description: Wide crawl of the web for March 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.029333
0
{ "en": 0.9177905917167664 }
{ "Content-Length": "110720", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:KMIBZSKATJNH5WMVZQQSWWUIWF6RQSUT", "WARC-Concurrent-To": "<urn:uuid:a25c4982-54d2-4cff-8f57-c3fdcbc28e55>", "WARC-Date": "2022-08-15T09:20:51", "WARC-IP-Address": "23.185.0.4", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:S77324YTWSGPBIGGELZNXRHYMGLZ7ZMS", "WARC-Record-ID": "<urn:uuid:3e20a3a2-61fd-4739-9979-13f000b95a44>", "WARC-Target-URI": "https://www.visiongallery.org/event/caroline-estelle-a-la-mode/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c8b2191e-0109-4544-a8fe-04bca60b2e41>", "WARC-Truncated": null }
164
Loading Events This event has passed. Just in time for summer, Vision Gallery presents À LA MODE, paintings by Caroline Estelle. Images and notions of summer can evoke a sense of joy and escapism.  With warmer weather, people feel more liberated, but as the articles of clothing become smaller, the societal pressures to have an “acceptable” body grow larger.  Through saccharine colors and hyperrealized forms, Estelle embraces the idealized notions of summery scenes.  However, after further examination, one begins to notice that the bodies are intentionally distorted and uncharacteristic of the idealized female forms found in advertisements and art history.  Despite their uncanny appearance, these figures still maintain traits that make them relatable with rolls, folds, and skin discoloration.  These paintings prompt the viewer to consider their own preconceived notions of representations of the human body. They are a reminder to advocate that summertime should be a time of leisure without judgement, and that all bodies are swimwear bodies. Learn more about Caroline Estelle here.
https://www.visiongallery.org/event/caroline-estelle-a-la-mode/
isPartOf: CC-MAIN-2022-33 publisher: Common Crawl description: Wide crawl of the web for August 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-170 software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.119795
197
{ "en": 0.9737025499343872 }
{ "Content-Length": "36501", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FMXGTPOFTXDRPNEBKBWGBPTEJ45J5QRD", "WARC-Concurrent-To": "<urn:uuid:805cc09b-f18d-4098-a52d-3e47d0b9b925>", "WARC-Date": "2019-03-18T19:30:47", "WARC-IP-Address": "104.24.101.141", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:5STR2EI5V3LTO2AE6MUASN7EPTPTKMCI", "WARC-Record-ID": "<urn:uuid:99b9997f-6ca7-409f-b3e4-ce5de58e91cc>", "WARC-Target-URI": "https://novelonlinefull.com/chapter/venerated_venomous_consort/chapter_2371", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:53023636-2701-4447-9fd6-f88cec8ff37b>", "WARC-Truncated": null }
989
Venerated Venomous Consort 984: What If She Was Eaten? Venerated Venomous Consort - novelonlinefull.com If she were not able to lure both of beasts towards the little girl but instead accidentally attracted them back towards herself, then it would be a disaster! Her golden armored giant was relieved. It looked at Gu Xijiu who was in the midst of fighting, "Queen, this little girl is pretty good. What type of martial art is she using?" The young lady was suddenly angry, "What is so good about a lower cla.s.s person who possessed less than level eight spiritual power? Is she worth your compliment?" The golden armored giant went silent and did not dare to speak anymore. The young lady sneered as she looked at Gu Xijiu again. She thought that this little girl was afraid of offending her as she was an upper-cla.s.s level person, so she came back to help her to gain her forgiveness. Humph! She was not so easily fooled! The young lady thought that she must have guessed correctly. This little girl must be planning to cooperate with her to fight the beasts. If she could not defeat them, she might lure the beast's attention back towards her… She won't let her plan succeed! Since this little girl had lured the beasts away, she should be responsible for it until the end. It would be best if she were killed by the beast! She did a hand gestured to her golden armored servant, and it immediately turned left. The female beast was still angry, so it continued chasing after her. Very soon they were quite a distance away from Gu Xijiu and the other beast. Gu Canmo could recognize every single one of his students, and so he was stunned. He knew about Gu Xijiu's ability. If he fought alone with the beast, he had no confidence to defeat it. He knew that he had to cooperate with the other if he wanted a shot at killing the beast. This little girl had less than level eight of spiritual power, but now she was dealing with the beast alone… What if she was eaten by the beast? Gu Canmo clenched his fist tightly, and he became agitated. In his heart, he had decided that if he saw that Gu Xijiu was in danger, he would not care about the command of Messenger Chenge anymore and would rush out to help her! He would not allow his students to be in any danger! He opened his eyes widely to watch the fight between Gu Xijiu and the beast. His heart was pumping very hard, and he was sweating. Gu Xijiu had been utilizing her teleportation ability to its maximum. She sometimes went missing, and sometimes appeared somewhere else, and everyone was busy looking at her movements. However, whenever she performed the teleportation, she would not wander too far away to make sure that the beast did not lose its target. The beast rushed left and right and sometimes even chased after its tail, but it still could not hurt Gu Xijiu. She was jumping around its mouth like a mouse playing with a cat. It made the beasts even more furious. Its body color was changing and becoming more reddish. Apparently, its temper was at its limit. When the beast's body turned red, Gu Xijiu suddenly laughed. She teleported to the sky and took out something from her body. When the beast opened its mouth widely, she threw the thing into its mouth! The beast had opened its mouth so wide that its throat had been exposed. The thing that was thrown by Gu Xijiu rolled into its mouth and fell directly into its throat… Then she suddenly disappeared! "Boom!" The explosion was earth-shattering. Everyone was shocked as the inner part of the beast stomach had suddenly caught fire. The beast screamed shrilly, and its body exploded into pieces. Its blood dropped from the sky like rain. novelonlinefull.com rate: 4.5/ 5 - 606 votes Perfect World Perfect World Nine Star Hegemon Body Art Nine Star Hegemon Body Art Condemning The Heavens Condemning The Heavens Dragon-Marked War God Dragon-Marked War God Starlight Has No Past Starlight Has No Past Medical Master Medical Master The Divine Martial Stars The Divine Martial Stars Venerated Venomous Consort 984: What If She Was Eaten? summary
https://novelonlinefull.com/chapter/venerated_venomous_consort/chapter_2371
isPartOf: CC-MAIN-2019-13 publisher: Common Crawl description: Wide crawl of the web for March 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-184-109-84.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.111323
50
{ "en": 0.870318591594696 }
{ "Content-Length": "115407", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FI5UGSX3ABL3Q5MEDVWJMIZMPJLMOTBS", "WARC-Concurrent-To": "<urn:uuid:13d039e1-18c4-43f9-82d1-813a73597ca4>", "WARC-Date": "2017-08-24T02:25:12", "WARC-IP-Address": "35.154.119.25", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:NVVWVT5OG6AFKZH7ZQ6VJHCC7MSXGZGF", "WARC-Record-ID": "<urn:uuid:536c3210-db99-4c87-9822-1e588a47c708>", "WARC-Target-URI": "https://www.ixigo.com/how-to-reach-go-from/barcelona-to-sanya", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ce16efcd-e9e8-4e83-b1db-9e93e480eed0>", "WARC-Truncated": "length" }
109
Barcelona to Sanya Barcelona (Catalonia) to Sanya (Hainan) distance is 10059 km and you can get there by flight + flight in just over 17 hours and 8 minutes with fares starting from ₹ 48926. Beautiful weather for sightseeing and other outdoor activity. Travel Guide
https://www.ixigo.com/how-to-reach-go-from/barcelona-to-sanya
robots: classic hostname: ip-10-117-23-37.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-34 operator: Common Crawl Admin description: Wide crawl of the web for August 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.061293
33
{ "en": 0.9669805765151978 }
{ "Content-Length": "118796", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:R4V7ADXBRFYDCHPXRFFPQ6S4DKIHWLOH", "WARC-Concurrent-To": "<urn:uuid:c4cfb704-f3c7-4fed-aedc-412ab03287ef>", "WARC-Date": "2015-05-27T16:51:08", "WARC-IP-Address": "87.246.123.17", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:5FKIWQ52EYVQKJ3VKLTLR5FAEL6E5TX3", "WARC-Record-ID": "<urn:uuid:f98331a7-5f8c-4ffe-909e-d62f0875a988>", "WARC-Target-URI": "http://www.mumsnet.com/Talk/telly_addicts/1614218-Corrie-addicts-Possible-spoilers?pg=27", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:7ab933b3-4a32-4e6e-8f45-ab51ccad8172>", "WARC-Truncated": "length" }
1,403
Corrie addicts! [Possible spoilers] (1000 Posts) kenanddreary Fri 16-Nov-12 19:26:09 Loved Steve locking rob in the van. Bakingnovice Thu 24-Jan-13 13:50:32 Agree with what wish said. I'm glad corrie won an award. ajandjjmum Thu 24-Jan-13 15:06:48 I wonder if people didn't vote for Natalie because they don't like Kirsty. Not enjoying this storyline at all now - want it sorted quick (and in the right way!) Nancy66 Thu 24-Jan-13 15:35:10 backingnovice - I agree about all the halted weddings but re. the DNA thing - even if Tyrone did a test proving he was Ruby's dad it would make no difference - under UK law the child's mother must give written permission for the test to be carried out. Wishfulmakeupping Thu 24-Jan-13 16:06:15 I thought the same AJ not sure- don't watch any of the others- is the one who won actually any good? Bakingnovice Thu 24-Jan-13 16:37:59 Nancy you are right about the DNA. But surely he should know that he can go to court to get permission for DNA testing and ultimately a parental responsibility order. I know they like to make it dramatic but it's a shame they went down the 'let's have a big build up leading to wedding' as the story started so well. The wedding was added because producers like a story to build up to an event and a public scene. I wonder if they'll keep Kirsty and send her on an anger management course? Hell they flip reversed mad Mary's character. Remember when she went all Katy bates and kidnapped Norris. Now she's more likeable and I think they're setting her up to be with Roy once Hayley goes. Bakingnovice Thu 24-Jan-13 16:38:35 Kathy bates not Katy. alemci Thu 24-Jan-13 17:01:51 also Tyrone commented that they had the evidence from the hospital he visited. Won't there be a note on the file about how Kirsty was dismissed from the police and lied about Tina etc. She was rude to Rita too. Fiz complained about kirsty assaulting and threatening her after her finger got injured. Also ages ago Kevin asked Tyrone how he got a split lip I seem to remember. No one has ever seen any injuries on Kirsty. Maybe Kirsty's mother will come back into the story. Nancy66 Thu 24-Jan-13 17:12:57 it's true about Mary - they did that with Becky too - her character was unrecognisable at the end. People don't change THAT much! PoppyAmex Thu 24-Jan-13 17:26:55 True. I used to think they were just trying (and failing) to make the characters less one-dimensional, but now I realise it's just what suits their current story lines. Kylie is another example. It's annoying because it makes it hard to hold on to pet hates. Thankfully I still have Karl, LeAnne and Eva's headgear to shout at grin YouOldSlag Thu 24-Jan-13 17:41:49 Bakingnovice, you make a good point. They did that with Mary and also with Kylie. When Kylie first arrived she was a heartless cow who sold her baby and stopped Becky adopting. Nowadays she is quite a sympathetic character, really blossoming and a really good actress to boot. Nancy66 Thu 24-Jan-13 17:49:48 ...she is up the duff by her brother though! Her husband's brother! Mary did get quite stalkerish with Roy again a few months ago. Is she still living in a campervan somewhere? Surely she can't just live in it parked in a street somewhere. My biggest hates are Owen, Karl and Gail. You can't accuse them of messing with Gail's character too much, she's always been selfish, a bit dim and overbearing with her children. I was watching Corrie Years a few weeks ago and they showed Ashley and Claire's wedding, it was such a lovely happy day, seems happy wedding days aren't allowed any more. Nancy66 Thu 24-Jan-13 17:59:14 oh yes, Brother in law....whoops. snowiceslush Thu 24-Jan-13 19:31:01 Good to see awards going to Alan Halsall and the entire Corrie crew. I was surprised that the actress, Natalie, who plays Kirsty did not get best newcomer but I also agree with AJ. Kirsty is not a nice or likeable character. I am curious to know why at the awards they all booed EE Joey's rl girlfriend? Who is she? nellyjelly Thu 24-Jan-13 19:37:54 Hate Kirsty and think the actress overdoes it tbh. Sorry. Agree that the storyline needs to be concluded soon. Bakingnovice Thu 24-Jan-13 20:06:07 Nancy, poppy, slag - I made this point at the beginning of the thread somewhere. Corrie are notorious for totally changing a character. Becky was vile, unethical no morals a total chav. By the end shed been proposed to by every guy on the street and was meant to be the nations sweetheart. I hated her character. Same for kylie. Really vile but again now she's mum of the year, best wife best worker best daughter in law, with brains and brawn. Give over! I for one don't forget. I never warmed to either becks or kylie. Fizz is another one. Started all dopey and stupid but very clued up now. I do like mad Mary though, but corrie has a habit of descending into a farce. They have to start allowing a wedding/ christening/ funeral/ nativity/ birthday party go on without a scene. My current favourite is Karl. He's despicable but gets the best one liners. If you listen carefully there's a lot of humour intertwined in his depiction. Loved it last week when he complained sunita always burnt toast. Nancy66 Thu 24-Jan-13 20:08:28 it's also a bit daft that Lewis is trying to con Gail with the EXACT SAME scam he first pulled on Audrey - the 'investing in a little hotel' thing. Surely Gail would remember? Bakingnovice Thu 24-Jan-13 21:13:01 Very true nancy! I'd forgotten about that. In fact it was the same setup. Lewis paying a friend to pretend to be opening a hotel. Lewis revenge was enjoyable at the start but it's getting sinister now. Maybe it's the dormant feminist in me but hate the way he's exacting his revenge on the whole bloody family and taking Gail apart bit by bit. ajandjjmum Thu 24-Jan-13 21:21:41 Because I'm so old, I can remember Ivy and Vera coming to the Street, and I'm pretty sure they were universally disliked - and yet now Vera and Jack are considered to be one of the best loved couples ever. So maybe changing characters really is a Corrie trait from the early days - or maybe we just get to like/understand people more, as we get to know them. I'm giving this way too much brain space!! grin MrsSalvoMontalbano Fri 25-Jan-13 17:23:00 I'm also of the vintage where Jack, Vera Ivy seem like new characters! And yes, there is tendancy to soften characters - the Battersbys were nasty nasty originally then turned lovable. Best bit about Corrie is the one-liners - our Tracey has some corkers, and I loved Brian's comment when Julie tolds someone they driven Kirstie round for hours 'and half a tank of petrol!' grin MrsSalvoMontalbano Fri 25-Jan-13 17:27:52 Where is Bessie Street Juniors? Peter recently bundled Simon in the car, Brian appears to cycle - how do our Tracey, Sunita etc get them there - walking presumably? Recently in the Wendy Crozier story Ken took a taxi 'there' as the car was in for a service... Yup, I know, I too am spending way too much brain on this! One of my favourite one liners was years ago, Alec had taken someone (Bet probably) for a stay in a hotel and when asked if he wanted to pay the bill by cash or credit card, rolled his eyes to heaven and muttered "mortgage". Chippychop Fri 25-Jan-13 19:44:58 Going back to characters changing our Tracey seems to have stayed the same old wicked cruel manipulative charActer... Although to be fair that's miles away from the shy " thou shalt not utter a word" kid when she first joined the cast. Oh and why when a new bloke appears doesn't anyone say well she did murder her ex.....???? qazxc Fri 25-Jan-13 19:50:39 Fiz "He's a good man in a dreadful situation! Chesney - That's exactly what you said about Stape!" didn't deirdre walk in on something that will back kirsty's version? This thread is not accepting new messages.
http://www.mumsnet.com/Talk/telly_addicts/1614218-Corrie-addicts-Possible-spoilers?pg=27
robots: classic hostname: ip-10-180-206-219.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-22 operator: CommonCrawl Admin description: Wide crawl of the web for May 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.04561
17
{ "en": 0.877666711807251 }
{ "Content-Length": "43146", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EG743RVPHMAW2CHHBTOFVABB5N4HZPKD", "WARC-Concurrent-To": "<urn:uuid:90e21021-2e5d-4193-a6cb-42406a48fdf6>", "WARC-Date": "2014-08-30T14:32:17", "WARC-IP-Address": "67.221.36.21", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:4CMO4X2HI2JLU4OLSMKPFFFUNQNNAS6R", "WARC-Record-ID": "<urn:uuid:12b96ab2-ae5c-4930-9407-388a3c8068fb>", "WARC-Target-URI": "http://www.activeforever.com/a-psittacosis", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:7ffa7dca-b627-4937-999c-254ee8381c34>", "WARC-Truncated": null }
430
Alternate Names • ornithosis • chlamydia psittaci • parrot fever Psittacosis is a lung infection caused by bacteria called Chlamydia psittaci. These bacteria are found mainly in birds, such as parrots, parakeets, pigeons, chickens, ducks, and lovebirds. What is going on in the body? Psittacosis bacteria can infect a number of mammal species. Birds are the major reservoir for the organism and are an important source for human disease. Humans usually get the disease by inhaling the bacteria from dried bird droppings or infected secretions. Symptoms begin 1 to 2 weeks after infection. What are the causes and risks of the infection? Psittacosis is caused by the bacterium Chlamydia psittaci. Someone who lives or works around birds is at risk for getting the disease. What can be done to prevent the infection? Bird breeders and owners can protect themselves by avoiding the dust from the feathers and the cages of sick birds. If infected birds are discovered, they need to be treated. Their cages must be disinfected before further use. A person who has contact with sick birds should be watched for symptoms of psittacosis. How is the infection diagnosed? The diagnosis of psittacosis is usually made when blood tests show antibodies to the organism. Long Term Effects What are the long-term effects of the infection? In rare cases, a person with psittacosis can develop infections of the heart, liver, brain, or spinal cord. Other Risks What are the risks to others? It is unusual for humans to pass the psittacosis infection to each other. What are the treatments for the infection? Psittacosis is treated with antibiotics, including: • tetracycline (i.e., Sumycin) • doxycycline (i.e., Adoxa, Doryx, Oracea, Periostat, Vibramycin) • erythromycin (i.e., EES) with or without rifampin (i.e., Rifadin, Rimactane) • azithromycin (i.e., Zithromax, Zmax) • clarithromycin (i.e., Biaxin) Side Effects What are the side effects of the treatments? Antibiotics may cause allergic reactions or stomach upset. After Treatment What happens after treatment for the infection? A person generally recovers completely from psittacosis with antibiotics. If infections develop in the heart, liver, brain, or spinal cord, they may require longer treatment. How is the infection monitored? Current Medical Diagnosis and Treatment, Tierney, 2000 The Merck Manual of Medical Information, 1997   Account set up & astute solutions guidance.   Free edu catalogs for your staff & community.   Publishing, marketing & lead gen programs.   Vendors/Investors: full-service solutions.   EZ Publish our Discovery Digest free.
http://www.activeforever.com/a-psittacosis
robots: classic hostname: ip-10-180-136-8.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2014-35 operator: CommonCrawl Admin description: Wide crawl of the web with URLs provided by Blekko for August 2014 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.632817
18
{ "en": 0.8982640504837036 }
{ "Content-Length": "80932", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:CVBR6O4MREUFGEQBTPHQYH4OL4VS7KAG", "WARC-Concurrent-To": "<urn:uuid:2c5d24cd-c6c4-4db0-b0c9-373c6d933680>", "WARC-Date": "2018-01-21T10:47:47", "WARC-IP-Address": "173.236.157.183", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:Z7QIC6CUAPE2ZF3ML57OC37RMY2MS457", "WARC-Record-ID": "<urn:uuid:d34bce63-940f-41cd-b18a-c42c279321df>", "WARC-Target-URI": "https://www.global-regulation.com/translation/latvia/7849438/financial-and-capital-market-information-system-security-the-legislative-provisions.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b54260b1-c7f9-41e1-9e7b-58ab5d8ef422>", "WARC-Truncated": "length" }
10,172
Financial And Capital Market Information System Security The Legislative Provisions Original Language Title: Finanšu un kapitāla tirgus dalībnieku informācijas sistēmu drošības normatīvie noteikumi Read the untranslated law here: Financial and capital market Commission, the provisions of regulations No 112 in 2015 on July 7 (financial and capital market komisijaspadom meetings of Protocol No 25 p. 2) Financial and capital market information system security rules, regulations Issued pursuant to the financial and capital market Commission of the law article 7, first paragraph, point 1, of the law of credit institutions article 34.1, second paragraph, the third subparagraph of article 50, and payment services, electronic money, article 45 of the law on the financial instruments market law 123.5 the second paragraph of article 124 article 1.1, part of the law "on private pension funds ' in article 28 of the sixth part i. General questions 1." financial and capital market information system security regulations "(hereinafter-the the rules are binding on Latvia) registered in the financial and capital market participants (hereinafter operator): credit institutions, credit unions, payment institutions, electronic money institutions, insurance companies, insurance intermediaries, private pension funds, regulated market organizers, Latvian Central Depositary, brokerage firms, investment management firms and alternative investment fund managers. 2. the aim is to limit the market participants and customers for the provision of services of information systems to be used (hereinafter also – IR) risks generally striving for care information system risk management (risk appetite), as well as to provide uniform structured requirements for market participants IS the security risk management. 3. minimum requirements. The operator may introduce additional safeguards, depending on the classification levels of information resources and the risk analysis carried out in the light of the services of the company, number of employees, and information technology (hereinafter IT) the level of use. II. Terms 4. Audit trail-records available for analysis, which tracked data for specific events IS (access, input, change, delete, output, etc.). 5. Outsourcing provider, third party after market operator's request, IT IS the operators and management, development, security, audit, or other market participant provided a necessary service that is associated with this. 6. security measures-technical or organisational measures, which are certainly risk management and reduce the risk to acceptable ISO level. 7. Vulnerability – IS not entirely, allowing some particular risks materialise and affect the IS security. 8. information system-data input, storage and processing system that provides specific functions and provides lietotājpieej to the data stored in it or information. 9. Confidentiality of the information-providing access to information only to authorized persons. 10. Information integrity, information and its processing methods, the accuracy, correctness and completeness. 11. Access to information – opportunity to persons authorized to use the information at a specific time and place. 12. Information resource-information unit containing a data file containing the IS stored, processed and IS available to users, as well as all the information IS input and output documents, regardless of the media type. 13. Information resource holder – a person who is responsible for information resources and work with them on behalf of the operator. 14. Authentication factors (elements)-remote user authentication used for authentication features that are known only to the user (such as your password, PIN), which is in use, or belong only to the user (for example, code card, code, calculator, mobile phone), or what is the user's unique characteristics (such as fingerprints). 15. IS security – IS confidentiality, integrity and availability requirements. 16. IS security incident — adverse event or offence as a result of which are endangered or may be compromised IS the safety ( Or the computer network attacks, operational equipment, which result or may result in unauthorized access to the IR, denial of service). 17. IS the user – the person within the limits of the powers conferred on the IS used. 18. Risk – IS associated with the functioning of the Organization's alleged inability fully and quality to perform some of his obligations or functions as the likelihood of unwanted event and its consequences. 19. Technological resources – IS a component that includes the sistēmprogramm, applications, utilities, sistēmfail, computer, network, hardware, and other equipment which will ensure the IR activities. 20. The technological resource holder – a person who is responsible for the technological resources and work with them on behalf of the operator. 21. Definitions relating to internet payment services, see annex I of these rules under point 8. III. Organization of the security of information systems of management accountability and 22 support 22.1. market participants shall be responsible for the management of the IS security policy and IT strategy and implementation, staff duties and responsibilities, as well as the organisation of control adequate allocation of resources IS security and audit functions to make the ISO. 22.2. The IS security policy objective is to define market position and control of the aid IS in line with the security market and customer needs. 23. the regulations 23.1. The market operator shall confirm the hierarchically structured set of documents that define the ISA Management, Is security management. Defining security management, ISO sets the ISO security objectives, roles, responsibilities, and IS the application of the security measures. 23.2. The market operator shall document at least the ISA management processes that can lead to failure of the IS a security risk. 23.3. The market operator shall ensure the availability and accessibility of regulations updating the employees. 23.4. The market operator shall determine the employees ' liability for non-compliance with the regulations. 14.6. The market operator shall establish and maintain up-to-date information and data flow diagram. 24. IS security or the IR risk management function (hereinafter IR security function) 24.1. The market operator shall ensure the IS a security feature, to the realization of the risk control and IR security measures. 24.2. IS security functions within a market participant shall ensure at least: 24.2.1. IS security, regulatory development and updating; 24.2.2. IS the classification and risk management and coordination hazards identification; 24.2.3. management information on compliance with the safety requirements and relevant IR security incident; 24.2.4. monitoring the security measures laid down; 24.2.5. employee training and information IS security; 24.2.6. IS security incident management; 24.2.7. membership IS restored and continuity planning. 24.3. The market operator shall ensure IS security functions independent of the IS development and maintenance functions and responsibilities directly to inform market participants IS essential for the management of security events. If on IS security officer their duties performed in combination, then followed the principle of separation of duties – the performer may not be his to control. 25. The IS audit function 25.1. The market operator shall ensure the IS audit function to ensure the implementation of security measures IS independent examination. 25.2. The Audit function can also provide outsourcing provider. 25.3. A market until March 1 of each year shall be transmitted to the financial and capital market Commission, for the previous year, performed with the IR security audit list, specifying the subject of the audit objectives and audit, the analyst. 26. the Outsourcing of the management of the market participant can 26.1. use third party provider-outsourcing-services. Make all market participants used outsourcing. 26.2. Outsourcing arrival does not release the operator from the law or the contract with its clients determine responsibility – it is responsible for the outsourcing of work to the same extent as on your own. ISA security level, if the IS develops or maintains an outsourced provider, must not be lower than the market's. 26.3. before taking a decision on the acquisition of the outsourcing market assess suppliers and, taking into account the requirements of quality and safety of services, including accessibility, assess the risks, as well as the termination of the service strategy. 16.4. A market contract with the external service provider shall include the requirements for the control of outsourcing, for example, a clear description of the service, security requirements, confidentiality obligations, a right to service the information necessary for the supervision of outsourcing provider immediately to report the incidents, the right to terminate the contract. 26.5. Outsourcing, cloud computing, a market participant is obliged to maintain the necessary control over information resources that contains information about the operator's customers. The operators classified IS a safe way is physically or logically distinct from outsourcing provider's other clients IS. To prepare and regularly update the service interruption plan, providing data, software and technical resources of the return and deletion of customer information to the service provider. 16.5. The market operator shall carry out the monitoring of the quality of the outsourcing and security control, receive reports on quality of service and incidents. 16.6. The operator, if it provides outsourcing to third parties, using their own IR, including authentication, it is the duty of the outsourcing solution for controlling the third-party company. Market participants shall inform partners about the risks associated with the use of such services. Security requirements in the event of non-compliance to the operator is obliged to cease cooperation. IV. System of information resources management 27. Resource ownership 27.1. The market operator shall designate in writing the IS resources (information and technological resources) the holder for all the information and technological resources. 27.2. the obligations of the holder of information resources are as follows: 27.2.1. classify his holdings in existing information resources; 27.2.2. participate in his holdings of existing information resources and related risk analysis and ISO to approve it; 27.2.3. confirm access rights IS; 27.2.4. approve the changes to ISA and implementation; 27.2.5. determine the requirements for creating an audit trail; 27.2.6. collaborate with the technological resources of the holder of the IR functionality and security. 27.3. the participant of the market of information holders training in their duties. 27.4. The technological resource holder is responsible for the following: 27.4.1. technological resources to ensure the physical and logical protection; 27.4.2. collaborate with the holders of information to enforce his claim on information resources and access to them; 27.4.3. participate in risk analysis, identify the resources associated with the process IS to assess the risks and likelihood of these risks; 27.4.4. ensuring ISO restore procedures, if technological resources have been damaged and disrupted the functioning of ISA or impossible; 27.4.5. collaborate with the holder of the IR information resources IS the functionality and security. 27.5. Resource holder obligations can be instructed to perform resource guardians – who ordered the holders and everyday are responsible for the relevant ISA resources or part of it. 28. classification classification IS 28.1. the objective is to assess the importance of ICTS and ensure its protection according to the level of classification. Make all market participants IS determining the classification, IS privacy, values and level of availability, and documented. 28.2. the level of privacy IS granted by the operator depending on the damage that could be caused to the employer of the information or if the operator is allowed to access that IS not authorized. 28.3. the level of Value IS assigned by the operator depending on the damage that could be caused to the employer of the information or if the operator does not ensure the integrity of the ISO. 28.4. the level of resources available IS determined by the operator depending on the operator's operating needs (business requirements), in view of the harm which might be caused to the employer of the information or if the operator does not ensure the availability of resources, and the ISO determines the allowable time IS may not be available (Recovery time objective), and the allowable time period for which data can be lost (Recovery point objective). 28.5. Operator applied IS the classification that matches these terms and with at least two levels of each classification category. 28.6. market participants according to the level of classification of information to determine use of classified information and protection requirements. V. Risk analysis and management of Risk analysis and 29 management objectives are: to determine the permissible or 29.1. acceptable risk (risk limit or appetite); 29.2. to assess the likelihood of the hazard of the ISA, which IS the risk is intentionally (intentionally) or negligently made, action or inaction or possible events that may cause ISA security incident; 29.3. to assess the potential harm to the employer information, market participant or any other person, without the IS security; 29.4. to determine the appropriate and necessary security measures if the risk is not acceptable; 29.5. accept after security measures the residual risk (compliance with specified risk limits). 30. Risk analysis is a regular process. Market participant is performed throughout the life cycle of the ISA,, starting IS important when a project IS changes, becoming the new significant threats, the occurrence of significant incidents or increasing their total number. 31. Market risk analysis is conducted using the approved methodology. Market participant using a risk analysis methodology that allows you to effectively realize these rules laid down in paragraph 29. 32. A market plan and implement security measures if the risk analysis, the estimated risk is not acceptable, and planned security measures determine the marketing priorities, deadlines and responsible. 33. the security measures are designed to reduce the residual risk to an acceptable level. Operator safety measures shall be based on the costs and the possible loss of samērojamīb. Vi. Staff role in the security of information systems 34. Market risk management carried out in the framework of the measures of employee resulting from an act or an omission IS the security risks, as well as the role of employees IS safety measures and promote the awareness of the staff IS ready and the need for protection. 35. The market operator shall ensure that the IS user level of knowledge is an appropriate use of ICT needs. 36. market participants before the present employees with the governing documents. 37. The market operator shall determine the IS user: 37.1. the responsibility for the operation of regulatory documents IS not complied with; 37.2. the responsibility for all activities that are carried out with the ISA his user name; 37.3. the obligation to respect the obligation of confidentiality in relation to the data that comes into the person's possession, carrying out job responsibilities; 23.2. the obligation to inform the appropriate person (for example, ISA security principal) for IT security incidents and threats. 38. security awareness promotion 38.1. The market operator shall at regular intervals carry out systematic measures to promote the awareness of each employee IS the protection and promote employee awareness of common IR security (security awareness). 38.2. The market operator shall determine how and how often employees are informed and trained on IS security issues. 38.3. The market operator shall carry out training in the protection of classified information. VII. Physical and environmental security management 39. Market risk management IS carried out in the framework of the measures of physical protection, which protects from unwanted ambient (fires, floods, temperature, etc.), technical (inadequate electricity supply, the electromagnetic field exposure, etc.) and human factors (intentionally or unintentionally damage, theft, etc.). 40. The IS infrastructure (technological resources,, disk array servers, network equipment and cable etc., except for the end user of technological resources) physical protection of 24.9. Market IS infrastructure operates limited access spaces, physical protection, which provides the only access to the authorised person. If it is determined by the technological necessity, then, operating outside the restricted access to the premises IS technological resources physically restrained. ISA infrastructure facilities deployed in buildings where there is less risk, the likelihood of implementation. 40.2. The market operator shall determine which persons may enter this provision in paragraph 24.9 spaces and their access to the register. This list includes only those persons who work duties require physical access to ICT infrastructure. 40.3. The IS infrastructure third party premises may stay only in the presence of the persons who have the right of access to the IS infrastructure. 25.1. The market operator shall ensure the IS infrastructure indoor climate (humidity, temperature URu.tml.) IS used for the operation of the infrastructure hardware manufacturer. 25.2. The market operator shall be equipped with IR room infrastructure security alarm and detectors. 40.6. Market technological resources administering staff jobs separate limited access spaces. 41. Media physical protection of market participants made 41.1. the necessary security measures for the physical medium of protection depending on the IS classification, but in whatever form ( dismantled drive equipment, paper, Flash memory card, URu.tml.). 41.2. The market operator shall determine the order in which used stored and safely destroy the media. 41.3. Market media under the protection of the output data apparatus of physical protection, preventing unauthorized acquisition of information resources (such as printers equipment protection, limiting the use of interfaces). 25.7. If media containing sensitive ICT resources, is designed to destroy, then players will do it in a way that would not be possible to restore data. 42. The market operator shall take additional measures of physical protection depending on the ISO classification level. If necessary, physical protection measures may be offset by logical Defense (software and processes). VIII. Information System access rights management 43. new IS user registration, assignment of cancellation and blocking the market operator shall be carried out in accordance with documented request which confirms the information resource. Documentation for the method must be able to carry out effective current right of access control. 44. Each operator IS the user and the administrator is assigned a unique user code. 45. user authentication 45.1. authenticating the User aims to make sure that an IS classified using the authorized user code owner. 45.2. The market operator shall determine the means of authentication (for example, passwords, codes calculator, private key, biometric features, etc.), use password (password length, complexity, term of validity, the repeatability limit). 45.3. the password IS stored in encrypted form. Enter your password, it may not be legible on the screen. Password change immediately if it could be or is unauthorised become known to another person. 28.2. Creating, delivering and enabling authentication feature, the operator shall ensure that it is available only to the owner of the user code ( secure personalization and user password creation process). 45.5. If market participants used technology permits, in addition to the built-in administrator account operator creates an individual account for each administrator who is used in the daily maintenance of the ISO. ISA administrator code and copies of passwords stored in a secure location with limited access outside network connected to engineering resources. 46. The right of access IS a market participant shall be determined in accordance with the approved documented roles or user profiles. Is a user access only to the information and functions that are necessary for the performance of his duties. This requirement must be respected in determining technological ICT users also (account) rights. 47. IS the user's or administrator's job responsibilities change or termination in the event of a market participant shall immediately change or block IS the user and administrator rights. 48. The market operator shall at regular intervals carry out current permissions check to control this rule 46 and 47. compliance with the requirements. IX. Communications and operations management 49. Employees, performing the IS maintenance, the operator determines the duties and responsibilities and ensure interchangeability and qualifications. Process control to ensure separation of duties. 50. the configuration management and control 50.1. The market operator shall take technological resources and their current configuration. 50.2. The market operator shall determine any request, authorize, tested and technological resources. 50.3. Market risk control framework and controls the configuration of ISA maintained, taking into account the recommendations of security practices (hardening standards) and the known system vulnerabilities. 50.4. Market risk control framework and make the necessary technological changes in technological resources and reduce the standard configuration functionality to the required amount. 50.5. The market operator shall promptly take the necessary IS the standard software update works ( Security fix installation). 51. the protection of computer networks 51.1. The market operator internal computer networks separate from the external network. The data flow between internal and external computer networks allow only those services that are necessary for the function of the market participants. 51.2. The market operator shall establish and maintain an up-to-date computer network and connection scheme. 51.3. The market operator shall conduct regular checks on the existence of any external connections and make sure that there are only those connections that meet the market's operational needs. 51.4. Market risk control framework exercises necessary and possible additional data flow restrictions ( application, site containment) between the internal and external networks. 51.5. Market operator carries out monitoring of computer networks and vulnerabilities ( of malware). 51.6. If ISA Administration is performed from a remote location, the operator uses the cryptography features (such as a virtual private network (VPN)) and safe (at least two factor) user authentication. 32.1. The use of wireless data transmission technology, a market risk management framework provides the additional protection to ensure only authorized the use of ICTS. 52. the PC and device protection 52.1. The market operator shall determine what information resources may be stored and how to protect personal data processing equipment, desktop and portable computer (hereinafter PC), Smartphone, Tablet PC URu.tml. 52.2. the PC is installed and used only in the software and in a configuration set operators, which also lays down the procedure and take measures for protection against harmful programs via, for example, antivirus software, the software restriction policy. 52.3. Pc functionality in a market limited to job needs the function level, control the computer's port and the connection of equipment, controls access to the public network information (blacklisting, whitelisting) and logically separated access to the public network (internet) information from the internal organisation IS using, such as virtualization. 52.4. Pc is connected only to certain network operators. 52.5. The market operator shall ensure that when a user leaves your PC unattended, to resume use of the ISA, or connect to the network operators may only when user authentication has been performed. 52.6. with PCs that have enhanced physical security, portable devices used outside the premises of operators, classified information is transmitted and stored in encrypted form. 52.7. The market operator shall make all the existing personal computer for use outside the premises of operators, records to determine which person uses the equipment. 52.8. If the market allows employees to work using their own PCs, it determines the order of use. This procedure must not reduce the level of protection IS established. 52.9. In the event of a remote access market IS through a Smartphone or Tablet PC, the security must be protected in the event of an incident, to prevent customer or market sensitive data from falling into the possession of a third party (for example, protected access to the device, the data is not stored on the device or after sessions are automatically deleted). 53. Data Backup copying 53.1. To limit the risks to the integrity and availability of market data, backup copying. 33.1. The market operator shall develop documented data backup creation, determining what technology and operations are defined in the data backup and restoration of production information, as well as how often and to what extent you create backup copies of the data, taking into account the allowable time IS may not be available (Recovery time objective), and the time period for which data may be lost (Recovery point objective), as well as how often you perform the copy and restore procedures. 53.3. The market operator shall ensure that at least the IR, which provide the market participant or its customers essential services, data backup copying is carried out with the method that minimizes the risks (of the IS physically or logically separate data carriers). The data from the backup stored in the IS geographically separate location. 53.4. The market operator shall protect backup data against unauthorized use or damage. 54. The IS monitoring the market operator IS 54.1. monitoring for at least the following objectives – take preventive action IS a security maintenance and timely identification of the incident. Monitoring measures are applied according to the ISO classification. 54.2. The market operator shall carry out regular monitoring of ISA: 54.2.1. timely identification of both internal and external threats; 54.2.2. identifying system vulnerabilities, and fix them; 54.2.3. monitoring unauthorized use of equipment and software, and its prevention; 54.2.4. controlling an IR and equipment configuration changes; 54.2.5. monitoring IS the process, equipment and availability. 55. the audit trail management 55.1. to identify the user actions and the IS operator error, sort, store and analyze the audit trail. 55.2. Audit trail logging operators shall include at least all successful and unsuccessful connection to the appropriate time and user codes. Additional audit trail shall be made on the ISA parameter change, for working with user accounts, as far as it can be used to provide technological solutions. 55.3. market participants use methods and tools, which allow you to effectively analyze the audit trail. These tools are available only to authorized personnel. 55.4. The market operator shall ensure the integrity of the audit trail. 55.5. market participants synchronizes all it IS time tracking, which are interconnected to Exchange data, or transaction processing. 56. Cryptography use 56.1. Market participants, depending on the level of confidentiality of information resource uses the cryptography features. 56.2. The market operator shall determine the cryptographic products, as well as their protection. X. remote security management services 57. Market, customers, offering remote services provide services security management to minimize customer risks. 58. the requirement for security internet payment determined in the annex to these provisions. 59. The market operator shall perform customer identification, and other necessary measures to remote authentication feature of the services receive only its owner. Client authentication (Tools, software) are required, delivered and activated in a safe way. 60. Transferring customer data, protected by cryptographic means. Transferring customer data, it may not be encrypted if the information does not contain the other data of the customer and the customer accepts possible risks. 61. The operator uses at least one factor client authentication if: 61.1. service allows you to view only the information about the customer's account, which does not include third-party data, account balance, transaction history, account number; 61.2. service includes the use of financial instruments (purchase/sale). 62. The client user access is blocked by up to five auth attempts. 63. An inactive session is locked, no more than fifteen minutes. Client user access again will activate the safe way. 64. The operator client security awareness program provides customers with a full frame information on remoting services risks and information on how to safely and effectively use IS. Market participant before the client gives you access to remote services and continue cooperation regularly inform the customer of the market participant and client rights and responsibilities, the use of the service, the security measures required on the client side ( client workstation, mobile equipment), the authentication features for safe use and operation in the event of loss, as well as measures to identify potential fraudulent activity, money mule. 65. Market, communicate with clients, assess the information content and, if necessary, use a secure form of communication. 66. before remote service deployment, becoming new threats or making significant changes to the ISA, the operator carries out security checks or tests. 67. The market operator shall keep, for at least 18 months, the audit trail of the Remoting service and refuse connections using ( the source IP address, time) and user transactions and other transaction information necessary for identification. XI. the development of information systems and change management 68. The market operator manages the IS development and change management processes to minimize security risks and to develop ICT for IR and other related IS. 69. The market operator shall determine IS the development, acquisition, testing, implementation, and change management processes. 70. The IS development started a market determined 70.1. for IS the person responsible for the project, in accordance with these provisions is determined to develop the IR resource holders. 70.2. The persons responsible for carrying out the project and it IS ISA, which can affect the new IR, risk analysis, as well as setting the IR security requirements and risk control measures. 70.3. holders of the IS drawn up in cooperation with the employee responsible for security, make ISA ISA security requirements. 71. The IS development operator IS 71.1. development environment separated from the environment of use. 71.2. The market operator shall document each IS. The documentation shall contain the necessary information to be able to make use of the ISO quality, maintenance and management of change (for example, ISA, ISA administrator description and user instructions, etc.). 71.3. The operator must keep and use the appropriate level of classification in this dossier. 72. IS testing Before introduction of 72.1. ISA market participant under the plan IS carried out tests. The test plan IS also included in the functional requirements, not The is a security test. 72.2. Market IS distinguished a test environment from the use of the environment. 72.3. Test and development environment does not use use environmental data, however, if the IS security risk mitigation purposes, a test or development environment you need to use use environmental data, then use it and apply the the same security measures as the use of the environment ( the award, authentication, audit trail procedures). 73. the introduction of the ISA IS established IS 73.1. holders of the authorization, certifying that the testing has been completed and IS ready for implementation. 73.2. before commissioning use ISA market employee training. 73.3. The market operator shall ensure that the IS version control. 74. the change management 74.1. changes take place only under the ISO related ISA holders permission. 74.2. The market operator shall analyse how the changes will affect existing security measures and IS granted access to the available information and or changes do not diminish the IS security level. 46.2. The market operator shall take ISA documentation additions. 74.4. The market operator shall draw up guidance on the activities of the emergency (unplanned) changes in circumstances and determine who is entitled to take a decision on the emergency changes. The operator determines how measures are planned to reduce the need for prevention to make emergency changes, and take measures to prevent unauthorized changes. 75. Stopping the use of ICTS by eliminating or transferring it to another person, in cases where the market participant is terminated for some type of action from this ISA, the operator shall take the necessary security measures, risk analysis. XII. Incident Management Incident Management 76. the objective is to minimize the impact of security incidents IS on the market for customers and market activities and reduce their risk of recurrence. 77. The market operator shall establish and implement in practice the IS security incident management process that includes at least: 77.1. IS security incident identification; 77.2. incident mitigation and relief; 77.3. tracking the incident incident register; 77.4. the event IS security incident analysis ( causes and risk mitigation measures) and the management of information activities; 77.5. evidence required. 78. market participants until March 1 of each year shall be transmitted to the financial and capital market Commission last year IS recorded in a list of security incidents, including information about the groups or categories of incidents, in addition to adding the incident impact assessment and the total number of incidents with this level of impact. 79. ISA restore 79.1. Operator provides timely IR activities and restoring data, if the matter IS downtime. 79.2. The market operator shall draw up an operational recovery plan IS in accordance with the market participant's business continuity plan. 79.3. IR activities in the recovery plan includes operators IS to restore services in order of priority, resources are used, to do list and responsible employees. 49.3. Market in accordance with the procedure laid down above shall have regular ISA restore processes involved training and documented testing of the plan and change it back to ensure the plan is up-to-date. XIII. concluding issues 80. These provisions of section II of annex 10, paragraph shall enter into force by January 1, 2016. 81. To 2017 April 1, this provision of the services set out in the annex of the secure client authentication may be used in place of at least two-factor authentication. 82. Be declared unenforceable in the financial and capital market Commission of 26 March 2014 rules no. 49 "financial and capital market information system security regulations". Financial and capital market Commission and the President of p.i. licensing legal department director g. Romeik 1. pielikumsFinanš capital market Commission 07.07.2015. regulatory arrangements no 112 safety rules for payments on the internet I. scope and definitions 1 scope these requirements internet payment security based on payment services and electronic cash law article 11, first paragraph, point 5, which makes payment institutions to introduce strict management measures and adequate internal control mechanisms. 2. the requirements apply to the provision of payment services offered by payment service providers, as defined in the payment services and electronic cash law article 2, second paragraph, with the help of the internet. 3. without prejudice to the payment service provider's liability for payment transaction risk monitoring and evaluation. They are developing their own security policy and implement appropriate security, emergency, accident management and business continuity measures commensurate with the provision of payment services inherent risk. 4. Claim the purpose is to identify the common minimum requirements the following internet payment services regardless of access device: 4.1 payments with the card in the internet, including the payments with a virtual card, as well as credit card information to register to use the service "virtual wallet" (payment card); 4.2. credit transfers (credit transfers); 4.3. direct debit mandate and the issue of electronic (e-mandate); 4.4. electronic money transfers between two electronic money accounts via the internet (e-money). 5. payment integratori1 offering payment services is considered to start in either of the internet payment service for recipients (and thus for payment service providers), or of the aid scheme concerned external technical service providers, or for payment service providers. In the latter case, the Treaty lays down that payment integrator meets the requirements set out in this annex. 6. scope of claims does not include: 6.1 other internet services provided by the payment service provider, using their payment Web site (for example, e-brokerage, online contracts); 6.2. payment, if the instruction is done by mail, phone, voice mail, or using SMS technology; 6.3. mobile payments, with the exception of the browser-based payments; 6.4. credit transfers, if a third party accesses the customer's payment account; 6.5. payment transactions by the company through special network; 6.6. card payments using anonymous and non-refillable physical or virtual prepaid cards, if not a permanent link between the issuer and the cardholder; 6.7. the settlement of payment transactions and post (clearing). Definitions in this annex 7 in addition, the following definitions shall apply: 7.1. Authentication: a procedure which allows the payment service provider to verify identity of the client. 7.2. Secure client authentication: a procedure that is based on two or more of the following elements that qualify as knowledge, ownership and characteristics: (i) the only known to the user) data, such as a static password, code, personal identification number; (ii)) only the user-owned authentication to use for the device, for example, the code calculator, smart card, mobile phone; III) user's biometric data such as fingerprints. In addition, the selected elements are mutually independent, that is, one item is lost, the other (s) element (s) is (are) at risk. At least one of the elements must be unique and not to be used (except for the inherent characteristic), and such that it is not possible to secretly obtain via the internet. Secure authentication procedure is one that protects the confidentiality of the authentication data. 7.3. the authorization is a procedure that verifies that the customer has the right to perform a specific action, such as the right to wire the funds or access to protected data. 7.4. Authentication data is usually confidential information, for the purposes of authentication by the client. On the authentication data used for authentication is treated as a device (for example, the code calculator, smart card) or the user's biometric data. 7.5. the protected data in the context of this annex, depending on the methods of use and the designated protection mechanisms are considered authentication data, and other data to be used to make the payment or access the authentication data the authentication data management. 7.6. The transaction risk analysis is risk assessment associated with a specific transaction, taking into account criteria such as customer methods of payment (character), the related value of transactions, the type of product and the requested profile. 7.7. The virtual card is a payment card with a solution, they have an alternative, temporary card number to reduce the validity period, limited use, predefined payment restriction and can use online purchases. 7.8. The virtual wallet is a solution that allows a customer to register the data relating to one or more of the payment instrument to make payments to multiple e-merchants. 7.9. The E-mandate solution is optional, which topped the SEPA direct debit scheme, allowing the customer to issue, amend and revoke the direct debit mandate in the electronic environment. II. Requirements for internet payment security and safety to the General control environment control 1. Payment service providers implement and regularly review security policy internet payment services. 1.1. safety policy must be properly documented and reviewed regularly (in accordance with section II of this annex, point 2.4). Policy approved by the management. It determines the objectives of security and acceptable level of risk. 1.2. security policy defines roles and responsibilities, including information security risk control function with the right to give a direct message to senior management level, and the obligation to make regular security reviews of internet payment services, including the management of the protected data, taking into account risk assessment, control and mitigation. Risk assessment 2. Payment service providers perform and document the risk assessment in relation to internet payment security and related services both before the introduction of the service (s), and regularly thereafter. 2.1. Payment service providers, implementing risk control function, carry out and document the detailed risk assessment internet payments and related services. Payment service providers consider ongoing monitoring of results concerning the security risks associated with internet payment services they offer or plan to offer, taking into account: (i) the use of technological solutions); II) from external service providers received services; III) customer technical environment. The payment service provider to assess the risk associated with the chosen technology platforms, their construction and architecture, programming techniques and procedures, both in its pusē2 and pusē3, as well as the client security incident monitoring process (see section II of this annex, point 3). 2.2. on the basis of the risk assessment, the payment service provider shall determine whether, and to what extent the existing security measures, the technologies used and the services or procedures are required for the change. Payment service providers take into account the time required for the implementation of the changes (including the implementation of the client side) and the necessary temporary measures to reduce security incidents and fraud. 2.3. the assessment of Risk should be assessed in the framework of the security of the data protected also. 2.4. Payment service providers reporting risk scenarios and existing security measures at major incidents that affect service, before major infrastructure or changes in procedure and when new risks are identified. In addition, the risk assessment General review shall take place at least once a year. And review of the risk assessment results, approval of management. Incident monitoring and reporting 3. Payment service providers shall ensure consistent and integrated monitoring, security incident handling and control, including security-related customer complaints processing. Payment service providers shall establish procedures for reporting to management on such incidents. Important payment security incidents are reported in the financial and capital market Commission. 3.1. Payment service providers are available in the security incident procedures and security related customer complaints monitoring, treatment and control, and they report on such incidents, the company's management. 3.2. Payment service providers is available immediately to report the financial and capital market Commission for substantial payment security incidents relating to payment services provided. 3.3. The payment service provider is available to collaborate with the relevant judicial authorities in relation to significant incidents of payment security, including data protection violations. 3.4. Payment service providers with contracts require e-merchants that store, process or transmit protected data, collaborate on important payment security incident, including violations of data protection and payment service providers, both with the relevant supervisory authorities. If the payment service provider learns that e-trader does not cooperate as required by the contract, it will take steps to comply with the obligations laid down in this agreement, or terminate the contract. Risk control and mitigation 4. Payment service providers implement safety measures in the appropriate security policy to mitigate the identified risks. These include multiple levels of security that one defensive line breaking case involved the next line of Defense ("defence in depth"). 4.1. Establishing, developing and maintaining internet payment service, payment service providers shall pay particular attention to the obligation of separation according to the IT environment (for example, development, test and production environments) and due to the "least privileges" as a basis for the implementation of the principle of right of access pārvaldībai4. 4.2. Payment service providers are available in the appropriate security solutions to protect networks, Web sites, servers and communication links to violence or attacks. Payment service providers cut off servers all the extra functions to protect (strengthen) and prevent or reduce the risk of vulnerabilities in applications. Different application access to the data to reduce to a minimum in accordance with the principle of "least privilege". To limit counterfeit Web sites that mimic legitimate payment service provider site, use of the transactional Web sites offering internet payment services, protected by a trusted certificates, issued by the payment service provider's name, or other similar authentication methods. 4.3. Payment service providers establish procedures to monitor, control and restrict access to protected data: (i)); II) logical and physical critical resources such as networks, systems, databases, security modules, etc. Payment service providers create, store and analyse appropriate audit trail. 4.4. Izstrādājot5, developing and maintaining internet payment service, payment service providers shall ensure that the data collection is essential for the samazināšana6 main function: protected data processing, archiving and visualization, is likely to be reduced to a minimum. 4.5. the Internet payment service security check risk management control functions to ensure their safety and effectiveness. All changes of subject specific change management procedures, ensuring that the changes are properly planned, tested, documented and implemented. Based on the changes made and observed the security risks, the tests are repeated on a regular basis and examine certain possible attack scenarios. 4.6. The payment service provider at certain security measures periodically audits to ensure their stability and efficiency. The audit also internet payment services. This audit of regularity and objective, take into account the related security risks. Audited by competent and independent (internal or external) experts who are not involved in the internet payment service provided by the development, implementation and maintenance. 4.7. If the payment service provider of internet payment services, security functions are transferred to outsourcing providers contract with the external service provider shall include the provisions, which require compliance with the principles laid down in this annex and guidelines. 4.8. Payment service providers contract with e-merchants, acting (i.e., stored, processed and transmitted) with protected data, requires that they implement appropriate security measures for their IT infrastructure in accordance with section II of this annex 4.1-4.7 points, to avoid the theft of protected data e-business systems. If the payment service provider learns that e-merchants is not implemented the necessary security measures, this Act to comply with the obligations laid down in the contract, or termination. 5. Traceability of the payment service providers is available on the procedures to ensure that all transactions, as well as the e-mandate is the appropriate procedure for tracking. 5.1. Payment service providers shall ensure that the service includes security mechanisms that provide detailed logging of the transaction, including the transaction includes the order number, the transaction time stamp changes parameterization as well as any access to the e-mandate and business data. 5.2. Payment service providers shall ensure that the audit trail allows you to trace a transaction or e-mandate for data processing, additions, changes or deletion. 5.3. Payment service providers regularly review and analyze the audit trail of transactions and for this purpose, use the methods and tools that allow it to perform effectively. These procedures implement only the authorized personnel. SPECIAL control and security measures for INTERNET payments in the initial identification of the customer and information 6. Customers are appropriately identified in accordance with the laws of the Republic of Latvia aktiem7 and the relevant European legislation regarding the criminal money-laundering novēršanu8, and they confirm the readiness to make internet payments before they are granted access to such services. The payment service provider shall provide the customer with sufficient initial, regular or emergency information as appropriate for this service and the necessary requirements (for example, equipment, procedures) to make secure payments on the internet. 6.1. The payment service provider to ensure the customer research and make sure that the customer has submitted the necessary identity supporting dokumentus9 and other relevant information, before being granted access to the internet payment services. 10 6.2. Payment service providers shall ensure that the original informācija11 that is passed to the client containing all necessary information with regard to internet payment service. If necessary, it shall include: 6.2.1. clear information on the requirements of the customer's computer equipment, software, or other necessary tools (such as antivirus software, firewalls); 6.2.2. requirements for authentication data the correct and safe use; 6.2.3. detailed description of the actions to be taken to the customer will be able to submit and approve payment transactions and/or obtain information, including explanations about the consequences of the action taken; 6.2.4. the requirements of client devices and software released safe and correctly; 6.2.5. the action to be taken in the authentication data or customer equipment or software for access or transactions, loss or stolen; 6.2.6. the actions to be taken in case of abusive use of the account or if it is suspected; 6.2.7. the payment service provider and the customer's description of the respective obligations and liabilities, taking into account the specific internet payment service. 6.3. Payment service providers shall ensure that the contract with the client is stating that the payment service provider may block the payment of certain transaction or instrumentu12 based on security considerations. The contract provides for client communication methods and conditions, as well as the ways in which the client can communicate with the payment service provider to unlock the internet payment transactions or the service in accordance with the payment service and electronic money. Secure client authentication 7. Internet payment, as well as access to the protected data enables to secure client authentication. Payment service provider implements a secure client authentication procedure under the conditions laid down in that annex. 7.1. Payment service providers perform a secure client authentication client internet payment transaction authorization (including United credit transfers and e-cash transactions) and electronic direct debit mandate for service or modification (e-mandate). However, the payment service provider may use an alternative client authentication measures: 7.1.1. trusted beneficiary payments included in the approved payment of the previously created list or white list (white list); 7.1.2. transactions between one of the two customer accounts that maintain the same payment service provider; 7.1.3. transfers of the same payment service provider, if such option allows the payment service provider of the risk assessment; 7.1.4. small payments as referred to in the electronic payment services and money likumā13. 7.2. to access or change the protect data (including white list creation and modification), you need a secure client authentication. If the payment service provider offers informational services that do not represent the protected client or payment information such as credit card data, which can be misused for the purposes of fraud, the payment service provider may adjust your authentication requirements based on risk assessment. 7.3. in the case of transactions for all card payment service provider should be issued cards support secure authentication of the card holder. All issued cards to be technically ready for use (registered) with secure authentication. 7.4. Payment service providers, offering payment card acceptance service, support technology that allows a vendor to perform secure cardholder authentication. 7.5. The payment service provider, offering to buy the service, request its e-merchants to support solutions that allows you to make secure issuing cardholder authentication for transactions with the card on the internet. Alternative authentication methods you can use pre-defined low-risk transaction categories, for example, on the basis of a risk analysis, transaction or small payments as referred to in the electronic payment services and money. 7.6. the virtual wallet service providers require a secure authentication, if the legal holder first recorded card data. 7.7. The virtual wallet providers support client authentication, if the client logs on to a virtual wallet payment services or carry out transactions with the card on the internet. Alternative authentication methods you can use pre-defined low-risk transaction categories, for example, on the basis of a risk analysis, transaction or small payments as referred to in the electronic payment services and money. 7.8. Virtual maps the original registration shall take place in a safe and reliable vidē14. Secure client authentication requires a virtual card data generation process, the card issued to the internet environment. 7.9. The payment service provider to ensure mutual ("two-ways") authentication to communicate with e-business, if you make an online payment or access protected data. Login authentication tools and/or software and their delivery to the client 8. Payment service providers shall ensure that the client's login authentication features that are required to use your internet payment services, and the supply is made in a secure way. 8.1. the logon authentication products and their delivery meet the following requirements: 8.1.1. related activities carried out in a secure and reliable environment, while taking into account the possible risks arising from devices that are not on the payment service provider; 8.1.2. the introduction of effective and safe procedures for authentication data, payment software and all internet payments associated with personalized delivery of devices. Internet delivered software signed a payment service provider that enables the customer to verify its authenticity and to make sure that it has not previously been used; 8.1.3. transactions with the card the customer has the option of registering for secure authentication regardless of the particular internet purchase. If activation is offered online shopping, do it by directing customers to a secure and trustworthy environment. 8.2. Payment card issuing assets contribute to the card holder's registration for secure authentication and allows holders to bypass registration, only exceptionally and only a limited number of cases, if justified by the risks associated with the particular transaction with the card specifics. Authentication attempts, barred, the authentication session expires 9. The payment service provider shall determine the maximum number of attempts the authentication requirements for internet payment services session limitation and the duration of the validity of authentication. 9.1. using one-time password authentication/unique, payment service providers shall ensure that the following password/code validity is limited to the minimum necessary. 9.2. The payment service provider shall determine the failed authentication attempts maximum, when access to the internet payment service is blocked (temporarily or permanently). Payment service providers ensure safe process blocked internet payment service activation. 9.3. Payment service providers shall set a time period after which an inactive internet payment services session is automatically terminated. Monitoring and supervision 10. Supervision and monitoring solutions, which are designed to prevent, detect and block fraudulent use of payment transactions, the payment service provider before the last mandate. Suspicious or high risk transactions subject to specific monitoring and evaluation process. Equivalent safety oversight and authorization solutions also introduces the e-mandate. 10.1. Payment service providers use fraud detection and prevention systems or solutions to identify suspicious transactions, the payment service provider before they authorize. This system is based on a parameterized rules (such as a lost or stolen card data black list) and monitor the client's atypical behavior patterns (for example, internet protocol (IP) addresses or change the IP range maiņa15 internet payment service during a session that identifies the geographical location of the IP pārbaudē16, not the typical e-commerce vendor categories or specific customer transaction data usually not etc.), and the ability to identify known fraud scenarios (for example able to detect computer viruses, the symptoms of infection during a session). Surveillance and monitoring solution volume, complexity and adaptation is determined under current data protection legislation, and are proportionate to the results of the risk assessment. 10.2. The payment service provider uses fraud detection and prevention systems or solutions to monitor e-merchant activity. 10.3. The payment service provider shall carry out inspection and evaluation of transactions sufficiently short period of time, not to unreasonably delayed the payment run. 10.4. If the payment service provider in accordance with its risk policy decides to block payment identified as potentially fraudulent, the payment service provider shall ensure payment blocking a possible shorter time needed for execution of the payment related to solve problems of security. Protected data security processing, 11. storing or forwarding, protected data, to ensure security. 11.1. all data used to identify and authenticate the client (for example, connecting, starting internet payment or issuing, amending or removing e-mandates), must be secured against theft, unauthorised access or alteration. 11.2. Payment service providers shall ensure that, when a protected exchange of data over the internet, provides secure communication between parties throughout the šifrēšana17 the communication sessions, to ensure the confidentiality and integrity of data using secure and widely accepted encryption methods. 11.3. Payment service providers, offering the collector service, calls for e-merchants not storing any data protected. If e-merchant processing, i.e., stored or transferred, protected data, the payment service provider of the contract requires the operator to introduce e-mail necessary measures to protect this data. The payment service provider shall carry out regular checks and, if they find that the e-merchants, processing the data to be protected, not implemented necessary security measures, the payment service provider to comply with the obligations laid down in the contract, or end the contract. Customer information, education and communication with the client 12. Payment service providers, if necessary, provide help and guidance to customers for secure internet payment service. The payment service provider to communicate with your clients in such a way as to convince them about the authenticity of the received messages. 12.1. The payment service provider to ensure at least one reliable kanālu18 for permanent communication with customers about proper and safe use of the internet payment service. The payment service provider shall inform the customer about this channel and explains that any other payment service provider's name in the send message using other means, such as email, for correct and safe use of the internet payment service is not reliable. Payment service provider customers explains: 12.1.1. the order in which the customer must notify the payment service provider (suspected) for fraudulent charges, incidents or deviations in internet payment service and/or during a session on possible social inženierijas19 attempts; 12.1.2. future action steps, i.e. as a payment service provider will provide the answer to the client; 12.1.3. as the payment service provider shall inform the customer of (potential) fraudulent transactions or alert the customer on the attack (for example, phishing (phishing) email messages). 12.2. The payment service provider over a secure channel, inform the client of changes to safety procedures for internet payment services. All warnings of significant potential risks (such as warnings about social engineering) the payment service provider shall provide, through a secure channel. 12.3. The payment service provider to the customer, provide the assistance in relation to all questions, complaints, requests for support and notifications of incidents concerning internet payments and related services and shall inform customers about how such assistance can be obtained. 12.4. Payment service providers develop customer education and awareness programs to ensure customers ' awareness of the need for: 12.4.1. protect your passwords, code calculators and other confidential data; 12.4.2. properly manage personal device security (for example, a computer) using the component installation and update (anti-virus, firewalls, security patches); 12.4.3. assess the significant hazards and risks associated with the download software on the internet, the customer can be sure that your software is genuine and has not been modified; 12.4.4. to ensure that the payment service provider of internet payment website is real. 12.5. Payment service providers require e-merchants clearly separated with the payments-related processes from the online stores, so that customers can make sure when you get communication with the payment service provider, not by the payee (such as shifting customer and opening a separate window so that the payment would not be displayed in the frame e-merchant). Notifications and payment limit determination 13. Payment service providers determine the payment limits and gives your customers the ability to select risks further restrictive measures. They also provide alerts and customer profile management services. Before the internet payment service customers payment service providers limitus20 down payment relating to the services (such as limiting each individual payment amount or maximum total in this time period), and inform their customers. Payment service providers allow customers to block internet payment functionality. Customer access to information and the payment status of 14. Payment service providers shall ensure their customers payment information and promptly give customers the information they need to verify that the payment is properly started and/or completed. 14.1. The payment service provider of any laikā21 provides customers in real time in a safe and reliable environment check transaction (credit transfers or e-mandate), as well as the status of the account balance. 14.2. all detailed electronic statements and accounts are available in a safe and reliable environment. If the payment service provider shall inform the client of the availability of electronic communication (for example, through periodic e-statement service, or acknowledgement of the notification after the transaction execution) using alternative channels such as SMS, email, or letter, then the following statements must not be included in the protected data. If such data are included in the relevant notification, however, they must be masked. 1 payment integrator provides the payment recipient (that is, e-merchants) with a standardized interface for the payment services to be provided by the payment service provider. 2 for example, the sensitivity of the system to avoid paying session hijacking, SQL injection, cross-site scripting, buffer overflow, etc. 3 for example, the risks associated with media applications, browser plug-ins, frames, external links etc. use. 4 "all programs and everyone for the system user preferred to operate, using the least number of privileges required to complete the job." See Saltzer, J. H. "information-sharing protection and control system Multic", ACM interactions, of Association (1974), volume 17, no. 7, p. 388. 5 privacy protection. 6 reduction of data collection apply to personal data that are necessary to carry out the functions indicated in the least in the collection. 7 Criminal money laundering and terrorist financing Prevention Act and regulations 8 such as Directive 2005/60/EC of the European Parliament and of the Council of 26 October 2005 on the prevention of the use of the financial system for money laundering and terrorist financing (OJ L 309, 25.11.2005, p. 15-36). See also Commission Directive 2006/70/EC (1 august 2006) laying down measures for the implementation of European Parliament and Council Directive 2005/60/EC in relation to a "politically exposed person" and the technical criteria for simplified customer due diligence procedures and for exemption due to the financial transactions carried out by an occasional or very limited basis (OJ L 214, 29-34, 04.08.2006.). 9 for example, passport, identification card or a secure electronic signature. 10 customer identification procedure is without prejudice to any exceptions provided for in the existing legislation on money laundering. The payment service provider shall not make a separate customer identification procedure for internet payment services provided such customer's identification is made, for example, in connection with other existing payment services or with the account opening. 11 this information complements the electronic payment services and money article 64 of the Act, which specify the information that the payment service provider shall provide the payment service user, before conclusion of a contract for the provision of payment services. 12 see payment services and electronic cash law article 81 on the payment instrument use restrictions. 13 see the small description of payment instruments and payment services, electronic money in article 62 of the Act, and the first subparagraph of article 78. 14 payment service provider environment of responsibility according to the customer and payment service provider that offers the service, authentication and confidential/protected information is also supported: i) the payment service provider of the premises; II) internet bank or other secure Web sites; III) ATM (ATM) services. (ATMs needs secure client authentication. Following authentication typically provides you with chip and PIN, or chip and biometric standards.) 15 IP address is a unique numeric code that uniquely identifies each computer connected to the internet. 16 "GEO-IP" test is checked, or issuing State matches the IP address from which the user starts a transaction. 17 Secure or full encryption refers to encryption of the source system and with the appropriate decryption, what happens to the final destination (ETSI EN 302 system, 109 V 1.1.1. (2003-06)). 18 for example, special mailbox provider's secure payment website. 19 social engineering in this context means technique for manipulating people to get information, such as e-mail or phone calls, or get information from social networks for the purpose of fraud or obtain unauthorized access to the computer or the network. 20 payment limits can be applied to the General (i.e., all payment instruments that allow you to make internet payments) or individually. 21 except in emergency situations, for technical reasons, or major incident.
https://www.global-regulation.com/translation/latvia/7849438/financial-and-capital-market-information-system-security-the-legislative-provisions.html
robots: classic hostname: ip-10-111-199-146.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-05 operator: Common Crawl Admin description: Wide crawl of the web for January 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.028969
2
{ "en": 0.972434401512146 }
{ "Content-Length": "27530", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:4ZJKXHMIWLEN3V424ZHFY7LQ4PVCBTCH", "WARC-Concurrent-To": "<urn:uuid:1b73c00c-db92-47e5-ace1-5c453a7b239b>", "WARC-Date": "2016-12-06T12:42:37", "WARC-IP-Address": "104.31.64.94", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:QOOTX76JJMGOU4EQJ7U3NMCE27ONIM6H", "WARC-Record-ID": "<urn:uuid:7c5ef797-9dc0-486f-89c7-a9211a688426>", "WARC-Target-URI": "http://www.redorbit.com/news/space/1112494011/suns-impact-on-Earth-what-we-need-to-know-to-prepare-for-the-future/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b3e71935-35d1-4457-b13e-53d042734793>", "WARC-Truncated": "length" }
946
Sun's Impact On Earth: What We Need To Know To Prepare For The Future March 15, 2012 Sun’s Impact On Earth: What We Need To Know To Prepare For The Future Joshua Kelly, Meteorology Correspondent If you recall back in the year 2000 we were being filled with this information of “global warming” occurring at record setting levels. However, did you also know that in 2009 there were reports of the glaciers in Montana gaining ground and expanding snow cover? So how is it possible that we are going into global warming and then magically just as of recently we now are being told that it´s “climate change.” So with this in mind, what and who do we believe about these conditions? What is actually happening on Earth? Here are some things that you need to understand before we go on. First are terms such as Solar Cycle, Solar Maximum, and Solar Minimum. By understanding these terms, the rest will make more sense. Solar cycle is best defined as the fluctuation between intense sun activity and minimum sun activity. Solar cycles occur in increments of a range of years. The reason for this is that it takes time for the sun to go from extremely active and warm to cooler and less active. The next term is Solar maximum. This is known as the time when the sun is warmer with intense solar activity being released such as strong geomagnetic storms and solar flares -- all of which could impact the Earth. The next term is the Solar minimum. This is when the sun is referred to as going into a less active period. Now that we know these terms, lets evaluate how the sun impacts our planet Earth with different things from very warm times and very cool times. First during a solar maximum, the sun is emitting strong rays towards the Earth and this causes our planet to experience a warming trend. This warming trend can be significant just like what happened back in the early 2000´s when we had politicians screaming “Global Warming.” There is a flipside to this and that is a solar minimum. During this time the sun is still emitting rays towards the Earth, just not as strong. This in return can impact the Earth by providing cooler weather conditions such as what happened just recently when we had heavy snow fall in the Gulf Coast Region and also very hard freezing conditions occuring all the way down into Southern Florida. So, if you remember back around 2009 we saw the term rephrased to climate change. So why such a change in terminology? The best way to explain this is that with the advancement of technology and the further understanding of how the sun works, scientist are beginning to realize that this is all part of a larger cycle known as the solar cycle as mentioned above. So in all honesty we need to prepare ourselves for this ever changing cycle known as the solar cycle. It is going to cause intense weather patterns to occur and repeat over time. For example in 2005 we had a huge outbreak of hurricanes in the United States. But why?  That is better understood when we look into other terms such as El Nino and La Nina. But for this article we are going to focus on the solar impacts on Earth. So as you recall in that 2005 hurricane season we saw storms fire up in the Atlantic Ocean and take aim at many places, creating large amounts of disruption to many people.  This all occurred on the decline of a solar maximum. The reason I believe it took a few years after the solar maximum to actually experience these events is because it was a time delayed event. Now another event just took place over the last couple of years and that was the record cold outbreaks in places that usually don´t get that cold. So why? This again relays back to the involvement of El Nino and La Nina. However, it can also be studied by the solar cycles too. In fact if we look back at the last solar cycle we see that we were heading into and at a solar maximum, which means the sun was emitting less energy towards the Earth which lead to the colder conditions on Earth in my belief. So should we be worried so greatly about what the future holds on Earth for us? The easy answer to this is yes. However, the reason is different and that is because as these cycles continue, they also have stronger periods throughout history which lead to Ice Ages and periods of extreme Co2 being emitted on Earth such as our thoughts behind the Dino era coming to an end. Will these cycles repeat themselves? Definitely they will, and the potential is there that we could see the same side effects occur again. As the solar maximum periods get stronger, the effects on Earth will be felt greater through things like stronger hurricanes and also more violent tornadoes.  Also as the solar minimums get deeper and stronger they will provide longer periods of colder outbreaks to places that have sensitive plants and that are vital to our living. Also in places that see snow leave in March and April may see the snow stay around until early June which would create a shift in the potential of farmers getting into the field on time to get a healthy harvest. The important thing to understand is that the Earth will continue seeing these cycles and the best thing we can do is prepare ourselves for them and what they may bring.
http://www.redorbit.com/news/space/1112494011/suns-impact-on-Earth-what-we-need-to-know-to-prepare-for-the-future/
robots: classic hostname: ip-10-31-129-80.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-50 operator: CommonCrawl Admin description: Wide crawl of the web for November 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.863544
5
{ "en": 0.9035326838493348 }
{ "Content-Length": "30015", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UYTEVYY3QRV3KMHLBWFCTB2XVR5NC464", "WARC-Concurrent-To": "<urn:uuid:e1e0f4a6-85de-4302-afbc-d0c36eeb336f>", "WARC-Date": "2021-07-30T01:24:28", "WARC-IP-Address": "44.235.123.136", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:GMVP26GHXQBO6LHG3PA3UAVLXF6YWFBR", "WARC-Record-ID": "<urn:uuid:26dd94e0-8e44-4b45-8342-b6c1ce1a32ab>", "WARC-Target-URI": "https://oduinn.com/2011/01/11/xpcshell-and-reftest-are-slower-on-win7-faster-on-winxp/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:601a5ac2-0039-458d-b2b1-8c2e000c0260>", "WARC-Truncated": null }
226
xpcshell and reftest are slower on Win7, faster on WinXP Why, oh why, would xpcshell and reftest run so significantly slower on Win7 vs on WinXP? The other unittest suites give comparable performance except for: WinXP vs Win7 • reftest: 50% slower (1,488 seconds on WinXP but 2,234 on Win7) • xpcshell: 75% slower (1,248 seconds on WinXP but 2,190 on Win7) This was measured using the same binary build of Firefox, and the same identical hardware being used on both OS. Also, this difference is *after* Armen and Jimm already landing one fix which really helped, but there’s obviously more to do – details can be found in Armen’s blog and also in bug#617503. Can you help? Given the number of checkins (and hence tests) we run daily, any help fixing this will be a big win (groan!) for our Win7 test waittimes, which impacts us all. 2 thoughts on “xpcshell and reftest are slower on Win7, faster on WinXP” 1. For reftest, here’s one theory (that would need to be tested). On Win7, contrary to WinXP, we have Direct2D acceleration. Although it’s generally a speed improvement, it also takes some time to initialize. The reftests render thousands of tiny pages, probably making initialization time very significant. Leave a Reply
https://oduinn.com/2011/01/11/xpcshell-and-reftest-are-slower-on-win7-faster-on-winxp/
isPartOf: CC-MAIN-2021-31 publisher: Common Crawl description: Wide crawl of the web for July/August 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-190.ec2.internal software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.054734
28
{ "en": 0.9333806037902832 }
{ "Content-Length": "110635", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:XTIYFLL2Z4ZMRV4MKBSX754EEIFMP5EK", "WARC-Concurrent-To": "<urn:uuid:383395c5-4a8b-4021-afac-d42b3969b5a2>", "WARC-Date": "2020-09-26T06:08:33", "WARC-IP-Address": "197.242.76.250", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:42GY5KV7XXH7NWLHBNT7J3TA45NHJG2A", "WARC-Record-ID": "<urn:uuid:69beee95-97d4-4015-bd25-2396f81f8803>", "WARC-Target-URI": "https://www.aro-healing.com/wnewsdisp.php?id=2349", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ea56b03f-6324-41bb-a4e3-b7c522989990>", "WARC-Truncated": null }
2,132
Archived Newsletters TOUCH is fundamental to life Touch is so fundamental to life that most of us never think of how the many sensations we feel are produced: how, for instance, we can tell silk from sandpaper, or recognize an object simply by the way it feels on the skin. Q Why do babies touch everything around them as well as looking at them? A As babies we train our brains to be able to match the sight of an object with its feel. When older, these earlier experiences enable us to predict what the texture of an object or surface is without touching. Q When someone has had a stroke and is paralyzed down one side, does this mean that he or she will have lost the sense of touch on that side? A Not necessarily. Some people who have been paralyzed by a stroke will have retained their sense of touch on that side, provided the damage has been confined to the movement control parts of the brain. If the area of damage is sufficiently large to have involved the touch analysers in the brain or their connections, then the sense of touch will be damaged. Q I have noticed that on very cold days my sense of touch is poor. Why is this? A In very cold weather two things are working against the touch receptors just below the skin in the fingers. First, the cold itself will be reducing their efficiency, and second, blood will have been diverted away from the skin in order to minimize heat loss; this relatively poor blood supply will further impair the ability of these nerve endings to send concise messages to your brain. Q Is it true that blind people have a better sense of touch than the sighted? A A blind person will have the same equipment in his or her nervous system for touch perception. What makes blind people able to use it more effectively than those with full sight is the practice that this sense has had in the absence of sight. The brain has come to rely on touch to a much greater extent, and so the analysis of touch has become more efficient, enabling, for example, the rapid reading of Braille. Touch is one of the first ways in which young babies explore their world, and it remains our most intimate way of rela­ting to our environment. It is through a wide range of receptors in our skin, sen­si ti ve to different types of pressure, that we are continually able to monitor our immediate surroundings and keep our brains 'in touch' with the surfaces on which we sit, the objects we grasp, and so on. However, our sensation of touch is complex and is therefore sensitive to disturbances in many parts of the ner­vous system. least sophisticated in structure and rapidly stop firing if the hair continues to be stimulated. Receptors found in greater numbers in the hairless part ofthe skin. for example on the fingertips and lips, are formed into tiny discs. Because the nerve fibres are embedded within these disc~ they respond more slowly to pressure and continue to fire when the pressure i~ maintained. Other more structurally complicated receptors are formed by many membranes being wrapped around a nerve ending like an onion skin, ane give responses to more maintainee pressure. In addition, all the receptor~ tend to be influenced as to what in­formation they send into the nervou~ system by the temperature at which the:. are operating. This explains why ow sense oftouch tends to be impaired in cold weather. The distribution of the different typeo of touch receptors reflects their particulc: job. The receptors around the base ofb06: hair send messages from large areas :: The sensory receptors Just below the surface of the skin there are many nerve. endings whose varying degrees of sensitivity allow the nervous system to be supplied with different types of touch sensations. Wrapped around the base of the fine hairs of the skin are the free nerve end­ings which respond to any stimulation of the hair. These touch receptors are the The touch receptors in our skin are sensitive enough to respond to the gentlest stroking of a blade of grass. From an early age we use our sense of touch to help us to become acquainted with the shape and feel of things around us - even a familiar object like Mum! the skin about the pressure stimulating them. They rapidly stop their flow of information once we have been warned of the presence of objects, for example, an insect on the skin. On the hairless skin the more sophisticated receptors give continuous information, allowing objects to be felt as the brain assembles this informHtion into a coherent picture. Parietal lobe Cerebral Touch pathways Touch receptors in the skin relay their messages to the cerebral cortex via two specific pathways in the spinal cord: one for well-localized touch sensations; the other more diffuse touch. Hairless skin Merkel's disc Iwell·localized touch) Analysis in the spinal cord Some of the fibres conveying touch in­formation pass into the spinal cord and, without stopping, go straight up to the brain-stem. These fibres deal mainly with sensations of pressure, particularly a specific point of pressure. They there­fore need to send their messages rather directly to the higher centres ofthe brain, so that this well-localized sensation can Brainstenl be assessed without confusion from any analysis in the spinal cord. Other nerve fibres bringing informa­tion of more diffuse touch enter the grey matter of the spinal cord, and there meet a network of cells which perform an initial analysis of their information. This is the same area which receives messages from the pain receptors in the skin and elsewhere. The meeting in the spinal cord of messages dealing with both touch and Spinal cord pain allows for the mixture of these two sensatioris and explains such events as the relief of painful stimuli by rubbing. This spinal cord analysis filters the Seeing is believing, but touching is twice the fun when you come face-to-face with a 'real-live' woolly sheep for the very firsr time (top left). The various touch receptors in our skin aTE very discerning. If a shape is drawn on thE hand,fur instance, we can often tell what ir is without looking (top). This is obvious ly important to someone who is blind, as the ability to define shapes is fundamental to reading Braille (above). We can all get enjoyment from the way " things feel- from the delicious sensation 0.1 i kneading soft, pliable modelling clay (lefr ~ to the decidedly more delicate sensuousnt 5 of soft, tactile material worn next to the ski:. (far left). sensations which are then sent upwards to the brain. The grey matter of the spinal cord here acts as an electronic gate, so that pain information can be suppressed by the advent into the cord of certain types of touch impulse, limiting the amount of trivial information that needs to be transmitted to the higher centres. This division of the touch pathways to the brain into two streams - one of which goes fairly directly up to the brain-stem and the other which is first analysed by the cells of the spinal cord - enables the fine discriminating aspects of touch to be preserved. We can, therefore, estimate accurately the amount of pressure in a touch and its position, but if the pressure is too great or too sharp. the pain ana­lysers become inyalwd through the con­nections in the spinal cord and tell us that the touch is painful as well. The sensory sorting house Whether the tauch sensations from the skin have came by the more direct route or after analysis in the spinal cord, they eventually end in the campact knot of grey matter deep in the centre of the brain, called the thal2mus. The direct toucr. fibres \\'ill have al­ready relayed once in the brain-stem and then will haw crassed a\'er to the other side, streaming ta' the thalamus in a compact bundle. H.e 'Other fibres will have crossed O\'er to the appasite side of the spinal cord afte,' their relay in the grey matter there: SD all 'Our touch sen­sations fram 'One side 'Of the body are ~. analysed by appasite sides 'Of the brain. ~ In the thalamus ~hese pieces of in­j formation from \'2riaus different types of ~ receptor in the ski:cl are assembled and ; co-ordinated. This e::-.ables the brain's if. highest centres i:cl ~l-.e cerebral cortex to put together a picture 'Of the sensations of touch of which \\'e became conscious. The final analYSis The area of the braiL \\'hich enables the complex array 'Of touch sensations entering the neryaus s\'stem to be con­sciously perceiwd is the middle section of the cerebral cortex. Like all other sensory information, touch is analysed by the cortex in a series 'Of steps. each increasing the complexity 'Of the sensory perception. From the thalamus. the raw data is projected to a narr,,\\' strip in the front of the parietal lobes. This primary sensory area of the cortex processes the infarmatian before passing it on to the secandary and tertiary sen­sory areas. In these latter areas the full picture ofthe site. type and significance of the touch sensations \ve feel is produced and correlated along with memories of previous sensatians. as well as sensory stimuli coming via the ears and eyes. The latter co-ordination is achieved easily since the areas for vision and hearing back on to the areas for touch. The touch sensations are also, and very importantly, co-ordinated at this point with the sensations of what position our limbs, joints and digits are in: this is of importance since it enables us to deter­mine an object's size and shape and helps us to distinguish one object from another. Damage to the nervous system at many different levels can alter our ability to feel and notice things that touch our skin. How this affects us depends to a large extent on the exact place in the nervaus system that the damage occurs. Damage to the peripheral neD-es. which may happen in diabetes 'Or in alcoholism, to give twa camman examples, can affect the sense 'Of tauch. However it takes quite extensive damage for the sense of touch to be lost completely or severely diminished. Often people with such disorder'l notice pins and needles in their hands and feet for some time before any alteration in their sense of touch. The ability of the fingers to make fine touch discrimination may be involved, and sufferp~'s may report that it feels as if they have gloves on all the time. Instead of being lost or diminished, the sense of touch can also become distorted as a result of damage to the peripheral nerves, so that a sufferer may say that smooth surfaces feel like sandpaper or warm surfaces feel hot. Much greater distortion of the sense of touch, however, arises from disease in the spinal cord, for example in multiple sclerosis. The cross connections which arise in the spinal cord ifit is diseased or even pressed upon from the outside produce distortions oftouch which can be quite disabling and unpleasant. Apart from noticing a feeling of numbness, the hands may have lost their ability to make properly co-ordinated touch perception, for example in picking the correct coin from a pocket, or the feet may feel as if they are walking on cotton wool instead of firm ground. Similar types of symptoms can arise from damage to the same touch pathways through the brain-stem all the way to the thalamus. Thalamic damage, which happens after strokes, for example, can produce bizarre alterations of touch so that a simple pinprick produces un­pleasant spreading electric shock-like sensations or the gentle stroking of a finger may be felt as an unpleasant burning spreading over the skin. Damage to the parietal lobes of the cerebral cortex, common in strokes and tumours of the brain, may disrupt touch sensations in other ways. If the thalamus is still intact (it is often involved in the disease as well) then the touch will be felt, but the localization of the touch will not be accurate - it may, for example, be felt on the other side of the body. If the parietal lobe is not functioning, the cor­relation of different types of sensation will not occur. For instance, usually, when the hand or skin is drawn upon, a person will not have trouble in distinguishing letters and numbers, but someone with parietal lobe damage will not recognize the shape, although he or she will be aware that a touch has occurred. Taken from The Marshall Cavendish A  to Z GUIDE IN WEEKLY PARTS,  DOCTOR’S ANSWERS: PART 88, TOUCH, Page 2420 to 2423. Back Back to top
https://www.aro-healing.com/wnewsdisp.php?id=2349
isPartOf: CC-MAIN-2020-40 publisher: Common Crawl description: Wide crawl of the web for September 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-59.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.058194
2
{ "en": 0.8830878734588623 }
{ "Content-Length": "214458", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:SFPX2CICPLWY3XX4LO6MD2UES6B6LZMW", "WARC-Concurrent-To": "<urn:uuid:31f640c3-9a29-4686-839c-17ae5f5d7cc3>", "WARC-Date": "2018-09-19T01:01:06", "WARC-IP-Address": "172.217.8.19", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:HRTGKZLCSFJPECFNIZA67NOQPQN65KH4", "WARC-Record-ID": "<urn:uuid:66fb187c-665a-4f19-9c25-650164e9d110>", "WARC-Target-URI": "http://www.andresbonifacio.info/2017/11/open-letter-to-renato-reyes-for.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:1a1c8ca2-743b-412c-a590-f40d128576d3>", "WARC-Truncated": null }
233
Header Ads Open Letter to Renato Reyes for the Garbages Left by Protesters After the ASEAN Rally A concerned netizen posted an Open Letter on social media intended to one of the leaders of the civil society groups, Renato Reyes of Bayan who led the protest rally against the government of Pres. Rody Duterte for the country's hosting of the 50th anniversary of the Association of Southeast Asian Nations (ASEAN). Concerned netizen De Guzman Erap Josef posted some photo evidences on how the protesters left the protest area with more garbageswhich is contrary with their slogan of caring for the Philippines and showing their patriotism. According to the concerned netizen, aside from making some damages and disturbing the streets due to their protest actions, the protesters left some tons of garbage which the government needs to dispose. Renato Reyes is the head of one of the country's largest and well-organized protest group Bayan, which is considered as a prominent figures in various protest actions against any government leader since the Marcos presidency. Here's the Complete Open Letter of a Concerned Netizen: Dear Petmalu Renato, Sasabihin nyo makabayan kayo, dahil mahal nyo ang bayan. Ano 'to? Nanggugulo nanga kayo, nag iwan pa kayo ng basura. Kapwa nyo Pilipino ang pinahihirapan Wag na tayo maglokohan. Here's Some Photos of the Garbage Left by the Protesters: Source: Facebook No comments Powered by Blogger.
http://www.andresbonifacio.info/2017/11/open-letter-to-renato-reyes-for.html
isPartOf: CC-MAIN-2018-39 publisher: Common Crawl description: Wide crawl of the web for September 2018 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-65-123-119.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.059915
27
{ "en": 0.9371021389961244 }
{ "Content-Length": "36208", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VW673VONDJH2MKE3HTCHRVY75NHHBYKC", "WARC-Concurrent-To": "<urn:uuid:1c74c68b-6db3-4ae2-934c-40d8f4490fc7>", "WARC-Date": "2018-04-26T07:26:46", "WARC-IP-Address": "198.49.23.144", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:BXFFFPXQVOABCIKSOJACWQ74PWG6OUIO", "WARC-Record-ID": "<urn:uuid:6bde8116-2d1d-410b-a40f-ec65d836e8d4>", "WARC-Target-URI": "http://www.yellowstonervcabin.com/place-to-go-1/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d5085bc7-50fe-438a-a075-b92b909b7133>", "WARC-Truncated": null }
72
Yellowstone National Park is the first National Park in the U.S. and located primarily in the U.S. state of Wyoming, although it also extends into Montana and Idaho. It is known for its wildlife and its many geothermal features, especially Old Faithful Geyser, one of the most popular features in the park. The top attractions: 1.  Old Faithful Geyser 2. Mammoth Hot Springs Terraces 3.  Grand Canyon of the Yellowstone 4. Wildlife Viewing
http://www.yellowstonervcabin.com/place-to-go-1/
robots: classic hostname: ip-10-146-107-169.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-17 operator: Common Crawl Admin description: Wide crawl of the web for April 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.155044
0
{ "en": 0.9705888032913208 }
{ "Content-Length": "132573", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EL5LCLKCBKV6ZQHWFXJ4U27EBYHRBGWP", "WARC-Concurrent-To": "<urn:uuid:f6eb25a1-f9f4-4c9b-8a50-b48273274ca7>", "WARC-Date": "2019-03-22T12:52:15", "WARC-IP-Address": "192.229.173.169", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:VKPREQ2THKON6XDTXEZQJPGXIEPQAH3B", "WARC-Record-ID": "<urn:uuid:f81bd34b-3374-4f82-b1ee-a90be8096df7>", "WARC-Target-URI": "https://kpel965.com/insurance-task-force-meets-seeking-to-reduce-louisiana-rates/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:08b51f9a-799b-4b06-b50b-021f031d37ea>", "WARC-Truncated": null }
258
An auto insurance rate task force had its first meeting to address the state’s incredibly high insurance rates. The commission, appointed by State Insurance Commissioner Jim Donelon is composed of leaders from multiple industries, as well as state officials, and legislators. River Ridge Representative Kirk Talbot says the task force wants to address the elephant in the room keeping insurance companies away. “They won’t write insurance here if they can’t make money. The damage awards are in a lot of cases double what they are everywhere else, so it costs insurance companies twice as much to do business here.” Louisiana has the highest auto insurance in the nation, while neighboring Mississippi sits at 22nd highest, and Alabama at 30th highest. He says along with looking at Tort Reform, and distracted driving legislation that could help cut costs for insurance companies, they’ll also be addressing a quirk of Louisiana law that leaves the state a notable outlier. “Louisiana is one of the few states where when you get in a car wreck, the jury cannot hear whether you were wearing your seatbelt or not when they are awarding damages.” Efforts to address insurance rates by attacking distracted driving and allowing seatbelt information into court proceedings all crashed and burned during the regular legislative session in spring. Talbot says he’s more optimistic this time do to a rising appreciation from legislators on both sides of the isle about how insurance rates hit the working class, which is least able to afford the thousands of dollars in additional yearly costs associated with insuring in Louisiana.
https://kpel965.com/insurance-task-force-meets-seeking-to-reduce-louisiana-rates/
isPartOf: CC-MAIN-2019-13 publisher: Common Crawl description: Wide crawl of the web for March 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-167-248-25.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.14237
13
{ "en": 0.8870868682861328 }
{ "Content-Length": "3373", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:QB5Z4E4GRT2XSAWRDIW7FJCVAZKQRR5P", "WARC-Concurrent-To": "<urn:uuid:85b91861-9012-49d2-a8e5-a48467eb46a8>", "WARC-Date": "2021-01-20T17:12:55", "WARC-IP-Address": "134.213.70.247", "WARC-Identified-Payload-Type": "application/x-bibtex-text-file", "WARC-Payload-Digest": "sha1:GXZYAP6JSVXLI2C3GF2TGYCIWPHSUHZX", "WARC-Record-ID": "<urn:uuid:f9b86fa4-66a7-450e-bf50-756fc08f0e8d>", "WARC-Target-URI": "https://www.frontiersin.org/articles/10.3389/fphys.2019.00992/bibtex", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2e2d3c81-46dc-4c20-8898-a2015439a86e>", "WARC-Truncated": null }
310
@ARTICLE{10.3389/fphys.2019.00992, AUTHOR={Hwang, Hyun Seok and Baldo, Marcelo P. and Rodriguez, Jose Pindado and Faggioni, Michela and Knollmann, Bjorn C.}, TITLE={Efficacy of Flecainide in Catecholaminergic Polymorphic Ventricular Tachycardia Is Mutation-Independent but Reduced by Calcium Overload}, JOURNAL={Frontiers in Physiology}, VOLUME={10}, PAGES={992}, YEAR={2019}, URL={https://www.frontiersin.org/article/10.3389/fphys.2019.00992}, DOI={10.3389/fphys.2019.00992}, ISSN={1664-042X}, ABSTRACT={BackgroundThe dual Na+ and cardiac Ca2+-release channel inhibitor, Flecainide (FLEC) is effective in patients with catecholaminergic polymorphic ventricular tachycardia (CPVT), a disease caused by mutations in cardiac Ca2+-release channels (RyR2), calsequestrin (Casq2), or calmodulin. FLEC suppresses spontaneous Ca2+ waves in Casq2-knockout (Casq2−/−) cardiomyocytes, a CPVT model. However, a report failed to find FLEC efficacy against Ca2+ waves in another CPVT model, RyR2-R4496C heterozygous mice (RyR2R4496C+/−), raising the possibility that FLEC efficacy may be mutation dependent.ObjectiveTo address this controversy, we compared FLEC in Casq2−/− and RyR2R4496C+/− cardiomyocytes and mice under identical conditions.MethodsAfter 30 min exposure to FLEC (6 μM) or vehicle (VEH), spontaneous Ca2+ waves were quantified during a 40 s pause after 1 Hz pacing train in the presence of isoproterenol (ISO, 1 μM). FLEC efficacy was also tested in vivo using a low dose (LOW: 3 mg/kg ISO + 60 mg/kg caffeine) or a high dose catecholamine challenge (HIGH: 3 mg/kg ISO + 120 mg/kg caffeine).ResultsIn cardiomyocytes, FLEC efficacy was dependent on extracellular [Ca2+]. At 2 mM [Ca2+], only Casq2−/− myocytes exhibited Ca2+ waves, which were strongly suppressed by FLEC. At 3 mM [Ca2+] both groups exhibited Ca2+ waves that were suppressed by FLEC. At 4 mM [Ca2+], FLEC no longer suppressed Ca2+ waves in both groups. Analogous to the results in myocytes, RyR2R4496C+/− mice (n = 12) had significantly lower arrhythmia scores than Casq2−/− mice (n = 9), but the pattern of FLEC efficacy was similar in both groups (i.e., reduced FLEC efficacy after HIGH dose catecholamine challenge).ConclusionFLEC inhibits Ca2+ waves in RyR2R4496C+/− cardiomyocytes, indicating that RyR2 channel block by FLEC is not mutation-specific. However, FLEC efficacy is reduced by Ca2+ overload in vitro or by high dose catecholamine challenge in vivo, which could explain conflicting literature reports.} }
https://www.frontiersin.org/articles/10.3389/fphys.2019.00992/bibtex
isPartOf: CC-MAIN-2021-04 publisher: Common Crawl description: Wide crawl of the web for January 2021 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-35.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.096345
15
{ "en": 0.9460285305976868 }
{ "Content-Length": "42850", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UT2PMEUPXPOVFJDUS347MZSQ3EDWNANF", "WARC-Concurrent-To": "<urn:uuid:caaeaaab-fbcb-417c-8a8d-9a6bbb6cfcd1>", "WARC-Date": "2020-07-07T05:10:51", "WARC-IP-Address": "34.195.25.71", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:NZIDFJQNFYLGOAM5YFRWGW64YVJHQQC7", "WARC-Record-ID": "<urn:uuid:8657e0ed-c972-4546-b4bf-8f30ccfcb1a5>", "WARC-Target-URI": "https://www.hugheshubbard.com/news/solicitor-general-sides-with-priority-creditors-in-recent-amicus-brief", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:27db1d0f-7441-4d5f-8815-a81c32149aaf>", "WARC-Truncated": null }
898
June 2, 2016 - Last summer, the HHR Bankruptcy Report analyzed the Third Circuit’s ruling in Official Committee of Unsecured Creditors v. CIT Group/Business Credit Inc. (In re Jevic Holding Corp.),[1] which approved, as part of the structured dismissal of a chapter 11 proceeding, a settlement agreement that allowed distributions that violated the absolute priority rule.  Following the Third Circuit’s ruling, the aggrieved priority creditors filed a writ of certiorari in the hope that the Supreme Court would address the split between the Courts of Appeals as to whether settlements must follow the absolute priority rule.[2] Now, in response to an invitation from the Supreme Court, the Solicitor General has submitted an amicus brief on behalf of the United States encouraging the Court to grant certiorari and to overturn the Third Circuit’s ruling. The United State government has a particular and somewhat unique interest in having the Supreme Court review the Third Circuit’s decision. Federal taxing authorities (e.g. the IRS) are granted either second priority or eighth priority claims by the Bankruptcy Code depending on whether the tax obligation arose pre or post-petition. Accordingly, the government recognizes a real danger that, as a result of the Third Circuit’s ruling, debtors could collude with junior creditors to “squeeze out” government tax claims with a higher priority. At issue in Jevic was the approval of a settlement agreement between the debtor, the Unsecured Creditors’ Committee and defendants to fraudulent transfer actions, that provided, in part, for (i) distributions to certain administrative and unsecured creditors as part of a structured dismissal of the chapter 11 proceeding, but did not provide for (ii) distributions to the debtor’s former employees who held higher priority claims arising from WARN Act liability. The former employees objected to the approval of the settlement on the ground that a bankruptcy court cannot approve a settlement and related structured dismissal of the case that does not comply with the order of priorities set out in section 507 of the Bankruptcy Code. Relying on the fact that it was highly unlikely that the debtor would confirm a plan of reorganization or that the employees would receive any distribution in a chapter 7 liquidation, the Third Circuit rejected the employees’ argument and held that a chapter 11 proceeding may be resolved, in rare circumstances such as those presented in the Jevic proceeding, through a structured dismissal that deviates from the Bankruptcy Code’s priority scheme. The Solicitor General argued in his amicus brief that the Third Circuit had erred in reaching its holding for a number of reasons. First, the order of priorities established by the bankruptcy code reflects Congress’s detailed balancing of the rights and expectations of various creditor groups, and that by approving a settlement that deviated from this order of priorities, the bankruptcy court was upending “that carefully balanced system.” The Solicitor General noted that this outcome was particularly incongruous when compared to the requirements for chapter 11 plan confirmations and chapter 7 liquidations where priority creditors must be paid first (unless they consent to impairment). Second, the Solicitor General disagreed with the Third Circuit’s reasoning that a deviation from the Bankruptcy Code’s priority scheme was justified by the fact that the employees would not be prejudiced by the settlement because there was no prospect of a chapter 11 plan being confirmed or of a distribution to priority creditors if the case was converted to a chapter 7 liquidation (i.e. the employee creditors would be in the same position whether or not the settlement was approved). The Solicitor General noted that if the case had “simply been dismissed” pursuant to section 1112 of the Code, the employees could have pursued a fraudulent –conveyance action against the settling defendants on a derivative basis as creditors of Jevic. So rather than being outcome neutral, the employee creditors were being directly deprived of a potential source of recovery.  The Solicitor General also argued that granting certiorari was appropriate in this case because of the existing split between the Circuits on this issue, as well as the real and significant impact the ruling could have on the rights of creditors in future proceedings. The Solicitor General’s amicus brief highlights the potentially wide impact of the Third Circuit’s ruling, despite the court’s attempt to limit its holding to cases where “specific and equitable grounds” justify deviation from the priority scheme. It is conceivable that in nearly every case where a debtor is administratively insolvent, a justification could be found for deviating from the absolute priority rule under the Third Circuit’s ruling.  In those circumstances, debtors will be able to apply strong bargaining pressure on priority creditors to accept reduced claim amounts, less the debtor strike a settlement with other junior creditors of the case that cuts out the recalcitrant priority creditor entirely.  Additionally, in light of the Circuit split on the issue, the Third Circuit’s ruling raises forum shopping concerns, as debtors (many of whom are organized under the laws of Delaware) will be more likely to commence proceedings in the Delaware bankruptcy court, if only to ensure themselves the benefit of the debtor-friendly rule adopted by the Third Circuit. [1]         787 F.3d 173 (3rd Cir. .2015). [2]         Compare In re AWECO, Inc 725 F.2d 293 (5th Cir 1984)(finding that a bankruptcy court abuses its discretion in approving a settlement agreement that does not comply with the absolute priority rule); with In re Irdium Operating LlC, 478 F.3d 452 (2d Cir. 2007) (holding that a settlement may deviate from the absolute priority rule in certain circumstances).
https://www.hugheshubbard.com/news/solicitor-general-sides-with-priority-creditors-in-recent-amicus-brief
isPartOf: CC-MAIN-2020-29 publisher: Common Crawl description: Wide crawl of the web for July 2020 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-218.ec2.internal software: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.020899
0
{ "en": 0.9529646039009094 }
{ "Content-Length": "34295", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DUVZZ2HK7AGZXGL6ZWW3LTEGFEJCHSRW", "WARC-Concurrent-To": "<urn:uuid:bb508778-eeba-4a9b-a4f3-30897f56f889>", "WARC-Date": "2018-11-15T14:38:06", "WARC-IP-Address": "66.240.223.130", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:VU274SGIUPTZDFTP6264QQWB46NIGVNU", "WARC-Record-ID": "<urn:uuid:0a510bfd-2500-4c59-8496-0fc88c79bbe5>", "WARC-Target-URI": "http://www.microprojects-vietnam.org/TransportInfrastructureOfVietnam/transport-vietnam-bus", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a234d83a-0fca-456a-8ef1-a6922c536118>", "WARC-Truncated": null }
1,063
Transport Vietnam bus February 17, 2017 Getting around Vietnam on making your way around Vietnam is cheap and easyThe settings of transport in Vietnam are varied. Aside from the typical buses and trains, expats will soon observe that the locals like to travel on two tires, utilizing motorcycles or bikes. The roads in Vietnam’s metropolitan areas are generally congested and crazy. Driving can be stressful and expats should stay away from getting behind the wheel if possible. Roadway traffic accidents are typical in Ho Chi Minh City and Hanoi, and expats must always work out care when working with Vietnam's roads. Public transport in Vietnam Trains and buses in Vietnam is certainly not always comfortable but fares tend to be reasonable. Buses and trains allow it to be simple for individuals travel around the nation. Inter-city buses can be used to travel between significant metropolitan areas in Vietnam. Hoang longer and Mai Linh are a couple of associated with significant coach companies operating long-distance bus solutions in Vietnam. Some inter-city buses in Vietnam come in good shape, and they are air-conditioned, making use of buses for very long journeys is certainly not constantly comfortable. The chairs are made for the smaller individuals of Vietnam, and bigger Westerners frequently complain about the cramped circumstances and decreased knee space. When travelling lengthy distances by bus, expats should you will need to reserve chairs towards middle associated with vehicle. This enables passengers in order to prevent directly seeing the risks taken by the coach drivers and escape the continual sound for the motorist honking the horn at every passing vehicle. If people are not travelling to the ultimate location regarding the inter-city bus route, Vietnamese coach drivers have a practice of losing the traveler down at the most convenient crossroad the coach driver without at coach terminal, like most individuals would expect. Expats going with large bits of luggage or bikes should negotiate an additional charge using coach driver versus during the pass counter. Costs for additional baggage should not be any above 10% associated with solution cost. The frequency of inter-city buses in Vietnam varies in line with the course and the bus business getting used. In the busiest course between Hanoi and Ho Chi Minh City there are around 12 bus services per day. Although trains in Vietnam are a little more high priced to utilize than buses, they have been undoubtedly a far more comfortable way to travel overland through nation. The most important train range in Vietnam, the Reunification Express, runs between Hanoi and Ho Chi Minh City. This alone is a 30-hour train journey, but there are a number of stops as you go along. Additionally there are some shorter paths from Hanoi to your northwest and northeast of the nation. Additionally, it is feasible to travel from Hanoi across the edge to China by train. Whenever scheduling a train in Vietnam it's always best to book a seat in a sleeper carriage due to the fact seating tend to be more comfortable. On trains where you have the alternative, constantly choose a seat in an air-conditioned carriage. The best and most cost-effective method to purchase passes is at the place. On popular channels, but best chairs when you look at the air-conditioned carriages are purchased beforehand by agents and re-sellers. Therefore, when individuals get to the place is informed that seats are offered on, this will be seldom the actual situation. In most instances, unsold tickets can be purchased in the last second from re-sellers loitering within station. The commission on these tickets gets paid off due to the fact train's deviation time draws nearer. Expats should attempt to buy train passes at the least 3 days ahead of time to prevent frustration together with hassle of dealing with representatives and re-sellers. Additionally it is worth remembering that train services can get busier during peak holidays. One common con that expats should become aware of is when personal travel agents or re-sellers during the station make people pay for tickets on an air-conditioned carriage and give them a solution for a chair in a non-air-conditioned or reduced class carriage. The passenger usually won’t realise they've been scammed till these are typically agreeable the train and it's also too late to need compensation. Domestic routes in Vietnam Routes within Vietnam have become inexpensive, particularly when you views just how much time they save. a flight from Hanoi to Ho Chi Minh City takes around a couple of hours. Additionally, there are regular flights to many other major towns in Vietnam, including Da Nang, Hai Phong, Can Tho, Hue and Nha Trang. Domestic airlines feature Vietnam Airlines, Jetstar Pacific, Viet Jet and Air Mekong. Cycling in Vietnam More daring expats might decide to travel through Vietnam by bicycle. In fact, most Vietnamese men and women bypass by cycle it is therefore a great way to meet the locals. Bicycles can be hired cheaply in several locations in Vietnam. Cycling in smaller towns, such as Dalat, Hoi a and Hue is a comparatively pleasant and safe experience. But attempting to cycle anywhere within Ho Chi Minh City or Hanoi is virtually suicidal. Traffic in the significant towns is crazy and road users in many cases are unpredictable which can make cycling aggravating and dangerous, specifically for inexperienced expats. While parking bicycles in smaller cities just isn't issue, in Ho Chi Minh City and Hanoi parking bicycles on sidewalks is not permitted and cyclists are required to pay a small cost to keep their particular cycle in a parking area. Motorcycles in Vietnam Motorbikes are most likely typically the most popular mode of transport among the Vietnamese locals. Hanoi and Ho Chi Minh City tend to be swarmed using them and it is not normal to see an entire family operating about the same motorbike. However, expats should be in possession of a temporary Vietnamese bike licence to be able to employ or function a bike in Vietnam. So that you can get a temporary motorcycle licence, expats will have to convert their worldwide driving licence and also have a legitimate residence license. Greyhound transport bus, Vung Tau, Vietnam Greyhound transport bus, Vung Tau, Vietnam Vietnam Transportation: riding the SAIGON PUBLIC BUS SYSTEM Vietnam Transportation: riding the SAIGON PUBLIC BUS SYSTEM Share this Post
http://www.microprojects-vietnam.org/TransportInfrastructureOfVietnam/transport-vietnam-bus
isPartOf: CC-MAIN-2018-47 publisher: Common Crawl description: Wide crawl of the web for November 2018 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-97-162-208.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.032717
54
{ "en": 0.9641035199165344 }
{ "Content-Length": "107643", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:5ZZNTXGTVPEVXHZG3UDVZCYAAUY36DHL", "WARC-Concurrent-To": "<urn:uuid:fee9f84d-75c7-4bd0-8f44-bbbf0c021cd5>", "WARC-Date": "2018-05-24T16:32:17", "WARC-IP-Address": "104.17.24.105", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:XN2USK7ZD6WEPCCCQNYMZ7GQ5GQRYUP7", "WARC-Record-ID": "<urn:uuid:2deb7c71-8f73-45fd-af87-b75dc235e17b>", "WARC-Target-URI": "http://www.wnd.com/1999/01/5267/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:70993e83-1539-4eb5-8e74-4bcc3cda9197>", "WARC-Truncated": "length" }
1,101
In recent days, many senators have been speaking as if they have the constitutional authority to decide whether or not the House’s impeachment of Bill Clinton will be brought to trial. But a good case can be made that any such senatorial action would violate the terms on which the Constitution establishes the Senate as the court empowered to try impeachments of the president of the United States. The Constitution says explicitly that “When the President of the United States is tried, the Chief Justice shall preside.” (Article I, Section 3) Therefore, when acting as a Court for the impeachment of the President, the Senate acts under the presiding authority of the Chief Justice of the United States. Apart from its power as a Court of impeachments under the presiding jurisdiction of the Chief Justice, the Constitution gives the Senate no other power to pass judgments against the President or impose penalties upon him. This means that there is nobody in the Senate who has the presiding authority to call the Senate to order as a court of presidential impeachment. That authority rests with the chief justice of the United States, Justice William Rehnquist. As the constitutionally designated presiding judge, he is the individual responsible for the conduct of the trial. Since he must be in the chair, no trial can proceed without his cooperation. The Senate has no independent authority to decide when or whether the trial will occur, or how it will be organized. These are decisions that can properly be made only by and with the authority and cooperation of the individual required to conduct the trial, the chief justice. Clearly then, once Chief Justice Rehnquist has been formally notified by the House of the charges against President Clinton, it is for him to take steps to assure that the trial takes place in an orderly and expeditious fashion, which must include making sure that the senators are properly notified and sworn to hear the charges brought by the House of Representatives. Furthermore, as the presiding judge, the chief justice is the proper authority to rule with finality on the admissibility of evidence, witnesses and other procedures and organizational aspects of the trial. Clearly, prudence dictates that he do so with respect for and in consultation with the senators. But the argument that the Senate is the master of its own procedures cannot be easily applied in this situation. The presiding authority of any body usually makes procedural decisions subject to overrule by a majority of the body. But as a matter of fact, a presiding officer can be effectively overruled only if, upon his adamant insistence on any point, he can be removed from his chairmanship. However, when the Senate considers the impeachment of the president, it does not have the power to remove the chief justice. He holds the chair by direct authority of the Constitution. In several initial drafts of the Constitution, the Supreme Court was established as the court of impeachments for federal officials. For reasons outlined by Hamilton in Federalist 65, the Senate ultimately received that role. He asks whether it might “have been an improvement of the plan to have united the Supreme Court with the Senate in the formation of the court of impeachments.” He acknowledges that, “This union would certainly have been attended with several advantages;” but a sense of the disadvantages won out. He then observes that “the benefits of that union will be obtained from making the Chief Justice of the Supreme Court the president of the court of impeachment”. As we observe the present floundering of the Senate’s efforts to compose itself for the trial of the president, it is easy to see what those benefits may be. The trial of the president is not supposed to be a partisan struggle, determined exclusively by political maneuvers, expediency, or corruption. It must be seen to be a fair and orderly process, ultimately policed by the judgments of a guide not subject to immediate political pressures or calculations. As Hamilton notes later in the Federalist papers, (Federalist 78) the Framers took great pains to assure that the members of the Supreme Court would be in this position of independent integrity, the chief justice above all. It makes sense to conclude that this governed their decision to make the chief justice responsible for the conduct of proceedings so necessary and yet so potentially dangerous to the peace, safety and stability of the republic. If the trial is not conducted under the authority of such an independent presiding officer, there may be grave consequences for our constitutional system. In another but similar context, Hamilton points out “the injury to the innocent, from the procrastinated determination of the charges which might be brought against them; the advantage to the guilty, from the opportunities which delay would afford to intrigue and corruption; and in some cases the detriment to the state, from the prolonged inaction of men whose firm and faithful execution of their duty might have exposed them to … persecution.” (Federalist 65) Moreover, the precedent of a trial conducted at the mere discretion of the Senate would open the door to the destruction of the independence of the executive. For example, once the House passed articles of impeachment against a president, the Senate could manipulate the prospect of the delay or indefinite postponement of the trial to coerce his cooperation with their legislative or other agendas. The Framers were particularly wary of this sort of legislative dominance of government at the federal level. I believe they aimed to preserve the constitutional balance by making sure the presidential impeachment trial would be, at least in terms of its procedures, free of the direct corruption of political intrigue. They did so precisely so that the kind of political maneuvering, deal making, and possible intimidation that we are presently witnessing could not prevent a speedy, expeditious and fair trial of articles of impeachment voted by the House. Chief Justice Rehnquist has a weighty and explicitly personal responsibility to preside over the conduct of the trial of the president. The nation depends upon his firmness and discretion, and we ought to insist that his role be respected by the Senate so that the integrity of the constitutional process can be preserved. At this moment, every eye in America should be turned toward Chief Justice Rehnquist to encourage and support his constitutional authority. It is clearly his duty to assure that a trial is speedily convened and properly conducted, so that the nation can anticipate a result that justifies our continued faith in the processes of constitutional self-government. Note: Read our discussion guidelines before commenting.
http://www.wnd.com/1999/01/5267/
robots: classic hostname: ip-10-146-108-157.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2018-22 operator: Common Crawl Admin description: Wide crawl of the web for May 2018 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.02967
2
{ "en": 0.9616394639015198 }
{ "Content-Length": "103828", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3JBY3WQCHXUYIOZNTWPPU33C6E224BUN", "WARC-Concurrent-To": "<urn:uuid:4086cc22-d181-4c5b-898c-c71d83bf1a3a>", "WARC-Date": "2022-05-19T07:57:19", "WARC-IP-Address": "104.197.19.125", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:EUHNJE7DTNHQUCXY2IBBADJJE5ZDMOFL", "WARC-Record-ID": "<urn:uuid:a54cbd4a-f195-48b4-acb0-04d74a95f21c>", "WARC-Target-URI": "https://intpolicydigest.org/attacks-on-saudi-oil-why-didn-t-prices-go-crazy/", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:1fe863c9-be85-41c1-b669-312338999125>", "WARC-Truncated": null }
1,078
Hamad I Mohammed/Reuters World News Attacks on Saudi Oil. Why didn’t Prices go Crazy? Energy experts and scholars like me have long wondered what the impact would be from a major attack on Saudi Arabia’s oil facilities. For decades, the Saudis were the world’s top exporter and swing producer, able to change output to meet fluctuations in market demand. Would an assault on their oil bring panic and an extreme rise in prices? Now there is an answer. The recent drone and missile attacks at Abiqaiq, the Saudi’s largest oil processing center, caused the worst sudden supply disruption in history, knocking out nearly 6 million barrels per day, half of the country’s total production and about 5% of global supply. But not much happened in the aftermath. There’s been renewed rhetorical fire and fury between Iran and the U.S., a plan to deploy U.S. “air and missile defense” troops in Saudi Arabia, and a promised increase in U.S. sanctions. Yet almost no panic in the oil market occurred, no surge in prices and no sign of a stock market collapse. To understand this, one must look at how dramatically the global oil market has shifted in the past decade, particularly the role of the U.S. History not a guide We’ve seen the impact oil shocks can have. The Iranian Revolution of 1978-79 took about 5 million barrels per day or 9% of global supply off the market, at a time when oil demand was rising and the Saudis weren’t able to fill the gap. Prices more than doubled and remained high for over a year, raising inflation and bringing a new era of smaller vehicles, energy conservation, and lower oil consumption. A decade later, when Iraq’s invasion of Kuwait took out exports from both countries, amounting to 4.3 million barrels per day, or 5% of global supply, the price rise was small and brief. The Saudis had more oil on tap and were able to replace the loss. This history helps explain why some observers, in the heat of the moment, thought that the attacks on Saudi facilities at Abqaiq would push prices up 30% or more. World prices did rise to $69 per barrel the day after the attacks but quickly fell back to around $64, where they’d been for much of the summer. The attacks on oil refineries, claimed by Houthi rebels in Yemen but blamed on Iran by the U.S. and Saudi Arabia, have raised tensions in the Persian Gulf. (Mandel Ngan/Pool Photo via AP) Geopolitical tensions certainly didn’t relax. The Trump administration blamed Iran for the attacks and spoke of a possible military strike, despite a claim of responsibility by the Houthis in Yemen. Iran denied responsibility while the Saudi government insisted the country was at fault. Despite these rattling sabers, the markets have remained relatively calm. One reason may be that the Saudis seem able to divert enough oil from other sources to keep exports at pre-attack levels for a week or more. Also, photos of the attacked sites reveal a fairly sophisticated, precision-targeted operation and serious but limited damage. Individual buildings were not destroyed, as shown by images of more than a dozen spheroidal structures in which crude is depressurized and explosive gases are recovered. The Abqaiq processing center removes these gases and toxic hydrogen sulfide from crude oil, making it safe for export. The limited nature of the damage helps explain why, according to updates from the Saudi government in Riyadh, significant volumes could be quickly restored. Though getting back to full production may take more time than the two or three weeks claimed by the Saudis, the notion that the country will desperately struggle to keep up exports and that the oil market will be angst-ridden looks like an exaggeration at best. American powerhouse The new reality of world oil supply that has recently emerged explains why panic remains unlikely with current conditions. And central to this reality is the radically new role played by the U.S., one that will not wither or weaken anytime soon. In just six years, America’s production of crude oil rose so rapidly that it surpassed that of both Russia and Saudi Arabia, increasing from 5.5 million to 12.2 million barrels per day. It is now forecast to reach over 13 million barrels per day in 2020. Adding to these other petroleum liquids, especially those derived from natural gas, the total rises to 18 million barrels per day, a level no country has ever before achieved. There has also been the lifting of a 40-year ban on oil exports, a policy Congress reversed in 2015. As a result, exports went from near-zero to over 3 million barrels per day by mid-2019, surpassing most countries in the OPEC group. A particularly striking number here is that America’s need for imports of crude oil have fallen from 60% to a mere 8% in a single decade. What does this mean for the global market? Two things: that the world has gained a massive new source of supply, while dropping a longtime source of imports. The overall effect has been to keep the market better supplied than in the past. Another effect has been to eliminate worries about the world running out of oil. The drilling technique known as fracking has spread in the U.S., including in North Dakota, leading to a surge in domestic oil and natural gas production. (Geof Wilson/Flickr) Still more, the historical anxiety in the U.S. about “foreign oil” (and overdependence on OPEC) has also been erased. This hasn’t stopped prices from being volatile at times. But it has added a degree of background stability; supply is no longer controlled by autocratic regimes. If the attacks on Abqaiq had occurred 10 years ago, prices would have shot far higher and not fallen back so quickly. Today, there is enough oil sloshing around in the world for the Saudis even to buy some from their neighbor, Iraq, to maintain their exports, with little effect on prices. What’s next? There are no guarantees about the future. If President Trump were to order a military response, and war broke out in the Persian Gulf, serious impacts on the oil market would ensue. And more provocations from Iran are entirely possible. To date, the global oil market has been tested by this growing conflict and shown to be more resilient than in the past. But there are obviously limits to the “game” being played.
https://intpolicydigest.org/attacks-on-saudi-oil-why-didn-t-prices-go-crazy/
isPartOf: CC-MAIN-2022-21 publisher: Common Crawl description: Wide crawl of the web for May 2022 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-67-67-26 software: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.180971
7
{ "en": 0.9247276782989502 }
{ "Content-Length": "33349", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DU4N74ZX77I5EYI56JQSASHSFV2XK7A7", "WARC-Concurrent-To": "<urn:uuid:44733db4-4480-485b-baee-72c0087d4f65>", "WARC-Date": "2017-06-25T22:58:55", "WARC-IP-Address": "54.172.193.148", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:INA23MAELXGI76CQFUAHSWJHBBZYMC4B", "WARC-Record-ID": "<urn:uuid:10e2842a-af50-4bee-8943-9a3519171022>", "WARC-Target-URI": "https://www.factmonster.com/dictionary/metaplasm", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0bb49a1a-bfd6-4003-b61a-0e9bf2cfc43a>", "WARC-Truncated": null }
78
Meaning of metaplasm Pronunciation: (met'u-plaz"um), [key] — n. 1. the nonliving matter or inclusions, as starch or pigments, within a cell. 1. a change in the structure of a word or sentence made by adding, removing, or transposing the sounds or words of which it is composed or the letters that represent them. 2. the formation of oblique cases from a stem other than that of the nominative.
https://www.factmonster.com/dictionary/metaplasm
robots: classic hostname: ip-10-113-152-80.ec2.internal software: Nutch 1.6 (CC) isPartOf: CC-MAIN-2017-26 operator: Common Crawl Admin description: Wide crawl of the web for June 2017 publisher: Common Crawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.927383
126
{ "en": 0.9576569199562072 }
{ "Content-Length": "69581", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BRYOP5RSYJJ4PVUILMRNPEOSMZCYFIIM", "WARC-Concurrent-To": "<urn:uuid:3ac12c67-b7f4-4746-b43a-7a9540cccefe>", "WARC-Date": "2015-10-09T20:32:51", "WARC-IP-Address": "62.140.213.189", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:6R6K7FQXB4KT7MDLE4RC2IQHV3ORS4FU", "WARC-Record-ID": "<urn:uuid:5ea77aa1-121a-4068-9ccc-34b4a03ed3bb>", "WARC-Target-URI": "http://searchenginewatch.com/sew/news/2059327/google-doesnt-have-to-hand-over-search-logs-to-justice-department", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:6c4df5e6-10fd-4933-afe4-2efd1837b91d>", "WARC-Truncated": "length" }
758
Google Doesn't Have To Hand Over Search Logs To Justice Department Catching up on some important news from last week, the judge in the case of the US Department Of Justice versus Google has ruled that Google does NOT have to provide the DOJ with query logs. Google calls it a victory, and I agree. Let's recap: • Last year, the DOJ demanded that Google handover two month's worth of query data, from June 1 through July 31, 2005. That would have been billions of queries in total. Just put them in an "electronic file," Google was told. Then find a terabyte USB key big enough to hold this monstrous text file, so that I guess the DOJ could open it up in WordPad on the special computer used to process Bill Gates's taxes. Maybe that has enough memory to load the file :) • The DOJ backed off the original request, saying it wanted only on week's worth of data. "Only a week" still would have put the number of queries in the billion plus range. • In court last week, the DOJ declared that it now only needed 5,000 random queries in total. Got it? Originally it needed billions of queries and went to court to force Google's hand, then it decides only 5,000 were necessary. The judge decided against giving the DOJ any search data at all. Why? From my reading of the ruling (PDF format), the judge found that the possible concerns over privacy outweighed the concerns that the DOJ needed to have Google's data in addition to data it already obtained from other search engines or could obtain through other options. The judge noted that Google itself warns users that government actions might require it to hand over private data. Still, the judge wrote: The expectation of privacy by some Google users may not be reasonable, but may nonetheless have an appreciable impact on the way in which Google is perceived, and consequently the frequency in which users use Google. Such an expectation does not rise to the level of an absolute privilege, but does indicate that there is a potential burden as to Google's loss of goodwill if Google is forced to disclose search queries to the Government. But the government didn't want private data, right? They only wanted queries, not the other log information that might link the queries personally with anyone. That's not entirely correct. "Private Searches Versus Personally Identifiable Searches" is my past article that explains how all searches are private, at least in the minds of many searching. Moreover, some of these private searches might contain information to somewhat link them back to an individual. True, the searches can't be absolutely, positively identified back to an individual. However, they still remain "private" in nature. The judge clearly was concerned about this, enough so to ultimately ruled against the query log handover: Google does have to handover 50,000 random URLs from its index, which doesn't impact the privacy of anyone. Interestingly, the ruling does put Google in an odd position. Now it has a court backing up the idea that query logs are private. So should it still be publishing query log data through tools like those provided to AdWords advertisers? I showed earlier how I could use that tool to find things queries containing social security numbers. Perhaps the company might find itself the target of a different suit down the line, by someone claiming their privacy was violated through exposure like this. I think that's unlikely, but it's worth noting. Overall, I still am glad to have these types of tools (other search engines offer them as well). I think there's a difference between the government overreaching to ask for billions of queries versus advertisers doing more focused research on searching patterns. And heck, the government could have just used the advertiser tools themselves. For background on the case, see these past articles from us: About the author
http://searchenginewatch.com/sew/news/2059327/google-doesnt-have-to-hand-over-search-logs-to-justice-department
robots: classic hostname: ip-10-137-6-227.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-40 operator: CommonCrawl Admin description: Wide crawl of the web for September 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.049256
11
{ "en": 0.959643542766571 }
{ "Content-Length": "182502", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:P7RJGHE5JNSGHD5PJE22VO2JSUB2LNAO", "WARC-Concurrent-To": "<urn:uuid:5054044e-6c6c-4980-92cf-42f0801a6199>", "WARC-Date": "2019-06-17T15:27:18", "WARC-IP-Address": "104.24.29.57", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DUDT5L6ZCS6QTGVX3GPXQ6MMR5IKPMGG", "WARC-Record-ID": "<urn:uuid:bba8e7ba-a50f-4f2d-a3c0-d7361b366313>", "WARC-Target-URI": "https://lessons.com/ny/freeport/dance-classes/how-to-hiphop-the-mcf-technique", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:6e8f37bb-3ba4-49f6-9372-7e820f630dab>", "WARC-Truncated": null }
354
How To Hiphop: The MCF Technique How To Hiphop: The MCF Technique About this pro I believe anyone can become a great dancer just by being comfortable with their body and also using my technique.  I love expressing myself without having to explain or give reason for what I feel through many words. To be able to move your body in anyway you feel freeing is beautiful  Read more about this pro Freeport, NY 11520 Email verified Phone verified ReviewsWrite a review There are no reviews yet What is your typical process for working with a new student? My process is to get to know the student so they can get comfortable. Find out what they like about the art of dance, then note down some of there favorite songs and start movingour bodirs I've worked in many schools and I am also a dance choreography for an acting program called The possibility project; (am willing to bring resume  How did you get started teaching? I began teaching close family members and then went on to assist my dance teachers at school. The rest is history  What types of students have you worked with? All types ,races and ages, from beginners to advanced. Describe a recent event you are fond of. The Nycgrind is an event hosted by one of my good friends that gather many different artist/ lovers of the performing arts together to celebrate life, showcase our talents and network with others.  Look for a teacher who shows personality and passion with what they do. Someone that doesn't do it for the money rather than truly for the love of sharing a gift why do you teach dance?  What is your goal for teaching me?   Are you patient?  What is one word that describes you? Lessons offered Dance Classes Choreography Classes Contemporary Dance Classes Dance Choreography Classes Hip Hop Dance Classes
https://lessons.com/ny/freeport/dance-classes/how-to-hiphop-the-mcf-technique
isPartOf: CC-MAIN-2019-26 publisher: Common Crawl description: Wide crawl of the web for June 2019 operator: Common Crawl Admin (info@commoncrawl.org) hostname: ip-10-123-210-107.ec2.internal software: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/) robots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons) format: WARC File Format 1.1 conformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/
0.036717
68
{ "en": 0.9806079268455504 }
{ "Content-Length": "85565", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:5MBG2BIUMNNRNZRVD6BPBECZ24N3NC3S", "WARC-Concurrent-To": "<urn:uuid:cabe5371-9d7b-420c-a7ab-9175d2025c42>", "WARC-Date": "2016-07-29T15:59:48", "WARC-IP-Address": "69.60.11.103", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:T4G35KXEKM5YJC2HCVXLOYMF4TQNQKUI", "WARC-Record-ID": "<urn:uuid:709192df-de6d-4aeb-9612-1ee1f19269ee>", "WARC-Target-URI": "http://quemas.mamaslatinas.com/parenting/104049/parents_are_responsible_for_a", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:1949cea0-b5df-4801-bf5d-bc9e77357830>", "WARC-Truncated": null }
825
Do you have any friends or family members whose kids are so spoiled you can't stand them? Spoiled kids are the worst kind of children. You obviously can't say this aloud, but you can't help but wonder, "Why are these damn kids so f*** spoiled?" I blame the parents. Let me quote Nora Ephron and her take on parenting. In one of her essays, she wrote that she came from a generation where mom and dad were simply parents, but this later evolved into a verb, a science called "parenting." Suddenly, one day, there was this thing called parenting. Parenting was fierce. Parenting was a participle, like going and doing and crusading and worrying; it was active and energetic. Parenting meant playing Mozart CDs while you were pregnant, doing without the epidural, and breast-feeding your child until it was old enough to unbutton your blouse. This child-centered rearing seems to be a creation of modern-day American society. It used to be that children would devise ways to entertain themselves and develop without mom and dad hovering over them, and when parents said no, they meant no. I've witnessed a mother telling her daughter, "No. We don't throw the milkshake at mommy's face, because mommy gets wet and it's not nice." Kill me now! Further, many parents really ask nothing from their kids and they do every little single task for them. Kids sit down to eat and ask why there is no silverware on the table, instead of standing up to get it. Kids that don't learn to do any chores grow up to become teenagers that don't know how to operate kitchen appliances, and when they become young adults, they're totally useless handling the simple everyday tasks. Now we see a generation of unemployed college grads moving back home who sit around waiting for mom and dad to feed them and do their laundry, all while the parents are drowning in tuition debt. This is unacceptable. As parents we'll always be there for our kids, but if we raise a useless person, we are doing him more damage than good. A former school principal said, "Today's parents are not just 'helicopter parents', they are a 'jet-powered turbo attack model' trying to clear every obstacle from their children's paths." I believe that as parents we work too hard to help our kids, we are missing the part where we're actually holding them back, the constant monitoring of their every single activity -- is making them less confident -- to do anything on their own. My mom always tells me to ignore my kids when they are misbehaving. She says, "let them cry, let them whine, let them throw a tantrum, eventually they will stop." It's true, we don't have to indulge our kids every time they cry. They have to understand from early on that as much as we adore them, they are not the center of the world, and acting like spoiled brats will get them nothing. Our children will become women and men one day, let's make sure we do our part to bring up a generation of good, hard-working, appreciative, independent and smart adults. Or at least let's try. Image via Thinkstock About the author Read More I have to agree we don't have to give in to our childrens every cry.  I truly believe some parents just don't want to have to deal with their children so they give them what they want or give in to their demands.  I certainly thank God every day my mother raised me to earn what I get and to know that by crying and throwing tantrums will not get you want you want.  This time out thing they use nowadays truly doesn't always work with kids....good luck to those that have tantrum throwing children Unfortunately this happens.  I have a great friend that does that.  Actually, it gets worse, when the children yell at her she apologizes.  She is a great person, and I am no one to jodge, because my kids are not perfect, nor will they ever be, and I am far from being the perfect mother, but I try my best not to spoil them.  And certainly do not tolerate certain behaviors, and I think by now they have to have a clue because I have told them over a million time I am not your maid and we do not have maid services, so if they want certain things they have to work for them/ 1-2 of 2 • Facebook • MamásLatinas • Comment as a Guest you are logged in as (logout) Submitting comment, please wait...
http://quemas.mamaslatinas.com/parenting/104049/parents_are_responsible_for_a
robots: classic hostname: ip-10-185-27-174.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-30 operator: CommonCrawl Admin description: Wide crawl of the web for July 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.054498
14
{ "en": 0.9375929236412048 }
{ "Content-Length": "178494", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RKWGCJOQM43Z6PKNV7OIT3WTBXX2KRKT", "WARC-Concurrent-To": "<urn:uuid:7808c56f-356a-4aa0-9126-924884a53cb8>", "WARC-Date": "2016-02-08T23:18:03", "WARC-IP-Address": "23.23.96.233", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:RFEDY5DXNH4NIVLAWVZGJB4IXMRBIKAY", "WARC-Record-ID": "<urn:uuid:e6333d4a-3f05-4e16-9809-ca34af2c9842>", "WARC-Target-URI": "http://bleacherreport.com/articles/545284-long-days-journey-into-night-the-giants-finally-win-it-all", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d5ffca9b-9c2c-4cf6-9a7d-2c5869e6b2bf>", "WARC-Truncated": "length" }
2,963
Long Day's Journey Into Night: The Giants Finally Win It All Use your ← → (arrow) keys to browse more stories Long Day's Journey Into Night: The Giants Finally Win It All Christian Petersen/Getty Images The Wait Is Over And so it begins for you back in 1962, when you’re ten and a half years old and you have no idea what love is, but you’re starting to get old enough where you want to find out.  There’s a new team in town, the Mets, and you watch them the first few weeks because there’s no way you can root for the Yankees.  The Yankees win all the time, and that’s not the way it is on the south shore of Long Island, where the people you came from don’t win, they just survive, and your old man smokes three packs of Viceroys every day and pounds it into you just how hard life really is, and people who root for the Yankees don’t understand that, can’t possibly grasp the pain of it all, and everybody else just sleeps and eats and copulates until they get old and die. So you watch the Mets for a few weeks but something doesn’t quite feel right, because this is absolutely the worst baseball team of all time, and even though you want to see the underdog win, you just can’t quite go there.  And a month later you have the flu and have to stay home from school and sit in front of your black and white TV, the one with the tubes that Uncle Bill comes to fix every few months, and you just happen to be there, right there, when the San Francisco Giants come back to New York for the first time in four years after migrating west.  And you see him, the Great Man, black Jesus, the one and only Mays, and the fans are screaming because they love him so much and he’s back where he belongs, and he runs impossibly fast, throws impossibly hard and hits the ball out of sight.  The Giants beat the Mets four straight and now you know what love is.  Now you are hooked. So you spend a summer racing to the street when the paperboy comes with Newsday, and you rip it open to read the box score and see if they won and the Great Man hit one out, and the pennant race is a classic and your beloved Jints catch the hated Dodgers on the last day of the season and it goes to a three-game playoff to see who goes on to the Series to play the haughty Yankees.  And you’re sitting there on a dark east coast October night watching on your black and white TV that Uncle Bill just fixed again, and your old man is puffing away on Viceroys, and you marvel, even in black and white, about the way the sun slants across Chavez Ravine way out in California, and that plants a seed in you, a seed that grows and tells you someday you’ve got to feel that sun for yourself, in the golden west.  And so it goes to the ninth inning of the deciding game three, and your Giants are down 4-2, and you’re sobbing because it hurts so bad and there’s nothing your old man can say to make you feel better.  But your boys score four runs in the ninth to win it and go to the Series, and it doesn’t get any better than that, because you’re screaming and rolling around on the living room floor and your old man is laughing so hard he has tears in his eyes, and you laugh, too.  So you get into that first Series, and it takes weeks to conclude because of rainstorms on the west coast, and these are the days when they play the Series during the day, so you bring your little transistor radio to school and you run the wire up through your shirt and lean on your right hand, over your ear, so the teacher can’t see that you’re listening to the game.  But these are the days when baseball rules, so your sixth grade teacher Miss Lotito puts the game up on the speaker on the wall.  Miss Lotito is a hard-ass little Sicilian no more than five feet tall, but she’s got a leather face and a right hand like Rocky Marciano, and you’ve seen her slam the heads of punks into the blackboard and you are scared shitless of her.  But she puts the game on and you hear Chuck Hiller hit the first NL grand slam in Series history and you think you might be in. But then it’s the seventh game and you’re across the street watching it on Jerry Shaver’s black and white TV, and the Great Man hits a two-out double in the ninth to chase Matty Alou to third.  You’re trailing 1-0 and a base hit will win it, because even God can’t throw out Willie Mays trying to score from second.  And then the great McCovey, the Giant your mother loves because of his drawl and he’s so nice, the great McCovey hits a ball about as hard as a man can hit it, but Bobby Richardson catches it and it’s over, and now you’re sobbing again because there’s no tomorrow. But there’s always next year and you’re absolutely convinced they’ll win it then, and in fact your beloved Giants have the best record in baseball for the decade of the ‘60s, but they never do win it all.  They finish second five years in a row, behind either the hated Dodgers or the Cardinals, and you watch the great Koufax, a Brooklyn Jew, and his sidekick the snarling Don Drysdale, a hound of a man from Hades, and you see the hated Dodgers win every game that counts 2-1, and you wonder to yourself:  how does it feel to have pitching THAT good? You spend the rest of the ‘60s having your heart broken every year, because they’re never bad, they’re very, very good, but just never good enough.  You stay up until two in the morning on school nights to listen to games from the west coast, fighting through the static listening to Bob Prince out of Pittsburgh or Harry Carey out of St. Louis, only at night when the skip wave brings the beautiful sound of baseball to you, and even if you can only hear three words an inning through the static, it’s enough.  It’s enough. And the next thing you know, it’s time to leave home, and you take the first plane ride of your life at 18 to go to college in California and follow that dream, and it turns out that the Giants play right up the road in a frozen tomb called Candlestick Park, and now you can go see them anytime.  They get close in 1971 and then the next year you’re in school in England, and you read in the International Herald Tribune that your beloved Giants did the unthinkable, trading black Jesus the great Mays away, and now you wonder if your love will die. But it doesn’t, because you’re back in the Bay Area in 1973 and the Jints make a brief run at it, and you like the way Bobby Bonds lights up a cigarette in the corner of the dugout after he hits one out, and even though black Jesus is gone forever, you know you’re hooked for life.  So you move to LA in 1974 to fight the rock and roll wars, and now you’re surrounded on all sides by Dodger fans, who mock you and laugh at you because every year the Dodgers are winning now, and your team just flat out stinks.  You walk to the end of the hill to take your dog out at night and you look across a valley to where the glow of Chavez Ravine sheds light on the city of angels, and your link to the game is now through the golden voice of the great man, Vin Scully, and even though you hate the Dodgers you just love Vin because he’s the best there ever was (and STILL is, remarkably, all these years later). So you get your head handed to you in the rock and roll wars and you move back to the Bay Area and start over, and man, are those Giants bad.  You go to games at the frozen Candlestick mausoleum that looks and feels like a big cement toilet bowl.  You walk up to the ticket booth on any given night and buy seats behind the Giants dugout, because there are only 5,000 people there on any given night, and you’ve never been so goddam cold in your life in the middle of July, when the fights break out and the beer bottles get thrown and you can smoke dope right out in the open behind the dugout because no one gives a damn. And then the late ‘80s come and Candy Maldonado (Candy mal o nada we called him) slides to make a catch but the ball rolls to the wall and the Cardinals go on to the Series.  And then it’s 1989 and your boys finally make it in for the first time since ‘62, only to lose four straight to the Oakland A’s, and it’s the goddam Dodgers’ fault again because they beat the A’s in 1988 with Hershiser pitching like Koufax used to, and there was no way the A’s, then the best team in baseball, were going to let anyone beat them in ’89 because of it.  The earthquake comes in mid Series to hold things up, but you’re there in Candlestick in the upper deck by the right field foul pole for Game Four when the A’s sweep, and it’s the last time you ever smoke dope at a baseball game because the housewives give you dirty looks and suddenly it’s not cool anymore. And so a few years later the Giants trade for Barry, the son of cigarette- smoking, alcohol-riddled Bobby, and the Giants win 103 games in 1993 but don’t even make the playoffs, and you wonder, how is that even possible?  And you buy a big house on a hill in Oakland where you can look across the Bay and see the gleaming lights of the most beautiful ballpark ever built, Candlestick now just a memory, and you watch almost every game, except on the weekends when you work in the yard with your transistor radio blaring, just like it was 1962 all over again. And now it’s 2002 and the Giants are in the Series once more, and Barry Bonds’ head is the size of a beach ball from all the steroids, but you don’t care, because you have never, ever seen a man hit a baseball like he does, and it doesn’t matter that he’s an asshole because he’s a Giant.  He is one of you, and you love him unconditionally even though he has all the charm of a bridge troll.  And so you’re up 3-2 in games and it’s the seventh inning of Game Six and Jeff Kent knocks in a run to put you up 5-0 and you stand up and shout “It’s Over!”, and for fifteen minutes you actually know what it’s like to be a champion.  Except it isn’t over, and goddam Felix Rodriguez with his straight fastball throws one in the only place you never throw a fastball to a power-hitting left hander, low and in, and the degenerate Scott Spezio hits one out, and the next thing you know the game is lost, and there’s no way they’re going to win Game Seven, and of course they don’t. And then your life falls apart and you leave that house on the hill with the three beautiful children and you drive back home to Long Island in your big black car, because there’s nowhere else to go and you understand that home is that place where, when you absolutely have to go there, they absolutely have to take you in.  Mercifully, your Giants fall into the nether regions for a few years, because now you have more on your mind than the Giants, and you have to extract your head out of your ass before you can pay attention to them again. But, what light at yonder window breaks?  The pain subsides and you get your head out of your ass, and suddenly the Giants look good again.  They can’t hit for shit, but if you close your eyes you can almost channel Koufax again because these guys can really pitch, led by a long-haired doper who looks like he belongs in Little League but blows people away with nasty stuff that has more hair on it than he does on his neo-hippie head. So from afar, you watch them get close in 2009, and when spring comes the next year and they look good, you say “Yeah, I’m down with that,” and you pay 175 bucks to get MLB TV and you can watch anything.  You can watch Kansas City play Seattle if you’re really sick, but all you watch is the Giants.  You watch at least 140 games, and it’s 1962 all over again, because you stay up until 2 AM watching games on the coast, except now you don’t have school in the morning and your 90-year-old mother down the street can’t stop you from pounding that vodka and smoking that weed and crawling up the stairs to go to bed with your heart racing, because every game is 1-0 or 2-1, and now you’re starting to understand how those goddam Dodger fans felt in the ‘60s when they had Koufax and Drysdale, who made every hitter look like he was swinging a piece of brittle uncooked spaghetti instead of a baseball bat. And so the season stretches on and you hope, but there’s this little matter of the San Diego Padres who refuse to fold---until they finally do, losing 10 straight, and on the last day of the season you clinch and you’re in.  Again.  You watch your boys go to Atlanta and beat those tomahawk-chopping hillbillies to send Bobby Cox into retirement.  You watch your boys go to Philly and beat the best team in baseball, the best team with the worst fans who would boo Santa Claus if they had the chance, and now you’re one step away, and you just can’t take it. You wish it were the Yankees instead of the Rangers lying in wait, because you owe those money boys from the Bronx a little payback, but if you can’t have them, then a team that used to be owned by that clown prince George Bush is the next best thing.  And when you can’t watch the Series on your own TV because of a local cable dispute, you watch it on your computer, with one camera angle from the press box, and it’s like watching baseball in 1962 all over again, and it’s priceless. And then the TV comes back on and you’re sitting there with a pipe and some vodka.  Instead of old Miss Lotito you watch the games with another Sicilian, from the wrong side of the tracks in Patchogue, the next town over where your parents grew up.  She can’t remember the names of people she met just yesterday, but she can tell you the entire roster of the ’69 Miracle Mets, because she was there behind the dugout with her Mafioso uncle and his box seats, a 10-year old dancing on the seats in her crushed velour blue and orange Met-colored hot pants, dancing to get on TV.  And now she screams with you every night, and your German Shepherd Otto barks at the big screen because this baseball thing confuses him, and now you’re getting close. And then, it’s over.  Edgar Renteria, the forgotten man who the fans have raked over the coals for his big contract and diminished skills—the same Edgar Renteria who won the World Series for the 1997 Marlins in his rookie year with a line drive to center—comes up in the seventh inning for what likely will turn out to be the last at bat of his career, and he hits another one to center.  But it’s high and deep this time, and you think it will be caught— except that it just keeps going, keeps going, keeps going and finally drops into the first row of seats for a three-run bomb.  And as Edgar rounds the bases the ghosts run with him, the great ones like Mays and McCovey and Cepeda, and the almost forgotten ones like Bolin and LeMaster and Manwaring, and even though there are nine outs left to get, you know it’s over.  And then, suddenly, it is. Sweet Jesus.  Forty-eight years and a couple of weeks after McCovey’s liner finds Richardson’s mitt, and it’s finally over.  Next year has finally come. The band is playing somewhere, and somewhere hearts are light. And somewhere men are laughing, and somewhere children dream; But the greatest joy is by the bay*…the Giants reign supreme.” *  San Francisco Bay, Great South Bay, Bay of Fundy…it’s all the same. The old man told me so very long ago:  All things come to those who wait.  Wish you were here to see and feel this, Dad.  Good night, sweet prince. Follow San Francisco Giants from B/R on Facebook Out of Bounds San Francisco Giants Subscribe Now Thanks for signing up.
http://bleacherreport.com/articles/545284-long-days-journey-into-night-the-giants-finally-win-it-all
robots: classic hostname: ip-10-236-182-209.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2016-07 operator: CommonCrawl Admin description: Wide crawl of the web for February 2016 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.025436
12
{ "en": 0.9080063700675964 }
{ "Content-Length": "6083", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UDZRUSD7LYQWHMC7KAKMUPK4CIVKU3LC", "WARC-Concurrent-To": "<urn:uuid:557731d6-e386-48d7-8d7a-a66f6e285641>", "WARC-Date": "2015-08-01T07:23:44", "WARC-IP-Address": "82.195.75.100", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:Z4WGIKVDZGXXO7V6YK5THVP5IHY3E2QR", "WARC-Record-ID": "<urn:uuid:dd717e5e-b9ac-49c1-94af-9c87df0c11fc>", "WARC-Target-URI": "https://lists.debian.org/debian-legal/2006/12/msg00208.html", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ee688223-1780-4022-8155-f7752e5fbd7f>", "WARC-Truncated": null }
203
Acknowledgment clause in GPL code? I'm curious as to the status of the following code for solving a Rubik's cube: The readme.txt file states This program is released under the GNU General Public License. It may be modified and/or redistributed under the terms of said license. The creator is not responsible for damages occuring because of this program. IT MAY NOT BE REPRODUCED OR MODIFIED so what does that mean? If I grab the code myself and modify it for Debian, I need to explicitly credit myself as an author too? What does "explicit credit" mean, beyond the copyright notice present in the source files? The source files also have a curious format for presenting their GPLness, referring the reader to readme.txt instead of explicitly stating that they are GPLed (although this can probably be modified). It also does not specify a GPL version, nor even includes a copy of the GPL with itself. As I understand it, this means that I can apply any version of the GPL to the code, correct? I take it this package is suitable for Debian, is it not? - Jordi G. H Reply to:
https://lists.debian.org/debian-legal/2006/12/msg00208.html
robots: classic hostname: ip-10-236-191-2.ec2.internal software: Nutch 1.6 (CC)/CC WarcExport 1.0 isPartOf: CC-MAIN-2015-32 operator: CommonCrawl Admin description: Wide crawl of the web for August 2015 publisher: CommonCrawl format: WARC File Format 1.0 conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
0.62758