fasttext_score float32 0.02 1 | id stringlengths 47 47 | language stringclasses 1 value | language_score float32 0.65 1 | text stringlengths 49 665k | url stringlengths 13 2.09k | nemo_id stringlengths 18 18 | is_filter_target bool 1 class | word_filter bool 2 classes | word_filter_metadata dict | bert_filter bool 2 classes | bert_filter_metadata dict | combined_filter bool 2 classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
0.055947 | <urn:uuid:1b81a7cd-5404-4b9f-84e6-49853c385a4b> | en | 0.989423 | Cookies for Oniitan
Cookies for Oniitan
By Laura Schiller
Series: Shugo Chara
Copyright: Peach Pit
Tadase had intented to settle down on the deck chair of his balcony with his math reader and get some studying done on this fine Friday afternoon. After that, he had meant to immerse himself in the latest volume of Detective Conan. He had not planned on unwanted visitors popping up on the balcony, especially not one who could make Tadase's blood boil by the mere mention of his name.
"Tsukiyomi Ikuto!" he snarled, jumping up and scanning the balcony for Kiseki.
The little Shugo Chara leaped out of his master's pocket and pointed an accusing scepter at both Ikuto and Yoru. "How dare you peasants invade out home!"
"Relax, kiddy king." Ikuto held up his arms, cat ears twitching with amusement. "I'm not gonna hurt you. Don't you trust your onii-tan anymore?"
Behind the smirk was a hint of genuine sadness, but Tadase did not notice.
"What do you want?" he asked curtly, folding his arms.
"Who cares what they want?" Kiseki raged. "Let's throw them off the balcony and be done with it!"
"Yeah, yeah, shut up." Yoru waved a dismissive paw. "I'd like to see you try!"
"Yoru." The warning note in Ikuto's voice sent the cat dropping down to the balcony railing. "Don't start anything. Come here."
Muttering under his breath, Yoru crept into Ikuto's shirt pocket and stayed there.
"Now look," said the older boy, with not a hint of irony in his face or voice. "I just wanna talk, okay? I'm tired of things this. I'm especially tired of being shouted at by you every time you see me. I want least try to explain."
"Explain what?" Tadase's voice was bitter. "How you and your sister used me? How you pretended to be my friends just to get information about Shugo Charas? I didn't forget, you know! I waited at that playground for weeks and you never came! Now you come sneaking here again with your cat ears and your arrogance and you think you can fool me again? No way!"
He paused for breath; his voice was getting dangerously wobbly. He couldn't tell if it was from the rare exertion of shouting or from impending tears. He prayed it was not the latter; he would die before crying in front of his former friend.
Ikuto's eyes were softer than his voice as he perched carefully on the balcony rail.
"Keep ranting," he said with a tiny crooked smile. "Just get it all out of your system. I'll listen."
"Oh, shut up."
"Very original response."
"Shut up!"
"Okay, sorry." Ikuto jumped off the balcony rail and sat down on the floor, leaning his head against the rail. "I can't help being sarcastic. You're just so funny when you get mad. Remember that time Utau made fun of your hairstyle? You yelled at her in exactly the same way."
The memory made them both fall silent, thinking of those fleeting afternoons at the playground together. Tall, stern-faced Ikuto taking care of his younger playmates, teaching them grown-up skills like bicycle riding and defending them from bullies. Tadase almost felt as if he were there again. How he had looked up to his strong and protective 'onii-tan', who with his five additional years seemed nearly grown-up.
"I want to tell you what happened that day," Ikuto began. "The first day we...didn't come. We couldn't come. See, that was the day our mother remarried."
He made a face. "Our father had been missing for...years. I don't even remember what year he left. We were living on welfare – you remember how we took you to the Salvation Army shop and you rummaged around like it was a treasure hunt? But it wasn't fun for us. That man...Hoshina, the owner of Easter...was rich and he wanted to marry Mother. And she'd given up on Father coming back anyway. So she thought, might as well. He promised her that her son and daughter would receive an excellent education." His eyes clouded over. "And we did. An education on how to cheat."
Tadase's eyes were wide. There were so many things about Ikuto he had never known. He felt guilty for shouting at him now.
"At the day of the wedding, Hoshina gave us a contract to sign. We thought it was part of the ceremony or something. He gave us a golden fountain pen to sign with and we were so proud. It was like we were grown up. I was twelve and Utau eleven. We had no idea we were signing away our lives to Easter."
"Signing away your - ?"
"Yeah. Since Hoshina was our stepfather and burdened with our living expenses, he decided we should 'earn our keep', as he put it. Everything he spends on us – clothes, food, etcetera – gets added to the dept we have to pay off. Mother never said a word to prevent it. She's just an empty shell now. Utau got pushed into becoming a child star. And because Yoru's a good asset in a fight, I ended up in the department that searches for the Embryo, which is how I became your enemy."
His eyes seemed to focus on a distant spot in the horizon. Then, catching sight of Tadase, they refocused on his face.
"And as to why Utau and I didn't contact you...we moved. Clear to the other side of town. I didn't know how to find the playground again. And our phone and computer use was monitored too. We weren't allowed any contact outside of Easter. But you know what?" With a sudden flash of energy. "If I ever do find the Embryo, I'll never give it to that man, I swear. I'm gonna use it to clear my debt and run away with Utau and Mother. I want to search for Father...if he's even still alive."
"Is..." Tadase hesitated. "Is that why you still go by Tsukiyomi? Because it's your father's name?"
Ikuto nodded. "That's the one thing they couldn't take away from me. That and my violin. That man doesn't even know about it, otherwise he and those other bloodsuckers at Easter would put me on display in a concert hall. Like an exotic animal in a cage. I hate that!"
Tadase's mind whirled. He had no doubt that his friend was telling the truth. Shock, pity, guilt and joy somersaulted around his head – joy, because he realized that Utau and Ikuto had cared about him after all.
In that one word, quietly spoken, all his feelings were contained. He forgave Ikuto, wholeheartedly for disappearing from his life three years ago.
All his former friendship and affection welled up inside him; he didn't realize how his eyes began to swim until Ikuto held out his hands in alarm.
"Oi, Tadase! Don't look at me like that! You're a big kid now, remember? No tears!"
Tadase turned red as a tomato and disappeared through the balcony door. A snorting noise was heard; a few moments later, he came back with a red nose, carrying a tray with two glasses of milk and a plateful of shortbread cookies.
"Who said anything about tears?" He said haughtily. "I was just remembering my duties as a host. And cats like milk, so I thought it would be fitting."
He remembered perfectly well that Ikuto had loved milk as a child, but he wasn't about to admit that fact.
Ikuto's eyes gleamed. "You bet they do. Come on out, Yoru."
Yoru proved the point by breaking into a cheer as he saw the milk. The teenager and the child threw back their heads and laughed together, just like they used to do.
Throughout the afternoon, not wanting to spoil the newfound peace, neither of them mentioned a certain pink-haired girl. That was an argument best left for another day. | https://www.fanfiction.net/s/4346109/1/Cookies-for-Oniitan | dclm-gs1-249930001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.201273 | <urn:uuid:a7880258-aeaa-4518-877b-05ab0597be52> | en | 0.862963 | Scan for .PCH File Extension Errors | What is the .PCH File Extension? | Repair .PCH File Errors
Run a Free Scan to check for PCH related errors.
What is the .PCH File Extension?
.PCH File Extension Description:
Microsoft Visual Studio uses The PCH file extension. Visual Studio contains a set of tools and processes that are used to build programs from source code written in programming languages. It can be used to create GUIs (Graphic User Interfaces), consoles, web sites, Windows Forms tools, web applications and web service functions. The program can support several programming languages such as C, C++, VB.NET, and C#. The program includes a code editor, a debugger, a designer for GUI software, class designer for creating object blueprints, a designer for database structures and a web designer. There are also several add-ons and plug-ins available that can be added to the program to provide additional functions. The program has language specific versions, particularly Microsoft Visual C++.
The Microsoft Visual C++ version of the program is a compiler program for the languages C and C++. Compilers are used to create source code files out of written program script. The program includes all the tools of the generic program, except they are specifically designed for the C and C++ programming language. This version of the program uses the PCH file extension. The file extension .pch is attached to header files. Header files with the .pch file extension are attached to source code files that are compiled by the program. Source code files contain programming scripts, which are used to create processes or objects. Source code files can then be run by a debugger program to check for errors in the script, linked together to form a library, DLL (Dynamic Link Library) or an executable file.
Files with the PCH file extension tell other software development programs what resources the source code file needs. The PCH file extension is used to store descriptions of the process stored in the source code it is attached to. These files are also written in either the C or C++ programming language.
The Pixeur program also uses the PCH file extension. The program is used to check and identify all the colors in a computer screen. The software identifies the Hex, Long, RGB and Color Value of any hue. Pixeur can also store the history of all the colors selected by the user. These colors are stored in files with the PCH file extension. These files are called Pixeur Color History files.
Author: Microsoft Corporation (,Microsoft Visual Studio),, Veign (,Pixeur),
Author URL:,MicrosoftVisualStudio),,,Pixeur),
Related Applications: Microsoft Visual Studio C++, Pixeur
Common Path: N/A
Run a Free Scan to check for PCH related errors & to optimize PC performance.
Do you have errors with .PCH files?
What Causes .PCH files Errors?
.PCH files errors are potential severe Windows file system errors and are caused due to a faulty registry entry that needs to be repaired right away to prevent additional corruption in other applications and/or hardware. Dangers include device damage, blue screen errors and fatal crashes.
Symptoms of .PCH files Errors:
.PCH files errors produce many symptoms, including: computer hangs on start up or shut down, softwares halt, diminished personal computer performance, case speaker beeping, trouble accessing documents, sluggish behaviour and trouble installing software.
Helpful Tools
XoftSpySE Anti-Spyware
Browse File Extensions by Name:
Is your File Extension missing?
Submit File Details Form
What is the .PCH File Extension? | Scan for .PCH File Extension Errors | How to Fix .PCH File Extension Errors | http://errordecoder.com/file-extensions/P/PCH.html | dclm-gs1-250130001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.708487 | <urn:uuid:b6ac2c0c-869a-4243-9056-7327207ade94> | en | 0.925476 | Have you “fallen off the wagon?”
The only time a person EVER “falls off a wagon”
is when there’s a wagon to fall off of;
sound familiar?
when you “fall off the wagon,”
Not fun, and so avoidable.
Ask yourself,
Where am I judging my performance with food?
You see,
How emotional eating is saving your ass.
Or something along those lines.
But here’s my take on it…
we can finally see it for what it is:
What is your “I-can’t-stop-once-I-pop” food?
Sweets drive you crazy?
Can’t have one bite of ice cream without eating the whole pint?
Maybe it’s chips? Peanut Butter? Kentucky Fried Chicken? Feel free to get weird.
And let me tell you a little something about your favorite “addictive” foods.
The only time you will ever feel “out of control” around a specific food, is when you’re trying to control it to begin with.
Somewhere, somehow, you are judging, shaming, or limiting yourself around that food. You are calling it “bad.” You are wishing you didn’t want it. You are worrying you will lose control, gain weight, get caught.
You are handing that food power over you, by fearing it.
If you don’t believe me, try naming one food that “drives you crazy,” that you allow yourself to eat with complete abandon. No shame, no guilt, no fear of losing control. Just letting that food be a part of your life, like it was when you were a kid. Like it’s No. Big. Deal.
I bet you can’t.
The only answer to fear around food, is allowance, more allowance, and deeper still allowance. If you are a veteran of this work, you may not even be conscious of all the ways in which you are still restricting yourself, but let your “lack of control” remind you. Lack of Control = Lack of Allowance = Binge Waiting To Happen.
Lean into your lack of control, and be surprised by the grace that lifts you up.
Why You Can’t End The Diet-Binge Cycle
It’s wanting to control your weight,
that triggers the dieting (in various forms),
that triggers it.
“I’m afraid I’ll gain weight.”
Fear of weight gain controls us.
Get thin or die.
that’s when the cycle begins.
because you believe your survival depends on it.
And then it’s just a matter of time…
before you can’t fight any longer.
because you just need some R.E.L.I.E.F.
The pressure is too much; it’s too heavy to bear.
Emotional Eating is the almost certain outcome of hating your body.
| http://isabelfoxenduke.com/ | dclm-gs1-250260001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.046864 | <urn:uuid:9c19a797-5d78-4562-b22b-f946d2480154> | en | 0.86246 |
The Prefab Messiahs
0 Shouts - 30,956 Scrobbles
The Prefab Messiahs began as a proto-lo-fi post-punk left-field garage pop band associated with the "Wormtown" (Worcester, Massachusetts) punk/arts scene of the early 1980s. Stylistically, their early sounds have been compared with Television Personalities, Swell Maps, Josef K, White Fence, Thee Oh Sees, The Clean, and King Tuff.
Top Songs
Total plays on over the last 6 months
1. Desperately Happy - 3,740 plays
2. The 16th Track - 2,337 plays
3. Beyond All That - 2,419 plays
4. Prefab Sun - 2,023 plays
5. Franz Kafka - 2,023 plays
Show More (5) | http://mp3.com/artist/The%2BPrefab%2BMessiahs/ | dclm-gs1-250360001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.058382 | <urn:uuid:7e6f9417-408c-4fad-a116-8be4c01ab91d> | en | 0.93526 | Follow Slashdot stories on Twitter
Forgot your password?
Comment Re:I still don't get it (Score 1) 218
Nice try, Google. Also, poster fails to realize there's a difference between listening to customers and crowdsourcing, namely, most times, people at least want acknowledgement they've given feedback, and sometimes would like an explanation as to why something works the way it does. It's almost impossible to get it out of Google, but it's possible to get it out of a great majority of companies one does business with.
Comment Re:Ad Hominem (Score 1) 575
What part of the criticism are you skeptical about? There are several assertions made, the main ones for me were: 1. The part about defining slope as "rise over run" is a oversimplification 2. That teaching requires preparation and planning (as opposed to Khan's admitted lack of prep and planning) 3. The part about multiplying negative numbers, and how Khan dealt with it ("...Kind of weird people are nitpicking...") And the big one: 4. The combination of lack of planning, incorrectness, and an lack of attention to details and overall correctness yield a low quality educational experience. Ad Hominem isn't bad because you look at arguments with a skeptical / critical eye, it's bad because you generally ignore or marginalize the content of the argument because of the source of the argument.
Comment Re:additional freedom (Score 1) 369
The GPL is more restrictive from the POV of downstream developers. "Open" licenses (BSD et. al.) are more restrictive from the POV of the code itself, and original authors, as it allows downstream developers to insert arbitrary restrictions (arbitrary depending on license). I, for one, am a fan of requiring derivative improved code to be contributed back to the project, so we don't end up with what Stallman was trying to prevent in the first place: proprietary Xerox printer drivers. (
Comment Re:Oh fucking Christ (Score 2) 315
I believe the AC's point is more speaks to the OP's question of the public souring on Apple.. I, for one, am tired of Apple being held to a higher standard than Amazon, Dell, HP & Sony. The fact that Apple is also the one paying for the independant audit shows that Apple's actuallydoing more than the aformentioned companies as well. Why, therefore, should the company doing the most already face the most criticism? It may just be a new thing for the apple-haters to rail on, methinks. I've seen a lot of rational people come to absolutely ridiculous conclusions on this issue because "Apple makes more profits"
Comment Re:Why are archivists worried? (Score 1) 227
I run the digital preservation efforts at a respected museum of photography and film, yet my comments are my own, not theirs. Frankly your assertion is a bit myopic. Digital media provides a key benefit that mitigates the volatility extensively, namely, mathematically provable exact duplicate copies, something you simple cannot do with film transfers, regardless of quality of your equipment. You think the government settled on microfilm because if the world ends and life re-evolves we can hope they'll read it easier? That's a stretch. Plus, I'll take needing to swap a hard drive for vinegar syndrome (which should be rearing its head in the next decades for all the non-polyester microfilm stock) any day of the week.. Right now, we can do 4K transfers easily (read: at many different labs).. and a feature length film is, oh, lets just call it 15TB for arguments sake.. a big hefty chunk.. in 2011. In the next decade, prices should come down to make this 'affordable' to archives, especially with respect to LTO tape libraries, as they can further help mitigate bit rot (by tape rotation) and obsolescence (Oracles support for "any tape any slot" kind of stuff helps out). With cinema being on the brink of a digital turn, digital will soon become an artifice (replacing the projection print).. if we printed it to film, we'd have quality loss from the originals. Considering we're beginning the transition in the field, it means archives need to start DOING this stuff, to gain competency for when we have no choice but to do it. Will there be missteps? There already have been (ask any museum of reasonable size about laser disc). The big shift for activists is that digital preservation isn't a function of archive management and library science, but of information technology.. will they inform IT WRT requirements? Certainly. But IT folks have been tasked with persisting digital data since approximately day 1 of the profession. There are plenty of nay-sayers, and I feel strongly that said nay-sayers are damaging the ability of institutions to deal with digital, because we WILL have to, so we might as well start now with challenge pieces and advancing standard conservation practices to incorporate digital.
Comment Re:Good (Score 1) 131
I didn't mind this until I started seeing Google Chrome ads with increasing frequency. It's obviously been affective, considering the penetration of Chrome vs. other webkit browsers (of which where are many, most notably Safari). While certainly some of the differences can be attributed to Chrome really nice feature set, I have a terribly hard time believing prime placement on search result listings, google analytics, google mail, etc. played a significant role.
Comment Re:But the IMPORTANT question is... (Score 0) 86
This, in fact, is a way of extending copyright, in the UK. The UK recognizes rote copying of copyrighted works to be copyrighted themselves (see: UK NPG vs. Wikimedia commons a year or two ago). The articles al state that these books are to be used for 'non-commercial' uses only. And 'non-comercial' is becoming a smaller slice every day (publishing it? commercial. Website with ads? commercial). Google doesn't go what's good for the World, Google does what's best for Google.. if they overlap, it's merely coincidental.
Comment Re:Kodak: credit where credit is due (Score 1) 140
George Eastman House can be found at
You can also read an essay by about the Sasson camera and more in the book Camera: A History of Photography from Daguerreotype to Digital (Todd Gustavson)
Disclaimer: I work there, but the book really is good!
-Ryan Donahue
Manager of Information Systems, George Eastman House
Logic doesn't apply to the real world. -- Marvin Minsky | http://slashdot.org/~RPD9803 | dclm-gs1-250450001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.050431 | <urn:uuid:06224fe0-1ea8-485f-8aa8-78643ab10f93> | en | 0.96083 | Does use year really matter?
Discussion in 'Purchasing DVC' started by twotoohappy, Feb 10, 2004.
1. twotoohappy
Aug 30, 2003
Just curious......what makes people choose certain use years? I'm planning on going to WDW for Thanksgiving and April vacation. I have 100 points VWL in the process Feb. use year. What would be a good add on time for my BCV?
thanks for the input:teeth:
2. Avatar
to hide this adverts.
3. jarestel
jarestel DIS Veteran DIS Lifetime Sponsor
Oct 24, 2003
Most people don't choose use years, and I don't think they matter very much at all. The month people think they will vacation most often today will probably change many times over the next 50 years. I wouldn't worry too much over this. Good luck!
4. Happy Birthday Cat
Mar 22, 2001
The only way it could matter is for the cancelation of a trip. If you usually vacation in January (for example) you wouldn't want a use year that begins in February. If you had to cancel a trip for January and had a February use year, you wouldn't have time to either bank or use the points. You have the first 6 months of your use year to bank 100% of your points, so if you can get a use year that starts right before you usually vacation it would be best. It is a small detail but you never know.
5. disneyberry
disneyberry Dreaming of adventure DVC Premium
Apr 10, 2001
what i write below only applies if you're talking about buying another resale (assuming your Feb VWL goes through), and you are dead set on buying a 2nd use year to maximize your vacation flexibility.
then IMO the best bet would be to buy a UY that is 6 or 7 mos away, i.e. Aug or Sep.
my reasoning is that every use year will cover the first 6 - 7 mos very well in terms of if you need to cancel your trip last minute, and want to be able to bank 100% of your points. (remember you must cancel 31 ore more days ahead in order to avoid that dreaded holding acct)
so if you want "coverage" the entire year, then 2 separate UYs that are 6 - 7 mos apart is the way tot go.
i say this because vacation habits are impossible to predict for the next 30+ years.
i do want to warn you that your Feb UY is not very good for Thanksgiving trips, since those trips will always fall towards the end of your UY.
if you only buy a single UY, and really only plan to travel April and Thanksgiving, then an Oct UY would be the best.
hope this doesn't confuse you more. heh. ;) sometimes i type the same reply to UY questions over and over, so i thought i would try sometime different this time.
6. invalid_char
invalid_char Mouseketeer
Apr 28, 2001
I basically agree with what is being suggested here. The best use year is the one that starts immediately prior to when you norrmally go. That will give you the most time to change your mind.
For example, we have an April use year and we usually go in the end of April or beginning of May. Our 100% banking window is from April 1 - September 30. So we can always book our vacation for the following year at the 11 month window (say end of May) and then we have a few months (until September 30th) to change our mind without penalty.
This worked out nicely one year when we decided to forego a trip and sell our points so we could justify an add-on. We knew that we could keep our points on the market for several months, and if we didn't get a reasonable offer, we could still go on the trip. It was nice to not be under any pressure. As was said earlier, ya never know!
Share This Page | http://www.disboards.com/threads/does-use-year-really-matter.507562/ | dclm-gs1-250670001 | false | false | {
"keywords": "mouse"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.020894 | <urn:uuid:ec5f0b2c-9a89-4736-80a7-f743f740e4c7> | en | 0.959874 | Question from pimpsterb
How do I beat Reed?
Hello,my name is brad.i just can not seem to beat reed!!! if anyone could give me some pointers or hints or ideas on how to do this(beat reed),i would very much appreciate it. thank you.
Shotgunnova answered:
Reverend Reed will typically run down to the beached riverboat area for awhile before retreating to the far ridge. Sniping him with the Remington at that point will bait him into returning again. Naturally, using quickdraw at close range can work too, but remember that his horse is armored and can't be killed in the same fashion as the normal types. Speaking of which, this semi-annoying battle can be exacerbated if Reed kills Colton's horse and there aren't any spares around -- save a few ponies from the reverend's cronies during the first half of battle.
0 0
_Cat_Bert_ answered:
Hello, Brad......Keep shooting at him!! And if your horse dies then you killed an innocent animal!! but just keep following him and if you come to a point where you and your horse is dying than go hide behind something and find bottles (but you can also choose from a different horse) Also you can use your quickdraw but dont point it at the horse point it at Reed. (the horse is the BEST! (reeds anyway) and not even the best of weapons can kill it) And remember (you should do this) to do upgrades...!!! :D
0 0
william_x answered:
ok DONT let him hide he will regain health if u let him hide so keep shoot and following him.always shoot him never shoot his horse wont do ya any good allways i suggest the double-barrel shotgun if u have it and the rifle i think they work the best...good luck
0 0
_Cat_Bert_ answered:
Okay fine, you cant hide behind any old rock or whatever. you have to hide where you first started off. there no one will find you.
0 0
thebrutekiller answered:
stick to him with the rifle and when his health is allmost gone use the deul peace makers to finish HIM off
0 0
Answer this Question
More Questions from This Game
Ask a Question
| http://www.gamefaqs.com/ps2/922364-gun/answers/3463-how-do-i-beat-reed | dclm-gs1-250740001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.046244 | <urn:uuid:5511add0-c597-48fd-a578-ae21a06af64b> | en | 0.9791 | The Vampire Diaries Review: Yes, Sire
at . Comments
Elena Gilbert in Pain
What did everyone else think?
Editor Rating: 3.1 / 5.0
• 3.1 / 5.0
• 1
• 2
• 3
• 4
• 5
User Rating:
Rating: 4.6 / 5.0 (1840 Votes)
We need to keep in mind that according to Julie Plec the sire business has nothing to do with Damon or Elena's feelings for each other; it just means they have to navigate a bit to figure it out. And I know we Delena fans have been waiting A VERY LONG TIME FOR THIS, but it wasn't smooth sailing for Stelena, so we shouldn't really expect anything different for Delena. But it did spoil the moment a little bit, but Julie Plec's words after the show give us hope that they'll sort it in the end and we'll see that relationship being explored further, and Stefan and Caroline's eventual admittance that they were flat out wrong about Delena and apologies will have to be forthcoming...
pure RAGE. i was enjoying the episode up until those last few minutes about some nonesense sire-bond between vampires. it gave matt and jeremy more purpose in the show, the link between shane and hayley, the klaus-caroline tandem, and of course delena. then totally shut down by caroline. so random how she put the idea of vampire-sire bond together over drinks with stefan. those two blondes need to stop being so selfish and let elena figure out what she wants. they ruined the whole maturity of the break up as Matt had mentioned from his past review. tsk, tsk TVD writers.
I don't think this demonizes Damon. I don't think he even knows what's going on. He'll be more upset than anyone to find out. When it's said and done, Elena does love him. The bond just makes her less herself and I assume that's why she jumped into bed with him. Haven't read the books, not a � shipper�. I am getting over poor tortured Stephen though. I want to see him be his own man.
Just watched the episode, My Brother's Keeper, and loved it. Finally Jeremy gets a decent storyline, instead of the male Gilbert damsel in distress. I thought this episode was going to obssess over Damon and Elena but wisely it focuses on Elena and Jeremy instead, something that's been missing since the beginning of Season Three. Is Jeremy acting out his own wishes when he tries to kill Elena, or is that just his hunter side?
Caroline is back to being her usual control freak self calling Elena out on Stefan and Damon, and as usual Elena gets the last laugh when Klaus shows up, making Caroline a bit of a hypocrite.
Loved the turning point, and I hadn't expected it to come so quickly. As usual any 'cure' to a curse, like the hybrid curse, usually involves the death of a major character, and in this case in order to 'cure' Elena, Jeremy will have to become a hunter, and probably die in the process. Great acting from Steve McQueen. Is Stefan so obssessed with turning Elena back to human that he'll use anyone he needs to, including the only family Elena has left. Of course Elena isn't going to want to destroy her brother just to turn human again, maybe she can start getting used to life as a vampire now.
Just a thought, with Jeremy a hunter, shouldn't Kol be watching his back from now on.
Matt, you have taken the exact words out of my mouth! I didn't feel like screaming when they slept together, even though I'm a major Delena shipper! I was really upset because Damon has been portrayed yet again as a womanizer and Delena is not actually 'real' anymore. It's not the Delena we knew. And that's the Delena I fell in love with.....
As I predicted, this love triangle is not going to end any time soon. I hated how Elena just jumps straight into bed with Damon after breaking up with Stefan, especially cause she admitted she still loves Stefan, it should've been given some time. Delena definitely has passion but I think it's mainly physical, I don't see them having that love and connection Stelena has.
I LOVED Klaroline in this ep, definitely a potential couple. Also loving Caroline and Stefan's new friendship.
David and sabrina 2014
Turns out "My Brother's Keeper" Turned out to be the WORST EPISODE EVER!!!!!!!! This had a very disappointing Delena scene(which got them all happy and crazy)that shattered the Stelena fans and Stefan's heart into millions of tiny pieces which then turn to ash. This episode has made "The Turning Point" feel like it never happened or existed and it's very depressing. I hope that things will get better later on in the season,have Stelena fans rise again(even though this memory will be left as a scar for them)and just have vampire diaries retelling the wonderful love story since season 1(and they better be right of this episode Delena scene feeling wrong). No matter how tough things get,true love(one that doesn't lie like Elena)will conquer them all(I blame Damon for messing up Elena's mind when deep down she's still a human with a loving heart even if she's a vampire. X(
@DiMyLovely, There is no need to be disappointed. 1st it has been clarified that Damon had no idea about this sire bond when he made love with Elena (and like you said Damon always wanted to be real since season ), 2nd this sire bond twist has been planned since season 3 when Damon mentioned the sire bond as an explination for Tylers obedience to Klaus and when they intentionally made Elena turne by Damon's blood and I'm sure they knew how to make things work out. Plus don't you remember how much things Damon and Elena faced but they always survive it and this one won't be any difference and the beauty of this twist for me is that it will erase any doubt and it will prouve that Elena's love for Damon is 100% real.
Sorry got cut off! Damon is usually quick to pick up on things, so I can't believe he wouldn't figure it out then that whole hot sex scene was really a disgusting rape scene. I don't like it! Damon wanted to keep things real with Elena since season one (remember Georgia, anyone?) I don't believe that Damon would do such a thing. Also, this is really something that cannot be fixed or undone. The writers have to tread carefully now. I have always like how true to character they keep everyone in this series, but this episode ruined that for me. I just hope it doesn't ruin the whole season.
Tags: ,
The Vampire Diaries Season 4 Episode 7 Quotes
| http://www.tvfanatic.com/2012/11/the-vampire-diaries-review-yes-sire/comments-3.html | dclm-gs1-251020001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.15122 | <urn:uuid:f4ff28e3-a072-4f54-ae9b-19cca6fe981d> | en | 0.930342 | Edit Article
This article will teach you how to make your own tinted and flavoured lip balm, which not only gives your lips a hint of colour, but smells great and moisturises your lips. It's extremely easy and completely free.
1. 1
What you need is: A small jar with a lid to store the finished product, a bowl, a spoon, a microwave, petroleum jelly and red food flavouring. Optional: If you want your lip balm to have SPF in it, you can also add some of your suncream in.
2. 2
Take a scoop of petroleum jelly with your spoon and put it in the microwavable bowl.
3. 3
If you want to add some SPF in it, put some of your suncream in the bowl.
4. 4
Put the bowl in the microwave for 1 minute. Keep microwaving the mixture until it turns into a complete liquid.
5. 5
Now add colouring. You are using food colouring instead of lipsticks and eyeshadows which means it doesn't have any harm on your body even if you eat it by mistake since it's 'food' colouring which you basically put inside foods. The more colouring you add, the more redder the lip balm will be. You can also put a few drops of yellow food colouring for an orange tinted lip balm, and of course, you can also use any loose eye-shadow and pigments instead or with the food colouring.
6. 6
Mix the contents of the bowl really well with a spoon, stirring continuously. Keep stirring until the colour combines with the petroleum jelly, and put it in the microwave if you want the lip balm to look flat and new:) Then just simply put in in the refrigerator to keep it cool and hardened.
Now you're done!!!♡
• Try matching the food flavouring with the colour of the lip balm. If your lip balm is bright red, consider using strawberry food colouring. If your lip balm is a very pale colour, use peppermint. If it's a golden-orange-bronze colour, use vanilla or orange flavour.
• If you have an old eyeshadow, blush or lipstick that you really don't want, consider putting the entire thing in. Your lip balm will have fantastic pigmentation.
• You can also label the lip balm if you want, and give it a name, such as "Super Strawberry" or "Light Lemon" or "Pink Peppermint."
• You can add very fine glitter to the lip balm before you put it into the container.
• You can put stickers on the lid of the jar if you want, to decorate it.
• If you have a leftover eos, just scoop that out, add some food coloring, microwave it, scoop it back into the container, and refrigerate it.
• Be careful when you take the bowl out of the microwave! It'll be really hot!
• Don't use essential oil for flavouring. It is not lip safe.
Article Info
Categories: Lip Gloss and Balms
Did this article help you?
Yes No
an Author!
Write an Article | http://www.wikihow.com/Make-Tinted-Lip-Balm | dclm-gs1-251070001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.050057 | <urn:uuid:b593ffea-b89c-49ea-ab0b-ef57905f9f5a> | en | 0.731983 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Tropomyosin 1 (alpha)
Protein TPM1 PDB 1c1g.png
PDB rendering based on 1c1g.
Available structures
PDB Ortholog search: PDBe, RCSB
Symbols TPM1 ; C15orf13; CMD1Y; CMH3; HTM-alpha; LVNC9; TMSA
External IDs OMIM191010 MGI98809 HomoloGene121635 GeneCards: TPM1 Gene
RNA expression pattern
PBB GE TPM1 210986 s at tn.png
PBB GE TPM1 206116 s at tn.png
PBB GE TPM1 210987 x at tn.png
More reference expression data
Species Human Mouse
Entrez 7168 22003
Ensembl ENSG00000140416 ENSMUSG00000032366
UniProt P09493 Q545Y3
RefSeq (mRNA) NM_000366 NM_024427
RefSeq (protein) NP_000357 NP_077745
Location (UCSC) Chr 15:
63.04 – 63.07 Mb
Chr 9:
66.82 – 66.85 Mb
PubMed search [1] [2]
Tropomyosin alpha-1 chain is a protein that in humans is encoded by the TPM1 gene.[1] This gene is a member of the tropomyosin (Tm) family of highly conserved, widely distributed actin-binding proteins involved in the contractile system of striated and smooth muscles and the cytoskeleton of non-muscle cells.
Tm is a 32.7 kDa protein composed of 284 amino acids.[2] Tm is a flexible protein homodimer or heterodimer composed of two alpha-helical chains, which adopt a bent coiled coil conformation to wrap around the seven actin molecules in a functional unit of muscle.[3] It is polymerized end to end along the two grooves of actin filaments and provides stability to the filaments. Human striated muscles express protein from the TPM1 (α-Tm), TPM2 (β-Tm) and TPM3 (γ-Tm) genes, with α-Tm being the predominant isoform in striated muscle. In human cardiac muscle the ratio of α-Tm to β-Tm is roughly 5:1.[4]
Tm functions in association with the troponin complex to regulate the calcium-dependent interaction of actin and myosin during muscle contraction. Tm molecules are arranged head-to-tail along the actin thin filament, and are a key component in cooperative activation of muscle. A three state model has been proposed by McKillop and Geeves,[5] which describes the positions of Tm during a cardiac cycle. The blocked (B) state occurs in diastole when intracellular calcium is low and Tm blocks the myosin binding site on actin. The closed (C) state is when Tm is positioned on the inner groove of actin; in this state myosin is in a "cocked" position where heads are weakly bound and not generating force. The myosin binding (M) state is when Tm is further displaced from actin by myosin crossbridges that are strongly-bound and actively generating force. In addition to actin, Tm binds troponin T (TnT). TnT tethers the region of head-to-tail overlap of subsequent Tm molecules to actin.
Clinical Significance[edit]
Mutations in TPM1 have been associated with hypertrophic cardiomyopathy (HCM) and dilated cardiomyopathy. HCM mutations tend to cluster around the N-terminal region and a primary actin binding region known as period 5.[6]
1. ^ Mogensen J, Kruse TA, Borglum AD (Jun 1999). "Refined localization of the human alpha-tropomyosin gene (TPM1) by genetic mapping". Cytogenet Cell Genet 84 (1-2): 35–6. doi:10.1159/000015207. PMID 10343096.
2. ^ Missing or empty |title= (help)
3. ^ Brown, J. H.; Kim, K. H.; Jun, G; Greenfield, N. J.; Dominguez, R; Volkmann, N; Hitchcock-Degregori, S. E.; Cohen, C (2001). "Deciphering the design of the tropomyosin molecule". Proceedings of the National Academy of Sciences 98 (15): 8496–501. doi:10.1073/pnas.131219198. PMC 37464. PMID 11438684.
4. ^ Yin, Z; Ren, J; Guo, W (2015). "Sarcomeric protein isoform transitions in cardiac muscle: A journey to heart failure". Biochimica et Biophysica Acta (BBA) - Molecular Basis of Disease 1852 (1): 47–52. doi:10.1016/j.bbadis.2014.11.003. PMC 4268308. PMID 25446994.
5. ^ McKillop, D. F.; Geeves, M. A. (1993). "Regulation of the interaction between actin and myosin subfragment 1: Evidence for three states of the thin filament". Biophysical Journal 65 (2): 693–701. doi:10.1016/S0006-3495(93)81110-X. PMC 1225772. PMID 8218897.
6. ^ Tardiff, J. C. (2011). "Thin filament mutations: Developing an integrative approach to a complex disorder". Circulation Research 108 (6): 765–82. doi:10.1161/CIRCRESAHA.110.224170. PMC 3075069. PMID 21415410.
Further reading[edit]
External links[edit]
| https://en.wikipedia.org/wiki/TPM1 | dclm-gs1-251150001 | false | true | {
"keywords": "e protein, c protein"
} | false | null | false |
0.044206 | <urn:uuid:a5550983-0cb1-4fa4-be3e-67d4e4254f0a> | en | 0.976545 | Skip to main content
About your Search
bringg in 87 billion dollars. with a deficit of a trillion plus, you still have a 900 billion dollarr deficit and if you have a trillion dollar deficit. it brings in 8divide million from the rich and you still have 913 billion of red ink . and you can crazy and trash the millionaires and take every red cent they earn . every millionaire will have the entire income confiscated. you trash the institution and confiscate the red cent and you bring in 839 billion. >> steve: you are way short. >> brian: we are short a trillion every year. >> you don't have a taxing problem. this is a spending problem. it is solved by reducing spend reforming entitlements over the long term. taxing the rich will make barely any difference . it is a political slogan. >> steve: right now the president wants to get reelected so he has the key to air force one. >> he thinks that if you tax the rich that brings in votes. >> steve: we are talking about increasing the taxes on the rich. what people forget about. taxes for everyone are scheduled to go up next year. >> yes, they will. >> steve: everybody is going to
you are doing. you bring down unemployment. all right? you bring down the deficit. you're a republic. you're a republic. all right? so you are performing well in your state. shouldn't that be enough, your performance to make romney win the state? >> well, bill, i think it helps but, look, people, you know, endorsements are greatly overrated in politics. >> bill: no, no. you don't have tone doors. why aren't the buckeye state people saying okay, we put a republic in and he is improving the economy. why wouldn't we put another republic in on -- you see? i'm trying to logically think this. >> yeah. well, bill, i think that look, they have gotten to know me over a period of time, you know? and with mitt romney he comes in but he doesn't live here all the time. i'm here all the time. what i think he needs to do frankly he is here all the time. >> bill: he is here today. he was in ohio today. >> yeah, i think they ought to be paying income tax here, you know. but if this was not real close, they both wouldn't be here all the time. and i think what romney needs to do, the question is people | http://archive.org/details/tv?time=20120925-20121003&q=deficit&fq=topic:%22john+mccain%22&fq=topic:%22rasmussen%22&fq=topic:%22john+mccain%22 | dclm-gs1-251380001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.034886 | <urn:uuid:c1f6a611-3439-4e83-a036-84f4555f917c> | en | 0.970818 | President Obama and Jay Leno / Jacquelyn Martin, AP
It may have been The Tonight Show with Jay Leno, but President Obama's interview Tuesday night did cover some serious subjects like terrorism.
The temporary closing of U.S. embassies in the Middle East and Africa is "a reminder that for all the progress we've made -- getting (Osama) bin Laden, putting al-Qaeda between Afghanistan and Pakistan back on its heels -- that this radical, violent extremism is still out there," Obama told Leno at one point. "And we've got to stay on top of it."
Here are some other topics and comments:
The U.S. warnings to overseas travel
The National Security Agency surveillance programs
National Security Agency leaker Edward Snowden
"Well, we don't know yet exactly what he did, other than what he's said on the Internet, and it's important for me not to prejudge something. ... Hopefully, at some point he'll go to trial and he will have a lawyer and due process, and we can make those decisions."
Russia's decision to grant Snowden temporary asylum
"There have been times where they slip back into Cold War thinking and a Cold War mentality. And what I consistently say to them, and what I say to President (Vladimir) Putin, is that's the past and we've got to think about the future, and there's no reason why we shouldn't be able to cooperate more effectively than we do."
Russia's threat to enforce anti-gay laws at the 2014 Winter Olympics in Sochi
"I think Putin and Russia have a big stake in making sure the Olympics work, and I think they understand that for most of the countries that participate in the Olympics, we wouldn't tolerate gays and lesbians being treated differently. They're athletes, they're there to compete."
His new friendship with John McCain
The president's recent lunch with Hillary Rodham Clinton
"We had a great time. She had that post-administration glow ... You know, when folks leave the White House -- two weeks later, they look great."
His remarks on the Trayvon Martin case
"Well, I think all of us were troubled by what happened. And any of us who were parents can imagine the heart ache that those parents went through. ... And what I wanted to try to explain was why this was a particularly sensitive topic for African American families, because a lot of people who have sons know the experience they had of being followed or being viewed suspiciously."
Copyright 2015
Read the original story: Obama on Leno: Terrorist threat 'still out there'
Photo Galleries
Real Deals
Sign up for home delivery today
Most Commented | http://archive.thetowntalk.com/usatoday/article/2626787?odyssey=mod_sectionstories&from=global | dclm-gs1-251410001 | false | false | {
"keywords": "surveillance"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.018476 | <urn:uuid:245830bb-ca5f-48cb-a305-de3bf89c2011> | en | 0.968292 | Symphony: Copland and Barber indifferently delivered
The audience for the opening night of the Houston Symphony’s weekend classical program was, as often is in the fall, thinly moderate in size. But visually it was one of the most interesting in a long while.
On the upper level, where the cheap and deluxe seats meet, there were the teen in suit, open-neck shirt and bright white tennis shoes, the 30s man in blue jeans, long-sleeve work shirt and short-cropped Mohawk, and the 20s guy in dark polo, khaki shorts, white socks and tennies.
True, the majority of the audience was skewed toward older patrons who were more traditionally dressed, but the Houston Symphony doesn’t lack good demographics. It simply lacks enough people in the hall, at least on the opening nights of three-concert series.
The program led by former Houston Symphony associate conductor Carlos Miguel Prieto was also very interesting at the outset. (Given the reactions of the audience, my comments may be a minority report of one.)
Instead of the usual big-orchestra arrangement of Copland’s Appalachian Spring Suite, Prieto employed the original 13-instrument version created for Martha Graham and her dance company. The size was dictated by the small Library of Congress auditorium where the premiere took place but, to my taste, it makes the elegance and spareness of Copland’s simpler music much more compelling.
But the simplicity, let alone familiarity, doesn’t mean conductor and players can be satisfied or complacent. Unfortunately the performance was technically excellent but interpretatively plain.
As in many movements during the evening, Prieto started Appalachian Spring flabbily. Copland’s glorious suggestion of some kind of dawn hung in the air like Houston’s 7 a.m. humidity in the summer. There was no lightness, anticipation or energy in the playing.
At least from the Grand Tier, the balance among instruments was bad. It was an error to take the lid off the concert grand used in the performance. Many times its sound overwhelmed the rest of the ensemble and when it was functioning as a percussion instrument it cut through every sound.
In a program change, violinist Nadja Salerno-Sonnenberg made the evening all-American. She ditched the originally scheduled Four Seasons by Astor Piazzolla when she couldn’t get the music in time to prepare adequately, the symphony reported. So she substituted Barber’s Violin Concerto.
Once a darling of the violin set, she has slipped toward the upper middle of the pack. She still has strong dates like Houston’s but she also plays a lot of part-time and regional orchestras.
Her performance Thursday was not up to star standards. Periodically she showed flashes of technical brilliance and brooding introspection, and her soft playing demonstrated emphatically that, in reality, the orchestra seldom plays very quietly.
A lot of the time, though, her playing was uneven. Tone quality varied greatly (her vibrato in the upper register could sound like that of an aging church choir soprano on the verge of a permanent wobble). Some technically challenging passages were smeared and melodies generally had a self-indulgent character and arc.
Prieto, now head of the Louisiana Philharmonic and a passel of orchestras in Mexico, didn’t seem to have comfortable command of Barber’s music (he was very score-bound). Generally, the interpretation lacked structural clarity and emotional forcefulness.
Copland’s Symphony No. 3 – reusing the popular Fanfare for the Common Man in the last movement – concluded the evening.
Once movements got under way they were sure-footed and often exciting. The second movement Scherzo at times sounded like Shostakovich having a good day, and the fanfare-driven last one was muscular and almost brazen.
But throughout the orchestra played at a level that was a big notch below what it displayed when music director Hans Graf was conducting in September. An early entrance by a first violinist at the start of Symphony No. 3 typified the problems. The playing wasn’t as clear, sharp and unified as it can be.
Categories: Uncategorized
Charles Ward
One Response
1. Philip Short says:
Taking the lid off of the piano does NOT result in a larger sound than usual at all, unless you are sitting behind the instrument, or perhaps suspended in mid-air. It is a much more diffuse sound than when the lid is set at the more typical “full stick” setting, where the sound is focused forward by the lid, and is thus a bigger, more penetrating sound than when the lid is off, by quite a margin. I can’t speak for why it was set this way (probably to allow other musicians to hear the piano on stage, as the Jones stage is a difficult one to hear each other on), but the notorious vagaries of what you hear in different parts of Jones is probably to blame for what you heard, as the balance was perfectly fine where I was sitting downstairs.
As to the orchestra not playing softly enough for the soloist’s quieter playing: I found that Salerno-Sonnenberg’s erratic quality of phrasing also included a tendency to play with virtually NO tone at all, for some effect that is beyond my understanding. The start of the slow movement was perverse in this manner… orchestra can play softly enough to stay under that kind of completely unsupported tone. At other times she would veer in and out of supported tone in a completely random manner. If the orchestra had played to match this wayward style, one might think of someone twiddling with the volume knob on a stereo system. Her absurdly fast tempo in the last movement showed that she was unwilling to actually collaborate with conductor and orchestra at all, as it was a scramble at this unplayable tempo, and no where near the fairly sane one that Barber asks for….it was all a typically “me-me-me” interpretation that sacrificed musical coherence for moments of self-gratification. | http://blog.chron.com/artsinhouston/2007/10/symphony-copland-and-barber-indifferently-delivered/ | dclm-gs1-251540001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.054722 | <urn:uuid:61df318f-f1a7-48dc-8683-9e4644c5eb93> | en | 0.966435 | Starting as a hobby, John Hollinger parlayed his love of sports and analytics into a career in sports analytics, and has had a major influence on basketball analytics. One of his major contributions is the Player Efficiency Rating (PER), which takes many different factors and parlays it into a single number. In the latest BITV episode, John shares his passion for sports analytics and breaks down the difference between perceived performance and measured performance into a new methodology: Game Score.
Follow BI TV on Twitter
Watch the video from your mobile device with Microsoft Tag | http://blogs.msdn.com/b/bi/archive/2011/04/14/espn-s-john-hollinger-applying-sports-analytics-to-business-analytics.aspx | dclm-gs1-251600001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.030684 | <urn:uuid:13a8cdba-fc29-4b23-87aa-c7c3a4652715> | en | 0.990579 | Cash postponed until August 3rd
Aubhav Sinha’s Cash has had a very hard time getting to the silver screen. There have been battles raging behind the scenes and in the courts. Recently it was reported that the title Cash had to be changed to Anubhav Sinha’s Cash because of these problems. Well now it is back to being titled Cash but the opening weekend has had to be pushed back until August 3rd, one week after it was suppose to premiere.
The movie starring Ajay Deagan, Ritesh Deshmukh, Suniel Shetty, Dia Mizra, Esha Deol and Shamita Shetty has been involved in a battle between Anish Ranjan and Sohail Maklai over who had the rights to the film. The dispute has gotten so bad, that they have had to go to the courts to decide.
According to Ranjan and Sinha the reason the film had to be delayed was because Maklai did not provide the court with the necessary papers that the film needs to submit to the censor board. The censor board has passed the film with a U/A and zero cuts, all they were waiting for were the documents needed to issue the certificate. Maklai was instructed to do so by the court but waited until the last minute and so the movie has to wait a week. Ranjan also said that Makali tried to get extort money from them before he would hand over that papers but that they did not cave into his demands. He is furious and adds, “We would rather have the film come a week late and fight it out in the court rather than take something like this lying down.”
They are sure that they will be able to release next week and have decided to increase the number of prints to make sure they make up for some of the losses that they incurred by the delay. “We don’t have a choice but to increase the prints. Thankfully the buzz around the movie is quite strong and hence we are confident that the film would open quite well. Earlier we had 700-800 prints worldwide. Now we will come up with an even higher number. I am actually genuinely feeling sorry for ‘Gandhi My Father’ (another film that comes on 3rd August). I wanted that film to work and I hope it will. The only factor is that earlier it too was the sole major release of the week but now it would have ‘Cash’ for competition,” said Ranjan.
Sinha is upset and sad that all this has happened especially the fact that someone he was working with closely on the movie he now has to face in court. However, he is confident that the film will still do well even with the delayed release. “It is going to be a huge release. I have been told by distributors that they are anticipating a much bigger and better response than ‘Dus’. Also the economics have changed in last two years and the scale and canvas of ‘Cash’ is such that it should rake in good moolah,” said Sinha.
Adding finally that he will look at this delay as a blessing in disguise and will use the time to promote the film so that everyone is talking about it and are eagerly anticipating its release!
It will be interesting to hear Maklai’s side of this story. We will report any new developments, so watch this space for more news! And if you were rushing off to see Cash tonight you will have to wait for movie night next Friday!
45 queries in 0.502 seconds. | http://bollyspice.com/7173/cash-postponed-until-august-3rd | dclm-gs1-251630001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.038628 | <urn:uuid:5794632f-f7dc-43a9-ba1c-8cd18bd173c0> | en | 0.945774 | Download the Latest Issue of ETF Edge from Pro Immediately
Chq logo
Although many associate this metal with the U.S. coinage system, nickel is actually one of the oldest known metals with uses tracing back more than 5,000 years. Today, the vast majority of the world’s supply of nickel comes from only two places: a mine in Ontario, Canada and another one in Siberia, Russia.
Nickel is generally prized for its anti-corrosive properties and for its ferromagnetic characteristics.
In regards to the U.S. five-cent piece, nickel only makes up a quarter of the coin’s composition but is still one of the biggest uses of the metal.
Because of nickel’s industrial uses and its ability to serve as a hedge against the U.S. dollar and inflationary pressures, investing in nickel has grown in popularity over the years. And thanks to the development of the exchange-traded fund industry, investors now have several ways to gain access to this popular industrial commodity. Below, we outline two nickel ETFs and how they will fit your investment objectives.
U.S. Nickel Reverse
Quick Stats
Barclays iPath’s JJN was the first-ever nickel ETN to hit the markets. However, since its debut in 2007, the fund has not been able to attract significant attention as a viable trading and investing instrument. JJN tracks an index that consists of only one futures contract on nickel, currently the Primary Nickel futures contract, traded on the London Metal Exchange. Although the fund may be appealing because of its simplicity, it has not been overly popular yet with investors. It’s also important to note that JJN is structured as an exchange-traded note, meaning investors will be exposed to the potential credit risk of the issuing institution [see also The Ten Commandments of Commodity Investing].
JJN is right for you if: You are an investor seeking to speculate on nickel’s movements through the use of futures contracts.
Pure Beta Nickel ETN (NINI)
Quick Stats
NINI is the only other exchange-traded product available that offers investors exposure to nickel prices through the futures market, but with a slight twist. Unlike JJN, which rolls its holdings on a monthly basis, NINI does not roll exposure on a predetermined schedule; the roll timing is based on a proprietary “pure beta” methodology designed to reduce the impact of contango and backwardation on returns. This is perhaps the fund’s most alluring feature, considering how both of these futures trading nuances can have a devastating impact on bottom-line returns.
NINI is right for you if: You are an investor looking to achieve nickel futures exposure, but want a methodology that helps avoid the adverse effects of contango.
Disclosure: No positions at time of writing.
Popular Articles
Leveraged Commodities Investing
Investing For The Long Term, Are MLPs A Good Investment?
Historically, investors buy Master Limited Partnerships, or MLPs, for their high yields. Oil and...
Short or Inverse Commodities Investing
How Inverse Commodity ETFs Work
Leveraged Commodities Investing
How to Play Gold as a Long-Term Investment Using ETFs
| http://commodityhq.com/investing-ideas/which-nickel-etf-is-right-for-you-jjn-vs-nini/ | dclm-gs1-251710001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.047372 | <urn:uuid:b457ba2c-48c5-4448-854b-e5e1390e7087> | en | 0.95532 | Our Onions, Ourselves
Note: This was when Katie Krauss of the Tor Project interviewed me for the Tor blog. Because so many other pressing things needed to be written about, it didn't make it there, so I got permission to post it here. The original text is below, with no changes. -GB
Griffin Boyce and Paul Syverson, both associated with the Tor Project, wrote an article about the great properties of onions sites--for which Tor sees a bright future: “Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication.” [1]
What lead you to write this article?
My co-author, Paul Syverson, and I had both been working with people and organizations using (or hoping to use) onion sites to quickly deploy websites without needing specialized domains or SSL certificates.
To set up a new domain and certificate for a conventional web site takes days. But a shell script can create a hundred hidden services in a few minutes, and it only costs your time. There are trade-offs with both approaches, and sometimes the best approach is to use both a certificate and an onion site. So we’ve tried to lay out all of the issues around these topics in the paper.
How did you get interested in anonymity software?
After a long illness, I found myself re-evaluating my life and career. I decided that instead of working with clients on commercial websites, I wanted to work on something that truly mattered to me. At that point, I’d had a long history of working as a volunteer on LGBT-related projects, and core tenets of those projects were privacy and the right to free expression. Working more directly on censorship and surveillance seemed like a natural extension of that work.
What are you working on these days?
My main project is Satori, a project to make it easy for censored users to download and verify security software. My second project is Stormy: I’m trying to make secure Tor hidden services achievable for people who aren’t systems administrators. Right now, you need strong technical knowledge to set up an onion site. To make matters worse, much of the technical information is only available in English and German. But once you know what to do, the process is extremely fast and simple. So the goal with Stormy is to break down that understanding barrier and guide users through the process of creating a hidden service that is useful for them.
I’ve also been spending time researching automated document analyses to accurately guess redacted content, with promising results so far. There seem to be few other researchers working on this topic, and it’s a great way to explore machine learning, pattern recognition, and typography. So it’s really fun for me.
What's your advice for people who want to work on freedom-making software?
Find an aspect that is fun for you, that you are passionate about, and just work on it. There are lots of projects that need help and lots of people who are happy to work with volunteers. There are also lots of people who could use help learning how to stay safe online. It’s worthwhile to reach out to local charities full of people who need online privacy as well as software projects.
“Once the project is released, it turns out that your community is much more diverse than you expected. This is obvious with Tor, whose users range from transgender military members to domestic violence survivors to bitcoin cooperatives to famous musicians.”
What are your views on user experience?
I’ve worked extensively with trainers and end-users, and I’m a developer focused on usability, so my views on user experience are pretty well-rounded. I can see the points where it gets frustrating for most users and also see use-cases that aren’t at the forefront of developers’ minds when they create software. When you’re building a piece of software, you might have a certain view of possible users (“user personas”) but typically once the project is released, it turns out that your community is much more diverse than you expected. This is obvious with Tor, whose users are everyone from transgender military members to domestic violence survivors to bitcoin cooperatives to famous musicians. None of these groups were specifically anticipated when the software was created, but all have benefitted in unique ways. It helps a lot to create diverse personas when designing software, but the big message to developers is Be Flexible and consider how existing software can be used in novel ways.
Who are your living information freedom heroes?
Kelley Misata is doing amazing research on privacy that will impact low-income individuals and people in crisis, which I’ve been really excited about. MC McGrath has been working in transparency for a few years and always has great ideas about analyzing datasets. Both are also really friendly and easy-going.
Favorite experience hacking?
██████ back in 1999, I ███████████ ██ ███████ switching office █████ ███ ! ██████ Beggs Telco █████. Later, we ██ ███ graffiti and ██████ ██ ████ Masonic Temple. ████████ ██████. That was pretty much the best. =)
What is the value of research into anonymity technologies? Why go there?
Everyone has the right to speak freely; to assemble peacefully; to protest injustices they see. To have privacy. Working on privacy, and on censorship, goes a long way toward helping people maintain these rights.
Some people care more about surveillance or privacy than censorship, but I see them as related. To censor someone, you must first invade their privacy to find out what they are saying (frequently with surveillance). As someone who likes his privacy, it’s natural for me to dislike surveillance, but I also want to help people speak freely and organize online without fear of arrest.
Fun facts about you?
I love surrealism, video games, and surrealist video games (Jazzpunk, Psychonauts). Sometimes I make art and put it up in public, unsigned.
[1] Sometimes called “hidden services,” or “the dark web.”
I'm looking for a new assistant
This is a paid position, to begin in October 2015. Telecommuting is okay. Must have a high tolerance for puns and memes.
I am seeking a part-time assistant to help me stay organized as the head of an anti-censorship software project. Rather than working for someone and taking on tasks that are unimportant, I'm looking for an assistant to work with me in keeping the project on-track to meet critical deadlines. While the project and field it is in are very high-stress, this position is not. I'm very affable and past contractors and assistants have found me very easy to work with. Because I work with at-risk activists in a politically-sensitive human rights project, sensitivity to confidential matters is of the utmost importance.
As my assistant, here are some things you would definitely have to do:
• Take meeting requests and invitations from specific email inboxes and place them on the calendar
• Flag emails for review
• Remind me of calendar items and ongoing tasks
• Place tasks on the Trello board
• Proofread documents and website content as needed
• Occasionally write emails and short blog posts
• Review and provide feedback on presentation slides
• Be accountable and very reliable in performing these duties with a past track record of reliability.
Because I travel fairly frequently, an assistant may also need to take on these tasks from time to time:
• Turning (scanned) receipts into expense reports in Excel or OpenOffice, including conversion rates
• Travel-related research: lodging, coffee, dance clubs =)
The successful candidate must be willing to learn (and follow) digital security best practices, and sign a non-disclosure agreement.
To apply, please provide a resume and a writing sample (business or persuasive) to Griffin via griffin@cryptolab.net, with [Assistant] in the title. Interest or background in free software, anti-censorship tools, or human rights is a plus.
• Time required: 10 hours a week typically, up to 15 hours near project deadlines
• Compensation: Negotiable, from $20 per hour
• Location: Any
• Employment status: Contractor
• Position Begins: October 2015
Intermittent Fasting
Those of you who keep up with fitness may occasionally come across the term “intermittent fasting.” So what is it?
IF 1: Precise meal scheduling
For some, it makes sense to eat on a very specific schedule, leaving large blocks of time without a meal. 12-20 hours is quite common for this type of intermittent fasting. If one trains every day, this can be an ideal way to trim extra calories without eliminating the nutrients they need for a workout.
Examples: Alice eats all of her meals between 7am and 6pm, leaving a 13-hour window where she is fasting. Bob eats all of his meals between 7am and 1pm, skipping dinner in the process.
IF 2: Day-long fasting
For others, it makes more sense to take an entire day off from eating, resulting in 24-36 hours without a meal. While it seems like a frivolous change, if I were to fast two days per week, I’d reach my goal 4 weeks sooner.
Example: Carol eats dinner at 7pm on Monday and has her next meal at 7am Wednesday morning. This is a 36-hour fast. Dave eats breakfast at 6am Monday and has breakfast at 6am Tuesday -- a 24-hour fast.
Why do people fast this way?
Calorie restriction is implicit in all cases. With IF1, it simply makes a lot of sense for some people to restrict their intake to certain hours to reduce late-night snacking and ‘fourth meal’ shenanigans. Sometimes this can include skipping specific meals of the day.
Wait, is that it?
Calorie restriction is required, but with intermittent fasting it’s only half the story. For IF2, an entire day without eating can reduce one’s weekly calorie intake by quite a lot, leading to an extra half-pound or more lost for each day fasting. Certain groups of people find it easier to stick to, and more of those studied lost weight with intermittent fasting (65% vs 40%). Or as the WSJ says “Eating much less on some days and normally on others is as or more effective than reducing one's calories to between 1,200 and 1,500 calories daily, though continued research is needed, scientists say.” The current thinking is that in addition to helping eliminate the urge to snack, it puts additional stress on the body, causing the dieter to burn additional fat.
My take
Intermittent fasting is as much bro science as it is real science. Like everything in the weight loss space, there’s some amount of gimmick involved. But unlike many methods/products/sekretz promoted, IF is used by a surprisingly large number of people, but not actively monetized. Which makes some amount of sense. After all, it would be hard to write a book about this. “Condense all of your eating into an 8-hour window every day and see increased weight loss if you already have a caloric deficit and exercise regularly.” End of book.
There are strong indicators that it works when used as a supplement to an already-successful diet and fitness routine. But I’d caution against trying to do too much, too different, too quickly. If you’re switching to a ketogenic diet and restricting your calories severely and starting a new exercise plan and taking supplements and intermittent fasting… Not only are you going to crash quickly, but your body will not lose weight as quickly as maintaining a steady pace of smaller changes. Start slowly and add new elements as you progress.
Why you should go to CCC Camp, with Stefan
Stefan, just doing his thing
This summer's hottest conference is CCC camp. Located in an empty field north of Berlin, CCC camp has everything: stern Germans in black leather, expats on acid, Mitch Altman, a cat from a bodega, four hundred liters of grappa, Robot Snowden back for revenge...
The Great Migration
As I migrate old posts to the new blog system, expect thing to break occasionally. | http://cryptic.be/ | dclm-gs1-251780001 | false | true | {
"keywords": "surveillance, candida"
} | false | null | false |
0.030151 | <urn:uuid:8cb2468f-f464-48c9-b170-e8c2c5afa25d> | en | 0.938261 |
That’s the impression got when I was in college.
But you know what’s cool?
The times are starting to change.
1. University incubators and accelerators
ASU SkySongUniversities all over the nation are offering extremely kickass resources to student entrepreneurs, including funding, incubators and accelerators.
Not every university has invested tens of millions of dollars in student entrepreneurship like ASU has…but many universities at least have a business plan competition that includes a nice pile o’ cash as a prize.
Beware, though: universities have essentially 2 reasons for helping out:
1. a genuine sense of helping students pursue entrepreneurship as a career path, and
2. University business consulting.
Universities often offer programs specifically designed to help the surrounding business community. As a student, you’re prime to take advantage of these for your own startup endeavors.
For example, ASU has the Innovation Advancement Program that does business and legal consulting (they charge around $400 for a semester of work; many schools do it for free). The University of Connecticut has the Connecticut Center for Education and Innovation (CCEI)–which does business consulting–and the IP Law Clinic, which offers free patent filing and analysis.
3. Meetup groups.
meetupMeetup.com is a godsend for student entrepreneurs. Meetup is essentially the platform for groups of people united around a common interest to get together and chill / do work.
You know how 98% of people just give you a weird look when you say you want to pursue entrepreneurship? Well, Meetup is a great way to connect with the other 2% of people that get you, man!
It’s amazing to me how few students actually take advantage of Meetup. For example, I help run a Meetup group in Hartford, CT, that hosts monthly coworking. After 10 or so sessions, a university student has only shown up once. Why university students would turn down free pizza, free beer, and the opportunity to meet other entrepreneurs at a coworking event is a topic that must be outside of my expertise, because to me, it makes no friggin sense.
4. Professors who actually care about entrepreneurship.
Not every professor at your school is some old stodgy academic who’s spent the last 30 years complaining about having to teach 6 credit hours this semester instead of 3 and writing academic journal articles that no one will ever read.
At ASU, I met a professor who had made serious cha-ching starting companies, and basically just chilled out and taught classes for the semi-retirement lifestyle (“I have to go to New York this weekend for a board meeting” was one of the most frequent things I heard him say”).
How many kids do you think actually went to his office to ask about starting a company? I don’t know, but I’m guessing it wasn’t more than a few. And like most genuinely helpful people, I sense he would have been willing to help almost anyone that went to his office hours.
How to find professors who actually care about entrepreneurship:
• Go to your school’s management or marketing department (in the School of Business), and ask the dean / someone else who seems like they are in the loop with the department if any professors there have a background in entrepreneurship. (Of course, if the business school has an entrepreneurship department or classes–which ASU did–talk with them).
• If you’re want to do a web startup, do the same thing with your school’s computer science department.
• Be wary of professors who “teach entrepreneurship” but don’t have an actual background in starting companies (some of them just researched entrepreneurship academically; I’ve found those professors often don’t have any practical knowledge about entrepreneurship they could pass on to you).
5. Computer science clubs and classes; and university software development programs.
Looking for a programmer? Don’t pay some shady freelancers on ODesk to program your app…try to get kids from your school’s computer science department to do it instead!
But there’s other ways, too:
If you can find a way to get in on this…I know Arizona State University and the University of Connecticut have it, for example…it’s essentially a goldmine of free (or inexpensive) programmers. For example, UConn only charges around $7,000 for a year of programming to non-students (and I’ve seen this for as low as $1,500 at other universities)…and has even done work for free for student startups.
Did I get you excited? Good.
Do they say “startups have to pay a fee”?
”RC, it almost seems like your advice is too simple…just go talk to people, and they’ll help you out??”
YES, you dolt!!!
Just showing up is 80% of the win!
Here’s an example:
Srinivas RaoYesterday, A-list blogger Srinivas Raofounder of the awesome interview podcast BlogcastFM and the personal development blog The Skool of Life, hosted an office hours session on Spreecast that was advertised to everyone.
Here, Srini engaged one-on-one with attendees, and you could ask him questions and talk with him about basically anything!
I learned 2 things from yesterday’s office hours:
1.) Srinivas is an awesome guy that genuinely cares about his readers, and,
2.) It’s amazing how few people took advantage of this opportunity.
To my utter amazement, there were only about 15 people who logged on to the Spreecast.
Now, that made for an awesome and intimate event…but think of how many people missed the chance to build a cool relationship with a top blogger and the other awesome people who attended the session.
All they had to do was log on to the site! I bet you some of those people who missed the event last night are cold-emailing him pitches for exposure today…an e-mail I’m sure will go straight into the Recycle Bin.
The point is: there’s so much that can be gained from just showing up. And as you beginto develop your startup career and bud as an entrepreneur, never forget the value that comes from persistence and simply being present.
Just show up.
Let me know in the comments below!
0 comments… add one
comments powered by Disqus
Next Post:
Previous Post:
Read previous post:
The Nightmare
3 Surprisingly Simple Steps to Overcoming Fear of Entrepreneurship
| http://decodingstartups.com/blog/2013/04/5-awesome-resources-for-college-entrepreneurs-that-i-wish-i-knew-about-when-i-was-in-college/ | dclm-gs1-251830001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.642882 | <urn:uuid:f74642c9-645c-43c0-8c60-9c617188d5c1> | en | 0.927534 | Bit By A Baccano!. A man in search of the truth behind Baccano! I didn't make the comic, I simply used gimp and paint to edit it and put in pics I took from ..
Bit By A Baccano!
A man in search of the truth behind Baccano! I didn't make the comic, I simply used gimp and paint to edit it and put in pics I took from You need to login to view this link .
• Recommend tagsx
Views: 34853
Favorited: 24
Submitted: 08/15/2013
Share On Facebook
submit to reddit +Favorite Subscribe to contaminatedwin Subscribe to animemanga
Anonymous comments allowed.
User avatar #2 - yusay (08/15/2013) [-]
It's Isaac and Miria.
#4 to #2 - redrock (08/15/2013) [-]
You're thinking of Dullahan-rara
User avatar #7 to #4 - Loppytaffy (08/16/2013) [-]
They debuted in Baccano, and the reason they're in Durarara!! is explained in Baccano.
#12 to #7 - redrock (08/16/2013) [-]
I'm well aware, but apparently no one got the joke.
Think of it this way, how could I possibly mix that up? I wouldn't know their names from DRRR alone and Baccano would be first in in-universe time line as well as real world production date
User avatar #10 to #2 - prondy (08/16/2013) [-]
They were at least hands down the best characters
User avatar #1 - bronybox (08/15/2013) [-]
That's what I love about Baccano! and Durarara!!
The character interaction is just so brilliant and well done, it's essentially stories with absolutely no main characters.
#6 to #1 - anon (08/16/2013) [-]
meh, durarara seemed to me like a story that could've evolved into something action packed and epic, but nope. just large objects being thrown
User avatar #27 to #1 - vicsix (08/16/2013) [-]
I have only seen durarara, but what is with anime and the dumbest ******* names possible? Baccano sounds like bacon from a pig with downs, and durarara sounds like a stuttering pokemon. The worst is bobo bo bo bobo bo or whatever the **** .
User avatar #32 to #27 - yusay (08/16/2013) [-]
Baccano means ruckus in Italian.
User avatar #33 to #32 - vicsix (08/16/2013) [-]
They're japanese though.
User avatar #37 to #36 - vicsix (08/16/2013) [-]
"Baccano! is a Japanese light novel series written by Ryohgo Narita and illustrated by Katsumi Enami."!
******* idiot.
#42 to #37 - anon (08/16/2013) [-]
User avatar #40 to #37 - yusay (08/16/2013) [-]
Italian for "racket" or "ruckus"
If anyone is the idiot here, it's you.
User avatar #43 to #40 - vicsix (08/16/2013) [-]
Oh, jesus if only you would read. I never said it wasn't wrong, I said they are Japanese, the anime and manga are japan based, so I was asking why it was in Italian. Does that help?
#45 to #43 - yusay (08/16/2013) [-]
Don't try to fall back on that. You would be incredibly stupid to try to start an argument about that if you know the anime was about the Italian Mafia. The name makes sense, so arguing on the point that because the author is Japanese it's stupid to have an Italian name is incredibly ******* stupid.
User avatar #46 to #45 - vicsix (08/16/2013) [-]
Did I ever say it didn't mean racket in Italian? No. Did I insult you first? No. You started an argument about something I wasn't even talking about so you could fuel your ego. And I was questioning why Anime has stupid ******* names, and yes, Baccano is still a stupid ******* name, cause shootings aren't just a ruckus, they're ******* loud.
User avatar #47 to #46 - yusay (08/16/2013) [-]
Considering your gross pronunciation of an Italian word, it's pretty obvious you didn't know what it meant when you first commented.
Yes, you did insult me first. If you'd like, I can link to it and quote it for you.
" ******* idiot."
As for the name Baccano, Ruckus is a good name for an upbeat show with the Mafia and Camorristi.
User avatar #48 to #47 - vicsix (08/16/2013) [-]
Really? Condescending reaction pictures aren't insulting? And if you'd be so kind, how do you say baccano?
User avatar #50 to #49 - vicsix (08/16/2013) [-]
Doesn't change my mind on it sounding like bacon from a pig with downs.
User avatar #61 to #46 - bronybox (08/16/2013) [-]
It's called an understatement, it's there for a reason.
#39 to #37 - yusay has deleted their comment [-]
User avatar #60 to #27 - bronybox (08/16/2013) [-]
Durarara!! is the Japanese onomatopoeia for a motorcycle, as in the one Celty rides and the one that acts as an icon throughout the season. The English equivalent would be "drrr!", but because the Japanese language calls for there to be a vowel after every consonant, it becomes "durarara!!"
Baccano means racket in Italian, because the storyline takes place in ******* Italy and has an Italian cast of characters, it's about the Italian Mafia. The name makes perfect sense.
#16 - saturated (08/16/2013) [-]
favorite anime of all time and it was only 13 episodes
favorite anime of all time and it was only 13 episodes
#19 to #16 - anon (08/16/2013) [-]
plus the 3 specials.
#17 to #16 - knowstoomuch (08/16/2013) [-]
Have you SEEEN Mushishi?
User avatar #62 to #17 - saturated (08/16/2013) [-]
I just watched the first episode because of your comment and maybe my hopes were too high for it but I found it bland and boring
#66 to #62 - knowstoomuch (08/17/2013) [-]
#18 to #17 - anon (08/16/2013) [-]
how's this relevant?
#20 to #18 - knowstoomuch (08/16/2013) [-]
It's the greatest anime of all time ever. The only problem is that it ends.
#38 to #20 - yusay (08/16/2013) [-]
Dude, that is just your opinion. Don't parade it around as if it's fact, because that will only generate hate for it.
#26 to #20 - anon (08/16/2013) [-]
that's all up to opinion, and it's still irrelevant to what he posted.
User avatar #44 - rainbowtacos ONLINE (08/16/2013) [-]
I really disliked Baccano, it was just boring and Isaac and Miria couldn't redeem it.
#51 to #44 - anon (08/16/2013) [-]
maybe its because your parents didnt love you. I actually over heard them saying you were an accident
#41 - baconslapped (08/16/2013) [-]
**baconslapped rolled a random image posted in comment #106 at Archie's Grand Scheme! ** I watched the series drunk...don't remember it. Need to rewatch.
User avatar #9 - thechosentroll (08/16/2013) [-]
Reminds me of me when I was trying to figure out if the goat and deer in Nichijou are main characters or not.
User avatar #52 - ButtonFly ONLINE (08/16/2013) [-]
I never heard of Baccano.
What's it about?
#59 to #52 - anon (08/16/2013) [-]
its based around a three way train robbery between 2 rival gangs and another gang of other dudes and then theres 2 comedy characters who makethe anime worth it just for them alone
User avatar #55 to #52 - contaminatedwin [OP](08/16/2013) [-]
It's a japanese anime based in america, about the italian mafia.
User avatar #56 to #55 - ButtonFly ONLINE (08/16/2013) [-]
Huh, interesting.
Well it seems like the majority of the people here like it so I'll give it a shot.
User avatar #57 to #56 - contaminatedwin [OP](08/16/2013) [-]
You're gonna love it!
User avatar #58 to #57 - ButtonFly ONLINE (08/16/2013) [-]
The whole thing's on Hulu and I'm sick today so yeah, I'll get right on it.
User avatar #8 - Loppytaffy (08/16/2013) [-]
I'd like to say Firo.
but then Czes...
User avatar #15 - playercz (08/16/2013) [-]
there are so many main characters that he grew a moustache in the last panel
User avatar #67 - werfgh (02/16/2015) [-]
Czes.. he is in every story , 1711, 1930,31,32
User avatar #53 - tiggerlecunt (08/16/2013) [-]
Ladd Russo Boxing Scene - Baccano! best scene loved this anime
#13 - playercz has deleted their comment [-]
#14 to #13 - playercz has deleted their comment [-]
User avatar #11 - sverresverre ONLINE (08/16/2013) [-]
Sounds like Game of Thrones
Friends (0) | http://funnyjunk.com/channel/animemanga/Bit+By+A+Baccano/LkktGYx/ | dclm-gs1-252060001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.648003 | <urn:uuid:96943326-e9ad-4c37-b898-21f432e40ea5> | en | 0.959594 | Got bread like Quizno’s
Lyric Meaning
Quizno’s is a sandwich shop that has a lot of bread to put their sandwiches on. Bread of course, is another word for money. Remember those weird commercials they used to run with those hamster/cyborg puppets playing instruments?
| http://genius.com/48189/Kanye-west-good-music-bet-cypher/Got-bread-like-quiznos | dclm-gs1-252140001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.01902 | <urn:uuid:cf463308-9a3a-4f29-a96d-1baac8fb5c8b> | en | 0.752299 | Acta Crystallographica Section C
Crystal Structure Communications
Volume 68, Part 9 (September 2012)
metal-organic compounds
sk3444 scheme
Acta Cryst. (2012). C68, m255-m258 [ doi:10.1107/S0108270112033616 ]
[mu]-4,4'-Bipyridine-[kappa]2N:N'-bis[tetraaqua(4,4'-bipyridine-[kappa]N)dimanganese(II)] bis(4-aminobenzoate) bis(perchlorate)-4,4'-bipyridine-water (1/2/4): a supramolecular system constructed by [pi]-[pi] and hydrogen-bond interactions
J. Wang, J. Gao and W. Zhao
Abstract: The title dinuclear manganese compound, [Mn2(C10H8N2)3(H2O)8](C7H6NO2)2(ClO4)2·2C10H8N2·4H2O, (I), has an inversion center located midway between the MnII ions. Each MnII ion has a distorted octahedral coordination environment, defined by two mutually cis N atoms from two different 4,4'-bipyridine (4,4'-bipy) ligands and four O atoms from four water molecules. The asymmetric unit contains cationic [Mn(4,4'-bipy)1.5(H2O)4]2+, one isolated 4,4'-bipy molecule, one 4-aminobenzoate ion, one disordered perchlorate ion and two uncoordinated water molecules. In the dinuclear manganese cationic unit, one 4,4'-bipy acts as a bidentate bridging ligand between two MnII ions, while the other two act only as monodentate terminal ligands, giving rise to a `Z-type' [Mn2(4,4'-bipy)3(H2O)8] host unit. These host units are linked to each other via face-to-face [pi]-[pi] stacking interactions between monodentate terminal 4,4'-bipy ligands, generating a zigzag chain. The corners of these chains, defined by Mn(OH)4 units, are surrounded by the solvent water molecules and the carboxylate O atoms of the 4-aminobenzoate ions, and all of these are connected to each other via strong O-H...O hydrogen-bond interactions, leading to a three-dimensional grid network with a large cavity running along the b axis of the unit cell. The isolated 4,4'-bipy molecules, the 4-aminobenzoate and perchlorate anions and the water molecules are encapsulated in the cavities by numerous hydrogen-bond interactions.
moldisplay filedownload file
MDL mol file (13.8 kbytes)
[ doi:10.1107/S0108270112033616/sk3444Isup3.mol ]
Supplementary material
Where possible, images are represented by thumbnails.
bibliographic record in format
Find reference: Volume Page
Search: From to Advanced search
Copyright © International Union of Crystallography
IUCr Webmaster | http://journals.iucr.org/c/issues/2012/09/00/sk3444/stdsup.html | dclm-gs1-252280001 | false | true | {
"keywords": "t cell, ligand"
} | false | null | false |
0.02435 | <urn:uuid:fa58955f-d5b5-4dd6-92c9-1aeaa9c0ecf9> | en | 0.959957 | Linking Latinas
Venezuela: A transgender candidate’s run for Supreme Court challenges culture of intolerance
By Jennifer Barreto-Leyva
CARACAS -- Venezuela is making history with the very first transgender candidate who has applied to be a member of the Supreme Court.
I wanted to let Tamara tell her story in her own words, and let the world know what it's like to be in her shoes with her expectations, dreams and perspectives when it comes to intolerance found in Venezuela and the prospect of being a part of this country's history.
So Tamara, for all those who don´t know your story, can you please introduce yourself and tell us about yourself?
Well, I am a lawyer and a graduate of one of the most prestigious universities in Venezuela, Andres Bello Catholic University. I also graduated with high honors and received my doctorate in law from University Paris 2 in France.
I am a law professor and have been teaching undergraduate, postgraduate and doctorate studies at the same Catholic University since 1982, and at the University of Central Venezuela since 1986.
I also practice law and have worked both in the public and private sectors. I am a human rights activist fighting intolerance and discrimination in many fields, especially towards women, refugees, persons living with HIV and the LGBT community.
I identify myself as a transsexual woman, as a lesbian woman and as a feminist woman, as well as, a base activist. All these descriptions are strong political categories.
I have had a gender conflict since I was a child, but social and family pressures prevented me from assuming my true identity. At one time, I was married to a woman and had two children. Unfortunately, I barely get to see my children because they are pursuing their college education.
I eventually divorced and transitioned into who I am today. I am happily remarried to a woman, and am very proud being a part of the only legally married lesbian couple in Venezuela.
Tamara, what is the best way to deal with intolerance?
Intolerance must be addressed with tolerance, though it is, in many ways, difficult to be tolerant of intolerants and fundamentalists.
I feel, however, that once you make public your identity and your sexual orientation, you become more and more admired. Many people, who never before realized that discrimination actually exists for the reasons of sexual orientation and gender identity, begin to feel empathy.
This is especially true when they realize that they can also be subjected to discrimination themselves. Anyone and everyone is member of a certain minority and can feel discrimination based on these grounds, more or less.
Discrimination exists. Thus, alliances and information are the best allies to our causes.
How has it been for you to live in such an intolerant country as Venezuela?
Venezuela is an intolerant country in many respects. But at this moment, political intolerance is much more heightened here than in any other country.
When the moment comes, you will see how this very politically divided society illustrates their intolerance of those who do not conform to their sexual orientation and gender identity.
For example, it is often a fact that when a member of one of the two political factions wants to insult the other, he uses pejorative words relating to gender identity or expression and sexual orientation.
In fact, the people of one faction consider being lesbian, gay, transsexual, transgender or intersex, to be a condition exclusively derived from the other faction's political ideas. This could be very funny if this is how it worked, if it were not for insulting personal integrity and putting the lives of LGBT people in danger.
How long have you been practicing law? How come you came up with the idea of proposing yourself to be a judge for the Venezuelan Supreme Court?
I've been continuously practicing law and teaching for more than 28 years, after my return from France in 1982. Being a very well-known lawyer, law professor, and having the qualifications far above the requirements established in the Constitution and by law to become a judge of the Venezuelan Supreme Court, I decided I met the criteria and conditions to propose myself for this position.
But, at the same time, my candidature has a different meaning. It pretty much has the same symbolic connotation that the first African-American judge elected to the Supreme Court in the USA had.
As an activist, I know that individual actions may have a collective impact. And this is one of those cases. The subject of LGBT rights, and in particularly, the intolerance by the current National Assembly (totally dominated by pro-Chavez partisans) that have blocked each and every initiative for equal rights; as well as, the intolerance of the same Supreme Court to which I am proposing myself, which has neglected to even admit my action for constitutional recognition and protection of my psycho-physical-social identity for more than six years and a half, are all factors in my submitting my candidacy.
Thus, my candidature has two meanings: I have all the qualifications to be a judge, and at the same time, it serves as a barometer for measuring the intolerance and lack of recognition of human rights of the current government, National Assembly and judicial power.
This is particularly important because in most of the countries of Latin America there have been improvements and important legal advancements in this field, in such countries as in Mexico, Argentina, Uruguay, Colombia, Bolivia, Ecuador, El Salvador, Panama, Nicaragua, among others.
Tell us about the process to apply to the Supreme Court. What went through your heart and mind that particular day?
I think that one of the more important reflection points was the moment of the personal interview. They called me by a male name, and I did not react. They called again, and I told them: 'I think you are calling me, but by a name that is not mine, so, either you call me by my name or let me go and tell the public the kind of discrimination you are engaging in.
Since then, I just do not respond until they use my name.
What kind of feedback have you received from the people around you at the Supreme Court?
In general it is very positive, although some people working for the government are very afraid to give an opinion. These are the consequences of political persecution.
But I say, and this is my slogan for the campaign: 'Tamara Adrian is not fourth or fifth, she is always first.' The meaning of this slogan may be difficult to understand for people living in other countries, but it refers to the current government saying that they are representing the Fifth Republic, as opposed to the previous 40 years of democracy before 1998 when Chavez won the elections.
Thus, it means that I do not identify myself with Chavez nor with the previous presidents, and instead, I try to be the very best in everything I do.
When is the deadline for Supreme Court to deliberate if they accept you or not? What is the process like?
By the week ending November 20.
Let´s imagine both circumstances. Scenario number one: You´re rejected for this position, what will you do?
If the people elected are less qualified than me, this will be the actual proof of discrimination for gender identity. This is, in itself, a triumph for the LGBT cause.
Tamara Orden LM Olaso 9.jpg
Case scenario number two: They take you as a Judge on the Supreme Court, now what?
If this happens, I think that the Supreme Court will have an independent member, not someone who will submit to pressures from the government.
Did you do this just to be a rebel, to prove something or with the actual belief that you can make deep changes in the Venezuelan justice system?
No, as I told you, I have all the qualifications. And if this were a country in which qualifications prevailed and discrimination was non-existant, I would certainly be elected.
As a lawyer, in your opinion what is the biggest failure in the Venezuelan justice system?
It is a lack of stable appointments among the judges. Almost 90 percent of all the judges are "provisional," selected and appointed without any public evaluation. They are removed at the discretion of higher authorities when their judgments don't please certain people.
With all honesty Tamara, do you think Venezuela will change the intolerance culture in all matters some day?
Every country is able to do so. See what happened in the USA or in South Africa in a very short time after segregation was abolished? Or with women's equality fight?
Yet this means that Venezuela would have to have a political commitment to achieve this, and have actual public policies to fight against discrimination. For the time being, it seems to be quite difficult.
Right now you still have your male name, why?
I have a male's name in my papers, but as you know, one of the international standards for protection of human rights of trans and intersex people is to exercise the right to disregard this name. This is one of the international fights, and it has been achieved in many countries.
How come congressman and congresswomen haven´t made any outreach efforts towards the transgender community?
Most of them are not conscience at all that racism is very close to homophobia, lesbophobia and transphobia. They fill their mouths with big words for integration and equality and, at the same time, they act as the more recalcitrant religious fundamentalists.
It's just one more of the many contradictions in this country.
Despite this Supreme Court move, is there any other goal you have in mind to achieve?
I have so many projects in mind, both internationally and nationally, that I always have to choose. For the time being, I will continue to pursue my goals, either professionally or in activism.
Do you see yourself someday as President of the Venezuelan Supreme Court?
Limitations exist in your mind. If you limit yourself and your dreams, these will be your frontiers.
I do not put any limits to my goals. Why not be President of the Venezuelan Supreme Court or President of Venezuela, or successor to UN Secretary-General Ban Ki Moon, or even higher?
Just dream and pursue your dreams -- that's my commitment to life. And I've proved it during my life with all my actions.
>Learn more about Jennifer:
Jennifer Barreto-Leyva lives in Caracas, Venezuela where when this 5"11 venezolana is not defending the rights of her clients as a lawyer or inspiring people as a motivational speaker, she is an outspoken defender on the rights of plus-size people.
Because of her sassy outspokenness and willingness to force the issue that beauty does not lie with a person's weight, Jennifer has found her message much in demand from South and North America to Europe and Asia.
As a result, Jennifer has launched the first spanish-language magazine in history for plus-size people -- Belleza XL.
I saw myself different (as a child), not only when it comes to my size but my beauty as well. I've always had to deal with people's cruelty because they think I'm ugly and have no hesitation letting me know that. I had to be strong and mature when no one around was. I'm beautiful because I've decided and feel that way, not because everyone else says it is so.
Click to add a comment
You must be logged in to post a comment Login
Leave a Reply
Linking Latinas
More in Linking Latinas
Latina Perspective: Fighting to breathe
Latina ListaJanuary 7, 2015
Forget what’s your sign. What’s your dosha?
Marisa TreviñoJanuary 3, 2012
One Latina defies critics and creates Lazy Girl Tamales
Marisa TreviñoDecember 29, 2011
USA: “Hermanaly” advice for the first day of college
Marisa TreviñoAugust 22, 2011
Bolivia: A hidden treasure in the salt flats of Uyuni could liberate Bolivia from poverty
Marisa TreviñoJuly 22, 2011
Venezuela: Hometown designer makes his mark on international fashion stage
Marisa TreviñoJuly 21, 2011
Bolivia: Improving the Race
Marisa TreviñoJune 8, 2011
Peru: An election countdown to change and social unrest
Marisa TreviñoMay 26, 2011
Marisa TreviñoMay 21, 2011 | http://latinalista.com/2010/11/venezuela_a_transgenders_run_for_supreme/ | dclm-gs1-252320001 | false | true | {
"keywords": "assembly, candida"
} | false | null | false |
0.119396 | <urn:uuid:d1517b8d-9407-498c-8c57-4b1813842df3> | en | 0.845693 |
SPARQL Update - Clarifying correct behavior when a graph is created implicitly
From: David Booth <david@dbooth.org>
Date: Tue, 13 Sep 2011 18:40:57 -0400
Cc: eric neumann <eneumann@pangenx.com>, Ian Emmons <iemmons@bbn.com>
Message-ID: <1315953657.2882.67424.camel@dbooth-laptop>
The SPARQL Update spec indicates that "If data is inserted into a graph
that does not exist in the graph store, it *should* be created":
However, I've run into an issue with one implementation (Parliament
2.7.1) in which the graph *is* created automatically in such
circumstances, but the graph is not persisted in the store unless it was
created explicitly using a CREATE operation.
For example, the following query creates the named graph whether line 3
is commented out or not:
PREFIX test: <http://example/test/>
CREATE SILENT GRAPH test: ; # Line 3
GRAPH test: { test:foo a test:bar }
But if line 3 is commented out, then the graph is not persisted.
I consider this a bug (and I assume the Parliament implementers will
also, though I have not heard back from them yet) because it would lead
to substantial compatibility issues for SPARQL update queries if some
implementations persisted the graph and others did not. But AFAICT, the
SPARQL Update spec does not make clear that this behavior is wrong.
Therefore, I suggest adding some clarification to this effect at the end
of the first paragraph in section 3.1:
If a graph is created implicitly by an update operation, then the
behavior of the Graph Store MUST be functionally equivalent to its
behavior if the graph had been created explicitly by a CREATE operation.
David Booth, Ph.D.
Opinions expressed herein are those of the author and do not necessarily
reflect those of his employer.
Received on Tuesday, 13 September 2011 22:41:24 UTC
| http://lists.w3.org/Archives/Public/public-rdf-dawg-comments/2011Sep/0008.html | dclm-gs1-252390001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.059374 | <urn:uuid:13b3b679-cc40-426e-8ac8-4f761267087b> | en | 0.907544 | Strawberry Watermelon Coolers
Total Time
Prep 10 mins
Cook 0 mins
Strawberries and watermelon, how can you go wrong? One of the wonderful things about hot weather is this cold drink! Adapted from Whole Foods.
Ingredients Nutrition
1. Put strawberries, watermelon, ice and sugar into a blender and purée until smooth.
2. Pour into tall glasses and top off with sparkling water.
3. Garnish with mint and serve.
4. Enjoy!
Most Helpful
4 5
Very refreshing. A great summer drink :)
4 5
This was tasty and refreshing! Made as written and the whole family drank it. I did double the amount of sugar. Made for 123Hits.
5 5
Nice refreshing after dinner drink. Made recipe as posted, and we (DS and I) really enjoyed the combination of flavors. Made for PRMR tag.. | http://low-cholesterol.food.com/recipe/strawberry-watermelon-coolers-456204 | dclm-gs1-252430001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.037814 | <urn:uuid:f0234ab9-fc19-477c-8519-1b6d407411ec> | en | 0.932337 | Twproject for Mac
150.3 MB 2,630 downloads
6.0 Build 60003 100% CLEAN Trial
3.6/5 32
Easily handle large projects by coordinating multiple team members in a web-based environment, with this powerful and intuitive application
editor's review
If you are looking for a project management solution for your company that can help team members organize their tasks, there are numerous applications to choose from. However, a varied array of connectivity options can be crucial for streamlining activities, and this is an aspect many developers ignore.
This is not the case with Twproject, a powerful web-based app that only needs to be installed on one machine, and can then be accessed by your team members from any device by connecting to a server with the help of a web browser.
Comprehensive project management utility that provides all the tools you need to get the job done
As you would expect from such an application, you can create multiple projects, manage resources, assign tasks to specific team members and keep track of costs.
You can visualize all this data on an interactive Gantt graphic representation that makes it easy to update parameters in real-time, add new assignments or create dependencies.
Intuitive application that facilitates sharing and communication
Any issues that need to be dealt with are sorted depending on their priority, and you can upload important documentation so that everyone can access it whenever it is needed.
Twproject also includes a counter and allows team members to record any activities they have performed in a timesheet, providing relevant details and logging expenses.
Communication between team members is made especially simple, as they can all share agendas, join discussions and post notes on interactive boards.
Easy-to-access web interface that makes it simple to track projects from any location
Twproject’s web-based interface focuses on keeping everything as straightforward as possible while including all the information you need when performing certain tasks.
One of the most important features is the fact that projects can be accessed from any device, without having to install the application on each of them.
Overall, Twproject is a powerful tool that can be very helpful for companies that need to manage large projects involving numerous team members. It is easy-to-use and stores all of the recorded data on a web server that be accessed from a multitude of devices.
Twproject was reviewed by Catalin Chelariu
Last updated on September 30th, 2015
Twproject - Twproject displays a summary of the state of various projects and tasks, as well as current issues on the dashboard.Twproject - Twproject is a powerful management tool that makes it easy to assign tasks to specific team members and organize activities.Twproject - At a glance, you can get a good idea of the state of certain tasks, view which team members are working on them and their overall progress.Twproject - screenshot #4Twproject - screenshot #5Twproject - screenshot #6Twproject - screenshot #7Twproject - screenshot #8Twproject - screenshot #9Twproject - screenshot #10Twproject - screenshot #11Twproject - screenshot #12Twproject - screenshot #13Twproject - screenshot #14Twproject - screenshot #15Twproject - screenshot #16Twproject - screenshot #17Twproject - screenshot #18Twproject - screenshot #19Twproject - screenshot #20Twproject - screenshot #21
0 User reviews so far. | http://mac.softpedia.com/get/Business/Teamwork.shtml | dclm-gs1-252460001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.027759 | <urn:uuid:736ee3ae-a361-4857-b978-123ac9a7d917> | en | 0.870158 | Sign up ×
This question already has an answer here:
I'm a relative beginner in Mathematica, but after reading the forums for a long time, I couldn't understand one thing:
• I want to plot a list h. Let's call it ListPlot[h]
• I also have a second list, of the same size c
• I want to write a color function that plots a given point in h with a color corresponding to the value of c at the same point.
Anyone knows how to do it?
share|improve this question
marked as duplicate by R. M. Jan 22 '14 at 18:25
Related question:… – Cassini Jan 22 '14 at 17:56
2 Answers 2
Perhaps it's better to use Graphics where you have full control over all aspects of the plot:
h = RandomReal[10, {10, 2}];
c = ColorData[1, "ColorList"][[1 ;; 10]];
Graphics[{PointSize[Medium], #[[1]], Point[#[[2]]]} & /@ Transpose[{c, h}], Axes -> True]
Regarding your comment, you could do something like this:
h = RandomReal[10, 20];
c = RandomReal[10, 20];
(* You have to give each y value a corresponding x value *)
h = MapIndexed[{First@#2, #} &, h];
(* You have to normalize the concentration so it works with the color function. *)
c = Normalize[c];
colorfunc = ColorData["SolarColors"];
Graphics[{PointSize[Medium], colorfunc@#[[1]], Point[#[[2]]]} & /@ Transpose[{c, h}], Axes -> True]
It's the same idea, but we don't assume that the x coordinate of each point is its position in the list. We also don't assume a list of colors, but rather think of that list as a list of concentration levels.
I noticed now that in m_goldberg's answer he sets the AspectRatio to 1/GoldenRatio, this is an excellent idea since it looks good and is the default aspect ratio for plots in MMA. I too recommend that.
share|improve this answer
@Edouard, for a large number of points I would suggest using a gradient color scheme, for example: c = ColorData["Rainbow"] /@ (Range[25]/25); – Simon Woods Jan 22 '14 at 16:58
Thanks a lot ! But actually, what I want to do is not to plot one function as a function of the other. I would like h to be a [1xn] list, and simply plot the n values of "h". But then, to have the values of "h" colorcoded according to the values of "c" at the same x-axis value (without actually plotting "c"). Basically, I want to look at the profile of a a physical interface which has some concentration of molecule at every point. And I would like the interface h(x) to be red (for instance) in regions where the concentration c(x) is high ? Thanks again ! – Edouard Jan 22 '14 at 17:03
@Edouard I added something I think should meet your needs. – Pickett Jan 22 '14 at 17:24
Thank you so much, this is awesome ! – Edouard Jan 22 '14 at 17:33
I think Pickett is right to use Graphics, but here is how I would implement it, step-by-step.
Make some data
h = RandomInteger[42, 12];
c = Table[Hue[i/Length[h]], {i, 0, Length[h] - 1}];
Make the points.
pts = Point /@ Transpose[{Range[Length[h]], h}]
Color the points.
coloredPts = Transpose[{c, pts}];
Make a plot with 'Graphics`.
Graphics[{PointSize[Medium], coloredPts},
Axes -> True, AspectRatio -> 1/GoldenRatio]
share|improve this answer
| http://mathematica.stackexchange.com/questions/40919/coloring-the-points-in-a-listplot-with-the-value-of-another-function | dclm-gs1-252520001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.540636 | <urn:uuid:31c64d4c-8c25-4a85-bdd6-8831f2e56e97> | en | 0.8959 | 1. Welcome to the Muppet Central Forum!
2. The Muppets "Hostile Makeover"
3. The Muppets on Dancing with the Stars
4. In Their Own Words: Jim Henson
Will there be a big Muppet gathering this year?
1. Fraggline
Fraggline Active Member
2. Fraggline
Fraggline Active Member
3. beaker
beaker Well-Known Member
Sadly, no mention of anything for D23 schedule wise has made it online, even though the expo is now two months away.
So here's the quandry...I can only do one trip this year, which means I gotta choose if Disneyland/D23 weekend will be "the" trip. Which means I can only do Disneyland once. Will D23 be the "it" weekend, OR...will Disney announce an official Muppet celebrational weekend closer to the movie date, much like they had the "elecTRONica" tron themed california adventure Tron thing. hmm...guess I'll have to wait to start planning.
Share This Page | http://muppetcentral.com/forum/threads/will-there-be-a-big-muppet-gathering-this-year.47612/page-2 | dclm-gs1-252650001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.033519 | <urn:uuid:60cc6994-784e-45ee-a5dc-fc14781fd506> | en | 0.780126 | - this week
People who like Jud also like:
Beck Conlan Corin Denis Edda Gearoid Ingram Jael Laurie Shanti Telma Thera Ty Vale Von Show me more names similar to Jud Comment on Jud
Famous People Named Jud
Jud Buechler, American professional basketball player
Jud Heathcote, American college basketball coach
Jud Logan, American Olympic athlete
Jud Strunk, American singer-songwriter and comedian
Jud Taylor, American actor and director
Jud Wilson, American baseball player
Pop Culture References for the Name Jud
Jud Fry, farmhand in musical "Oklahoma"
"Jud Jud", song by The Story So Far
Inspired by Jud?
Discover 1000s more amazing names you'll love with NameHunter
Hunt Me Some Names | http://nameberry.com/babyname/Jud | dclm-gs1-252670001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.018475 | <urn:uuid:9a885e91-4c11-4f33-aff1-0c5ffd0129e0> | en | 0.950148 | Nicki Minaj’s Crazy ‘American Idol’ Nicknames Are A Hit
By Sowmya Krishnamurthy
All fun aside, the main event on tonight’s episode was the much talked-about throwdown between Nicki Minaj and her fellow judges, especially Randy Jackson and Mariah Carey. After a long day of judging in North Carolina, Nicki felt that MC and Randy were being especially hard on a contestant Summer. The beef quickly turned from Summer to the judge’s throwing jabs at each other and Nicki eventually stormed off the set. | http://rapfix.mtv.com/2013/01/24/nicki-minaj-american-idol-crazy-nicknames/ | dclm-gs1-252870001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.05714 | <urn:uuid:dc441af7-a47b-4085-bddb-9fd23885a84a> | en | 0.949165 | Final Defense Bill Does Not Include Ability To Detain American Citizens
I know this is something that many were concerned with, no matter what side of the political aisle they stand on. But, American citizens should not be concerned, as the final bill does not give the government the right to detain Americans indefinitely, send them to Guantanamo Bay, or give them military trials
As I wrote, I never posted anything about this because I was behind the curve on the story. Also, because I spoke with an aide to a politician who said that the language would never survive to make it to the president’s desk. There was too much opposition in the House and Senate.
(The Hill) One of the more controversial provisions of the bill is language that reaffirms the authority of the administration to detain people found to be associated with al Qaeda, and requires military detention for anyone who plots an attack against the United States. In both cases, the bill does not create any new authority to detain U.S. citizens, ensuring their rights to a fair trial, and the military detention language does exempts U.S. citizens.
The redone provisions apparently are more than just giving the POTUS the power to waive indefinite detention for American citizens and legal residents caught on US soil. It gives them the normal legal protections already accorded.
Just to be clear, the final version of HR 1540, National Defense Authorization Act of 2012, Subtitle D, Section 1032(b)
Sections 1031 and 1032 are the ones cited, and the above language comes from the final legislation. They won’t be able to haul off US citizens even if captured outside of the US, nor to lawful residents captured within the US.
While there is still some concern by some Congress critters (who still voted for the bill), the language regarding US citizens is pretty cut and dry, with no exceptions.
Crossed at Pirate’s Cove. Follow me on Twitter @WilliamTeach.
Related Articles
New Low for Associated Press
Against Family’s Wishes, the AP Releases Picture of Dying Marine
Islamofascist Terrorists Expected to Focus on “Soft Targets”
Share this!
Enjoy reading? Share it with your friends! | http://rightwingnews.com/war-on-terrorism/final-defense-bill-does-not-include-ability-to-detain-american-citizens/ | dclm-gs1-252900001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.429958 | <urn:uuid:790e5ecd-a91a-4d7b-8e3e-95fda67fe888> | en | 0.927258 | COMMON NAME: primates
KINGDOM: Animalia
PHYLUM: Chordata
CLASS: Mammalia
ORDER: Primates
FAMILY: 13 extant families
GENUS SPECIES: 233 extant species
DESCRIPTION: Long arms with opposable thumbs; body hair over most of body; shortened nose (rostrum); forward-looking eyes; opposable first digits on forelimbs and hind limbs
SIZE: Varies according to species
WEIGHT: The smallest living primate is the pygmy mouse lemur, which weighs approximately 30 g (1.05 lbs). The largest is the gorilla, which weighs on average of about 175 kg (385 lbs).
DIET: Some species eat leaves or fruit; others are insectivorous or carnivorous; certain species are omnivorous
GESTATION: Varies according to species
SEXUAL MATURITY: Varies according to species
LIFE SPAN: Varies according to species
RANGE: Varies according to species
HABITAT: Most dwell in tropical forests
STATUS: IUCN Certain species are listed
CITES All primates are at least Appendix II
USFWS Certain species are listed
1. Baboons have complex social structures with anywhere from 8 to 200 individuals per troop. They use at least 10 different vocalizations to communicate. When traveling as a group, males will lead; females and young stay safe in the middle and less dominant males bring up the rear. Young chimps learn to create tools from objects in their environment by watching others; they use sticks to extract termites to eat and crumple leaves to soak up water to drink.
3. Lemurs get their name from the Ancient Roman belief that they were ghosts or spirits. They were mistaken for specters because of their nocturnal, stealth habits.
4. Lemurs rely on their sense of smell as a way of communicating with other animals. They have special scent glands on their wrists and bottoms that leave scent trails on branches to mark their territories.
7. "Marmoset" is derived from the French "marmouset" which means, loosely, shrimp or dwarf. An apt name, considering they are the smallest of the true monkeys (the lightest of the true monkeys is the pygmy marmoset).
8. These monkeys use their specialized claws to establish a firm grip on tree trunks and gnaw little holes in the bark with their lower incisors and canines. This causes the tree to produce more sap, which is used to seal injuries to the bark. This tree sap is a valuable source of carbohydrates and minerals.
10. The spider monkey's prehensile tail acts as an extra limb. The tail has a hairless patch on the tip that is used for grip. This hairless patch is unique in its markings, just like the human fingerprint.
11. A female spider monkey's clitoris is very protuberant and can be mistaken for a penis. It acts as a reservoir for urine. The male is able to smell when a female is in estrus.
Nowak, Ronald M. (ed.). Walker's Mammals of the World. Vol. I. Baltimore: Johns-Hopkins University Press, 1991.
| http://seaworld.org/en/animal-info/animal-bytes/mammals/primates/ | dclm-gs1-252960001 | false | true | {
"keywords": "monkey, mouse"
} | false | null | false |
0.21314 | <urn:uuid:6b381f8f-db53-404a-b29a-186d20737a59> | en | 0.866574 |
Forgot your password?
It's funny. Laugh.
Submission Nebraska Senator Sues God->
ThelpDealio writes: "A Nebraska Senator, Ernie Chambers, has filed suit against god in Chambers v. God in order to stop terror threats.
In the suit, (PDF) he states that god "has made and continues to make terroristic threats of grave harm to innumerable persons." including "fearsome floods, egregious earthquakes, horrendous hurricanes, terrifying tornadoes, pestilential plagues, ferocious famines, devastating droughts, genocidal wars, birth defects, and the like.""
Link to Original Source
| http://slashdot.org/~ThelpDealio/submissions | dclm-gs1-253000001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.092634 | <urn:uuid:7c1fcd46-bf3d-4ae5-9192-36e2cb07e4af> | en | 0.910759 | Sign up ×
I'm new to Hadoop and was curious about the commandline messages from my pig script.
Total records written : 7676
Total bytes written : 341396
Spillable Memory Manager spill count : 103
Total bags proactively spilled: 39
Total records proactively spilled: 32389322
The end result is indicated to be a "Success!". I am still not sure. What do these numbers above mean?
share|improve this question
1 Answer 1
up vote 4 down vote accepted
The first two shows the total records/bytes written to HDFS by your MR job.
It can happen, that during a MR job not all records fit into the memory. Spill counters indicate how many records have been written to the local disks of your datanodes to avoid running out of memory.
Pig uses two methods to control the memory usage and do a spill if necessary:
1. Spillable Memory Manager:
This is like a central place where the spillable bags are registered. In case of low memory this manager goes through the list of the registered bags and performs a GC.
2. Proactive (self) spilling:
Bags can also spill themselves if their memory limit is reached (see pig.cachedbag.memusage)
Back to the statistics you have:
• Total bags proactively spilled: # of bags that have been spilled
• Total records proactively spilled: # of records in those bags
It's always good to check the spill stats of your job since lot of spilling may indicate huge performance hit that need to be avoided.
share|improve this answer
Your Answer
| http://stackoverflow.com/questions/12378925/records-proactively-spilled-in-hadoop-pig | dclm-gs1-253110001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.869414 | <urn:uuid:7b562fe9-d029-481f-92b2-b2d68bfc3664> | en | 0.785936 | Sign up ×
I have read several options (PERL, Ruby, Python and PHP) about web scraping a website or RSS feed. My question is, if I used say Python or Ruby to web scrape, is it possible to write the scrape to an .html file like the index.html? Basically what I wanna do is grab x,y,z links from an RSS feed and make a menu on my home page out of x,y,z.
Is this possible? If so, where would I get started?
@Amigable Clark Kant
Firstly, thanks for the more detailed answer. So each time I scrape, I'd have to rewrite the whole HTML file? I have one section, Headlines, that I need to change every hour or so, which gets the information from the scrape. Here is the code that I would need to be changed every time the scrape runs:
<article class="grid_4">
<div class="box-1">
<ul class="list-1 p2">
<li><a href="more.html"><b></b><strong>Lorem ipsum</strong> dolor amet, consectetuer</a></li>
<li><a href="more.html"><b></b><strong>Adipiscing elit</strong> sed diam nonummy nibh</a></li>
<li><a href="more.html"><b></b><strong>Euismod tincidunt</strong> laoreet dolore magna</a></li>
<li><a href="more.html"><b></b><strong>Aliquam erat</strong> volutpat wisi enim ad minim</a></li>
<li><a href="more.html"><b></b><strong>Veniam nostrud</strong> exerci tation ullamcorper</a></li>
<li><a href="more.html"><b></b><strong>Suscipit lobortis</strong> nisl ut aliquip commodo</a></li>
<li><a href="more.html"><b></b><strong>Duis autem</strong> vel eum iriure dolor hendrerit</a></li>
<li><a href="more.html"><b></b><strong>In vulputate</strong> velit esse molestie consequat</a></li>
<li><a href="more.html"><b></b><strong>Vel illum</strong> dolore eu feugiat nulla facilisis</a></li>
<li><a href="more.html"><b></b><strong>At vero</strong> eros et accumsan</a></li>
<div class="alignright p3"><a href="more.html" class="link-1">read more</a></div>
<a href="more.html" class="banner-1"></a> </article>
Is it possible to do this? If not, can you point me somewhere to start reading/learning about it? Thanks again.
share|improve this question
closed as not constructive by katrielalex, Lev Levitsky, Soner Gönül, Andy Hayden, Graviton Jan 21 '13 at 4:48
You can scrape/parse anything: a web request is a web request, the response is the response. Search the web for any tutorial on scraping in whichever language you want. – Dave Newton Jan 15 '13 at 15:36
@ esaelPsnoroMoN - I'm not asking what to use to parse, I already know that and I know that it has been asked 10000 times. What I'm asking is, once you have the data you want, how do I get it to the actual HTML page. – Rodney Wilson Jan 15 '13 at 17:52
2 Answers 2
Install Beautiful Soup with
pip install beautifulsoup4
then read the documentation
( If you don't have pip, install it from here: )
Beautiful Soup will give you a nice clean version of the web page. You can search through this structure looking for links or whatever information you are after.
Will give you all the links in a page.
To get these onto a web page there is an infinite number of possibilities, some come to mind:
• You could generate the web page
• You could generate a web page and load it in an iframe
• You could generate a text file in JSON format with all the links in it and GET it from Javascript embedded on a static web page
• You could run Django, as you say
What is best depends on a lot of factors - how often can you scrape? How often should you scrape? Does the scraping have to happen on the web server or should it happen on some other computer which periodically uploads to your web server?
Fuzzy question, fuzzy answer...
share|improve this answer
I know how to use BeautifulSoup in Python. I'm asking once I have the data I want, how do I get it to my HTML page. Would I have to use DJango or some other template software? – Rodney Wilson Jan 15 '13 at 17:53
yes it is possible...
python/beautiful soup
more soup
share|improve this answer
| http://stackoverflow.com/questions/14341134/web-scraping-to-html-code | dclm-gs1-253160001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.072341 | <urn:uuid:5e6bbe38-f284-45e1-9119-4f417223a431> | en | 0.847438 | Sign up ×
I have written a training application with each page/slide of the training workbook as a seperate blade template file named as "page1.blade.php", "page2.blade.php" and so on. Each of these files has content of the kind:
{{-- Page title --}}
Page Title
{{-- Page content --}}
<div class="pageContentContainer">
<h2>Page Title</h2>
This works really well when being viewed page by page within the browser. However I also wish to automatically compile all pages into a PDF document. This is being done via dompdf which works amazingly well when I pass each pages html to it manually. However I wish to condense the @section('pageContent') section of each page into one large section which extends a different layout for passing to dompdf.
Given the above context my question is this: Is there a method in Laravel's blade parser which would allow me to pass it a blade file and just get the rendered html from a particular section? The below pseudo-code demonstrates what I would like to be able to do.
$pages = array(...); // content of the directory
foreach ($pages as $page)
$renderedPage = Blade::render($page);
$title = $renderedPage->title;
$pageContent = $renderedPage->pageContent;
share|improve this question
1 Answer 1
up vote 2 down vote accepted
Instead of doing the normal return of view
return View::make('page');
You can instead store the view in a string
$view = View::make('page');
So then you can do your code something like this (not tested - but you get the idea):
foreach ($pages as $page)
$renderedPage[] = view::make($page);
share|improve this answer
This was useful, I then had to break down the string line by line and just grab the lines between the @section('title') and @parent. – carbontwelve Aug 30 '13 at 8:27
Your Answer
| http://stackoverflow.com/questions/18231295/how-to-grab-content-from-section-within-blade-template | dclm-gs1-253190001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.029206 | <urn:uuid:b8c1e461-6d00-47bd-8f20-004ce65a986c> | en | 0.885198 | Sign up ×
I am just doing a little work this morning making some static libraries. Why do static libraries end with '.a'?
No one in my office knew, so I thought I would ask around on Stack Overflow. We are writing code in C++, C, and Objective-C.
share|improve this question
I suppose if anyone knows the history behind this that would be pretty interesting. – Kaili Sep 17 '10 at 16:24
Tagged with POSIX -- on Windows the common extension is .lib. – Billy ONeal Sep 17 '10 at 16:29
@Billy: is the .a extension specified by POSIX though? – jalf Sep 17 '10 at 19:34
@Billy,jalf: it's more specific to GCC and likewise compilers... MinGW (Windows) also uses .a as the import/static library extension. – rubenvb Sep 17 '10 at 19:39
Other compilers use '.lib" extension. – Thomas Matthews Jun 28 '12 at 21:53
3 Answers 3
up vote 15 down vote accepted
I think the .a convention comes from using an "archiver" to place the object files into a static library.
share|improve this answer
That's just a convention on Unix-based systems. Visual Studio (Windows) generate .lib files.
In fact, I just discovered that there are several other namings, see Wikipedia article Library (computing), section File naming.
share|improve this answer
I would be curious to know the history behind this convention. I wonder if it's documented anywhere? – Mark Ransom Sep 17 '10 at 16:23
I thought it might stand for something. Must have been a grad student that thought it was a good idea to give it a one letter extension lol – Kaili Sep 17 '10 at 16:23
Yeah I added the link to wikipedia, that's interesting. – Klaim Sep 17 '10 at 16:24
It's an archive format (think of .zip or .tar) containing .o object files generated by "ar". The linker just treats it as if the object files were specified individually.
share|improve this answer
If you specified the .o file individually the linker might include them even if none of their symbols were specified, but with .a files linkers usually only bring in .o files within the archive who are required to satisfy the object being built. – nategoose Sep 17 '10 at 16:34
Your Answer
| http://stackoverflow.com/questions/3737096/why-do-c-cstatic-libraries-end-in-a?answertab=votes | dclm-gs1-253200001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.206991 | <urn:uuid:9a22199c-5ce1-40bf-9f3b-c28e0a71702f> | en | 0.797457 | Sign up ×
I am having some issues trying to statically link programs using c++0x thread features. Code looks this: (Compiler is gcc 4.6.1 on Debian x86_64 testing)
#include <iostream>
#include <thread>
static void foo() {
std::cout << "FOO BAR\n";
int main() {
std::thread t(foo);
return 0;
I link it with:
g++ -static -pthread -o t-static t.cpp -std=c++0x
When I execute the program, I have the following error:
what(): Operation not permitted
GDB Debug output looks like this:
Debugger finished
Current directory is ~/testspace/thread/
GNU gdb (GDB) 7.2-debian
Copyright (C) 2010 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <>
and "show warranty" for details.
For bug reporting instructions, please see:
Reading symbols from /home/will/testspace/thread/t-static...done.
(gdb) list -
1 #include <iostream>
(gdb) b 1
Breakpoint 1 at 0x4007c8: file t.cpp, line 1.
(gdb) r
Starting program: /home/will/testspace/thread/t-static
what(): Operation not permitted
Program received signal SIGABRT, Aborted.
0x00000000004a8e65 in raise ()
(gdb) bt
#0 0x00000000004a8e65 in raise ()
#1 0x000000000045df90 in abort ()
#2 0x000000000044570d in __gnu_cxx::__verbose_terminate_handler() ()
#3 0x0000000000442fb6 in __cxxabiv1::__terminate(void (*)()) ()
#4 0x0000000000442fe3 in std::terminate() ()
#5 0x0000000000443cbe in __cxa_throw ()
#6 0x0000000000401fe4 in std::__throw_system_error(int) ()
#7 0x00000000004057e7 in std::thread::_M_start_thread(std::shared_ptr<std::thread::_Impl_base>) ()
#8 0x0000000000400b18 in std::thread::thread<void (&)()> (this=0x7fffffffe540, __f=@0x4007c4) at /usr/include/c++/4.6/thread:135
#9 0x00000000004007f3 in main () at t.cpp:11
Linking with static libstdc++ could (possibly) make this error disappear, and the compiled C++0x programs can run on systems without gcc 4.6 libs:
g++ -static-libgcc -pthread -L.-o t thread.cpp -std=c++0x
But first, we should make a symbolic link to 'libstdc++.a' at current directory:
ln -s `g++ -print-file-name=libstdc++.a`
share|improve this question
My suggestion would be "do not use static linking because the glibc folks will make you suffer eventually".… – Nemo Aug 18 '11 at 5:04
@Nemo - thanks for the info! – will Aug 18 '11 at 5:16
4 Answers 4
For reasons exactly unknown to me (I consider this a bug) you can not use std::thread on gcc 4.6 when linking statically, since the function __ghtread_active_p() will be inlined as returning false (look at the assembly of _M_start_thread), causing this exception to be thrown. It might be that they require weak symbols for the pthread_create function there and when statically linking they are not there, but why they don't do it otherwise is beyond me (Note that the assembly later contains things like callq 0x0, there seems to be going something very wrong).
For now I personally use boost::threads since I am using boost anyways...
share|improve this answer
Thanks for the reply! I have an eclectic solution that statically links libstdc++.a (but not pthread), so that compiled C++0x programs can run on systems without GCC 4.6 libs. Please see my edit above. – will Aug 18 '11 at 4:13
It's not true that you can't use GCC's std::thread with static linking, you just have to ensure that your executable contains the relevant symbols from libpthread.a instead of the weak symbols defined by GCC itself. You can do that with -Wl,--whole-archive -lpthread -Wl,--no-whole-archive or using Andy's answer to this question, or a linker script as I commented on Andy's answer. Or for Red Hat, Fedora, CentOS etc. it just works because libpthread.a is built so that it always works. – Jonathan Wakely Jul 7 at 10:26
@JonathanWakely: Note that this is talking about the ancient 4.6 gcc, a lot has changed since then. Even with your proposed linker line, __gthread_active_p() is still inlined to return false on my box. – PlasmaHH Jul 7 at 10:38
Works fine for me with 4.6.4 on Debian, either your distro packages gcc or libpthread badly or you're doing it wrong. – Jonathan Wakely Jul 7 at 11:53
The only change relevant to __gthread_active_p since 4.6 is which won't make much difference except on Android, or if you're redefining pthread_cancel – Jonathan Wakely Jul 7 at 11:58
You should make sure you're linking against pthread library, otherwise you'll get the "Operation not permitted" message.
For instance, to compile your source code, I'd use this:
g++ -Wall -fexceptions -std=c++0x -g -c file.cpp -o file.o
Then linking with this:
g++ -o file file.o -lpthread
When doing it without object files, you could try something like this:
g++ -Wall -fexceptions -std=c++0x -g main.cpp -o file -lpthread
Remember to leave libraries at the end, since they'll be used on the linking process only.
share|improve this answer
indeed, it looks like just adding the -lpthread resolves the issue. – Klaas van Gend Oct 16 '12 at 13:01
In gcc 4.7.1 I noticed that when compiling with a combination of '-pthread' and '-static' the "operation not permitted" error still ocurs. There are 2 workarounds: 1) remove the '-static' or 2) use the "-static-libgcc" + libstdc++.a tip from will above! – Filipe Dec 13 '12 at 16:32
The OP is using -pthread which already passes -lpthread to the linker. This answer solves a different problem (the problem of failing to link to libpthread!) not the one described in this question which is about static linking. – Jonathan Wakely Jul 7 at 10:31
you can use -u to resolve the problem (test in gcc version 4.6.3/(Ubuntu EGLIBC 2.15-0ubuntu10.4) 2.15 , gcc version 4.8.1/(Ubuntu EGLIBC 2.15-0ubuntu10.5~ppa1) 2.15)
1. reproduce the bug
g++ -g -O0 -static -std=c++11 t.cpp -lpthread
what(): Enable multithreading to use std::thread: Operation not permitted
Aborted (core dumped)
nm a.out | egrep "\bpthread_.*"
w pthread_cond_broadcast
w pthread_cond_destroy
w pthread_cond_signal
w pthread_cond_wait
w pthread_create
w pthread_detach
w pthread_equal
w pthread_join
w pthread_mutex_lock
w pthread_mutex_unlock
w pthread_once
w pthread_setcancelstate
2. resolve the bug
g++ -g -O0 -static -std=c++11 t.cpp -lpthread -Wl,-u,pthread_join,-u,pthread_equal
nm a.out | egrep "\bpthread_.*"
0000000000406320 T pthread_cancel
w pthread_cond_broadcast
w pthread_cond_destroy
w pthread_cond_signal
w pthread_cond_wait
0000000000404970 W pthread_create
w pthread_detach
00000000004033e0 T pthread_equal
00000000004061a0 T pthread_getspecific
0000000000403270 T pthread_join
0000000000406100 T pthread_key_create
0000000000406160 T pthread_key_delete
00000000004057b0 T pthread_mutex_lock
00000000004059c0 T pthread_mutex_trylock
0000000000406020 T pthread_mutex_unlock
00000000004063b0 T pthread_once
w pthread_setcancelstate
0000000000406220 T pthread_setspecific
share|improve this answer
Nice, something was missing in another list. This is a really good workaround for those in need of static but without the bulk of -Wl,--whole-archive – mlt Jun 8 at 23:08
This is indeed a nice solution. You can wrap it up as a linker script instead, e.g. libgthread.a and then link with -lgthread instead of -lpthread – Jonathan Wakely Jul 7 at 10:27
My previous answer was deleted and I wrote detailed answer.
In common cases this issue happens due incomplete linking of the libpthread. I found information about this here
You can try link you app with the following flags:
Also you could look at this questions with the similar problem: What is the correct link options to use std::thread in GCC under linux? Starting a std::thread with static linking causes segmentation fault
share|improve this answer
Your Answer
| http://stackoverflow.com/questions/7090623/c0x-thread-static-linking-problem/11867282 | dclm-gs1-253220001 | false | false | {
"keywords": "assembly"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.044888 | <urn:uuid:3ccd4f6f-63f9-4f1b-828a-32ab87ae360f> | en | 0.949302 | PC Gamer
PC Gamer
Once, the early Fallout RPGs were available on GOG. Then Bethesda and Interplay had a big fight, and Bethesda gained full rights to the Fallout series. Fallout, Fallout 2 and Fallout Tactics all promptly disappeared from GOG and Steam, and then—months later—returned to Steam only. That was it for the epic saga of The Company Who Owned A Thing. Until today.
GOG and Bethesda have finally struck a deal, and the Fallout games are back in DRM-free form on the distribution service. Also, GOG is now selling a number of other Bethesda-owned classics—all DRM free. Two of these new old games are being made available digitally for the very first time.
Here's what's now available:
• The Elder Scrolls III: Morrowind Game of the Year Edition
• The Elder Scrolls Adventures: Redguard
• The Elder Scrolls: Battlespire
• Quake (includes Mission Pack 1 and Mission Pack 2)
• The Ultimate DOOM
• DOOM II + Master Levels for DOOM II + Final DOOM
• Fallout
• Fallout 2
• Fallout Tactic
A number of deals are also available throughout the next week. Purchase all three Elder Scrolls games, and you'll get a 33% discount. Purchase all three Id games, and you'll get a 33% discount. Purchase all three Fallout games, and you'll get a 66% discount. Finally, purchase any of the above games and you'll get The Elder Scrolls: Arena and The Elder Scrolls II: Daggerfall for free.
PC Gamer
The team behind the Morrowind-based Skyrim mod Skywind has released an update video, to let everyone know they're "still alive and working just as hard".
The video runs through a few of the locations and creatures that those who've played Morrowind will recognise, but updated for the Skyrim engine: places like West Gash and Bitter Coast, and creatures like the impressive Kwama Forager and the adorable Guar Pup.
There's also mention of AI schedules and town clutter, which should serve to make this fan version of Morrowind feel a little more alive than the original. You can also see that intent in the trailer release back in March that shows the reimagined Seyda Neen, the starting town from the game.
We don't yet know when Skywind will be ready and available, but when it does come out you'll need legitimate copies of both Morrowind and Skyrim to run it.
PC Gamer
Skyrim's taverns. They're cozy, they're comfy, but to be perfectly honest, there's not a whole lot to do in them except run in and sell a load of collected crap to the innkeeper and maybe knock a few things off the tables as you rush back out.
The Tavern Games mod aims to change that by adding two dice games, a card game, a board game, and even lottery tickets to Skyrim's inns and pubs. Just walk up to anyone in the tavern and begin a conversation, and there will be a dialogue option to play a game. Provided they have enough money, they'll agree to play. I mean, what else do they have to do besides sitting silently while eating comically large loaves of bread?
The games are relatively simple, and there's no animation when you roll the dice or play the cards—they just appear on the table—but it's still a nice way to spend a few minutes and try to win some cash. Here are the table games:
Prophet's Dice
One player rolls two dice, and then guesses if his opponents roll will be higher, lower, or equal. If you bet on equal and win, you receive triple the payout. Get it wrong, and you lose triple your bet.
Dice Jack
One player rolls two dice, and the total of that roll is multiplied by three—let's call that new total the Jack. After a coin flip to determine who goes first, the two players roll dice, trying to get as close as they can to the Jack without going over. If you bust, the other player wins. Hit the Jack exactly, and you win twice the bet.
The Battle of Heroes
A card game. Each player draws and plays three cards with numbers on them between 1 and 10. Add them up and that's your Hero Power for the round. At that point, you can choose to roll the dice up to two times to add to your Hero Power, though that dice roll costs gold which goes directly to the other player. In other words, you have to balance how much you stand to lose by rolling against how much you stand to win by having a higher Hero Power than the other player. Granted, it ain't exactly Gwent, but at least you can attempt to cheat.
Talk to the innkeeper and you'll be able to buy a rulebook for these games for a couple Septims. You'll also be able ask the tavern owner to play a board game with you.
The Daedra Challenge
This is probably the simplest game: dice rolls happen automatically and your pieces move around the board by themselves, attempting to get to the center first. Land on an arrow and you slide to the spot the arrow is pointing. Land on a skull, and you're asked a multiple choice question. Get it wrong, and you go back to the start. If you win, you get a gift from the innkeeper.
If you're looking for straight-up no-skill gambling, you might try purchasing a lottery ticket. Open it in your inventory to see if you've won, and if so, redeem it with an innkeeper. Prizes can be any number of things: gold, a spell book, potions, ingots, and even several nights of free room and board. I won two ingots! It was my lucky day.
Of course, if you know one thing about the rabble haunting Skyrim's taverns, it's that they don't exactly have a ton of gold, so most of the games you play will be of the low stakes variety (unless you yourself are just starting out and don't have much cash of your own). I did find a gambler named Gambler in the tavern in Solitude, however, who had a decent amount of Septims. He no longer does, thanks to a couple games of Dice Jack.
You can subscribe to this mod in the Steam Workshop, or download it from Nexus Mods. It also requires the Skyrim Script Extender, which can now be found in the Workshop, or at its official site.
PC Gamer
Remember that ambitious total conversion mod for Skyrim we covered earlier this year? Well, it's still in development, and while no release date has been confirmed just yet, the video above is the most substantial look at the mod in action I've seen yet.
Skyrim Enderal is developed by SureAI, the same team responsible for Nehrim: At Fates Edge, which was a total conversion project for Oblivion. It's well worth reading our interview with the team, where they discuss the logistic issues that abound when creating a hobbyist, non-for-profit mod that will (hopefully) rival the vanilla campaign.
Thanks to VG247.
PC Gamer
Thanks, VG247.
PC Gamer
Have you ever wished that Skyrim looked more like a Disney animated film, or maybe a Looney Toons classic? A Redditor by the name of UniqueUses has you covered: A mod called Toon Skyrim, which replaces the game's realistic-ish look with something more like Bugs Bunny might see after being clocked in the head with an apple.
"I'm basically making my own potato texture mod, with an enb and weather that goes with it to help hide that ugly lod," he wrote in the Skyrim Porn subreddit. "I like the potato texture style, but I think a lot of fixing up needs to be done for it to be playable. So I'm going to attempt to make things like signs and faces readable but still fit the potato style. For example, certain puzzles need to be seen, so I'm going to edit those."
"Potato texture," as Kotaku explained, is a flat, low-detail graphical style that's sometimes useful in getting games to run better on low-spec hardware. In this case, however, it doesn't sound like performance will be improved much because of the mod's use of an ENB, a sort of post-processing mod that adds additional effects to the game, but also places increased demand on hardware.
"All I'm doing is making the textures very small and then using an enb. So if textures size is a problem for somebody's pc then performance will go up in that area," he said in response to a question about Toon Skyrim FPS rates. "However enb's are very demanding. Turning off the ambient occlusion could make it at least break even with vanilla skyrim I imagine."
The mod isn't out yet, but the pre-release screens look fantastic. UniqueUses said he plans to upload the mod to Nexus Mods as soon as he's got the bugs worked out.
PC Gamer
If video games need anything, it's guns! Forgive me!
The following is an excerpt from The Most Dangerous Fantasy Game, a staple in the imaginary short story canon:
For a moment the general did not reply; he was smiling his curious red-lipped smile. Then he said slowly, "No. You are wrong, sir. The Giant Mudcrab is not the most dangerous big game." He sipped his mead. "Here in my preserve on this island," he said in the same slow tone, "I hunt more dangerous game."
Oh, so dragons.
Yes! Dragons! I was going to fake you out and say 'Man' but you caught on. Well done. Weird.
The dragon in the mirror
Short fiction in the Elder Scrolls universe would likely reflect less of man s existential concern with the self, and more of man s existential concern with being incinerated by an ancient, winged lizard-beast.
Through hours and hours of leveling up, finding gear, and building relationships, you can even the odds, somewhat. But, gosh dang, I am sick of dragons. They re always getting into my garden, pulverizing my cabbages (and also my house). It s time for an open season.
So, let s go dragon hunting! First, though, you ll need a gun. Spells and arrows won t do here.
Lock and load
Check out Project Flintlock, a mod that adds a few guns to Skyrim. Install is fairly simple. Just extract the meshes, textures, and sound folders, plus the Project Flintlock.esp file to your Skyrim/data install directory. After that, you just need to make sure the mod is checked in the Skyrim launcher under Data Files.
The total feature set includes:
• authentic flintlock rifle, blunderbuss, and grenade launcher, animated and rigid
• ammo with different damage values
• three different bayonets (short, long, sword) for the flintlock rifle
• new location with new models and items
• custom sounds and new effects for each weapon type
• the weapons are craftable, enchantable, upgradeable, follower friendly
• an optional ammo add-on with 15 new bullet types
The animations aren t perfect, and it becomes fairly obvious that they re just reskinned, stat-modified bows and arrows, but I m willing to suspend my disbelief for the sake of dragon population control. Here s a quick look at all three:
The weapons are assigned bullets just like arrows, so be sure to match the correct ammo with whatever gun is equipped. It's important to maintain realism in a fantasy setting.
Dragons for dinner
Alright, it's time to head out. Bring your jacket? License? Good, good. First, we ll need to find some kind of evidence that a dragon has been nearby. You see, the key to dragon hunting is—
Never mind!
Let s see how it takes to the musket.
Looks straight out of a gum commercial.
Looks straight out of a gum commercial.
Well, shoot, for lack of a better term. That's not much damage at all. The big dog hardly flinched. And I got breathed on by cold stuff! And it smelled really bad, not like those gum commercials would make you think. Caught a whiff of dead goat, corrupt jarl, and—what's that? Cabbages! It's time to end this.
Let's not waste any more time.
Inching the damage up just a smidge.
Inching the damage up just a smidge.
Oh god. What have I done?
I guess they're not so bad when they're not flying around, breathing smelly cold stuff on you.
Save the dragons
Ah, dang. I'm reflecting on my actions, feeling consequence, guilt, and all that jazz. I thought this was about extrinsic danger, but now I m all worried about who I am and becoming a monster . I mean, the dragons are sentient, yeah? And when I was just using the powers and gear I earned, we were sort of duking it out on fair terms. Turns out Skyrim might also have its fair share of folks thinking about how messed up humanity might be, looking in the mirror, gaunt-eyed, crying and whatnot. Going to liberal arts schools. Can t escape short fiction in Skyrim. So, without further adieu, the revelation:
Maybe dragons aren t the most dangerous game.
Maybe, we re the most dangerous game.
Or maybe, Project Flintlock is just dumb fun, especially in a game that you might have already explored, head to toe.
PC Gamer
My big hope for The Elder Scrolls VI: Elsweyr (I also hope that it's called that, and it's set in cat-people land Elsweyr) is that it's more systemic, more reactive and even more sandboxy than previous games in the series. Bethesda could start by re-introducing hauntings and NPC mourning, two features that, as it turns out, were cut from Skyrim. Modder vagonumero12 has dug through the game files, discovered the relevant code, and modded them back into the game.
Here's how haunting and mourning were supposed to work, according to the modder, before Bethesda scrapped the embryonic features.
"Haunting: when a unique NPC with family dies, there will be a random chance that it will—after some time—"resurrect" as a ghost that will follow a relative for the rest of the game. Only NPCs with generic voice files (don't expect to see Ulfric as a ghost), and only a single NPC in the whole save. You won't be able to fill Skyrim with ghosts (it was left like that by Bethesda).
Mourning: when a unique NPC with family or friends dies, their relatives/friends will do some comment about their loss to you on their hello dialogues."
The features don't appear to have been developed very much before they were cut, but Bethesda did get their voice actors to record some of that "my relative died, I'm well sad" dialogue. All of the 'random NPC' voice actors appear to have been asked to record these lines, including, weirdly, the ones that supplied the voices for Skyrim's children. Hear some kids lament the loss of their husbands and daughters here.
You can download vagonumero12's Haunting and Mourning mod here. (Thanks, Kotaku.)
Search news
Oct Sep Aug Jul Jun May
Apr Mar Feb Jan
Archives By Year
2015 2014 2013 2012 2011
2010 2009 2008 2007 2006
2005 2004 2003 2002 | http://store.steampowered.com/news/?feed=pcgamer&appids=72850%2C211720%2C22330%2C22320&appgroupname=Elder+Scrolls+Collection&headlines=0 | dclm-gs1-253250001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.036763 | <urn:uuid:8621ae02-81c8-4c8a-82fd-6aa86211e0f0> | en | 0.906967 | DomainKeys Identified MailT. Hansen
Request for Comments: 5585AT&T Laboratories
Category: InformationalD. Crocker
Brandenburg InternetWorking
P. Hallam-Baker
Default Deny Security, Inc.
June 2009
DomainKeys Identified Mail (DKIM) Service Overview
Status of This Memo
Copyright Notice
This document provides an overview of the DomainKeys Identified Mail (DKIM) service and describes how it can fit into a messaging service. It also describes how DKIM relates to other IETF message signature technologies. It is intended for those who are adopting, developing, or deploying DKIM. DKIM allows an organization to take responsibility for transmitting a message, in a way that can be verified by a recipient. The organization can be the author's, the originating sending site, an intermediary, or one of their agents. A message can contain multiple signatures from the same or different organizations involved with the message. DKIM defines a domain-level digital signature authentication framework for email, using public-key cryptography, with the domain name service as its key server technology (RFC 4871). This permits verification of a responsible organization, as well as the integrity of the message contents. DKIM also enables a mechanism that permits potential email signers to publish information about their email signing practices; this will permit email receivers to make additional assessments about messages. DKIM's authentication of email identity can assist in the global control of "spam" and "phishing".
Table of Contents
1. Introduction
This document provides a description of the architecture and functionality for DomainKeys Identified Mail (DKIM), that is, the core mechanism for signing and verifying messages. It is intended for those who are adopting, developing, or deploying DKIM. It will also be helpful for those who are considering extending DKIM, either into other areas of use or to support additional features. This overview does not provide information on threats to DKIM or email or details on the protocol specifics, which can be found in [RFC4686] and [RFC4871], respectively. Because the scope of this overview is restricted to the technical details of signing and verifying using DKIM, it does not explore operational issues, the details of services that DKIM uses, or those that, in turn, use DKIM. Nor does it discuss services that build upon DKIM for enforcement of policies or assessments. The document assumes a background in basic email and network security technology and services.
DKIM allows an organization to take responsibility for a message in a way that can be verified by a recipient. The organization can be a direct handler of the message, such as the author's, the originating sending site's, or an intermediary's along the transit path. However, it can also be an indirect handler, such as an independent service that is providing assistance to a direct handler. DKIM defines a domain-level digital signature authentication framework for email through the use of public-key cryptography and using the domain name service as its key server technology [RFC4871]. It permits verification of the signer of a message, as well as the integrity of its contents. DKIM will also provide a mechanism that permits potential email signers to publish information about their email signing practices; this will permit email receivers to make additional assessments of unsigned messages. DKIM's authentication of email identity can assist in the global control of "spam" and "phishing".
Neither this document nor DKIM attempts to provide solutions to the world's problems with spam, phishing, viruses, worms, joe jobs, etc. DKIM provides one basic tool, in what needs to be a large arsenal, for improving basic trust in the Internet mail service. However, by itself, DKIM is not sufficient to that task and this overview does not pursue the issues of integrating DKIM into these larger efforts, beyond a simple reference within a system diagram. Rather, it is a basic introduction to the technology and its use.
1.1. DKIM's Scope
A person or organization has an "identity" -- that is, a constellation of characteristics that distinguish them from any other identity. Associated with this abstraction can be a label used as a reference, or "identifier". This is the distinction between a thing and the name of the thing. DKIM uses a domain name as an identifier, to refer to the identity of a responsible person or organization. In DKIM, this identifier is called the Signing Domain IDentifier (SDID) and is contained in the DKIM-Signature header fields "d=" tag. Note that the same identity can have multiple identifiers.
A DKIM signature can be created by a direct handler of a message, such as the message's author or by an intermediary. A signature also can be created by an independent service that is providing assistance to a handler of the message. Whoever does the signing chooses the SDID to be used as the basis for later assessments. Hence, the reputation associated with that domain name might be an additional basis for evaluating whether to trust the message for delivery. The owner of the SDID is declaring that they accept responsibility for the message and can thus be held accountable for it.
DKIM is intended as a value-added feature for email. Mail that is not signed by DKIM is handled in the same way as it was before DKIM was defined. The message will be evaluated by established analysis and filtering techniques. (A signing policy can provide additional information for that analysis and filtering.) Over time, widespread DKIM adoption could permit stricter handling of messages that are not signed. However, early benefits do not require this and probably do not warrant this.
DKIM has a narrow scope. It is an enabling technology, intended for use in the larger context of determining message legitimacy. This larger context is complex, so it is easy to assume that a component like DKIM, which actually provides only a limited service, instead satisfies the broader set of requirements.
By itself, a DKIM signature:
1.2. Prior Work
Historically, the IP Address of the system that directly sent the message -- that is, the previous email "hop" -- has been treated as an identity to use for making assessments. For example, see [RFC4408], [RFC4406], and [RFC4407] for some current uses of the sending system's IP Address. The IP Address is obtained via underlying Internet information mechanisms and is therefore trusted to be accurate. Besides having some known security weaknesses, the use of addresses presents a number of functional and operational problems. Consequently, there is a widespread desire to use an identifier that has better correspondence to organizational boundaries. Domain names can satisfy this need.
There have been four previous IETF Internet Mail signature standards. Their goals have differed from those of DKIM. PEM and MOSS are only of historical interest.
Development of both S/MIME and OpenPGP has continued. While each has achieved a significant user base, neither one has achieved ubiquity in deployment or use.
To the extent that other message-signing services might have been adapted to do the job that DKIM is designed to perform, it was felt that repurposing any of those would be more problematic than creating a separate service. That said, DKIM only uses cryptographic components that have a long history, including use within some of those other messaging security services.
DKIM is differentiated by its reliance on an identifier that is specific to DKIM use.
DKIM also has a distinctive approach for distributing and vouching for keys. It uses a key-centric, public-key management scheme, rather than the more typical approaches based on a certificate in the styles of Kohnfelder (X.509) [Kohnfelder] or Zimmermann (web of trust) [WebofTrust]. For DKIM, the owner of the SDID asserts the validity of a key, rather than having the validity of the key attested to by a trusted third party, often including other assertions, such as a quality assessment of the key's owner. DKIM treats quality assessment as an independent, value-added service, beyond the initial work of deploying a signature verification service.
Further, DKIM's key management is provided by adding information records to the existing Domain Name System (DNS) [RFC1034], rather than requiring deployment of a new query infrastructure. This approach has significant operational advantages. First, it avoids the considerable barrier of creating a new global infrastructure; hence, it leverages a global base of administrative experience and highly reliable distributed operation. Second, the technical aspect of the DNS is already known to be efficient. Any new service would have to undergo a period of gradual maturation, with potentially problematic early-stage behaviors. By (re-)using the DNS, DKIM avoids these growing pains.
1.3. Internet Mail Background
The basic Internet email service has evolved extensively over its several decades of continuous operation. Its modern architecture comprises a number of specialized components. A discussion about Mail User Agents (MUAs), Mail Handling Services (MHSs), Mail Transfer Agents (MTAs), Mail Submission Agents (MSAs), Mail Delivery Agents (MDAs), Mail Service Providers (MSPs), Administrative Management Domains (ADMDs), Mediators, and their relationships can be found in Appendix A.
2. The DKIM Value Proposition
The nature and origins of a message often are falsely stated. Such misrepresentations may be employed for legitimate or nefarious reasons. DKIM provides a foundation for distinguishing legitimate mail, and thus a means of associating a verifiable identifier with a message. Given the presence of that identifier, a receiver can make decisions about further handling of the message, based upon assessments of the identity that is associated with the identifier.
Receivers who successfully verify a signature can use information about the signer as part of a program to limit spam, spoofing, phishing, or other undesirable behaviors. DKIM does not, itself, prescribe any specific actions by the recipient; rather, it is an enabling technology for services that do.
These services will typically:
1. Determine a verified identity as taking responsibility for the message, if possible.
2. Evaluate the trustworthiness of this/these identities.
The role of DKIM is to perform the first of these; DKIM is an enabler for the second.
2.1. Identity Verification
Consider an attack made against an organization or against customers of an organization. The name of the organization is linked to particular Internet domain names (identifiers). Attackers can leverage using either a legitimate domain name, one without authorization, or a "cousin" name that is similar to one that is legitimate, but is not controlled by the target organization. An assessment service that uses DKIM can differentiate between a domain (SDID) used by a known organization and a domain used by others. As such, DKIM performs the positive step of identifying messages associated with verifiable identities, rather than the negative step of identifying messages with problematic use of identities. Whether a verified identity belongs to a Good Actor or a Bad Actor is a question for later stages of assessment.
2.2. Enabling Trust Assessments
Email receiving services are faced with a basic decision: whether to accept and deliver a newly arrived message to the indicated recipient? That is, does the receiving service trust that the message is sufficiently "safe" to be viewed? For the modern Internet, most receiving services have an elaborate engine that formulates this quality assessment. These engines take a variety of information as input to the decision, such as from reputation lists and accreditation services. As the engine processes information, it raises or lowers its trust assessment for the message.
In order to formulate reputation information, an accurate, stable identifier is needed. Otherwise, the information might not pertain to the identified organization's own actions. When using an IP Address, accuracy is based on the belief that the underlying Internet infrastructure supplies an accurate address. When using domain-based reputation data, some other form of verification is needed, since it is not supplied independently by the infrastructure.
DKIM satisfies this requirement by declaring a valid "responsible" identity -- referenced through the SDID -- about which the engine can make quality assessments and by using a digital signature to ensure that use of the identifier is authorized. However, by itself, a valid DKIM signature neither lowers nor raises the level of trust associated with the message, but it enables other mechanisms to be used for doing so.
An organization might build upon its use of DKIM by publishing information about its Signing Practices (SP). This could permit detecting some messages that purport to be associated with a domain, but which are not. As such, an SP can cause the trust assessment to be reduced, or leave it unchanged.
2.3. Establishing Message Validity
As described above, this validity neither lowers nor raises the level of trust associated with the message. If it was an untrustworthy message when initially sent, the verifier can be certain that the message will be equally untrustworthy upon receipt and successful verification.
3. DKIM Goals
DKIM adds an end-to-end authentication capability to the existing email transfer infrastructure. That is, there can be multiple email relaying hops between signing and verifying. Hence, it defines a mechanism that only needs to be supported by the signer and the verifier, rather than any of the functional components along the handling path. This motivates functional goals about the authentication itself and operational goals about its integration with the rest of the Internet email service.
3.1. Functional Goals
3.1.1. Use Domain-Level Granularity for Assurance
DKIM provides accountability at the coarse granularity of an organization or, perhaps, a department. An existing construct that enables this granularity is the Domain Name [RFC1034]. DKIM binds a signing key record to a Domain Name as the SDID. Further benefits of using domain names include simplifying key management, enabling signing by the infrastructure as opposed to the MUA, and reducing privacy concerns.
Contrast this with OpenPGP and S/MIME, which associate verification with individual authors, using their full email addresses.
3.1.2. Implementation Locality
Any party, anywhere along the transit path, can implement DKIM signing. Its use is not confined to particular systems, such as the author's MUA or the inbound boundary MTA, and there can be more than one signature per message.
3.1.3. Allow Delegation of Signing to Independent Parties
Different parties have different roles in the process of email exchange. Some are easily visible to end users and others are primarily visible to operators of the service. DKIM was designed to support signing by any of these different parties and to permit them to sign with any domain name that they deem appropriate (and for which they hold authorized signing keys). As an example, an organization that creates email content often delegates portions of its processing or transmission to an outsourced group. DKIM supports this mode of activity, in a manner that is not normally visible to end users. Similarly, a reputation provider can delegate a signing key for a domain under the control of the provider, to be used by an organization for which the provider is prepared to vouch.
3.1.4. Distinguish the Core Authentication Mechanism from Its Derivative Uses
An authenticated identity can be subject to a variety of assessment policies, either ad hoc or standardized. DKIM separates basic authentication from assessment. The only semantics inherent to a DKIM signature are that the signer is asserting some kind of responsibility for the message. Any interpretation of this kind of responsibility is the job of services building on DKIM, but the details are beyond the scope of that core. One such mechanism might assert a relationship between the SDID and the author, as specified in the rfc5322.From: header field's domain identity. Another might specify how to treat an unsigned message with that rfc5322.From: field domain.
3.1.5. Retain Ability to Have Anonymous Email
The ability to send a message that does not identify its author is considered to be a valuable quality of the current email service that needs to be retained. DKIM is compatible with this goal since it permits authentication of the email system operator, rather than the content author. If it is possible to obtain effectively anonymous accounts at, knowing that a message definitely came from does not threaten the anonymity of the user who authored it.
3.2. Operational Goals
3.2.1. Make Presence of Signature Transparent to Non-Supporting Recipients
In order to facilitate incremental adoption, DKIM is designed to be transparent to recipients that do not support it. A DKIM signature does not "get in the way" for such recipients.
Contrast this with S/MIME and OpenPGP, which modify the message body. Hence, their presence is potentially visible to email recipients, whose user software needs to process the associated constructs.
3.2.2. Treat Verification Failure the Same as No Signature Present
DKIM must also be transparent to existing assessment mechanisms. Consequently, a DKIM signature verifier is to treat messages with signatures that fail as if they were unsigned. Hence, the message will revert to normal handling, through the receiver's existing filtering mechanisms. Thus, DKIM specifies that an assessing site is not to take a message that has a broken signature and treat it any differently than if the signature weren't there.
Contrast this with OpenPGP and S/MIME, which were designed for strong cryptographic protection. This included treating verification failure as message failure.
3.2.3. Permit Incremental Adoption for Incremental Benefit
DKIM can be used by any two organizations that exchange email and implement DKIM; it does not require adoption within the open Internet's email infrastructure. In the usual manner of "network effects", the benefits of DKIM increase as its adoption increases.
Although this mechanism can be used in association with independent assessment services, such services are not essential in order to obtain initial benefit. For example, DKIM allows (possibly large) pairwise sets of email providers and spam filtering companies to distinguish mail that is associated with a known organization, versus mail that might deceptively purport to have the affiliation. This in turn allows the development of "whitelist" schemes whereby authenticated mail from a known source with good reputation is allowed to bypass some anti-abuse filters.
In effect, the email receiver can use their set of known relationships to generate their own reputation data. This works particularly well for traffic between large sending providers and large receiving providers. However, it also works well for any operator, public or private, that has mail traffic dominated by exchanges among a stable set of organizations.
Management of email delivery problems currently represents a significant pain point for email administrators at every point on the mail transit path. Administrators who have deployed DKIM verification have an incentive to encourage senders (who might subsequently complain that their email is not being delivered) to use DKIM signatures.
3.2.4. Minimize the Amount of Required Infrastructure
In order to allow early adopters to gain early benefit, DKIM makes no changes to the core Internet Mail service and, instead, can provide a useful benefit for any individual pair of signers and verifiers who are exchanging mail. Similarly, DKIM's reliance on the Domain Name System greatly reduces the amount of new administrative infrastructure that is needed across the open Internet.
3.2.5. Permit a Wide Range of Deployment Choices
DKIM can be deployed at a variety of places within an organization's email service. This affords flexibility in terms of who administers its use, as well as what traffic carries a DKIM signature. For example, employing DKIM at an outbound boundary MTA will mean that it is administered by the organization's central IT department and that internal messages are not signed.
4. DKIM Function
DKIM has a very constrained set of capabilities, primarily targeting email while it is in transit from an author to a set of recipients. It associates verifiable information with a message, especially a responsible identity. When a message does not have a valid signature associated with the author, a DKIM SP will permit the domain name of the author to be used for obtaining information about their signing practices.
4.1. Basic Signing
With the DKIM signature mechanism, a signer chooses an SDID, performs digital signing on the message, and adds the signature information using a DKIM header field. A verifier obtains the domain name and the "selector" from the DKIM header field, obtains the public key associated with the name, and verifies the signature.
DKIM permits any domain name to be used as the SDID, and supports extensible choices for various algorithms. As is typical for Internet standards, there is a core set of algorithms that all implementations are required to support, in order to guarantee basic interoperability.
DKIM permits restricting the use of a signature key to signing messages for particular types of services, such as only for a single source of email. This is intended to be helpful when delegating signing authority, such as to a particular department or to a third-party outsourcing service.
With DKIM, the signer explicitly lists the headers that are signed, such as From:, Date:, and Subject:. By choosing the minimal set of headers needed, the signature is likely to be considerably more robust against the handling vagaries of intermediary MTAs.
4.2. Characteristics of a DKIM Signature
A DKIM signature applies to the message body and selected header fields. The signer computes a hash of the selected header fields and another hash of the body. The signer then uses a private key to cryptographically encode this information, along with other signing parameters. Signature information is placed into DKIM-Signature:, a new [RFC5322] message header field.
4.3. The Selector Construct
The key for a signature is associated with an SDID. That domain name provides the complete identity used for making assessments about the signer. (The DKIM specification does not give any guidance on how to do an assessment.) However, this name is not sufficient for making a DNS query to obtain the key needed to verify the signature.
A single SDID can have multiple signing keys and/or multiple potential signers. To support this, DKIM identifies a particular signature as using a combination of the SDID and an added field, called the "selector", specified in a separate DKIM-Signature: header field parameter.
The semantics of the selector (if any) are strictly reserved to the signer and is to be treated as an opaque string by all other parties. If verifiers were to employ the selector as part of an assessment mechanism, then there would be no remaining mechanism for making a transition from an old, or compromised, key to a new one.
4.4. Verification
After a message has been signed, any agent in the message transit path can verify the signature to determine that the owner of the SDID took responsibility for the message. Message recipients can verify the signature by querying the DNS for the signer's domain directly, to retrieve the appropriate public key, and thereby confirm that the message was signed by a party in possession of the private key for the SDID. Typically, verification will be done by an agent in the Administrative Management Domain (ADMD) of the message recipient.
4.5. Sub-Domain Assessment
Signers often need to support multiple assessments about their organization, such as to distinguish one type of message from another, or one portion of the organization from another. To permit assessments that are independent, one method is for an organization to use different sub-domains as the SDID tag, such as "" versus "", or "" versus "". These can be entirely separate from the rfc5322.From header field domain.
5. Service Architecture
DKIM uses external service components, such as for key retrieval and relaying email. This specification defines an initial set, using DNS and SMTP, for basic interoperability.
|- RFC5322 Message
+--------+ |
(paired) [Internet]
| Key | | RELAYING OR DELIVERING ADMD | | Sender |
| Store | | Message Signed? | | Practices |
. |yes |no .
. V | .
| Signature | | | .
pass| fail| | .
V | | .
| | | | .
. | | V V .
. | | .
. | V .
|Reputation/ | | | Message | | Local Info |
|Info | | Engine | | Practices |
Figure 1: DKIM Service Architecture
As shown in Figure 1, basic message processing is divided between a signing Administrative Management Domain (ADMD) and a verifying ADMD. At its simplest, this is between the originating ADMD and the delivering ADMD, but can involve other ADMDs in the handling path.
Signing is performed by an authorized module within the signing ADMD and uses private information from the Key Store, as discussed below. Within the originating ADMD, this might be performed by the MUA, MSA, or an MTA.
verifying is performed by an authorized module within the verifying ADMD. Within a delivering ADMD, verifying might be performed by an MTA, MDA, or MUA. The module verifies the signature or determines whether a particular signature was required. Verifying the signature uses public information from the Key Store. If the signature passes, reputation information is used to assess the signer and that information is passed to the message filtering system. If the signature fails or there is no signature using the author's domain, information about signing practices related to the author can be retrieved remotely and/or locally, and that information is passed to the message filtering system.
If a message has more than one valid signature, the order in which the signers are assessed and the interactions among the assessments are not defined by the DKIM specification.
5.1. Administration and Maintenance
A number of tables and services are used to provide external information. Each of these introduces administration and maintenance requirements.
Key Store:
DKIM uses public-/private-key (asymmetric) cryptography. The signer users a private key and the verifier uses the corresponding public key. The current DKIM Signing specification provides for querying the Domain Names Service (DNS), to permit a verifier to obtain the public key. The signing organization therefore needs to have a means of adding a key to the DNS, for every selector/SDID combination. Further, the signing organization needs policies for distributing and revising keys.
If a message contains a valid signature, then the verifier can evaluate the associated domain name's reputation, in order to determine appropriate delivery or display options for that message. Quality assessment information, which is associated with a domain name, comes in many forms and from many sources. DKIM does not define assessment services. Its relevance to them is to provide a verified domain name, upon which assessments can be made.
Signing Practices (SP):
Separate from determining the validity of a signature, and separate from assessing the reputation of the organization that is associated with the signed identity, there is an opportunity to determine any organizational practices concerning a domain name. Practices can range widely. They can be published by the owner of the domain or they can be maintained by the evaluating site. They can pertain to the use of the domain name, such as whether it is used for signing messages, whether all mail having that domain name in the author rfc5322.From: header field is signed, or even whether the domain owner recommends discarding messages in the absence of an appropriate signature. The statements of practice are made at the level of a domain name, and are distinct from assessments made about particular messages, as occur in a Message Filtering Engine. Such assessments of practices can provide useful input for the Message Filtering Engine's determination of message handling. As practices are defined, each domain name owner needs to consider what information to publish. The nature and degree of checking practices, if any are performed, is optional to the evaluating site and is strictly a matter of local policy.
5.2. Signing
Signing can be performed by a component of the ADMD that creates the message, and/or within any ADMD along the relay path. The signer uses the appropriate private key that is associated with the SDID.
5.3. Verifying
Verification can be performed by any functional component along the relay and delivery path. Verifiers retrieve the public key based upon the parameters stored in the message.
5.4. Unverified or Unsigned Mail
Messages lacking a valid author signature (a signature associated with the author of the message as opposed to a signature associated with an intermediary) can prompt a query for any published "signing practices" information, as an aid in determining whether the author information has been used without authorization.
5.5. Assessing
Figure 1 shows the verified identity as being used to assess an associated reputation, but it could be applied to other tasks, such as management tracking of mail. Local policy guidelines may cause signing practices to be checked or the message may be sent directly to the message Filtering Engine.
A popular use of reputation information is as input to a Filtering Engine that decides whether to deliver -- and possibly whether to specially mark -- a message. Filtering Engines have become complex and sophisticated. Their details are outside of the scope of DKIM, other than the expectation that the verified identity produced by DKIM can accumulate its own reputation, and will be added to the varied soup of rules used by the engines. The rules can cover signed messages and can deal with unsigned messages from a domain, if the domain has published information about its practices.
5.6. DKIM Processing within an ADMD
It is expected that the most common venue for a DKIM implementation will be within the infrastructures of the authoring organization's outbound service and the receiving organization's inbound service, such as a department or a boundary MTA. DKIM can be implemented in an author's or recipient's MUA, but this is expected to be less typical, since it has higher administration and support costs.
A Mediator is an MUA that receives a message and can repost a modified version of it, such as to a mailing list. A DKIM signature can survive some types of modifications through this process. Furthermore, the Mediator can add its own signature. This can be added by the Mediator software itself, or by any outbound component in the Mediator's ADMD.
6. Considerations
6.1. Security Considerations
The security considerations of the DKIM protocol are described in the DKIM base specification [RFC4871], with [RFC4686] as their basis.
6.2. Acknowledgements
Many people contributed to the development of the DomainKeys Identified Mail and the effort of the DKIM Working Group is gratefully acknowledged. In particular, we would like to thank Jim Fenton for his extensive feedback diligently provided on every version of this document.
7. Informative References
[Kohnfelder]Kohnfelder, L., “Towards a Practical Public-key Cryptosystem”, May 1978.
[RFC0989]Linn, J. and IAB Privacy Task Force, “Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures”, RFC 989, February 1987.
[RFC1113]Linn, J., “Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication procedures”, RFC 1113, August 1989.
[RFC1848]Crocker, S., Galvin, J., Murphy, S., and N. Freed, “MIME Object Security Services”, RFC 1848, October 1995.
[RFC1991]Atkins, D., Stallings, W., and P. Zimmermann, “PGP Message Exchange Formats”, RFC 1991, August 1996.
[RFC2440]Callas, J., Donnerhacke, L., Finney, H., and R. Thayer, “OpenPGP Message Format”, RFC 2440, November 1998.
[RFC3156]Elkins, M., Del Torto, D., Levien, R., and T. Roessler, “MIME Security with OpenPGP”, RFC 3156, August 2001.
[RFC3851]Ramsdell, B., “Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification”, RFC 3851, July 2004.
[RFC4406]Lyon, J. and M. Wong, “Sender ID: Authenticating E-Mail”, RFC 4406, April 2006.
[RFC4407]Lyon, J., “Purported Responsible Address in E-Mail Messages”, RFC 4407, April 2006.
[RFC4408]Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1”, RFC 4408, April 2006.
[RFC5322]Resnick, P., Ed., “Internet Message Format”, RFC 5322, October 2008.
[WebofTrust]Network Associates, Inc. and its Affiliated Companies, “How PGP works, in Introduction to Cryptography”, 1999, <>.
Authors' Addresses
Tony HansenAT&T Laboratories200 Laurel Ave.Middletown, NJ 07748USAEmail:
Dave CrockerBrandenburg InternetWorking675 Spruce Dr.Sunnyvale, CA 94086USAEmail:
Phillip Hallam-Baker Default Deny Security, Inc.Email:
A. Internet Mail Background
A.1. Core Model
Internet Mail is split between the user world, in the form of Mail User Agents (MUA), and the transmission world, in the form of the Mail Handling Service (MHS) composed of Mail Transfer Agents (MTA). The MHS is responsible for accepting a message from one user, the author, and delivering it to one or more other users, the recipients. This creates a virtual MUA-to-MUA exchange environment. The first component of the MHS is called the Mail Submission Agent (MSA) and the last is called the Mail Delivery Agent (MDA).
An email Mediator is both an inbound MDA and outbound MSA. It takes delivery of a message, makes changes appropriate to its service, and then reposts it for further distribution. Typically, the new message will retain the original rfc5322.From: header field. A mailing list is a common example of a Mediator.
The modern Internet Mail service is marked by many independent operators, many different components for providing users with service and many other components for performing message transfer. Consequently, it is necessary to distinguish administrative boundaries that surround sets of functional components, which are subject to coherent operational policies.
As elaborated on below, every MSA is a candidate for signing using DKIM, and every MDA is a candidate for doing DKIM verification.
A.2. Trust Boundaries
Operation of Internet Mail services is apportioned to different providers (or operators). Each can be composed of an independent ADministrative Management Domain (ADMD). An ADMD operates with an independent set of policies and interacts with other ADMDs according to differing types and amounts of trust. Examples include an end user operating a desktop client that connects to an independent email service, a department operating a submission agent or a local Relay, an organization's IT group that operates enterprise Relays, and an ISP operating a public shared email service.
Each of these can be configured into many combinations of administrative and operational relationships, with each ADMD potentially having a complex arrangement of functional components. Figure 2 depicts the relationships among ADMDs. Perhaps the most salient aspect of an ADMD is the differential trust that determines its policies for activities within the ADMD, versus those involving interactions with other ADMDs.
Basic types of ADMDs include:
Independent transfer services, in networks at the edge of the Internet Mail service.
End-user services. These might be subsumed under an Edge service, such as is common for web-based email access.
These are Mail Service Providers (MSP) offering value-added capabilities for Edge ADMDs, such as aggregation and filtering.
Note that Transit services are quite different from packet-level transit operation. Whereas end-to-end packet transfers usually go through intermediate routers, email exchange across the open Internet often is directly between the Edge ADMDs, at the email level.
| Edge---+---+ |
| | ------ | |
| | | |
| |
Figure 2: ADministrative Management Domains (ADMD) Example
In Figure 2, ADMD numbers 1 and 2 are candidates for doing DKIM signing, and ADMD numbers 2, 3, and 4 are candidates for doing DKIM verification.
The distinction between Transit network and Edge network transfer services is primarily significant because it highlights the need for concern over interaction and protection between independent administrations. The interactions between functional components within a single ADMD are subject to the policies of that domain. Although any pair of ADMDs can arrange for whatever policies they wish, Internet Mail is designed to permit inter-operation without prior arrangement.
Common ADMD examples are:
Enterprise Service Providers:
Operators of an organization's internal data and/or mail services.
Internet Service Providers:
Operators of underlying data communication services that, in turn, are used by one or more Relays and Users. It is not necessarily their job to perform email functions, but they can, instead, provide an environment in which those functions can be performed.
Mail Service Providers:
Operators of email services, such as for end users, or mailing lists. | http://testing.dkim.org/specs/rfc5585.html | dclm-gs1-253280001 | false | true | {
"keywords": "el tor, repurposing"
} | false | null | false |
0.28952 | <urn:uuid:57ef5083-d179-4609-a6f7-e08e17e1d9ae> | en | 0.842697 |
Type to find tags:
× 164
a syntax for embedding structured data in HTML5, making use of vocabularies. If the question is about the popular vocabulary Schema.org, use the tag [schema.org].
× 162
A server which a website lives on.
× 161
HTML tags that convey information about a webpage, such as it's title or it's description, in a way that a computer program can understand.
× 161
A popular content management system that powers many information websites . See http://www.mediawiki.org/ for more info.
× 155
× 150
HTTP Stands for "Hyper Text Transfer Protocol", and is the protocol that applications use to access documents/webpages/data from the world wide web.
× 149
a popular technique for creating interactive websites, though other technologies (e.g. JSON) are often used instead of XML.
× 143
a web application framework developed by Microsoft to allow programmers to build dynamic web sites and web applications.
× 140
× 139
XML files created to make it easier for Search Engine crawlers and other bots to efficiently and fully crawl a website.
× 139
Page-Speed normally refers to the time it takes for a web-page to be presented to a browser in a "fully loaded" state.
× 137
Virtual Private Server - a term used by internet hosting services to refer to a virtual machine.
× 136
A legal concept intended to protect the intellectual property rights of authors and artists by making unauthorized copying a civil or criminal offense.
× 133
commonly understood as the act of asserting a user's or entity's identity, although in the wider sense it can refer to asserting the truthfulness of any kind of claim. Authentication…
× 131
Organization that manages domain registrations
× 130
× 127
× 126
HTML tag displaying the title of a web page.
× 125 × 125
normally associated when more than 1 user is using a web host that uses the same resources to serve their web content to internet.
× 124
To make the conditions the best or the most favorable.
× 123
a free blog-publishing service owned by Google that allows private or multi-user blogs with time-stamped entries.
× 122
A description shown in search engine result pages about a website that is better quality than just a few lines of text.
× 121
× 120
System that handles large amounts of data in an organised fashion.
× 120
should refer to creating, editing, and displaying video on electronic devices. As video capture and playback vary significantly across platforms, it would be helpful to in…
× 118
a server that query and assign Human readable URL or IP Address.
× 115
× 113
a popular open source PHP-based CMS. There is a Drupal Stack Exchange at http://drupal.stackexchange.com/, so if your question is related to Drupal but not Pro Webmasters, then it should be …
× 112
Position of a web site or a web page in Google results.
× 110
an Ecommerce platform written in PHP. It uses a configuration-based MVC system and heavily leverages Java style OOP patterns in the business logic, UI, and layout rendering application laye…
× 110
Questions relating to Webmasters using various Marketing methods to promote their online website(s).
× 108
Questions related to the search for a web hosting provider. See this question before posting: http://webmasters.stackexchange.com/questions/20838/how-to-find-web-hosting-that-meets-my-requirements
× 108
Local Search Engine Optimization (local SEO) is a process of improving discoverability and visibility of web pages at a town, city or regional level, within location-based search functions (e.g. "resu…
× 106
× 105
This refers to the optimisation of websites that provide content in multiple languages, or variants of languages. Common issues relate to mechanisms for directing users to content in their language, a… | http://webmasters.stackexchange.com/tags?page=3&tab=popular | dclm-gs1-253520001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.028686 | <urn:uuid:101a5d7e-faff-444b-ab68-1739b84e165a> | en | 0.975541 | Welcome to the Anything and Everything Jersey and Winchester abuse case blog.
Please scroll past these initial links to get to the main blog or the post you have come to read.
This is a statement from last summer:
Here is a link to the four great letters:
Here is a collection of Open Letters:
Here is my psychological report from last year:
This is my Daily Blog running from October 2011 until now:
These are other people's blogs on my case:
The blog itself is quite broken up, not written in an ordered fashion, a bit mixed up, like I am, talking about Jersey, the Diocese and my life.
Thank you for reading my blog, please persevere if it is at a bitty phase, go back and find what you are looking for in older posts, use the search button, or look at the favourite posts and links in the side bars.
The blog is heavy, I know, but the case is complex and the reality is that it has always been beyond me to get past the trauma and tell my story, so I am doing my best, in bits, to do so, as well as sharing related articles and links.
• I was abused in the Church of England as a vulnerable adult aged 19.
• I was abused by the husband of a vicar who was also my counsellor, this vicar took me home as a replacement for her stepdaughter who her husband, the girl's father, had abused and abandoned.
• I was further abused by another church officer.
• The church tried to close my complaints down, refused to deal with them and left both abusers and those who stood up for them in church positions.
• The church got me a criminal record for speaking up, they claimed I was harassing them.
• I had never been in police trouble before, but as a result, I lost my home and job, and was left on the streets, injured by the police and severely traumatized.
• Last year, years too late and the other side of me being destroyed, and while I was still homeless and destitute, the church launched on me in the National press, claiming to apologize.
• They also launched in the press, a 'report' into what had happened. This report was hideously inaccurate although it did show how members of church had abused process in not dealing with my complaint.
• The report, although not naming me, made it quite easy for me to be identified, I was one of very few autistic 33 year old women in the UK on the streets, and enough people who I met and was looked after by, knew who the report was about, and I lost friends and was shunned as a result.
• I also had strangers condemning and maligning me, it was heartbreaking.
• Then a church officer associated with my abuser, also in government, released my name and breached the data protection act.
• As a result of the Press reports and the report released, an all-out war broke out between the Diocese and Deanery involved, with me caught in the middle, I was slandered, I was smeared, I was condemned.
• The Church offered no help and I became ill as each new inaccurate report and cover up came out, each new damnation of me.
• New investigations were comissioned, and one was blatantly conflicted, to be carried out by a member of the group who supported the wrongdoers.
• I have been excluded from all reports, which, to save the church, are whitewashes which cover up the original admissions of wrongdoing.
• The church have treated me coldly, threatened me, despite them having me illegally traced by police, and have not helped me, instead they made illegal referrals of me to what they called help, without my consent and without checking it would help or what I wanted.
• I have pleaded with them to stop the harm to me, but to no avail, and I am living in fear, severely traumatized and knowing I cannot withstand the damning press reports and whitewashes forever.
Tuesday, 6 October 2015
A reminder today to the Bishop of Winchester
Dear recipients,
As a result of the press stunts by the church of england in response to Peter Ball's sentencing, I fear for my life as the church's habit of using me as a whipping boy in the press is unlikely to cease until I take them to court and publicize it. I would like to warn you collectively that if you do attack me in the press as a result of peter ball's sentencing, I will indeed take you to court.
I have spent two years of my life living in terror and horror as a result of the church's horrifying attacks on me. I just phoned Wolvsley and the Eton Queen who put the phone down on me failed to take in my warning that I do not intend to allow the diocese to defame me as part of a PR stunt as a result of Peter Ball's sentencing.
The church haven't apologized for the Korris report, a public attack on me to cover up for Jane Fisher, nor have they arranged an independent investigation yet.
'Independent' does not mean conflicted, it doesn't mean whitewashers with a bias like Korris and Steel, it means someone who listens to both sides, and as yet, only the church's side has been heard. And the church have left me destroyed, with a ludicrous pretence of helping me while they destroyed me, their pretence of help was to illegally refer me to the NSPCC, and the referral was made by the woman who destroyed me and covered up for herself!
I recall Paul Butler's part in the PR stunt when the Korris rubbish was released. He vaguely played his stunts, he was 'praying for everyone involved' so basically he prayed for Bob Key and my abuser instead of stating with fury and horror that what the diocese of Winchester had done in releasing the Korris rubbish, illegally tracing me with the police and having me publicly attacked by those with a vested interest (which the diocese haven't recorded or declared) and those who didn't even know me! So Paul Butler hasn't a clue about safeguarding and Peter Ball's victims haven't a hope in hell of independent investigation if the church just appoint one of the clique - Hedley, Butler-Sloss of Steel or others, to investigate the corruption that their own little circle are guilty of!
I warn you, no more blatant attacks on me in the Local or National papers or the Church Propaganda Rag (church times)! I do not care that the church have powerful lawyers and really are artists in duplicity and plausible lies. You have destroyed me and destroyed me again. Do you think I will just sit here with tape over my mouth or lie on a cell floor with bruises from the police? NO, I WONT, even if you kill me you will not change the deep deep evil of what you have done to me nor will you change the fact that the core of the church of england is an elite club for rich callous and devious older men (and a few women). Eton-voice may put the phone down on me but he will not stop me warning you that even if I die in a convenient police beating that no one witnesses, as has been tried a few times, what you have done to me and are doing to me will NOT GO AWAY, EVER.
Please ensure that the Bishop informs me of the details of the independent investigation into the diocese of winchester and especially Jane Fisher's illegal actions. Having me beaten and imprisoned does destroy me, it will kill me, but it will not take away what you have done. EVER. It is the fifth anniversary of my death at your hands. Left homeless and destitute on the streets of Hampshire, with Jane Fisher determined to utterly and finally destroy me and no-one stopping her. And the Korris report smarms just as Fisher smarmed to everyone she slandered me to 'That she was just trying to help me'.
Do you think it was appropriate for the woman who had me imprisoned and left homeless after months on end of her destroying me, to be allowed to go round slandering me to everyone in the churches and outreach in Winchester while also trying to meet with me alone?! And what report covers any of that so far? Why would the woman who destroyed me and made me out to be mad and violent be meeting with me alone?
Eton voice can slam the phone down but he won't change the fact that there still needs to be a full investigation into EVERYTHING I have to say, because as yet, Bishop Dakin has only investigated ME for JANE FISHER in the Korris RUBBISH and BOB KEY in the STEEL RUBBISH.
Now that the Archbishop has been forced to investigate the corruption and will undoubtedly arrange another whitewash, it is time that the Bishop investigated my side of what happened in Jersey and Winchester, isn't it horrifying that he has called a two year attack on me a safeguarding investigation?
Every time you spineless duplicious church officials make a song and dance in the press, you cause me severe traumatic stress and disrupt my studies. My studies, work, and whole life seem useless to me anyway while I suffer night and day waiting for you to attack me and try to silence me for good, as Jane Fisher did so many times, leaving me severely damaged for life.
Is there any end in sight? Shall we make it this weekend? commemorate the anniversary?
'**************** 19.03.81 - 11.10.10'
I didn't survive Jane Fisher destroying me, and this afterlife waiting for you to finish me off is pure hell, and no matter how I build my life, I can neither remove the hell nor believe in my life while I wait for you to finish me off.
Nonetheless, even if you do, there will have to be a full public inquiry into my death at your hands, and public pressure and circulation of my letters to you will mean you will not win.
I write this expecting, as I never have stopped expecting, for you to kill me with police or press attacks. And then try to slander me. Isn't it great that you will never ever be able to remove the evidence that has been circulated?! And eventually, under a different government, the church will be held to account for blatant dishonesty regarding my case and others. Hey, every post on my blog is saved, every letter and every document is circulated and saved, and the Bishop still wants to kill me with the Steel-Bailhache-Ashenden report, and one day someone will ask why the Bishop was silent when he was asked about this, and why he gave an audience to all Jersey Deanery and supporters, and why the Archbishop did too, and allowed them to defame me in the church times and other press and media, when this matter was supposed to be about safeguarding. It will never be forgotten or covered up, no matter how dishonest the church are!
This is a warning that even if you do, and even if you don't, the Bishop of Winchester has shown an aversion to being taken to court and making a solicitor lie for him in court. So if I live I will take you to court and if you kill me, I think that will be the end of the church of england publicly. And to be honest that is not such a bad thing to bring a shattered and suffering life to a close, because even if I graduate from university, even if my work is a success, the suffering is never going to go, the anguish is unresolved and resting in peace while the corrupt and vicious church of england falls is not such a bad prospect. Actually can we try for the first option, taking you to court again? In an ideal world, you would all stand before a judge voiceless and physically and mentally destroyed from police brutality, but you are the church of england, you are not a victim of the church of england, there is no justice or balancing of scales is there?
An Open Letter to Bishop Paul Butler
What Butler fails to recognize in all his loud empty noise is that while the Cofe is the playground of old freemasons with a lot of money, and closing ranks occurs, he may as well just send out open invites to paedophiles rather than wasting his noisebox on safeguarding pretences.
Dear Bishop Butler,
Following my phone calls, I thought I would write to make sure that you understand fully how much distress you are causing by your lies about safeguarding.
While the situation remains that you are protecting and supporting my abuser, Jane Fisher to remain in safeguarding positions in the church, as well as remaining a church reader, after her misconduct, which even her whitewash cover-up, the Korris report, cannot completely cover up, and while complaints against her have been made to the police and safeguarding bodies as a result of her continuing to harass me, and while she has caused other safeguarding failures even while stitching me up, and while the Church have been notified very clearly that the Korris report was an invalid report and the Steel report is a conflicted whitewash that is leaving me in fear of my life but no redaction or apology has been made, you need to stop lying to the press and media about the Church of England's commitment to safeguarding, and actually take action regarding the Diocese of Winchester. You need to stop misusing the word 'independent' and you need to ensure an independent report by non-conflicted people who have no connection to the Church of England, a report that includes me this time, unlike your other whitewashes that are not credible as they have not been independent and have omitted me and vilified me to the general public and been illegal and a breach of the data protection act.
The church have had me branded, imprisoned, destroyed, left homeless, and their answer to all that was to publicly vilify me internationally in the press as a PR stunt, with no thought for my welfare and safety whatsoever. So I think your crowing and strutting in the press should stop now, until you have apologized, redacted the defamation of me, and recompensed me, although no recompense in the world will take away what you have done to me.
Can you explain how you consider that things have changed in the church when there has been no true investigation into what happened to me, but a huge amount of PR showing off, lies and slander and defamation and illegal activities with regards confidential information and breaches of the data protection act.
Can you explain what has changed in safeguarding when in 2013 I was destroyed by the lies and whitewashes launched into the press and there has as yet been no apology and no redaction, and instead I am living in fear of the report engineered by the Jersey Deanery?
Can you explain why, if you and the church are committed to safeguarding, why Bishop Dakin and Jane Fisher. the perpatrators of this massive attack on a vulnerable adult, nearly killing her, and putting her in danger of attacks with no defence due to the police record and slander of her, are still in their positions? don't you think you should take time out from lying in the press in order to deal with this?
Do you think leaving someone branded, shamed, ruined and broken and waiting to be killed by another round of defamation and lies in the press and internationally is good safeguarding? If that is your understanding of safeguarding then it is time for you to resign./
treat me as a human being, and you and your colleagues act as if I simply 'deserve this ongoing destroyal, then you shouldn't be in your job.
It is time that a major outside investigation got past your lies and flannel and misleading of the public and press and shone a light onto the rotten old Church of England system of duplicity and cover up.
I would like to know how, if Jane Fisher had been successful in killing me as she nearly did, the Church’s so-called safeguarding reports years later would have made any difference, with me dead and totally out of the picture, as opposed to how things are now,m me alive but destroyed and still challenging this evil of being left defamed and destroyed while my abusers remain in church positions, protected and upheld by the church, and in the case of one of them, still accessing vulnerable individuals from Jersey’s town church, where he is upheld and supported by the same group of States-judiciary-church-lawyers who ensured that the Dean of Jersey was cleared.
Can you explain why you and the other Church officers and Bishops have not responded to me in any way or form about the whole situation of the way the church have repeatedly and lastingly destroyed me, gone on harassing me and vilifying me and giving their blessing to those who also harass me, for example, you taking part in a church times article that vilified me and very deliberately upheld my abuser?
And worse.
Until you have answers and until you stop treating me as if ‘I deserve to wait to be destroyed by a conflicted whitewash’ because ‘from what you have heard’ from people who vilify me to cover up for themselves, then you have absolutely no understanding of what abuse victims go through and absolutely no right to talk about safeguarding, because in upholding Fisher, Dakin, Key and others, you completely invalidate your position and the words you speak.
Please stop spitting on Jesus by your nonsense in the press and refusal to safeguard me or deal with the Diocese of Winchester’s harassment of me.
The Church’s continued silence on this matter and allowing me to continue to suffer the shock and distress of press releases that defame me and clear wrongdoers while I wait to be destroyed by the Steel whitewash is a very very serious safeguarding issue and shows your complete and utter contempt for safeguarding, integrity and an abuse survivor who you have branded and crucified just as your predecessors, the Pharisees did to Jesus. As long as this matter goes on, the Church of England has no place in society and is breaching the trade descriptions act by claiming to be a Christian church. Or don’t you bother to claim that any more, is it just known as ‘extra socials outside of the lodge?’
On the subject of Steel, are you the conflicted so-called 'safeguarding expert' viewing the Steel report? And if so, are you aware that you are conflicted by your support of Fisher and your support of the Diocese and Deanery in destroying me? And if so, as you are not independent and have not asked for my side of things and have not ensured that I am included in any reports, and thus you have profoundly failed in safeguarding, isn't it time you shredded the whitewash reports and resigned? Also, you need to declare, if you are in any way involved, that you were Bishop of Southampton, and knew the Montagues and I met you with them, that day when Juliet got Fred to drive me to SOuthampton? If you are involved in Safeguarding then you will be aware that the hundreds upon hundreds of omissions and distortions invalidate the reports by the Diocese of WInchester and are very very bad safeguarding to say the least!
Please read the series of letters after my signature, and if you do not like clicking on links, then go to and go to the ‘Philosophy’ section and you will find the letters there, hopefully including this one.
Thursday, 1 October 2015
The high blog stats indicate...
Another attack by the Church of England is on it's way.
Will it kill me or not? My usual question.
Anyway...How appropriate!
Friday, 25 September 2015
The darkness is eternal
and the cold is unrelenting
It is so cold
that the sea is frozen
I walk on the frozen beach
and there is ice on green island and the rocks
I can see the cardinal markers
I can see the lights on the French Coast
I walk in the dark
and I remember I died here
I can't stop walking
further from the light
my home on the great ship bay
is always in sunlight and joy
but the frost and cold are in my heart
drawing me to where I fell
I try to count the years since my death
and try to turn back towards the light
I died here, and the cold and dark call me
the frost in my heart makes the light and joy of my home unreal
Can't I bring my soul home, to the great ship bay
and rest with the warmth and joy in my heart?
Until my destroyers release me, I am trapped here
fallen on the frozen bay and waiting
The sea beats on the wall, the night goes on,
I go on waiting
and I know you wait too
you can't release me from this so you wait too
there is no happy ending, we know that
because death happened there
so we wait, I look out on the midnight sea
and you stand in the shadows
you are the lantern-bearer, guiding light
you stand in the shadows and they never see your face
And in other news...
The Diocese of Winchester destroy a voiceless vulnerable adult and she asks them to have a voice for her side of things:
Tuesday, 22 September 2015
David Cameron
When the church of england swung the vote to get their protectors, the conservatives, back into power, did they forsee David Cameron, who is supposedly a Christian, making a meal of making a pig of himself and playing with his food?
There is a new crisis in the UK. mass vegetarianism. The farms will suffer like they did with the foot in mouth crisis.
That's all for now.
Refs - The Church propaganda rag told it's flock that voting conservative was the only way as they were the church's 'natural partners'.
Wealthy, country, uncaring people, yes, they are the church's natural partners, the government and the church both wipe their boots on the faces of the poor and vulnerable. Neither understand nor care for the vulnerable or the needy, they make them into outcasts.
I know I tend to put this song up as a Church of England Anthem but...
I'm not allowed to watch Monty Python...
So don't tell my mother
That isn't DakeDake by the way, it's Paul Butler, trying to protect abusers.
and what is all the interest in and from Guernsey on my blogs at the moment?
And here is the Church of England:
Monday, 21 September 2015
Recently I have had nightmares and flashbacks about the Lihous.
Co-incidental to see Guernsey appear on the blog feed.
Is that the Lihous and Honours and Warrens having a nose?
And does any report state the fact that they are all related?
And am I right in hearing that someone tried to ensure the Lihous brought a complaint against me by claiming I had a complaint against them.
Godless egomaniac church people. Repaint and thin no more.
I want to play in Latin now, repeat after me:
Guernsey est stercore capitii textilem
New visitors to the blog
There has been a big increase in viewers of this blog.
I do apologize if you are hoping for new and relevant information.
My day starts at 5.30 as I work as well as being at University, so I am not getting much blogging done.
I think there has been a surge of interest due to the parallels between the deliberate failures of the church and police in Peter Ball's case and my case.
To the people who suffered at Peter Ball's hands, I apologize, I am not trivializing what happened to you. no way.
What happened to you was more serious sexual abuse than I suffered.
What happened to me was sustained sexual and emotional abuse over quite some time, which on top of the terrible childhood I had, was the last straw when I was subjected to the church's denials, cover up and blame.
It must have been awful for Peter Ball's victims to go on seeing him in office as Bishop and to feel unbelieved, and slighted by Butler-Sloss as well. I do know how that feels, being laughed at by my abusers while Jane Fisher destroyed me was indeed intolerable. Jane Fisher being the 'safeguarding director' for the Winchester Diocese who went all-out to destroy me while protecting my abusers in the church.
What more can I say before I go to work?
As yet, no-one is holding the Church of England to account, they are a bit like the government who have shown no remorse for the paedophile ring that has been operating among them.
Paul Butler is usually doing press stunts to get the limelight and make the church look good every time an abuse case is reported.
But he doesn't do anything.
I have been told by a Kendal House survivor that after all the press stunt about an investigation, there hasn't been one yet.
And are the church going to investigate why Ball was left in power, whil Butler was his colleague?
And are they ever going to investigate Jane Fisher and the Winchester Diocese and how the Steel and Korris reports came about?
Sunday, 20 September 2015
ego sum a nortyperson. a minimum terroris
Lost in translation, harhar
Habemus ad proficiscendum redire.Sed finis non erit finis.
Quis hanc multam mecum domi
Ego sum a nortyperson
Thursday, 10 September 2015
Ashenden googles himself
One of the mysteries of life, why is Gavin Ashenden looking himself up on my blog? Does he want acclaim?
I dunno Ashenden if you really want an article about yourself, I could put together what people have sent me.
Apparently you used to be a very unbiased and inclusive Christian.
You were liked by your friends, some of whom have contacted me.
You were married and your wife's bipolar disorder became very serious and she threatened suicide a lot.
Incredibly, after a very stressful time where your wife's illness caused you very much stress, especially the suicide threats, she recovered.
And left you.
It is thought by the various people contacting me about your rabid behaviour of recent years, that that episode with your first wife was what tipped you over into your own mental illness that manifests as the rabid rantings and attacks that you are known for now.
When you judge everyone else as you do, you omit the fact that you are a divorcee and remarried and thus not in a position to lay down the law at all regarding Christianity. But I think you are too far gone to either understand or stop your wrong behaviour.
Anyway, while you were chaplain at the University in Sussex, you were seen to change from inclusive and liberal to rabid and unforgiving, biased and judgemental.
This is apparently why you had to leave there.
And Jersey of course being the trash can for priests with misconduct records who are not actually welcome to preside anywhere else but are welcomed to Jersey as the Church there is very different from the norm.
Since going to Jersey you have blatantly and constantly attacked minority groups and vulnerable people and rubbished abuse victims and their feeling, you have been openly racist and homophobic. Your rants and the fact that they are met by silence in the church of england, who proceed to proclaim 'great safeguarding' in Jersey, are a terrible reminder that the Church of England is not a Christian church.
Why are you googling your reaction to immigrants or searching my blog for it?
I have no idea if you ranted about immigrants or if you decided to do the church's usual PR trick of pretending to 'care very deeply'. Honestly, you are not very important, Ashenden, I pity you, I don't waste blog time and space on you.
It is true that people in the Diocese of Normandy have complained about your rude and arrogant behaviour and taking over there, but they contacted the wrong person, I am not your boss.
And regarding your Xenophobia, why did you go to Yemen? Just an all-expenses paid trip like when you go to Normandy?
You know and can't hide from yourself that your dishonesty and judgement of others and bad behaviour won't go away when you stand before God, and He will ask why you have abused me and others and continued to the charade of representing Him. And He will hold you responsible. The Queen won't be there to protect you then, neither will anyone in law or the church. If you really believe in God while you behave so badly, what is he going to say to you about the way you have behaved towards me in the media when I had no voice? What is he going to say about your engineered Steel report?
Seeing as you are looking yourself up on my blog, I hope this satisfies your cravings. You are not really worth my time or a proper article. If you were, I would print what was sent to me, a bit like you wanting the Steel report published to destroy me and cover up for the Dean's wrongdoing.
Monday, 7 September 2015
Twelfth and a half interview with HG
1. did you ever like sport at school?
I hardly went to school due to my parents' religious belief, I went to school briefly aged 8 and struggled with sports day, coming last, at the time of course it hadn't been noticed I was asthmatic with leg and spine problems, because my parents didn't believe in doctors or medical help.
2. which sports did you like?
Back then, none, now I love swimming, cycling, football and sailing, but due to my health after the church destroyed me, I can't take part in the last two.
3. do you think that making something "sport" can take the fun element out of a game?
No, from experience, competitive football, running and other sports can be fun.
4. do you watch any of these sports on TV - cricket, tennis, swimming, football, rugby, cycling, running, boxing, snooker?
I rarely focus on tv sport, my ADD means I am too hyperactive to settle and watch these things, I like to watch a bit of Wimbledon but I don't mind not watching it.
5. if so, which do you like, which don't you like?
I like Wimbledon and athletics, I don't dislike sport on tv but I don't really watch it.
6. which is the most useless sport there is?
There can't be a useless sport, otherwise no-one would play.
7. do you ever watch horse racing or grand prix
Horse racing. I like the National and the Derby.
8. do you have any sporting heroes, current or past?
9. do you think there is too much sport on TV
10. do you think some sports people, like footballers, get paid much to much money?
No, some train and train with no pay, training before work and school, they have my admiration. For example the Williams sisters were training constantly since they were little girls but of course not for money then. It is a one track life when you live like that, and takes great determination and courage.
11. have you ever played conkers?
Yeah, used to try to eat them too. Haha.
Tuesday, 18 August 2015
Safeguarding in Jersey's churches, Bishop trevor isn't in charge
courtesy of Tony the Prof:
Jerseys Anglican Church: Some Problems with Safeguarding
Clergy and senior lay leaders in Jersey's Anglican Church have had training in protecting islanders from abuse, the Bishop of Dover said. The Right Reverend Trevor Willmott said new safeguarding measures are in place to reassure everyone in the church. It follows a decision by the church's governing body - the Synod - that improvements must be made. Bishop Willmott said there was no question in his mind that "God's people are safe in this island".
-- BBC News
What would be useful to know, in the interests of transparency, would be the enhanced policies and procedures. I’ve had a look at the Town church website, and the only thing remotely connected is in the diary where there are “safeguarding training and lunches”
There is no safeguarding officer to contact in the list of contacts, no safeguarding policies on the website, and no indication of these new improvements at all, no links to safeguarding elsewhere (such as Dover) - or, for that matter, what training consisted of, or what they had for lunch!
Now pretty well any club or organisation which deals with children and vulnerable adults has a policy on their website, but the Anglican Church in Jersey does not. We have no idea how complaints will be handled, whether minutes of meetings will be kept, whether it will be ensured that vulnerable adults will have someone they trust in attendance.
It is also not clear how the church would act to implement the policies anyway. Part of the problem, both locally and in the UK, has been the way that in local communities, it is difficult to find someone outside and independent to look into these matters.
As one English survivor, called CF, said of her case:
"An abuse policy that does not have a clearly stated process of implementation is effectively worthless. A vulnerable person or an abused person by definition has no power in the Church. This means that someone with power has to make a decision to implement the policy, but to do this they have to suspend their total and complete faith in the priest or other person concerned."
There is a link to the Canons of the Church of England in Jersey on the Town Church website, and it is here that some interesting notes on safeguarding arise as the local Canons differ from the English Canon Law.
Let us look at changes to Canon Law to improve safeguarding in England:
On 16 February 2015, David Pocklingtom reported on changes taking place to Canon Law in England. This is what he noted:
At General Synod on 12 February, Mr Geoffrey Tattersall introduced the main provisions of the Draft PCCs: There was agreement that the disqualification and suspension provisions for PCC members should mirror those in relation to churchwardens. Furthermore, a bishop should also be empowered to suspend PCC secretaries and treasurers who are not PCC members.
(GS 1952A) and the draft Amending Canon No.34 (GS 1953A) – Draft Measure and draft Amending Canon for Revision. The main points identified in his speech are summarized below, and the Report by the Revision Committee is available as GS 1952-3Y.
The main provisions of the draft Measure are:
Suspension of a priest: Section 36(1) of the Clergy Discipline Measure already provides for the suspension of a priest or deacon when disciplinary proceedings are commenced or he/she is arrested on suspicion of committing a criminal offence, is convicted of certain offences, or included on a barred list.
Clause 1(1) of the draft Measure adds a power to suspend where the bishop is satisfied on information provided by the police or local authority that a priest or deacon presents a significant risk of harm – as defined in clause 1(2) – but before suspending the bishop is required to consult at the very least the diocesan safeguarding advisor. Such suspension continues for 3 months but may be renewed.
Churchwardens: The current clause 2 of the draft Measure provides for the disqualification and suspension of churchwardens. Mr Tattersall highlighted that:
Although the initial draft provided for a waiver of disqualification, the Revision Committee was persuaded that any such waiver required further clarity. Consequently clause 2(2) provides that before giving any waiver the bishop must at the very least consult the diocesan safeguarding advisor, and must give reasons for any such waiver, and that any such waiver will be of unlimited duration and have effect in every diocese;
As to suspension, the Committee agreed that a bishop should not only have power to suspend a churchwarden in the circumstances set out the present clause 2(5) of the draft Measure: i.e. if arrested on suspicion of committing a Schedule 1 offence, but also if the bishop was satisfied that the churchwarden presents a significant risk of harm.
And the draft Measure states this:
A relevant person must have due regard to guidance issued by the House of Bishops on matters relating to the safeguarding of children and vulnerable adults.
(2) Each of the following is a relevant person—
(a) a clerk in Holy Orders who is authorised to officiate in accordance with the canons of the Church of England;
(b) a diocesan, suffragan or assistant bishop;
(c) an archdeacon;
(d) a person who is licensed to exercise the office of reader or serve as a lay worker;
(e) a churchwarden;
(f) a parochial church council.
(1) In this Measure, “child” means a person aged under 18.
(2) In this Measure, “vulnerable adult” means a person aged 18 or over whose ability to protect himself or herself from violence, abuse, neglect or exploitation is significantly impaired through physical or mental disability or illness, old age, emotional fragility or distress, or otherwise.
Given that part of the reason for the split between Jersey and Winchester arose from a complaint made by a lady called HG about a churchwarden, these changes in England’s Canon Law - which mention churchwardens - need to be replicated in Jersey.
What is missing, therefore, from the Bishop’s statement is:
1. Policy and procedure documents available online in the public domain, including contacts and how to report a complaint.
2. Changes to Jersey Canon Law to bring it in line with England’s new safeguarding measures
Without those changes, the statement by the Bishop of Dover, that "God's people are safe in this island" seems rather hollow. It leaves significant gaps which still need to be rectified if that statement is to be made good.
Friday, 14 August 2015
Dear Church of England, you idiot ratbags from hell, I think you should complain to channel 4 because today on Hollyoaks, instead of distorting and misrepresenting the way the police and social services work, they are distorting and misrepresenting the way the church of england works.
In The news...
As I have already blogged, Sir Philip Bailhache, the Dean's main protector and the main attack of me, using his power in the States, has been named for protecting a paedophile in Jersey.
Unfortunately, of course, this was not the only case.
And the Church of England allowed him to destroy me publicly for my abuser and the Dean. And they are claiming the Church in Jersey is a safe place!
I like Tony the Prof's blog recently, where he quotes me, and I am trying to work out where the quote comes from, I think it is from my open letter to Sir Philip Bailhache:
My open letter to Philip bailhache:
And yes, reading through this, Tony has obviously read my letter to Bailhache and plucked that quote from there.
Anyway, I must go back to following the Janner case, and doing my university prep, and waiting to hear if the joyful arrival of a new baby has occured as well.
Thursday, 13 August 2015
12th Interview with HG
I emailed him.
7. What do you think about Reg's Garden closing?
I was told what to plead, I understood nothing.
10. Did they explain that it would mean leaving Jersey?
I don't know.
Tuesday, 11 August 2015
As Bishop spineless boasts about safeguarding in Jersey, his church officer makes the headlines!
This is Philip Bailhache, one of the Church officers who has supported and protected my abuser who was a church officer alongside him.
While Bishop Willmott lies about safeguarding being great. This man still holds church positions.
I want something done about the lies that are misleading people and mocking me and what I have suffered.
But what do you do when Jersey's police complaints department are so useless or corrupt that they don't even respond?
Direct Communications Unit
2 Marsham Street, London SW1P 4DF
E-mail: Website:
Reference: T17736/9 26 October 2009
Thank you for your e-mail of 12 October to the Attorney General’s Office about a complaint against Jersey police. Your e-mail has been passed to the Direct Communications Unit at the Home Office and I have been asked to respond.
I was sorry to hear you were upset by your alleged treatment by Jersey police.
In writing to Jersey police, you have taken the right course of action. It is their responsibility to handle the police complaints system and not the Home Office or other Government departments.
If you need information about the Jersey police complaints process please visit:
Yours sincerely
Kevin Allen
Lies that Bishop Willmott tells us
Dear Church of England,
Stupid comment of the year goes to Juliet Montague's former sweetheart, Bishop Trevor Willmott, another insult to church abuse victims of all kinds in Jersey.
This is the Bishop who blatantly took part in cult games to manipulate vulnerable people in Jersey at a Church services at St. Pauls and St. Matthews.
During the last year a clergyman has had an affair with his lay reader in Jersey and left, leaving her to face the usual community shunning, several potentially serious safeguarding issues have occured within the Jersey churches, no resolution or conclusion regarding my complaints have been made, and I have been left vilified and destroyed. So why has Bishop Wilmott spat on Jesus by lying?
It would be nice if Trevor Willmott would do a Tim Dakin and shut his loud mouth on the kind of permenant basis that Dakin has.
Who is Willmott referring to as God's people? Not the vulnerable, who remain marginalised in all churches more so in Jersey, presumably he is referring to the fat rich men who pay his wages, but he, the same as Paul Butler, should just be quiet and not mock people who have been harmed by the Jersey churches and safeguarding failures by the Diocese of Winchester, including myself, and numerous others who have contacted me.
The church, when they open their mouths in the press, do the following: bray like donkeys, lie like logs, and play for the crowd. Unfortunately they always without exception manage to insult, lie and do everything Jesus told the Pharisees was wrong.
Could Bishop Willmott explain why Gavin Ashenden is still unashamedly attacking the vulnerable, and Muslims and gay people, and anyone who doesn't do it his way, and making out that mental illness is something where he can publicly cast out demons in order to get acclaim. So who are God's people who Bishop Willmott believes to be safe? Presumably he is stating that he is protecting the Dean, Ashenden, Birt, LeMarquand, LeFeuvre, and all others who have behaved horrifyingly in attacking me in the press and church during the past few years? Given his own behaviour, maybe he really believes that these are 'God's people' seeing as they pay his wages. No mention of how they have behaved and how the church have or haven't dealt with it.
Stop misleading people.
'God's people' or rather the rich fat old men, will not ever care about safeguarding, did Paul Butler write Trevor Willmott's lines? Was Trevor too busy smooching with a married vicar somewhere?
Julie used to love coming home and telling us about Bishop Trevor's crush on her. She called him Bishop Treasure, and he was one of a number of men she shared affection with during her sham marriage to a serial abuser, which again, the church destroyed me for.
And until Bishop Willmott has arranged a proper independent safeguarding report and issued a proper apology for the Korris-Gladwin-Steel-Johnstone whitewash., the best thing he can do is redact his blatant lie in the press today and start actually doing something about safeguarding.
Unfortunately the Church still don't know what safeguarding is? Does it make them rich and powerful? No, does it make them feel good about themselves? No, so why should they care?
Obviously as I continue to see silly, crass and insulting lies in the press, the Church has not in three years been able to resolve their destroyal of me as a result of leaving me in the hands of known abusers, knowingly, and refusing to deal with my complaint.
They further have not been able to resolve a prolonged and very serious public attack on me by the Diocese of Winchester and Deanery of Jersey combined, a prolonged attack in the press and media, local and national that nearly drove me to death, while Bishops Dakin and Willmott stood by, Bishop Dakin joined in the attack as well.
Bishop Willmott shouldn't be expending energy on wickedness such as upholding the wrongdoers in Jersey, he and the whole church should be responding to their utterly devastating branding and defamation of me to protect men with power and money.
Would someone like to put the Dakin Gag on 'Bishop Treasure' or is it time for him to face action too? Oh don't worry, not Mark Hedley, who's aim in life is the same as Willmotts, to destroy the silenced and uphold the powerful wrongdoers.
It's called lying, Bishop Willmott, I know it is a way of life for the Church of England, lying at the expense of the vulnerable, and Paul Butler has done so spectacularly and regularly for quite a time.
The Diocese of Winchester are still employing an abuser who has broken the law, as a Safeguarding Director! A woman who not only let a known abuser to get his hands on me, but blamed me for that and the way I was treated by the church as a reaction, leaving me very very ill with depression, so how has anything changed???
Every day that the church continue to leave me waiting to be destroyed by defamatory whitewashes and add insult to injury by lies like those of Bishop Willmott today, is a day that the church continues to protect abusers and destroy victims, nothing has changed, and with spin-doctor butler protecting Jane Fisher, when will things change?
A big 'liar liar, pants on fire' to Bishop Willmott, the only people who are 'safe' in the church to publicly attack abuse victims are the wealthy and powerful men in Jersey, Philip Bailhache, David Capps, Gerard leFeuvre, Gavin Ashenden, Michael Birt, and the rest of them, with their colleague Dame Steel.
Now when is there to be an independent investigation into my case, one that includes me?
In the meantime, stop LYING about safeguarding and stop LYING in the PRESS, I remain deeply deeply traumatised and destroyed by your actions and what you have done in leaving me suffering and waiting for each new press attack is wickedness, and it is time for an outside investigation. It is time for a genuine serious case review into jane Fisher's manipulation and use of social services and the police to harm and silence me.
There has been no conclusion for me, no resolution, the church destroyed me, then they came back and destroyed me again, and have left me ill from living waiting for each new attack after the horrendous lies about me in the press. No Bishop trevor, you presumably do not consider me to be one of 'God's people' but that is presumably because the poor and vulnerable aren't considered to be that by the wealthy and powerful who run the church to meet their own needs, so you do not consider me, or other vulnerable people to be 'God's people' because we definitely are NOT safe in churches in Jersey. You let me be preyed on, for the second time, by a known abuser and blamed and destroyed me for it.
When are the lies going to stop and the threat of defamation going to stop? When is the Church going to actually record MY story after YEARS of WHITEWASH that EXCLUDE ME?
How can Bishop Willmott be so positive that safeguarding is so great and those people who publicly lied about me and committed illegal acts are suddenly so caring about the vulnerable? Have they withdrawn their lies in the press and apologized to me? No, so why doesn't he redact his lies until they do?
And on the subject, Paul Butler's frantic efforts to get the church out of external investigation recently led to him showing off about handing big names over to the police, the duplicity was horrifying, so now, to ensure that his words ring true, Bishop Willmott and Bishop Butler and the Archbishop now need to hand Philip Bailhache and Dame Heather Steel over to the police for illegal activity involving police records and data protection breaches, and unfortunately for these two Bishops who were also her colleagues, Jane Fisher also needs to face charges.
The church in Jersey currently contains dignitaries who have actively and deliberately protected abusers in Jersey's care system, so maybe Bishop Trevor thinks 'God's people' are safe, but what about the Victims of his 'God's people?' including victims who suffered not only abuse but trauma as they watched Philip Bailhache protect Rodger Holland and others. He has never apologized or shown remorse, so how come he was a churchwarden alongside my abuser for so long? And since protecting my abuser through illegal acts such as illegal gain of police records and data protection acts, Bishop Trevor is trivializing these crimes and more and mocking me and other abuse survivors and vulnerable people who have been failed by Jersey and Winchester, and I am not the only one in the past few years.
As well as that, the church 'safeguarding policy' extends only to excluding and marginalizing the vulnerable without their knowledge or consent to meet the church insurance requirements and protect their clergy.
The exclusions mean that no vulnerable person is allowed to a church or clergy house but they are not told this, while abusers are welcome, an example of this is my abuser being seen having tea with his protecting Vicar, Mike Taylor regularly during the time Jane Fisher was destroying me and protecting my abuser, while the clergy who had befriended me was told to turn me away after she had often had me round for tea, but she wasn't allowed to tell me, this left me shattered further and destroyed a good friendship, and then to add insult to injury, Jane Fisher, who was by now in full and constant attack against me, used that same clergy friend to continue to very seriously harm me.
I would like Bishop Willmott to apologize for his crass statement now.
The church have enabled and supported the Jersey Deanery fully in destroying me, and claimed it was to do with safeguarding. It really is time outside intervention on a large scale occured, because there is something seriously wrong with these glaring inaccuracies.
Also the recent suggestion that the Archbishop of Canterbury should investigate my complaint against Bishop Dakin makes that even more so, as the Archbishop upheld both Dakin and Key in their abhorrent behaviour.
Tell me, how was publishing lies about me as fact and in the press, good safeguarding, and how was letting me be attacked and receive death threats and being driven and on the run, safeguarding? Tell me how allowing the wrongdoers to run the investigation and then smugly claiming that 'God's people are safe' is safeguarding, when you haven't even resolved the damage to me or produced a balanced safeguarding investigation.
Time for outside investigation.
Don't forget: This woman was allowed to destroy me and then destroy me again, in light of Bishop Willmott's lies today, do explain why?
This email will now be published online. | http://whatreallyhappenedinthechurch.blogspot.co.uk/ | dclm-gs1-253530001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.633645 | <urn:uuid:c114b302-8fd7-4235-8a38-d07ba2f6a2c1> | en | 0.982361 | Dara Rocks
Broadcast: 02/09/2005
Reporter: Lexi Metherell
Daramalan College is the only local school to make it to the finals of the Schools Rock Eisteddfod. Lexi Metherell produced a preview.
ABBEY WATSON: A lot of people do sad issues and stuff like that, so we decided to do something a bit happy.
KIRRI ROBINSON: This year's king solomon's mines, it's basically about a cave, it's a mythical story, explorers go into a cave and they're looking for a load of treasure and diamonds and things and along the way they find a girl in distress who's been in the cave for a little while, got caught, and of course there's a happy ending it's a rock eisteddfod.
JOSH MEARS: We were just there to have a ball so we just went out there thinking this is going to be our last performance, let's give it everything we've got.
KIRRI: Coming from Canberra doing our little production going along happily and then going and watching some of the premier schools perform was just unbelievable.
ABBEY WATSON: ...And then when we found out we were in the finals we were just gobsmacked.
BRANDON GIRVAN: The most rewarding bit for me was basically being accepted for what i was doing in rock eisteddfod like being one of six guys in the rock eisteddfod process at a very football playing school, was just amazing that people were just yeah that's cool, that was fine, i was blown away at like people's attitudes towards it.
JOSH: Getting the nerve to stand up in front of all those people and do something that's usually considered a bit more towards the girlie side, you know what i mean, like but definitely once getting over that initial fright, it's so worth it and it's so worth getting out there and performing and afterwards it's just the most exhilarating feeling ever.
KIRRI: Most of the choreographers have spent the last seven or so months choreographing every week and going over and over again.
ABBEY: It's hard to get the girls' and the guys' enthusiasm up every sunday cause i know it's so repetitive, and everyone's just going come on let's get this over and done with.
KIRRI: Bit sick of spending every sunday with a group of 76 kids who don't want to be there anymore.
JOSH: More like tedious. Like every sunday you'd have a lot of work on because it the last year of school and you've got to bust every bone in your body to get everything in.
KIRRI: I think it's also going to be sad because we spent so much time doing it and sundays won't be there any more.
KIRRI: A lot of people who were really shy before are happy to come up and chat to you, and some of the ones who didn't think that rock eisteddfod was good enough for them they were just kind of in there for a bit of fun realised how much more it could be if they just put in a bit of effort.
JOSH: For me probably just a whole lot of self-confidence, and like self-realisation probably.
KIRRI: Some schools are out to win and you know they are but at the end of the day all you're there for is to get on stage and have eight minutes of fantastic fun and go off feeling really happy that you've done something.
BRANDON: I'm going to seriously be total rock eisteddfod deprivation, I'm going to go into relapses of just wanting to go up on stage and be with Kiri and just have total total amounts of fun, it's just mind blowing, you can't really describe it, it'll be, it'll just rip a part of me out (laughs). | http://www.abc.net.au/stateline/act/content/2005/s1452925.htm | dclm-gs1-253610001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.099363 | <urn:uuid:e79473e1-88c1-43b4-b3d0-316e5b151e96> | en | 0.992517 | Keeping It Real
Keeping It Real
The topic of sexuality came up almost immediately at your first group lunch. Can you talk about what it was like anticipating that you'd have to put your hand up as the gay guy? When we were in the airport in Phoenix, the question came up. Jonna said, "OK, how are we going to talk about that? Are you going to just come up and tell people that you're gay? What are we going to do?" But I said, "Well, let's just wait until it comes up in conversation." I think she just wanted to help me have it come out more easily. As soon as Ayiiia asked, "Who's the gay person?" I put my hand up and said, "Yeah, that's me." I wanted to say it there. I thought, Let's see what everyone thinks; let's see if everyone is going to be up-front with me right away.
You promised a true portrayal of yourself. Do you think others did the same when it came to talking about your sexuality? Everybody who I talked to from that first lunch and in individual conversations throughout the show was open with me. Everybody said, "Dude, you're the coolest gay guy we've met." They said, "If we got a really flamboyant gay guy, it would be so different because we're so used to you being one of the guys."
How did your coming out on the show compare to coming out back home? Coming out back in high school, in a town of 2,000 people who all know your business, it's not the easiest time. It was senior year, and I started seeing a guy who was completely open. I was still on the down-low -- still in the closet. I had a girlfriend who was one of my best friends. I couldn't tell her then because it was the beginning of the school year, and it [would have been] awful for her.
I tried to break it off with that guy. I said, "Dude, I can't do this." He said, "Well, if you're not going to tell anybody, then I'm going to tell everybody." So I thought, If I don't say anything then this guy's going to destroy it for me and will make my life, for the rest of senior year, [difficult]. So I told my good friends, and the thing that scared me the most was that I might lose those friends. And being from a small town, there aren't that many people. Turns out, they were OK with it. I didn't end up telling my girlfriend until I was leaving for college and we had to break up. She was hurt because I lied to her, but she forgave me. She said, "I want you to live your life happily as yourself rather than unhappy being somebody you're not."
And how did your family react? I'm really close with my grandmother, and it was kind of hard to tell her. She didn't really know until my freshman year in college. I told her by bringing my ex-boyfriend around. I didn't really tell her. I just tried to give her the hint.
But it was kind of easy for my mom because of my older brother's situation. My uncle, who I call my brother and is my best friend, is gay too. When I was little, she told me when he came out, "And you better not be a little homo either." I know she knew it, but it was funny. I took her to meet my ex, and she liked him. She said, "Where do you guys live?" So I showed her. She was surprised that there was only one bed. I said, "Yeah, we share a bed." She said, "Oh, OK," and the idea set into her. She's going to be uncomfortable seeing me kiss guys because she doesn't want to be around it, but she's OK with the idea.
Is she going to see a lot of that on the show? Oh, yes. Yes, yes, yes. Yes. Yes. I already warned her. I said, "Brace yourself for what's going to happen. It's not that bad, but it's not something that you will want to see."
MTV is suggesting that you brought some ex-boyfriend baggage to Cancú;n? Can you tell us about that? I didn't bring it along. Someone came uninvited and… caused a little ruckus down in Cancú;n.
A little ruckus? You'll just have to stay tuned and watch.
Reunion shows often provide a forum for those who don't feel they've been treated fairly. The stakes may feel higher as the only gay guy. Are you worried about how you'll be edited and later received? No, the thing about it is, I didn't get into any huge altercations on the show. From the very beginning, before this whole interviewing process, I said I'm not going to get into people's drama unless I have to. I went into this being myself, and that's who I was.
You are described as an overachiever in high school. What do you see in your real life after The Real World ? I don't know. When I was younger, I did a little bit of modeling and acting, but everybody who does Real World basically wants that. That's not all I'm looking for. Because I'm an overachiever and there are opportunities now and doors open for me, I'm going to be that person chasing my dream until I get it. If it takes me longer because of the show -- I took four months off from school -- it's OK. I'll still go to school to get my degree. But I still want to pursue my dream of acting, modeling, being an entertainer.
Do you see yourself playing an activist role in your pending celebrity? I want to start becoming more of an activist. At the moment, I'm not. I've looked into the deal with Proposition 8 in California and 102 here in Arizona. Because of the show and spotlight, I hope that I'm presented an opportunity to be an activist within the LGBT community. I want to talk to kids who are having a hard time coming out, and I want to be a role model for some gay people. Young gay people are going to be able to look at me in the show and say, "Look at what he's doing. He's gay, but he's not a bad person. He's someone who everyone gets along with, and people are OK with him being gay. So it's OK for me to be gay too -- to be open and happy." | http://www.advocate.com/arts-entertainment/television/2009/06/19/keeping-real-worlds-tradition?page=0,3 | dclm-gs1-253650001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.031122 | <urn:uuid:271cb335-e125-4324-8f7b-fad9aa517042> | en | 0.969107 | Page is loading...
Chapter 3: Al-Ijmā‘ or Scholarly Consensus: An Accepted Method for Controlling Heresy?
Orientalists who follow the Christianizing interpretation of Islāmic thought have attempted to present the doctrine of ijmā' as an accepted means of controlling “heresy” in Islām.1 According to Gibb, the doctrine of ijmā' can be viewed from the perspective of Christian orthodoxy and can be likened to the case of the council.
Despite their external differences, a certain analogy can be made between the concept of “consensus” of the Christian Church and the Islāmic concept of ijmā'. In some cases the results of both procedures were quite similar. For example, it was only after ijmā' was acknowledged as a source of law and doctrine that a definitive proof of “heresy” became possible. Any attempt to interpret Scripture in a way that negated the validity of a given and accepted solution was by consensus, a bid'ah, an act of “innovation” and “heresy” (Gibb 90).
Gibb's main thesis is that the concept of “council” in Islām forms part of a secular organism that mends Islāmic doctrine. It does so in light of a sovereign authority, thus fulfilling the work of purging and purifying matters of faith that can be assimilated into the work of ecclesiastic canonists. He understands the concept of “council” as a juristic entity, like a council of bishops. In order to protect the theological doctrine of the “Church,” the Islāmic Caliphate relied upon the doctrine of ijmā' as the basis for the orthodox refutation of “heretical” Shī'ite ideas.
When Gibb speaks of ijmā' in terms of councils or ecclesiastic consensus, the distinguished Orientalist maintains himself firmly within a Christianizing interpretation of Islām. The word “council” is derived from the Latin concilium which comes from cum, “with,” and calare, “to call” and “to proclaim,” hence the sense of convocation and assembly. The word “council” is a Latin term which defines, much like the Greek root of Church [lit. ekklesia, from ek and kalo] a flock or congregation of faithful Christians under the guidance and direction of their pastors.
It applies to a group of individuals with the same character in a double sense: active like convocation of bishops, and passive like a congregation of the same in an organization, a society or a collegial body. Viewing the doctrine of ijmā' through the Christian concept of council presupposes the existence of an orthodox “Church” in Islām which, like the Christian Church, can be recognized and differentiated from other “sects” or “heresies,” and as a juridical, hierarchical, sovereign, visible, empirical, and easily perceived institution for all to see.
Gibb's ecclesiastic conception of Islāmic consensus is misguided and even false. It fails to appreciate that in Islām both elements are identical: the doctrine of ijmā' as a source of law and canon of the Scriptures, on the one hand, and Islāmic orthodoxy, both internal and external, on the other. Both of them co-exist and coincide in the application of the sharī'ah and the sunnah of the Prophet as sovereign expressions of the Qur'ān in both Sunnī and Shī'ite Islām.2
Let us now turn from a general critique to some more specific observations. It must be noted that Gibb's Christianizing conception traces back to the 1950s, a period when the type of distinction we are discussing was not viewed with the same importance as it is currently. Hence, the absence of a broader and more elaborate perspective is fully justified. Many of the problems we are discussing here, such as the question of “sects,” had barely even been posed.
What we would have liked to observe, among the Orientalists who followed the same Christianizing line as Gibb, is a degree of academic, analytical and philosophical evolution. Above all, we would have liked them, starting with Gibb, the Orientalist from Oxford, to come to a better understanding of the questions raised by the study of Shī'ite Islām.
Unfortunately, this has not been the case. Besides a handful of honorable exceptions, the majority of research published in the West during the last decade of the fifties and even well beyond consists of nothing more than worthless compilations whose theoretical weakness is in sad contrast to the solid scientific work done by Orientalists in the past.3
These solid scholars include Reynold A. Nicholson, Louis Massignon, Jacques Berque, Miguel Asín Palacios and, why not, even Hamilton Alexander Rosskeen Gibb. Despite their incomprehension of the Islāmic spirit, they practiced and professed a science which was more consistent with their intellectual qualifications.
Their work is less suspicious of compromise with ideological controversy which reduces religious polemics, in all of its shades, into terms of extreme triviality and doubtful scientific integrity. It is the ancient affliction that appears to worsen in the West, especially in recent times, in which a host of “opinion-makers,” turned into “specialists” of Islām, have come forth like black heralds repeatedly croaking the same mistakes ad nauseam.4
Without doubt, the knowledge and analogical application of these theological principles must have seemed very convenient to Gibb in his work of comparing the Islāmic concept of ijmā' as a consensus of scholars with that of the Christian council as a consensus of ecclesiastics. This is even more evident when Gibb alludes to the role of analogy in his comparison and confesses that such a comparison is possible despite the external differences of the Christian councils.
This is absolutely false. Regardless of such esoteric formulaic divergences, there is no Church in Islām. Furthermore, there is no organized clergy in Islām in the ecclesiastic sense of the priesthood because Islām does not accept the mediation between God and man.
In Islām, there does not exist a religious establishment lead by a Pope with a hierarchy of bishops, cardinals and priests, all ranked according to their level of merit and the closeness to the central power of the Church. We must not forget that any attempt to look for examples of consensus in Islām comparable to the Christian councils of Nicea, Lyon, Letran, Trent, and the Vatican, would be useless.5
In the entire history of Islām, there has never been a case in which qualified scholars and jurists gathered in diverse synods to examine a doctrine that they considered erroneous and who then related their conclusions in letters to a prelate in which they asked for this error to be condemned as a heresy by the entire Islāmic community.
There were many times, however, when Caliphs or mujtahidūn reacted on the basis of arbitrary and erroneous decisions of incompetent authorities, ignorant of the very basis of the discussed doctrine. We are not claiming that “heretical” doctrines or misunderstood minorities have never been challenged, refuted, condemned and persecuted in Islām because the facts speak for themselves.6
We have the examples of martyrs for whoever would categorically deny any affirmation to the contrary. These include al-Hallāj, Suhrawardī, Uways al-Qarnī, Qanbar, Maytham al-Tammār and, among the followers of 'Alī, the very Imāms, of which the most tragic case was that of al-Husayn, sayyid al-shuhadā' [the Lord of Martyrs].7[138]
Is it not clear that all of these deaths were the consequence of emphatic and arbitrary decisions? In any event, we have made no attempts to deny or to justify the persecution of those who were accused or suspected of heresy as this goes beyond the scope of this study.8
On the contrary, our goal here has been to demonstrate that the concept of consensus as a type of council is an erroneous misrepresentation of the function of ijmā' in Islām. In the Muslim tradition, the concept of consensus does not express an accepted mode of controlling heresy or the unanimous authority of all the scholars of the Islāmic community.9
We understand perfectly well that Gibb's goal is to present the concept of ijmā' in socio-religious terms that are more readily understandable in the West, by linking it to the Christian concept of consensus. In our opinion, however, such simplifications do nothing other than complicate any attempt to penetrate Islāmic thought, particularly when it is done by examples that are as divergent as they are foreign to the Islāmic faith. When we say that concepts such as “councils” are foreign we do not mean to imply that Islām is somehow backwards or less up to date as religious institutions in the West, particularly it terms of its formal religious expressions.
According to the generally accepted etymology given by Arabic linguists, the technical term ijmā' comes from the Arabic root jama'a. It has several definitions, each of which relates to the concept of agreement, the first of which is “consensus.” Hence, there can be no doubt as to the concept the word expresses. Both the Arabic word ijmā' and the Latin word consensus convey the idea of being free from coercion, being able to distance oneself from anything oppressive which limits freedom of choice.
The mujtahidūn [lit: “those who make an effort” in the personal interpretation of the law] define ijmā' as a “point of view” and, in such a sense, it is closer to the Vedic concept of darsana than to the Christian concept of council. In effect, ijmā' as a source of law and doctrine, does not present contradictory concepts, but rather different points of view and differing aspects of the same many sided concept.10
The doctrine of ijmā' is obviously found in both the Sunnī and Shī'ite traditions. However, both of these orthodox tendencies interpret and apply it differently. It is universally agreed that what has more weight in Islāmic law is the Qur'ān, the Sunnah, and the companions of the Prophet, those who lived alongside him, were chosen by him, and who heard his sayings directly.
This is followed by the followers [tābi'ūn] of the companions and, finally, the followers of the followers, those who received from their masters what their masters had received from their masters.
With the disappearance of this last generation, for the majority of Islāmic schools of jurisprudence the consensus now rests with the mujtahidūn, whose edicts [fatāwā] vary in accord with their philosophical postures. If Sunnī Islām declared that the door of ijtihād [personal deduction of the law] was closed in the 10th century [we know that some Sunnī 'ulamā' have now reopened the door], Shī'ite Islām, on the other hand, never recognized this closure.11
Shī'ite jurists and theologians, known as mujtahidūn, have always defended this right. Although enlightened individuals and scholars can appreciate the inner meanings of the sacred law in all of its dimensions, none can any longer claim perfection and infallibility. Since scholars, regardless of their erudition, are human, their understanding of the law can only be imperfect.12 Hence, they must allow themselves to be guided by the consensus of the sunnah of the Prophet and the authorized interpretations of the Holy Imāms.13
In conclusion, it is wise to recall that the fundamentals of faith and principles upon which the Muslim faith is based are irrefragable. Complete faith requires complete acceptance of tenets which are not and cannot be the work of men or the result of human consensus.14 God is the Sole Sovereign and the Final Source of Legitimate Authority.15
The essence of His law is immutable truth. His law is more immutable than the process of human thought for it is eternal and never changes.
• 1. Author's Note: Concerning ijmā', see G. Hourānī, “The Basis of Authority and consensus in Sunnīte Islām” in Studia Islāmica XXI (1964), 13-60; for ijtihād, see M.I. Jannatī, “The Beginnings of Shī'ite ijtihād” in Tawhīd (1988), VI, I, 45-64; in relation with Islāmic jurisprudence and for a comparisonbetween the differentpoints of view of different schools see, A.R.I. Doi, Sharī'ah: The Islāmic Law (London 1984), 315; S.H. Nasr, Ideals and Realities of Islām (London 1966) IV.
• 2. Author's Note: It is essential to differentiate between the concept of ijmā' from the Catholic concept of council. Viewing ijmā' as the Islāmic version of the Christian Council is a gross oversimplification. From its very beginning, ijmā' was a fundamentally political concept even when it had legal repercutions. In early Islām, ijmā' was more intuitive than technical. The immediate goal of ijmā' was to address various socio-political questions which had surfaced as a result of the passing of the Prophet Muhammad.
According to the traditional view of Muslim scholars, Islāmic jurisprudence (fiqh) traces back the Companions (sahābah) of the Prophet Muhammad although it was only during the generation of the Followers of the Followers (tābi'ī at-tābi'īn) that the major schools of law (tābi'ī at-tābi'īn) were finally formalized.
According to Sunnī authors, the Companions (sahābah) derived answers to immediate problems from the Qur'ān and the Sunnah. When faced with unexpected issues, the Companions made an(ijtihād) to apply the spirit of the Prophet's teachings new problems. The ijtihād of the sahābah consisted of deriving judgments or legal norms from the teachings of the Prophet.
The sahābah had their own disciples and followers, the tabi'ūn, who consisted of Muslims who knew the sahābah and learned from them but never had the opportunity to meet the Prophet. The tabi'ūn were thus the second generation of Islām. The tabi'ūn, in turn, had their own followers, who consisted of disciples who had never met the sahābah, and they are known as the tābi'ī al-tabi'īn and represent the third generation of Islām.
The second and third centuries of Islām, known as the Century of the Companions, the Companions of the Companions, and the Great Sunnī Imams), were marked by the rapid expansion of Islām. During this time, many non-Arabs became Muslims, integrating into society, and greatly expanding the territory of the Islāmic community. Along with the influx of new Muslims came new questions. The new questions required new solutions and broad generalizations appeared which allowed for universal applications. In short, fiqh moved from a practical realm to a theoretical realm.
Prior to the formation of the major schools of jurisprudence, legal norms had not been organized in an orderly fashion. The early jurists did not engage in theoretical issues, dealing only with practical solutions to practical problems. Since no systematic study of law had been completed during the first and second generations of Islām, it would be inappropriate to refer to early Islāmic law as an actual legal science. Since the science of fiqh developed during the second century of the hijrah, the Companions cannot truly be called fuqahā'. In light of what we have explained, it can be said that Islāmic jurisprudence was born towards the end of the first century of the hijrah, namely, the beginning of the eight century.
During most of the first century A.H., Islāmic jurisprudence, in a strict sense, did not possess a legal corpus. The great center of Islāmic jurisprudence during the end of the first century A.H. and part of the second century A.H. was Iraq. Doctrinal influences from one school to another moved almost invariably from Iraq towards Arabia and the doctrinal development of the Medinan school was often surpassed by the school in Kufahh.
By the end of the first century A.H., we find the names of jurists whose existence can be confirmed as historical. These include Ibrāhīm al-Nakha'ī in Kufah and Sa'īd ibn al-Musayyab and his contemporaries in Madīnah. Not only did these ancient schools share a common doctrinal base, they shared the same legal framework and viewed law as a “living tradition,” a concept that dominated the development of Islāmic jurisprudence throughout the second century A.H.. Known as 'āmal or “living tradition,” the aim of Islāmic jurisprudence was to follow the spirit of the Muhammad's teachings. At the same time, this 'āmal was validated through consensus (ijmā'), which consisted of the common opinion of the learned representatives of each legal school.
Ijmā', as we have explained, was a powerful political tool. It was employed to ensure the election of Abū Bakr as the Caliph after the death of the Prophet Muhammad. Later, it would be used to ensure the spread and implementation of the four schools of Islāmic law as sole representatives of orthodoxy. In both cases, ijmā' was employed to marginalize the authority of the Household of the Prophet.
Imām 'Alī was passed over as Caliph despite being selected as the Prophet's successor and the Ja'farī school was cast aside and considered orthodox despite the fact that is was the most ancient school and formed the basis of the Hanafī and the Malikī schools. Since the time of the Rightly-Guided Caliphs, Muslim jurists had based themselves on the Qur'ān and the Sunnah in order to derive laws. In order to consolidate their political agenda, however, the ruling authorities were required to use ijmā' as a secondary source of legal authority which they did not hesitate to use against the Holy Imāms.
In the early days of Islām, ijmā' had not yet been consolidated as a secondary source of Islāmic law. It was only in the third century A.H. that ijmā' became codified as standard procedure.
During the time of the two first khulafā al-rashīdūn, Abū Bakr al-Siddīq, and 'Umar ibn al-Khattab, the analogical method was employed to deduce legal implications and to find solutions to new or unforeseen situations, turning to the Qur'ān and the Sunnah. When they found the solution they were looking for, they would apply it, and when they did not find it, they would gather a group of Companions and ask their opinions. Whichever opinion was the most prevalent was the opinion which prevailed. This selective practice represents the origin of “consensus” as a legal practice. In other words, until the time of the khulafā al-rashīdūn, the concept of ijmā' or consensus was an eminently political decision which had the force of law.
The Caliphs in Madīnah, as legal administrators, acted as legislators for the community, and the same example was followed by the 'Ummayad Caliphs and their governors. During the entire first century of Islām, the administrative and legislative activities of the Islāmic government were one and the same. The 'Ummayad governors appointed the first judges who would shape Sunnī law. These judges or legal arbitrators judged new cases on the basis of personal opinion (ray), basing themselves on traditional practices and customs but supposedly considering the the letter and spirit of the Qur'ān.
The need to establish an ijmā' al-ummah or community consensus surged from the unwillingness of some tribal chiefs to accept the designation of 'Alī as the Caliph or successor to the Prophet Muhammad. In the early days of Islām, consensus was not so much a legal necessity, as a political requirement.
When differences of opinion affected political matters, particularly relating to the succession of the Prophet, the Shī'ite had no other option but to speak out. As a result of the differences between early Muslims, and the prevalence of partisan politics, the Ummah of Muhammad split into 'Ibadīs, Sunnis, and Shī'īs. The intensity of the political debate accentuated other doctrinal differences leading to the division of the Ummah into three major groups of Muslims, Sunnis, Shī'īs, and 'Ibadīs, each employing their own form of ijmā' as a secondary source of Islāmic jurisprudence.
Although these groups were distinct, they were never separate from the broader Islāmic community. Even though the separation into factions was painful and accompanied with violence and diatribe, the universal spirit of Islām always prevented schism. Each new generation moved from the extreme positions of the generation which preceded it, embracing middle positions, and recognizing the right of each party to its particular position. If one examines the history of Islām, one will find that the first to call for Islāmic unity and the reconciliation of all Muslims were the Imāms Ahlul Bayt.
During the life of the Prophet, discord and disputes were resolved through revelation. The issue of the succession of the Prophet however, was left unresolved in the hearts of Muslims, and simmered below the surface. Despite the fact that the successor of the Prophet had been established and confirmed by the Qur'ān, Muslims were divided: some felt the successor should be elected by tribal leaders and others accepted that the successor had been chosen by divine decree.
Sunnī jurists have justified the use of ijmā' or consensus based on a hadīth from the Prophet Muhammad which states that:“My community will never agree on an error” (Tirmidhī). This hadīth served as the basis for turning ijmā' into a tool for deriving Islāmic laws. This tradition grants apparent infallibility to the consensus of Sunnī jurists, an infallibility no Shī'ite fuqahā' would ever claim for themselves as they rely on the legal and spiritual authority of the Holy Imāms who, as far as Shī'ite Muslims are concerned, are the only individuals worthy of being considered infallible (ma'sūmīn).
As far as Shī'ite Muslims are concerned, the Prophet and his Ahlul Bayt were, by divine design, perfect human beings from the moment of their birth. They were purified, and infallible due to the innate perfection they had been granted by divine grace. Although the need to recurr to political consensus might be invoked in the absence of divinely appointed leadership, the fact remains that the Prophet Muhammad appointed 'Alī as his successor in accordance with a divine decree. Despite the fact that no ijmā' was required, it was employed by the opponent of 'Alī in order to destitute him from his legitimate right to the Caliphate.
Had the Prophet Muhammad received a divine order to place the leadership of the Islāmic community into the hands of tribal leaders, he would have said so. We would have ample traditions in which they Prophet states: “When I die, hold elections and elect a Caliph.” The truth of the matter is no such traditions exist. What does exist is a large body of traditions in which the Prophet explicitly appoints Twelve Imāms as his successors, all of whom were individually named, the first of which was 'Alī and the last of which was the Mahdī. Rather than leaving his community in the lurch, the Prophet Muhammad had always emphasized the need for an Imām or divinely-inspired guide to lead the Muslim community.
It is important to remember that the Prophet Muhammad never considered the Islāmic Ummah as being infallible or free of error. When the tribe of Quraysh reached the peak of its aggression towards him, the Prophet prayed: “O Allāh, pardon my people for their ignorance.” Had the Islāmic community been capable of governing itself and acting in the best interest of Islām, there would never been a need for Allah to send Spiritual Guides.
The fact that Allāh had opened the wilāyah (Guardianship of the Imāms) upon the closing of the nubuwwah (Prophethood) is sufficient indication that the Islāmic community was in no position to guide itself and that it needed divinely appointed Imāms to guide it on the straight path. In this light, it could even be argued that consensus or ijmā' is an innovation (mustahdath) in Islām. Based on the pre-Islāmic tribal custom of shūrā, ijmā', as an Islāmic institution, was developed after the death of the Prophet in response to the political need to consolidate the power of the emerging Caliphate.
In the Twelver Shī'ite context, the use of ijmā' or consensus came at a much later date and coincides with the Greater Occulation of the Twelfth Imām. As far as Ja'farī jurists were concerned, the use of ijmā' could scarcely be conceived in the presence of Infallible Imāms. It is for this reason that Shī'ite jurists only started to employ ijmā' after the Greater Occultation of the Imām Muhammad al-Mahdī. It should be noted, however, that the concept of ijmā' for Shī'ite jurists differs completely from the concept of ijmā' held by Sunnī jurists. For Shī'ite scholars,ijmā' is used for religious matters and not as part of political ploys.
• 3. Editor's Note: As we explain in “El idioma árabe en proceso de convertirse en un arma contra el Islām,” “No cabe duda alguna que los orientalistas norteamericanos de hoy no son comparables a los orientalistas franceses e ingleses de la época colonial” [There is no doubt that the American Orientalists of today cannot be compared to the French and English Orientalists from colonial times].
• 4. Editor's Note: Ahmad Ghurāb's Book, Subverting Islām, is a valuable read as it exposes Saudi supported schools and scholars. The leading pseudo-specialists on Islām include the neoconservative Daniel Pipes who is viewed by many as Islāmophobic.
• 5. Editor's Note: The Council of Nicea was the first ecumenical council convened (325) by Constantine I to condemn Arianism. Lyon was the place of two councils (1245-1274) while Letran was the place of five. The Council of Trent took place in Trent, from 1545 to 1547, in Bologna from 1547 to 1549 and once again in Trent from 1551 to 1552 and 1563 to 1563. It was convoked by Pople Paul III and concluded by Pious IV. It was the keystone of the Counterreformation by which the Roman Church opposed the Protestants, revised their disciplines, and reaffirmed their dogmas. For the Vatican Council, see note 87.
• 6. Editor's Note: It cannot be denied that there have been cases of persecution in Islām. To cite a single example, Sultān Selīm I, the Cruel, exterminated 40,000 of his Shī'ite subjects for political reasons. As for the main madhāhib in Islām, they were imposed by various authorities on their subjects. For more on the spread of the Sunnī schools, see the chapter ”[The] Secret Behind the Spread of [the] Sunnī Schools” in Tījānī's The Shī'ah: The Real Followers of the Sunnah: 82-87.
Although Tījānī conveniently fails to mention it, this applies equally to the Ja'farī school of thought in Persia which was imposed as a state-religion, for political reasons, by the Safavids. Without the Occultation of the Twelfth Imām, Twelver Shī'ites did not have a physical candidate for the leadership of the Muslim Community.
Hence, they posed no immediate threat to the authorities at a time where multiple movements were vying for power and leadership. It is important to note that, although the Sunnī schools of law were imposed by the ruling authorities to ensure uniformity and unity, many of the founders of the Sunnī madhāhib had been persecuted by the powers that be. For more on the suffrage of ahl al-sunnah by the ruling class, see Khaled Abou El Fadl's The Search for Beauty in Islām: A Conference of the Books.
• 7. Editor's Note: Abū 'Abd Allāh al-Husayn ibn Mansūr al-Hallāj was a theologian, mystic and Muslim martyr whose work marked the beginning of a strong Sūfī current. Accused of claiming divinity for having stated anā al-Haqq (I am the Truth), he was executed by the Abbasids. The rigorist literalists who judged him could not see beyond the surface of his words.
Al-Hallāj was not claiming to be Allāh. He was stating that he had submitted to Allāh and had become at one with Him. As Annemarie Schimmel explains, “in rare moments of ecstasy the uncreated spirit may be united with the created human spirit, and the mystic then becomes the living personal witness of Allāh and may declare anā al-Haqq” (72). The legitimate theological basis for such an understanding is demonstrated in the following hadīth qudsī where the Messenger of Allāh says that Allāh said:
Rather than claiming that he was God, al-Hallāj was expressing that he had lost his “I”–his selfhood–and had been submerged in the Beloved.Rūmī believed that the words “I am God” and I am creative truth” meant “I am pure” and “I hold nothing within me except Him” (Arasteh 89). Rūmī contrasted this interpretation with “orthodox” believers who claim, “I am a servant of God,” which asserts the dualism of existence (89).
The Messenger of Allāh and the Holy Imāms are also the Supreme Names of Allāh for it has been said by Imām al-Sādiq: “We are the Most Beautiful Names” (Khumaynī Islāmic Revolution 411). The Ahlul Baytare manifestations of Allāh. As such, the divine names are applicable to them, despite the fact that they themselves are not divine. As Khumaynī observes, “The whole world is a name of Allāh, for a name is a sign, and all the creatures that exist in the world are signs of the Sacred Essence of Allāh Almighty” (367); “Everything is a name of Allāh; conversely, the names of Allāh are everything, and they are effaced within His being” (370).
Suhrawardī (c. 1155-Alepo 1191) was a philosopher and mystic. He integrated the Gnostic tradition, hermeticism and neo-Platonism into Islām and exerted a great influence. Uways al-Qarnī was a follower of 'Alī who died fighting for him. Qanbar was a retainer of 'Alī. Maytham al-Tammār was a freedman of 'Alī and a loyal Shī'ite. He was executed by Ibn Ziyyād in Kufah. For a detailed description of the Imāms, consult Mufīd's Kitāb al-irshād.
As for the Shī'ite Imāms, the majority opinion, with the notable exception of Shaykh al-Mufīd, is that all of them were martyred through poisoning with the exception of Imām 'Alī who was killed by the blow of a sword while conducting prayers and Imām Husayn in a heroic battle at Karbala.
• 8. Editor's Note: The author wishes to make it explicitly clear that he is not justifying or defending the actions of any individuals. Al-Hallāj's words may seem excessive to some, but so was the punishment inflicted upon him by the authorities. When the author describes al-Hallāj as a “martyr” he does so in the sense found in the dictionary: “someone who suffers death rather than renounce his faith // someone who suffers greatly for some cause or principle” and not in the strict Islāmic sense of the word shahīd, which means a Muslim who has died defending his dīn [religion], who struggled in the path of Allāh, and who is assured of immediate and eternal reward in Paradise. In the case of Hallāj, Allāh is the Judge and Allāh is Just.
• 9. Editor's Note: This is in contrast to Nasr's view that heterodoxy can be judged by the consensus or ijmā' of the mainstream community on the basis of the Qur'ān and the Sunnah (Heart of Islām 87).
• 10. Editor's Note: In Islāmic jurisprudence, one can find a variety of opinions on different issues, each suited to the variety of individuals and levels found in society. While there may be a myriad of multicolored leaves on the tree of Islām, they all contrast and complement one another to create the Muslim mosaic. Truly, there is a great blessing in differences and diversity.
• 11. Editor's Note: Among the Sunnis, the doors of ijtihād, the independent interpretation and application of Islāmic law to changing times and circumstances, was closed in the 10th century. As a result, many Sunnī Muslims are obliged to follow Islāmic law as understood by medieval scholars which comes into conflict with their ability to manage with modernity. See Morrow, John A. “Like Sheep without a Shepherd: The Lack of Leadership in Sunnī Islām.”
The reopening of the doors of ijtihād was done by Muhammad 'Abduh, leader of the Salafī movement which can be defined as “Wahhābism with ijtihād.” Their ijtihād, however, is not the interpretation of the sharī'ah to apply it to modern times but rather subjecting modernity to misinterpreted medieval mandates.
• 12. Editor's Note: A fact which must be remembered when following the fatāwā of any scholar. In some cases, what they are presenting are educated points of view which is why they often finish their fatāwā with the words wa Allāhu a'lam or “And Allāh knows best.” They are not necessarily absolute facts. On many issues, there is not just one ruling: there are many, each of which is based on a thorough understanding of the Islāmic sciences.
It is a must for Muslims to adopt this tolerant attitude of mutual respect and comprehension. Imām Khumaynī, who was perhaps the greatest Islāmic scholar of the 20th century, firmly adopted this humble attitude. In both his commentary of the Qur'ān, and other contingent domains, he reiterated that “what I have to say is based on possibility, not certainty” (Islām and Revolution 366). And this is precisely what differentiates Muslims from the Ahlul Bayt. While we may have knowledge, the ahl al-'ismah have knowledge of certainty.
• 13. Editor's Note: As Imām Muhammad al-Bāqir explains:
He who has given verdicts [in matters of religion] on the basis of his own opinion, has actually followed a religion which he himself does not know. And he who accepts his religion in such a matter, has actually contradicted Allāh, since he has declared something lawful and something unlawful without knowing it. (Kulaynī 152: hadīth 175)
And as the Prophet Muhammad has said: “He who interprets the Qur'ān from his own personal opinion will have a seat in hell” (Tirmidhī, Ghazālī).
• 14. Editor's Note: Shī'ite Islām places a great deal of importance on 'aql or reasoning. While Shī'ite Muslims must follow experts in matters of law, they are prohibited from following anyone in matters of faith without proof and conviction. As Imām Khumaynī explains, “A Muslim must accept the fundamental principles of Islām with reason and faith and must not follow anyone in this respect without proof and conviction” (The Practical Laws of Islām 17).
• 15. Editor's Note: The author is alluding to the following verse “to Allāh belongs all power” (2:165), among others.
Share this page
| http://www.al-islam.org/it/node/18480 | dclm-gs1-253680001 | false | true | {
"keywords": "assembly, candida"
} | false | null | false |
0.019303 | <urn:uuid:9b0d8ef6-e05f-4d8f-ac57-a128caa82d62> | en | 0.823301 | Highly Accessed Open Badges Review
Autoantibody systems in rheumatoid arthritis: specificity, sensitivity and diagnostic value
Martinus AM van Boekel1*, Erik R Vossenaar1, Frank HJ van den Hoogen2 and Walther J van Venrooij1
Author Affiliations
1 Department of Biochemistry, University of Nijmegen, Nijmegen, The Netherlands
2 Department of Rheumatology, UMC St Radboud, Nijmegen, The Netherlands
For all author emails, please log on.
Arthritis Res 2002, 4:87-93 doi:10.1186/ar395
Received:11 July 2001
Revisions received:5 October 2001
Accepted:9 October 2001
Published:6 November 2001
© 2001 BioMed Central Ltd
The diagnosis of rheumatoid arthritis (RA) is primarily based on clinical symptoms, so it is often difficult to diagnose RA in very early stages of the disease. A disease-specific autoantibody that could be used as a serological marker would therefore be very useful. Most autoimmune diseases are characterized by a polyclonal B-cell response targeting multiple autoantigens. These immune responses are often not specific for a single disease. In this review, the most important autoantibody/autoantigen systems associated with RA are described and their utility as a diagnostic and prognostic tool, including their specificity, sensitivity and practical application, is discussed. We conclude that, at present, the antibody response directed to citrullinated antigens has the most valuable diagnostic and prognostic potential for RA.
autoantibodies; autoimmunity; citrulline; rheumatoid arthritis
RA is a common systemic autoimmune disease with a prevalence of about 1% worldwide. Although the etiology of the disease is still unknown, several risk factors have been identified. Like many autoimmune diseases, RA occurs more frequently in women than in men (3:1 ratio), suggesting a role for sex hormones. Genetic studies have demonstrated that a genetic predisposition resides in the HLA-DR locus. There is also evidence that environmental factors, such as infectious agents, oral contraceptives and smoking, may play a role [1].
RA is characterized by inflammation of the synovial membrane of diarthrodial joints. Early indications of RA are swelling and pain of the proximal interphalangeal and metacarpophalangeal joints. Later, the larger joints become affected, especially those of the knee, elbow and ankle. Large numbers of activated leukocytes infiltrate the synovial membrane, causing hyperplasia and inflammation, which in most cases leads to progressive destruction of cartilage and bone. Since RA is a systemic autoimmune disease, other parts/organs of the body may become affected at a later stage. An example of this is the formation of rheumatoid noduli. Peak onset typically occurs in the fourth and fifth decades of life.
With more sophisticated types of therapy becoming available, it is becoming more important to diagnose RA at an early stage of the disease, so that earlier treatment can be applied and major damage of joint tissue can be prevented. It is during the first period of the disease, when not all clinical parameters are manifest, that a specific and sensitive serological test is needed. Even more helpful would be the serological test being able to predict, in an early phase of RA, the erosive or nonerosive progression of the disease.
Over the past 25 years, many autoantibody activities in RA have been described. This review summarizes the most relevant, and attempts to discuss their specificity and possible diagnostic and prognostic value. We shall distinguish between RA-associated antibodies, which are present in RA but also in other diseases, and RA-specific autoantibodies, which appear to be exclusively present in RA. It is, of course, the category of RA-specific antibodies that is most relevant for the clinician.
Autoantibodies associated with RF
Rheumatoid factor
The so-called 'rheumatoid factor' (RF) was first described about 75 years ago; since then a vast amount of work has been performed on the incidence, nature and specificity of RF (reviewed in [2]). The RF antibody is present in about 75% of RA patients, but its specificity is limited since RF is also found in patients with other autoimmune diseases (e.g. Sjögren's syndrome), infectious diseases (e.g. hepatitis, tuberculosis), and to a certain extent in the healthy population (3–5%) and healthy elderly individuals (10–30%). Despite its relatively low specificity, the presence of RF is widely used as a diagnostic marker for RA.
RFs are antibodies directed to the crystallizable fragment of IgG molecules. They are found in every immunoglobulin subclass (IgE, IgM, IgA and IgG). IgG RF has a self-binding capacity that can result in the formation of very large immune complexes, which are able to (further) activate the immune system (reviewed in [3]). It is not clear whether RF is directly related to the symptoms of RA, although RF is found significantly more often in cases of aggressive joint inflammation. In those cases, RF titers are linearly related with the severity of inflammation. The clinical relevance of RF has been reviewed frequently (see, for example, [3,4]). Since the presence of RF is one of the American College of Rheumatology criteria for RA, the test is performed on a routine basis in most clinical laboratories. Some reports mention raised IgA-RF levels as a parameter for disease activity [5,6]. A combined routine determination of IgM-RF, IgG-RF and IgA-RF is recommended for an improved sensitivity, for diagnostic specificity and for predictive value [7,8].
Anti-RA33 antibodies
Hassfeld et al. [9] described a 33 kDa antigen recognized by sera from RA patients on immunoblots from soluble nuclear extracts of HeLa cells. The antigen, referred to as RA33, was recognized by 36% of the RA sera and by only 1% of the normal sera. Characterization of RA33 revealed that RA33 is identical to the A2 protein of the heterogeneous nuclear ribonucleoprotein complex [10]. Heterogeneous nuclear ribonucleoproteins are large nuclear structures present in every eukaryotic cell composed of long stretches of heterogeneous nuclear RNA associated with about 30 different proteins, with molecular weights varying between 34 and 120 kDa. The most abundant proteins in the heterogeneous nuclear ribonucleoprotein complexes, the so-called 'core' proteins, are named A1, A2, B1, B2, C1 and C2.
It has been suggested that RA33 is a marker for early arthritis [11]. However, the autoantibodies to RA33/A2 protein are not exclusively found in RA patients. They are also present in systemic lupus erythematosus (SLE) (25% of investigated sera) and mixed connective tissue disease sera [11,12].
Calpains are calcium-ion-dependent neutral cysteine proteinases. Two forms of calpains exist: μ-calpains (calpain I, which needs micromolar concentrations of Ca2+ for activity) and m-calpains (which require millimolar amounts of Ca2+ for activity). Substrates of these enzymes are highly diverse and include cytoskeletal proteins, nuclear proteins, cytokines and extracellular matrix proteins including proteoglycans [13]. Elevated levels of extracellular calpain in the inflamed synovium have been reported, which suggests that calpains might be secreted by synovial cells and could play a role in cartilage degradation in RA [14,15].
Calpastatin is the natural inhibitor of calpains. Using immunoblots of recombinant protein, autoantibodies directed to calpastatin can be found in about 45% of the RA sera, but also sera from SLE, myositis and systemic sclerosis contain antibodies directed to calpastatin [16,17]. A recent study using recombinant fusion proteins with truncated forms of calpastatin showed that anticalpastatin antibodies can also be found in sera from healthy individuals, even in comparable numbers, relative to RA patients [18]. Autoantibodies directed to calpastatin could increase calpain activity, leading to enhanced cartilage damage, and could therefore contribute to the severity of the disease [14].
Other RA-associated autoantibodies
RA patients produce autoantibodies directed to many autoantigens, but most of them are not specific for RA. Among these nonspecific antibodies are those directed to a wide variety of cartilage proteins such as collagen and fibronectin, but also antiphospholipid antibodies and antineutrophil cytoplasmic antibodies (ANCA) can often be found.
Although autoantibodies against several types of collagens have been described, the autoimmune reaction directed to collagen type II (anti-CII) seems predominant. Anticollagen antibodies are present in about 30% of RA patients and only in HLA-DR4-positive ones [19]. Although anti-CII autoantibodies can be found in serum of only a small proportion of the RA patients, these antibodies and anti-CII-producing B cells are present in the joints of the majority of these patients [20]. It is not clear whether the occurrence of anticollagen autoantibodies plays a role in the pathogenesis of RA or is merely a result of the disease [3,19]. Anticollagen autoantibodies show a low specificity and can also be found in other autoimmune disorders (e.g. SLE, 20% occurrence; systemic sclerosis, 15% occurrence; relapsing polychondritis, 50% occurrence) and infectious diseases (e.g. leprosy, 50% occurrence). Anti-CII IgG titers in serum and synovial fluid appear to directly correlate with levels of acute-phase reactants, and of cytokines such as tumor necrosis factor-α and interleukin-6 [21]. A possible explanation for these findings is cross-reactivity with the first complement component, C1q, which has a collagen-like tail [22].
Fibronectin is a dimeric glycoprotein that interacts with collagens, fibrin(ogen), heparin and various cell surface adhesion molecules. It is present in connective tissue matrices and on the surface of epithelial cells. The protein is also (in a soluble form) present in plasma and other body fluids. Autoantibodies to fibronectin are found in about 14% of RA patients and show a low specificity (SLE, 34%) [23].
ANCA were initially discovered in serum of RA patients by immunofluorescence on neutrophilic granulocytes and can be subdivided into two groups depending on their localization: cytoplasmic ANCA, and perinuclear ANCA (reviewed in [24]). ANCA can be found in up to one-third of the RA patients, but can also be detected in other autoimmune conditions and various infectious diseases [25,26,27].
Autoantibodies directed to the nonhistone chromosomal proteins HMG1 and HMG2 can be detected in about 25–40% of the RA patients, but similar frequencies have also been reported for SLE, Sjögren's syndrome and scleroderma patients (see references in [28]).
Antiphospholipid antibodies, like autoantibodies directed to cardiolipin, are not only found in autoimmune diseases such as RA (4–49% occurrence) and SLE (~40% occurrence), but are also present in many infectious diseases (e.g. syphilis, 75% occurrence; leprosy, 67% occurrence). The incidence in RA can vary strongly, depending on the methodology of detection and the selection of patients (reviewed in [29]).
Autoantibodies specific for RF
Sa protein
The antigen Sa is recognized by autoantibodies in about 40% of the RA sera with a rather high specificity [30,31]. These antibodies can already be detected at an early stage of the disease, albeit with a rather low sensitivity (23%) [30,32]. The antigen is a 48–50 kDa protein, predominantly present in human placenta extracts [31]. It can also be detected in human spleen and RA pannus tissue, but not in cultured cells. As explained by Menard et al. [33], Sa possibly is a citrullinated form of the intermediate filament protein vimentin (in cultured cells, vimentin is normally not citrullinated). Other workers have postulated that part of the Sa activity could be identical to human α-enolase [34]. If the Sa protein indeed is citrullinated, the antigen can be categorized in the filaggrin/cyclic citrullinated peptide (CCP) family of citrullinated autoantigens (see below).
Heavy chain binding protein (p68)
Autoantibodies directed to the p68 protein, recently identified as heavy chain binding protein (BiP), occur in about 64% of RA patients and appear to be highly specific for the disease [35,36,37]. The reported specificity of these antibodies still awaits further confirmation by clinical studies. The BiP antigen is also a target of RA-specific T-cell and B-cell immune responses [38], and is over-expressed in RA synovial tissue compared with control tissue. BiP is a ubiquitously expressed chaperone protein predominantly localized in the endoplasmic reticulum. The major B-cell epitope of this antigen appears to be a N-acetylglucosamine carbohydrate group, which is possibly important for its cellular localization [39]. The BiP protein can be detected in the cytoplasm and endoplasmic reticulum of cultured cells, but also in low abundance at the cell surface. Under stress (especially heat shock) conditions, the antigen can relocalize to the nucleus [39]. This nonphysiological localization of the antigen, accompanied by a shift in its glycosylation pattern, might trigger antigenicity of BiP during the pathogenesis of RA. Anti-BiP antibodies can also be detected in mice with established collagen-induced or pristane-induced arthritis [37].
Glucose-6-phosphate isomerase
The household enzyme glucose-6-phosphate isomerase (GPI) was recently described as a novel autoantigen in RA [40]. The antibodies could be detected in 64% of RA patients but not in controls. Interestingly, anti-GPI antibodies are also present in T-cell receptor-transgenic mice. In this mouse model system, GPI can serve as an autoantigen for both B and T cells, and passive transfer of anti-GPI to normal healthy animals induces arthritis. The anti-GPI antibodies in humans appear to be produced locally, since anti-GPI titers were higher in RA synovial fluids as compared with RA sera. Immunohistochemistry of synovia from RA patients showed high concentrations of GPI on the surface of the synovial lining and on the endothelial cell surface of arterioles [40]. It is intriguing and significant that the same autoantigen is targeted by autoantibodies in RA patients and in a mouse model of RA.
Antiperinuclear factor/antikeratine antibodies/antifilaggrin/anti-CCP
In 1964 a highly specific RA antibody system directed to a protein component present in the keratohyaline granules in the cytoplasm of differentiating buccal mucosa cells was described. The antigen was referred to as perinuclear factor, and the antibody activity became known as antiperinuclear factor (APF) [41]. APF antibodies combined a relative high sensitivity (depending on the cohort of patients being studied, they were present in 49–91% of RA patients) with a strong specificity (73–99%, reviewed in [42]). The APF test never became popular because of several practical inconveniences. Only a few percent of an average (laboratory) population can donate buccal mucosa cells differentiated far enough to contain the peri-nuclear factor. Another inconvenience is the fact that the antibody activity can only be measured by indirect immunofluorescence, making interpretation of test results sometimes very difficult [42].
A related group of RA-specific autoantibodies, the so-called antikeratine antibodies (AKA), was first described in 1979 [43]. These antibodies stain keratin-like structures in the cornified layer of esophagus cryostat sections but do not recognize cytokeratins, as is suggested by the name. AKA can be detected by indirect immunofluorescence in 36–59% of RA sera with a specificity of 88–99% (reviewed in [42]). Several studies have shown that the APF and AKA antibodies target the same antigen, the epithelial protein filaggrin (for references see [44]).
Filaggrin (filament aggregating protein) is involved in the organization of cytoskeletal structures in epithelial cells and is synthesized as a large, heavily phosphorylated precursor protein, profilaggrin. During differentiation of epithelial cells, profilaggrin is partly dephosphorylated and proteolytically cleaved into 10–12 filaggrin subunits. Finally, about 20% of the arginine residues are enzymatically deiminated to citrulline residues [45]. Conversion of the basic amino acid arginine into the neutral residue citrulline is catalyzed by the enzyme peptidylarginine de-iminase (Fig. 1). It is this modification that has been shown to be essential for the autoantigenicity of filaggrin [46,47].
thumbnailFigure 1. The enzymatic conversion of peptidyl-arginine to peptidyl-citrulline.
Immunoblotting assays and an enzyme-linked immunosorbent assay (ELISA) using filaggrin purified from human skin as an antigen have been developed for the detection of antifilaggrin antibodies (AFA). Vincent et al. [48] could detect AFA in 41% of RA sera with 99% specificity. When combining the AFA immunoblot assay with AKA testing, a much higher sensitivity (64%), without loss of specificity, could be achieved [48]. However, the sensitivity of the assay appears to be dependent on the method for purification of the filaggrin. Slack et al. calculated sensitivities of 12 and 16% for two different filaggrin preparations, while only one of five positive sera reacted with both preparations [49]. The AFA-ELISA is somewhat more sensitive (47–54%) than the immunoblot assay [50,51], but the results are in good agreement with APF data obtained with the same set of sera [52]. Using in vitro deiminated recombinant filaggrin, Nogueira et al. [53] could detect AFA in about 52% of RA sera. The differences in AFA, APF and AKA results and the influence of the antigen preparation imply that several (rather than one single) epi-topes are recognized.
The AFA-ELISA test detected 45% of RF-negative erosive cases, in particular those with larger numbers of erosive joints. Testing for AFA could therefore supplement RF in the prediction of erosive disease. The test could also be helpful in the diagnosis of RA in those cases that do not completely fulfill the 1987 American College of Rheumatology criteria [52]. In a case-control study, pre-illness AFA titers were found to directly be related to the risk of developing RF-positive RA, but not RF-negative arthritis [54]. AFA are present early in the disease, as is the case with APF and anti-CCP antibodies (see below), and raised AFA levels correlate with the severity of the disease. However, there is discussion whether disease activity and radiological damage can be predicted by AFA levels [51,52,55].
One disadvantage of the AFA test is the difficulty of obtaining an antigen preparation that is pure and contains a reproducible citrulline content. These problems do not occur when citrullinated peptides are used as the antigen, as has been shown by Schellekens et al. [46]. RA sera, however, show different patterns of reactivity with the citrullinated peptide variants, which emphasizes the heterogeneous nature of the autoimmune response. With a combination of nine citrullinated peptide variants, a sensitivity of 76% could be reached with a specificity of 96% [46]. The test could be improved and simplified using a single cyclic peptide that has a three-dimensional structure optimally recognized by the heterogeneous population of RA autoantibodies [56]. Recent studies indicate that this anti-CCP test (manufactured by Euro-Diagnostica BV, Arnheim, The Netherlands) is extremely specific (~98%) and has a reasonable sensitivity of 68–75% [57,58] (van Boekel and de Jong, unpublished observations, 2001). Anti-CCP antibodies can be detected very early in RA, although with a somewhat lower sensitivity (40–60%) [32,57,58,59,60]. Anti-CCP appears to be a good prognostic marker and has a high discriminating power between erosive and nonerosive RA [61]. RA patients positive for anti-CCP develop significantly more radiological damage than anti-CCP-negative patients [59,60], although anti-CCP combined with RF appears to be an even better prognostic marker [56,58,61].
The results described (supported by the fact that nonfilaggrin-like citrulline-containing antigens are also recognized by RA sera [62]) suggest that, in principle, most citrullinated proteins/peptides will be recognized by autoantibodies in RA sera, all be it with different sensitivities and specificities. Since filaggrin is not present in the joint, it is reasonable to assume that other citrulline-containing proteins are present in the RA synovium. In RA pannus tissue, AFA are produced by local plasma cells and constitute a higher proportion of IgG than in serum [63]. Furthermore, B cells from the synovial fluid of anti-CCP-positive RA patients spontaneously produce anti-CCP antibodies, while peripheral blood B cells or B cells from anti-CCP-negative RA patients do not [64]. This suggests an antigen-driven maturation of CCP-specific B cells at the site of inflammation in RA. One of these possible autoantigens, citrullinated fibrin, has recently been identified [65]. The possible role of citrullinated fibrin and other citrullinated antigens in the pathophysiology of RA remains to be elucidated [66].
Conclusions and discussion
RA is accompanied by the occurrence of many autoantibodies in the serum of the patient. Most of these antibodies are not specific for RA because they also occur in other inflammatory conditions. Other antibodies appear to be more specific and are, in some cases, almost exclusively present in RA.
The possible pathogenic nature of autoantibodies in RA is still controversial (reviewed in [67]). The evidence for the pathogenic involvement of RF in RA can, at best, be considered indirect [67]. There is an association of RF with the severity of RA, and RF-positive patients can turn RF-negative following therapy [3,68]. Administration of human IgG or IgM monoclonal RF to mice (suffering from collagen-induced arthritis) results in an enhanced activity and severity of the disease and in an increase in anticollagen antibody levels [69]. RF has the capacity to activate the complement cascade, which could be an important factor in the disease activity and the chronic character of RA [3,70]. RF is also found in healthy individuals, however, and possibly even plays a physiological role in immune complex clearance [3].
Anticollagen antibodies possibly have pathogenic potential. Injection of serum IgG from a RF-negative patient with high levels of anti-CII antibodies induces a mild form of inflammatory arthritis in mice [71,72], but the pathogenic involvement of anti-CII antibodies is much less evident in human RA. Anticalpastatin antibodies could contribute to the pathology by inhibiting calpastatin functioning [13]. The participation of other autoantibody systems (such as anticitrullinated protein, anti-GPI and anti-Sa antibodies) in RA pathogenesis is still unclear, although their high specificity adds to the increasing body of evidence that they may be important in maintaining RA.
Some of the RA-specific antibodies might be very helpful in the early diagnosis and prognosis of the disease. These antibodies are presented in Table 1. Most promising for the future appears to be the growing family of antigens containing one or more citrulline residues. Some of these antigens (i.e. filaggrin and CCP) have recently been applied in simple and easy-to-use ELISA tests, and have been shown to be very specific for RA, to be able to diagnose RA in a very early phase of the disease, and to predict erosive disease. As such, this class of anticitrullinated protein autoantibodies has the potential to become the serological marker for RA of the future.
Table 1. Rheumatoid arthritis autoantigens with relatively high specificity
Although we know that the anticitrullinated protein antibodies are locally generated in the inflamed joint, we also know that both filaggrin and CCP are not present in this tissue. It was recently shown that fibrin in the pannus tissue is citrullinated. This intriguing finding underlines the idea that local citrullination of extravascular proteins might be one of the initiating event(s) leading to autoimmunity in RA.
The key question why only patients with RA develop antibodies to citrullinated (synovial) proteins remains to be answered. Further research will hopefully reveal the significance of protein citrullination in the immunopathology of RA.
AFA = antifilaggrin antibodies; AKA = antikeratine antibodies; ANCA = antineutrophil cytoplasmic antibodies; anti-CII = antibody response to collagen type II; APF = antiperinuclear factor; BiP = heavy chain binding protein; CCP = cyclic citrullinated peptide; ELISA = enzyme-linked immunosorbent assay; GPI = glucose-6-phosphate isomerase; RA = rheumatoid arthritis; RF = rheumatoid factor; SLE = systemic lupus erythematosus
1. Gabriel SE: The epidemiology of rheumatoid arthritis.
2. Mageed RA: The RF antigen.
In Manual of Biological Markers of Disease. Edited by van Venrooij WJ & Maini RN. Dordrecht: Kluwer Academic Publishers; 1996, (section B1.1):1-27. OpenURL
3. Smolen JS: Autoantibodies in rheumatoid arthritis.
In Manual of Biological Markers of Disease. Edited by van Venrooij WJ & Maini RN. Dordrecht: Kluwer Academic Publishers; 1996, (section C1.1):1-18. OpenURL
Immunol Today 2000, 4:177-183. Publisher Full Text OpenURL
5. Pai S, Pai L, Birkenfeldt R: Correlation of serum IgA rheumatoid factor levels with disease severity in rheumatoid arthritis.
Scand J Rheumatol 1998, 27:252-256. PubMed Abstract | Publisher Full Text OpenURL
6. Hoessien DA, Jonsson T, Davies E, Scott DL: Clinical significance of IgA rheumatoid factor subclasses in rheumatoid arthritis.
J Rheumatol 1997, 24:2119-2122. PubMed Abstract OpenURL
7. Jonsson T, Steinsson K, Jonsson H, Geirsson AJ, Thorsteinsson J, Valdimarsson H: Combined elevation of IgM and IgA rheumatoid factor has a high diagnostic specificity for rheumatoid arthritis.
Rheum Int 1998, 18:119-122. Publisher Full Text OpenURL
8. Swedler W, Wallman J, Froelich CJ, Teodorescu M: Routine measurement of IgM, IgG and IgA rheumatoid factors: High sensitivity, specificity and predictive value for rheumatoid arthritis.
J Rheumatol 1997, 24:1037-1044. PubMed Abstract OpenURL
9. Hassfeld W, Steiner G, Hartmuth K, Kolarz G, Scherak O, Graninger W, Thumb N, Smolen JS: Demonstration of a new antinuclear antibody (anti-RA33) that is highly specific for rheumatoid arthritis.
Arthritis Rheum 1989, 32:1515-1520. PubMed Abstract OpenURL
10. Steiner G, Hartmuth K, Skriner K, Maurer FI, Sinski A, Thalmann E, Hassfeld W, Barta A, Smolen JS: Purification and partial sequencing of the nuclear autoantigen RA33 shows that it is indistinguishable from the A2 protein of the heterogeneous nuclear ribonucleoprotein complex.
J Clin Invest 1992, 90:1061-1066. PubMed Abstract OpenURL
11. Hassfeld W, Steiner G, Graninger W, Witzmann G, Schweitzer H, Smolen JS: Autoantibody to the nuclear antigen RA33: a marker for early rheumatoid arthritis.
Br J Rheumatol 1993, 32:199-203. PubMed Abstract OpenURL
J Clin Invest 1997, 100:127-135. PubMed Abstract | Publisher Full Text OpenURL
13. Menard HA, El-Amine M: The calpain–calpastatin system in rheumatoid arthritis.
Immunol Today 1996, 17:545-547. PubMed Abstract | Publisher Full Text OpenURL
14. Yamamoto S, Shimizu K, Suzuki K, Nakagawa Y, Yamamuro T: Calcium-dependent cysteine proteinase (calpain) in human arthritic synovial joints.
Arthritis Rheum 1992, 35:1309-1317. PubMed Abstract OpenURL
15. Szomor Z, Shimizu K, Fujimori Y, Yamamoto S, Yamamuro T: Appearance of calpain correlates with arthritis and cartilage destruction in collagen induced arthritic knee joints of mice.
Ann Rheum Dis 1995, 54:477-483. PubMed Abstract OpenURL
16. Despres N, Talbot G, Plouffe B, Boire G, Menard HA: Detection and expression of a cDNA clone that encodes a polypeptide containing two inhibitory domains of human calpastatin and its recognition by rheumatoid arthritis sera.
J Clin Invest 1995, 95:1891-1896. PubMed Abstract OpenURL
17. Mimori T, Suganuma K, Tanami Y, Nojima T, Matsumura M, Fujii T, Yoshizawa T, Suzuki K, Akizuki M: Autoantibodies to calpastatin (an endogenous inhibitor for calcium-dependent neutral protease, calpain) in systemic rheumatic diseases.
Proc Natl Acad Sci USA 1995, 92:7267-7271. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL
18. Lackner KJ, Schlosser U, Lang B, Schmitz G: Autoantibodies against human calpastatin in rheumatoid arthritis: epitope mapping and analysis of patient sera.
Br J Rheumatol 1998, 37:1164-1171. PubMed Abstract | Publisher Full Text OpenURL
19. Rönnelid J, Lysholm J, Engstrom LA, Klareskog L, Heyman B: Local anti-type II collagen antibody production in rheumatoid arthritis synovial fluid. Evidence for an HLA-DR4-restricted IgG response.
Arthritis Rheum 1994, 37:1023-1029. PubMed Abstract OpenURL
21. Kim W-U, Yoo W-H, Park W, Kang Y-M, Kim S-I, Park J-H, Lee S-S, Joo Y-S, Min J-K, Hong Y-S, Lee S-H, Park S-H, Cho C-S, Kim H-Y: IgG antibodies to type II collagen reflect inflammatory activity in patients with rheumatoid arthritis.
J Rheumatol 2000, 27:575-581. PubMed Abstract OpenURL
22. Reid KB: Complete amino sequences of the three collagen-like regions present in subcomponent C1q of the first component of human complement.
Biochem J 1979, 179:367-371. PubMed Abstract OpenURL
23. Atta MS, Lim KL, Ala'Aldeen DA, Powell RJ, Todd I: Investigation of the prevalence and clinical associations of antibodies to human fibronectin in systemic lupus erythematosis.
Ann Rheum Dis 1995, 54:117-124. PubMed Abstract OpenURL
24. Charles PJ, Maini RN: Antibodies to neutrophil cytoplasmic antigens in rheumatoid arthritis.
Adv Exp Med Biol 1993, 336:367-370. PubMed Abstract OpenURL
25. Schnabel A, Hauschild S, Gross WL: Anti-neutrophil cytoplasmic antibodies in generalized autoimmune diseases.
Int Arch Allergy Immunol 1996, 109:201-206. PubMed Abstract OpenURL
26. Kallenberg CG, Mulder AH, Tervaert JW: Antineutrophil cytoplasmic antibodies: a still-growing class of autoantibodies in inflammatory disorders.
Am J Med 1992, 93:675-682. PubMed Abstract OpenURL
27. Mulder AH, Horst G, van-Leeuwen MA, Limburg PC, Kallenberg CG: Antineutrophil cytoplasmic antibodies in rheumatoid arthritis. Characterization and clinical correlations.
Arthritis Rheum 1993, 36:1054-1060. PubMed Abstract OpenURL
28. Uesugi H, Ozaki S, Sobajima J, Osakada F, Shirakawa H, Yoshida M, Nakao K: Prevalence and characterization of novel pANCA, antibodies to the high mobility group non-histone chromosomal proteins HMG1 and HMG2, in systemic rheumatic diseases.
J Rheumatol 1998, 25:703-709. PubMed Abstract OpenURL
29. Morris V, Mackworth-Young C: Antiphospholipid antibodies: clinical aspects.
In Manual of Biological Markers of Disease. Edited by van Venrooij WJ & Maini RN. Dordrecht: Kluwer Academic Publishers; 1996, (section C2.5):1-14. OpenURL
30. Hayem G, Chazerain P, Combe B, Elias A, Haim T, Nicaise P, Benali K, Eliaou JF, Kahn MF, Sany J, Meyer O: Anti-Sa antibody is an accurate diagnostic and prognostic marker in adult rheumatoid arthritis.
J Rheumatol 1999, 26:7-13. PubMed Abstract OpenURL
31. Despres N, Boire G, Lopez-Longo FJ, Menard HA: The Sa system: a novel antigen–antibody system specific for rheumatoid arthritis.
32. Goldbach-Mansky R, Lee J, McCoy A, Hoxworth J, Yarboro C, Smolen JS, Steiner G, Rosen A, Zhang C, Ménard HA, Zhou ZJ, Palosuo T, van Venrooij WJ, Wilder RL, Klippel JH, Schumacher HR Jr, El-Gabalawy HS: Rheumatoid arthritis associated autoan-tibodies in patients with synovitis of recent onset.
33. Menard HA, Boire G, Lopez-Longo FJ, Lapointe S, Larose A: Insights into rheumatoid arthritis derived from the Sa immune system.
ArthritisRes 2000, 2:429-432. BioMed Central Full Text OpenURL
34. Saulot V, Yon G, Vittecoq O, Charlionnet R, Machour N, Lange C, Marvin L, Gilbert D, Le Loet X: Sa, Alpha-enolase and rheumatoid arthritis [abstract].
Arthritis Rheum 2000, 43(suppl):S68. OpenURL
35. Bläβ S, Specker C, Lakomek HJ, Schneider EM, Schwochau M: Novel 68 kDa autoantigen detected by rheumatoid arthritis specific antibodies.
Ann Rheum Dis 1995, 54:355-360. PubMed Abstract OpenURL
36. Bläβ S, Union A, Raymackers J, Schumann F, Ungethüm U, Müller-Steinbach S, De Keyser F, Engel J-M, Burmester GR: The stress protein BiP is overexpressed and is a major B and T cell target in rheumatoid arthritis.
Arthritis Rheum 2001, 44:761-771. PubMed Abstract | Publisher Full Text OpenURL
37. Corrigall VM, Bodman-Smith MD, Fife MS, Canas B, Myers LK, Wooley PH, Soh C, Staines NA, Pappin DJC, Berlo SE, van Eden W, van der Zee R, Lanchbury JS, Panayi GS: The human endoplasmatic reticulum molecular chaperone BiP is an autoanti-gen for rheumatoid arthritis and prevents the induction of experimental arthritis.
38. Bläβ S, Haferkamp C, Specker C, Schwochau M, Schneider M, Schneider EM: Rheumatoid arthritis: autoreactive T cells recognising a novel 68k autoantigen.
Ann Rheum Dis 1997, 56:317-322. PubMed Abstract | Publisher Full Text OpenURL
39. Bläβ S, Meier C, Vohr HW, Schwochau M, Specker C, Burmester GR: The p68 autoantigen characteristic of rheumatoid arthritis is reactive with carbohydrate epitope specific autoantibodies.
Ann Rheum Dis 1998, 57:220-225. PubMed Abstract | Publisher Full Text OpenURL
Nat Immunol 2001, 2:746-753. PubMed Abstract | Publisher Full Text OpenURL
41. Nienhuis RLF, Mandena EA: A new serum factor in patients with rheumatoid arthritis. The antiperinuclear factor.
Ann Rheum Dis 1964, 23:302-305. PubMed Abstract OpenURL
42. Hoet RM, Van Venrooij WJ: The antiperinuclear factor and antikeratin antibodies in rheumatoid arthritis.
In Rheumatoid Arthritis. Edited by Smolen J, Kalden J & Maini RN. Berlin: Springer Verlag; 1992, 299-318. OpenURL
43. Young BJJ, Mallya RK, Leslie RDG, Clark CJM, Hamblin TJ: Anti-keratin antibodies in rheumatoid arthritis.
Br Med J 1979, 2:97-99. PubMed Abstract OpenURL
J Clin Invest 1995, 95:2672-2679. PubMed Abstract OpenURL
45. Gan SQ, McBride OW, Idler WW, Nedialka M, Steinert PM: Organization, structure, and polymorphisms of the human profillagrin gene.
Biochemistry 1990, 29:9423-9440. OpenURL
46. Schellekens GA, de Jong BAW, van den Hoogen FHJ, van de Putte LBA: Citrulline is an essential constituent of antigenic determinants recognized by rheumatoid arthritis-specific autoantibodies.
47. Girbal-Neuhauser E, Durieux J-J, Arnaud M, Dalbon P, Sebbag M, Vincent C, Simon M, Senshu T, Masson-Bessière C, Jolivet-Reynaud C, Jolivet M, Serre G: The epitopes targeted by the rheumatoid arthritis-associated antifilaggrin autoantibodies are posttranslationally generated on various sites of (pro)filaggrin by deimination of arginine residues.
48. Vincent C, Simon M, Sebbag M, Girbal-Neuhauser E, Durieux JJ, Cantagrel A, Fournie B, Mazieres B, Serre G: Immunoblotting detection of autoantibodies to human epidermis filaggrin: a new diagnostic test for rheumatoid arthritis.
J Rheumatol 1998, 25:838-846. PubMed Abstract OpenURL
49. Slack SL, Mannik M, Dale BA: Diagnostic value of antibodies to filaggrin in rheumatoid arthritis.
J Rheumatol 1998, 25:847-851. PubMed Abstract OpenURL
50. Palosuo T, Lukka M, Alenius H, Kalkkinen N, Aho K, Kurki P, Heikkila R, Nykanen M, von Essen R: Purification of filaggrin from human epidermis and measurement of antifilaggrin autoantibodies in sera from patients with rheumatoid arthritis by an enzyme-linked immunosorbent assay.
Int Arch Allegy Immunol 1998, 115:294-302. Publisher Full Text OpenURL
51. Paimela L, Palosuo T, Aho K, Lukka M, Kurki P, Leirisalo-Repo M, von Essen R: Association of autoantibodies to filaggrin with an active disease in early rheumatoid arthritis.
Ann Rheum Disease 2001, 60:32-35. Publisher Full Text OpenURL
52. Aho K, Palosuo T, Lukka M, Kurki P, Isomaki H, Kautiainen H, von Essen R: Anti-filaggrin antibodies in recent-onset arthritis.
Scand J Rheumatol 1999, 28:113-116. PubMed Abstract | Publisher Full Text OpenURL
53. Nogueira L, Sebbag M, Vincent C, Arnaud M, Fournié B, Cantagrel A: Performance of two ELISAs for antifilaggrin autoantibodies, using either affinity-purified or deiminated recombinant human filaggrin, in the diagnosis of rheumatoid arthritis.
Ann Rheum Dis 2001, 60:882-887. PubMed Abstract | Publisher Full Text OpenURL
54. Aho K, Palosuo T, Heliovaara M, Knekt P, Alha P, von Essen R: Antifilaggrin antibodies within "normal" range predict rheumatoid arthritis in a linear fashion.
J Rheumatol 2000, 27:2743-2746. PubMed Abstract OpenURL
55. Forslind K, Vincent C, Serre G, Svensson B: Antifilaggrin autoantibodies in early rheumatoid arthritis.
Scand J Rheumatol 2000, 29:320-322. PubMed Abstract | Publisher Full Text OpenURL
56. Schellekens GA, Visser H, de Jong BAW, van den Hoogen FH, Hazes JM, Breedeveld FC, van Venrooij WJ: The diagnostic properties of rheumatoid arthritis antibodies recognizing a cyclic citrullinated peptide.
Clin Chem 2001, 47:1089-1093. PubMed Abstract | Publisher Full Text OpenURL
58. Vencovský J, Šedová L, Machácek S, Kafková J, Gatterová J, Pešáková V, Ruzicková S: Autoantibodies can be prognostic markers of an erosive disease in early rheumatoid arthritis.
Ann Rheum Dis 2001, in press. OpenURL
59. van Jaarsveld CHM, ter Borg EJ, Jacobs JWG, Schellekens GA, Gmelig-Meyling FHJ, van Booma-Frankfort C, de Jong BAW, van Venrooij WJ, Bijlsma JWJ: The prognostic value of the antiperi-nuclear factor, anti-citrullinated peptide antibodies and rheumatoid factor in early rheumatoid arthritis.
60. Kroot EJJA, de Jong BAW, van Leeuwen MA, Swinkels H, van den Hoogen FHJ, van't Hof M, van de Putte LBA, van Rijswijk MH, van Venrooij WJ, van Riel PLCM: The prognostic value of anti-cyclic citrullinated peptide antibody in patients with recent-onset rheumatoid arthritis.
61. Visser H, le Cessie S, Vos K, Breedveld FC, Hazes JMW: How to diagnose rheumatoid arthritis early? A prediction model for persistent (erosive) arthritis.
Arthritis Rheum 2001, in press. OpenURL
62. Lapointe E, Déry U, Vaillanciurt F, Ménard HA: Rheumatoid sera potentially recognize all citrullinated proteins [abstract].
Arthritis Rheum 1999, 42:S86. OpenURL
63. Masson-Bessière C, Sebbag M, Durieux JJ, Norgueira L, Vincent C, Girbal-Neuhauser E, Durroux R, Cantagrel A, Serre G: In the rheumatoid pannus, anti-filaggrin autoantibodies are produced by local plasma cells and constitute a higher proportion of IgG than in synovial fluid and serum.
Clin Exp Immunol 2000, 119:544-552. PubMed Abstract | Publisher Full Text OpenURL
64. Reparon-Schuijt CC, van Esch WJE, van Kooten C, Schellekens GA, de Jong BAW, van Venrooij WJ, Breedveld FC, Verweij CL: Secretion of anti-citrulline-containing peptide antibody by B lymphocytes in rheumatoid arthritis.
Arthritis Rheum 2001, 44:41-47. PubMed Abstract | Publisher Full Text OpenURL
65. Masson-Bessière C, Sebbag M, Girbal-Neuhauser E, Nogueira L, Vincent C, Senshu T, Serre G: The major synovial targets of the rheumatoid arthritis-specific antifilaggrin autoantibodies are deiminated forms of the α and β-chains of fibrin.
66. Serre G: Autoantibodies to filaggrin/deiminated fibrin (AFA) are useful for the diagnosis and prognosis of rheumatoid arthritis, and are probably involved in the pathophysiology of the disease.
Joint Bone Spine 2001, 68:103-105. PubMed Abstract | Publisher Full Text OpenURL
67. Smolen JS, Steiner G: Are autoantibodies active players or epiphenomena?
Curr Opin Rheumatol 1998, 10:201-206. PubMed Abstract OpenURL
68. Cordonnier C, Meyer O, Palazzo E, de Bandt M, Elias A, Nicaise P, Haim T, Kahn MF, Chatellier G: Diagnostic value of anti-RA33 antibody, antikeratin antibody, perinuclear factor and antinuclear antibody in early rheumatoid arthritis: comparison with rheumatoid factor.
Br J Rheumatol 1996, 35:620-624. PubMed Abstract OpenURL
69. Ezaki E, Okada M, Yoshikawa Y, Fujikawa Y, Hashimoto M, Otsuka M, Nomura T, Yamamoto K, Watanabe T, Shingu M, Nobunaga M: Human monoclonal rheumatoid factors augment arthritis in mice by the activation of T-cells.
Clin Exp Immunol 1996, 104:474-482. PubMed Abstract | Publisher Full Text OpenURL
70. Breitner S, Störkel S, Reichel W, Loos M: Complement components C1q, C1r/C1s and C1INH in rheumatoid arthritis.
Arthritis Rheum 1995, 38:492-498. PubMed Abstract OpenURL
Mayo Clin Proc 1984, 59:737-743. PubMed Abstract OpenURL
72. Staines NA, Wooley PH: Collagen arthritis – what can it teach us?
Br J Rheumatol 1994, 33:798-807. PubMed Abstract OpenURL | http://www.arthritis-research.com/content/4/2/87 | dclm-gs1-253780001 | false | true | {
"keywords": "cytokine, interleukin"
} | false | null | false |
0.029525 | <urn:uuid:1b3b0032-e465-4c17-bbfa-65f413ae805a> | en | 0.978658 | Answer a question Ask a question
had a ultra sound found two sacks one baby
what does that mean was it twins
Posted: 08/26/2010 by meme07lisette
Mom Answers
Two sacs would indicate that at some point a twin pregnancy started to develop but for whatever reason one of the twins stopped. It is impossible to know at what point development stopped. But it is estimated that 1 in 8 pregnancies start out as twins. You can google vanishing twin syndrome for more information.
posted 08/26/2010 by sugar&spiceX3
Was this answer helpful?
1 out of 1 found this helpful
At 6wks we saw 2 sacs and one he saw a baby heartbeat and all....the other was "empty" is what he said. I started feeling sick, bad morning sickness that lasted all day! I even had to go get fluids b/c I was vomiting so much and couldn't even keep water down. At 10 wks I started bleeding (very light lasted about 2 hours) went in the next day to check on the baby. I'm expecting twins in January (18 wks today)....... Now I had friend who had IVF and at first they saw 2 sacs then one was gone. So my story may be unique, just watch your symptoms if they start getting on the extreme side it could be they just missed the baby. or it was just not as developed for whatever reason. Saying all that most likely the lady that answered before is right that one will just vanish. But pregnancy are a weird thing and sometimes you get the surprise of a lifetime!!
posted 08/28/2010 by ajoy79
Was this answer helpful?
0 out of 0 found this helpful
At 6 weeks, I had an ultrasound... 2 sac, 2 babies, 2 heartbeats! I just went in on Tuesday for another ultrasound and one of the twins was not viable. I am devastated. It is such a bittersweet feeling. So far, the other baby is doin well (I'm 10.5weeks). My doctor told me that it's called "vanishing twin syndrome" and happens in about 30% of twin pregnancies. In fact, he said that if I never had an early ultrasound and my first on was at 18 weeks... I probably would've never known I was pregnant with twins. Right now, I'm in grieving mode... Good luck.
posted 09/03/2010 by Foof1178
Was this answer helpful?
0 out of 0 found this helpful
Answer this question
Your Pregnancy, Week by Week
Your Pregnancy, Week by Week
Have an account? Log in | http://www.babycenter.com/400_had-a-ultra-sound-found-two-sacks-one-baby_7776574_322.bc | dclm-gs1-253840001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.564394 | <urn:uuid:b6f24b63-3a6f-44af-9154-7933a53df6f4> | en | 0.93318 | Ask Better Homes & Gardens
Experts and BHG readers answer.
How can I speed up the composting process in my compost bin?
I have had a large compost bin for two years. I have layered brown and green items and watered the pile during the summer. The pile is composting, but slowly. How can I speed up the process?
Submitted by BHGPhotoContest
Regular maintenance helps your compost pile work quicker. Add thin layers of topsoil or finished compost to your pile to introduce microorganisms that create compost. Water enough to keep it moist but not soggy. Turn your compost regularly-once a week if possible-to keep it aerated. If that doesn't produce compost as quickly as you desire, turn the pile more often, add more nitrogen-rich (green) materials, and shred or chop the carbon-rich (brown) materials before adding them to the pile. You'll know your compost is ready for the garden when it is dark and crumbly and most of the plant parts are decomposed.
Community Answers
Answer this Question
Enter an Answer to this Question
500 characters left | http://www.bhg.com/advice/gardening/soil/how-can-i-speed-up-the-composting-process-in-my-compost-bin/ | dclm-gs1-253910001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.546812 | <urn:uuid:eabcab57-40a2-4611-afab-a557b7d21439> | en | 0.962242 | Elliott 803 Initial Instructions
In order to load programs into the 803, a short program is needed that can read the program from a paper tape and write the contents into the store. It is possible to enter such a program from the keyboard and store it, but it would be tedious and error-prone. In order to store a pair of instructions (one word) several operations are needed:
As you can see this is not an easy process, and it is fortunate that the designers of the 803 thought so too. As a result, they devised a very short program, and arranged for it to be permanently available. The program takes only four words of store and these appear to be stored in the first four words of the 803 store. They are hard-wired and so cannot be overwritten, indeed, they cannot be read either, as attempting to do so returns a value of zero. They can, however, be executed, and are sufficient to load a larger program into the store. This can either be a short self-contained program, or a bootstrap loader which can then load a much larger program, and may include sum-checking to ensure that the program has not been corrupted, as happens occasionally if a tape gets slightly damaged.
The built-in loader was referred to as Initial Instructions (II) or by the name in which it appeared in the program library: T1. Paper tapes that were intended to be read by this program were said to be in T1 format.
The program is, as I have said, only four words, or eight instructions and is shown here:
This short program makes use of location 4 in the store, the first word following this program, to contain the address of the next word to be loaded. At least, that is not quite true, it is the address minus 4.
The program starts by clearing this location [26 4], then by clearing the accumulator [06 0]. It then enters the outer loop of the program and increments the load address [22 4 /]. The slash in the B-column means that the contents of location 4 (now set to one) is added to the second instruction in word 1 [16 3], giving [16 4] and so the zero in the accumulator is written into location 4, and the accumulator is set to zero (which it was already, but that's bye the bye). The inner loop of the program starts at word 2, with [55 5]. This shifts the accumulator left by 5 bits. As it is zero, not much happens here but it gets interesting later. The second instruction in word 2 reads in a character from the paper tape [71 0]. The 5 bits read from tape are or-ed into the accumulator. As it has just been shifted left by five bits, the bottom five bits are zeros, so the operation is just to set the character in these bottom five bits. The final word [3] of the program contains two jump instructions. The first tests for overflow [43 1] which won't have happened at this stage, so it continues on to execute the second instruction [40 2] which takes it back to word 2.
When a paper tape is loaded by the operator, the tape is always placed with the blank leader under the read head. So the first few characters read are always zeros. As a result, the 803 simply loops around words 2 and 3 until it encounters non-blank characters.
At this point the accumulator becomes non-zero, and the characters read in get shifted along until the eight characters have been read. The first non-blank character always has a high bit set, either 10000 or 01000. After being shifted 7 times, this bit causes the overflow flag to be set, either the accumulator has changed sign or a bit has been shifted out the top of the accumulator. Either way, the jump in the first half of word 3 [43 1] is taken, and the 803 moves to word 1. Here it increments word 4 (which had been set back to 0) to 1 (for the second time) and then the second word stores the content of the accumulator in location 4. The accumulator is then set back to zero and the inner loop is re-entered. The next 8 characters (ignoring any intervening blanks, of course) are packed up in the same way as the first word, and this is then stored in the location determined by the new content of word 4. Subsequent blocks of 8 characters are then stored at the locations that follow this.
It can be seen that the tape format should be a sequence of words, each word being stored as eight characters. Since 8 5-bit characters gives 40 bits and the 803 word is only 39 bits, the top bit is discarded. The first character of each block may be modified by adding in 10000 so as to force the overflow, although if the next bit is already a one this is not strictly neccesary. Some programmers always set the bit, others only set it when strictly needed. The first of these words defines the load address for the subsequent words. The value specified should be 4 less than the address intended to allow for the offset in this program. The remaining words handled by T1 are loaded into the store starting at the address given by the first word plus 4.
Since this is a very simple program, one might expect that there would be a problem when it gets to the end of the program to be loaded. Indeed, if no special action is taken, a program could be loaded and the tape reader would run off the end of the tape. The operator could then press SYSTEM RESET to clear the BUSY condition and set up a jump on the WG to enter the program just loaded.
However, the designers had another trick up their sleeves. If the program being loaded is being read into the top of the store, then the address will wrap around at the top of the store, and then subtle effects come into play. What the programmer does is to encode 4 words of zeros, which the machine will attempt to load into the first four words of the store. Since the Initial Instructions are hard-wired this has no effect, but when it overwrites word 4, then the new value can have a dramatic effect. The instruction modification that takes place adds the contents of word 4 to the whole of the second instruction in word 1. Suppose the value that was written into location 4 was [22 8062]. This would be incremented to [22 8063] and then added to [16 3] to give [40 8066] which is a jump instruction. The Initial Instructions would therefore jump to word 8066 in the store where the program just loaded presumably starts. In practice, it's a little bit more complicated as the [16 3] instruction is modified to [17 4] on that word, and the inner loop doesn't read 8 characters, only 1, but I'm sure you get the idea. It certainly works and I consider this to be one of the most ingenious programs ever written! Other machines (e.g. IBM 360) had some special hardware which would read a block from the input device into a fixed place in store and execute it, but this just uses standard instructions to achieve its ends.
Page created by Bill Purvis, last update: 5th January, 2004 | http://www.billp.org/ccs/ElliottAlgol/initialinstructions.html | dclm-gs1-253930001 | false | false | {
"keywords": "a sequence"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.427449 | <urn:uuid:c53a45d2-bde3-46a2-b376-9193afe18772> | en | 0.965915 | Keeping Iraq Intact
The soldiers said that while they wore Iraqi army uniforms they still considered themselves members of the Peshmerga -- the Kurdish militia -- and were awaiting orders from Kurdish leaders to break ranks. Many said they wouldn't hesitate to kill their Iraqi army comrades, especially Arabs, if a fight for an independent Kurdistan erupted.
The Kurds have readied their troops not only because they have long yearned to establish an independent state, but also because their leaders expect Iraq to disintegrate, senior leaders in the Peshmerga told Knight Ridder.
The Kurds are mostly secular Sunni Muslims and belong to two distinct ethnic groups that date their animosity to the seventh century. Their members predominantly share a belief in Islam but speak different languages, trace their origins to different geographic locations and have different customs.
Kurds have inhabited northeastern Iraq, northwestern Iran and parts of present-day Turkey, Syria and Armenia for centuries. They lived largely autonomously until the seventh century, when Arabs from the Arabian Peninsula conquered them. The Kurds maintained their separate identity, however, despite subsequent conquests by Mongols in the 13th to 15th centuries and by the Ottoman Empire at the end of World War I.
The militias now are illegal under Iraqi law but operate openly in many areas. Peshmerga leaders said in interviews that they expected the Shiites to create a semi-autonomous and then independent state in the south, as they would do in the north.
The Bush administration -- and Iraq's neighbors -- oppose the nation's fragmentation, fearing that it could lead to regional collapse. To keep Iraq together, the United States plans to withdraw significant numbers of American troops in 2006 will depend on turning U.S.-trained Kurdish and Shiite militiamen into a national army.
The all new
CBS News App for Android® for iPad® for iPhone® | http://www.cbsnews.com/news/keeping-iraq-intact/ | dclm-gs1-254100001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.018586 | <urn:uuid:3933ddef-8670-48d4-a8ec-c74d2d677fc9> | en | 0.926499 | View more editions
Contemporary Labor Economics
Contemporary Labor Economics 9th Edition
• 71 step-by-step solutions
• Solved by publishers, professors & experts
• iOS, Android, & web
2013 Chegg Homework Help Survey
Chapter: Problem:
Explain why a voluntary army may be less expensive to society than an army composed of draftees. Which will likely be less expensive to taxpayers
• Step 1 of 1
A voluntary army will be composed only of those whose net opportunity cost of enlisting is less than the wage paid. A conscripted army will likely be composed of those whose opportunity cost is much higher. Thus, the economic cost of the conscripted army is likely to be higher than that of a volunteer army. However, the conscripted army will be perceived by taxpayers as less expensive, as the cost is transferred from the taxpayer to the draftees.
Corresponding Textbook
Contemporary Labor Economics 9th edition 9780073375953 0073375950
Contemporary Labor Economics | 9th Edition | http://www.chegg.com/homework-help/contemporary-labor-economics-9th-edition-chapter-12-solutions-9780073375953 | dclm-gs1-254110001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.048759 | <urn:uuid:3b47b6ba-d630-4314-aec6-a89927754e5f> | en | 0.844999 |
Hartford Courant
World Cup finals match
England's captain David Beckham, left, Rio Ferdinand and Michael Owen (R) celebrate Owen's goal during the second round World Cup Finals match against Denmark in Niigata, Japan. Dan Chung, REUTERS | http://www.courant.com/chi-david2002celebratebeckham-20020616-photo.html | dclm-gs1-254300001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.133532 | <urn:uuid:f5933d09-7a01-40a2-ac1a-7ff7e746b4a0> | en | 0.882471 | The Daily Dot The Kernel
white house
computer monitor with a lock on the screen Twitter, Dropbox, ACLU petition White House to back strong encryption
The fight for private communication continues.
broken FBI-branded padlock Report shows cybersecurity officials feel understaffed and demoralized
'A job at Apple or Google will typically be more attractive and alluring for a recent graduate than a job at the IRS.'
Was CJ Pearson blocked by @POTUS?
Someone's lying—we just don't know who.
Pope Francis Pope Francis urges strong action on climate change in White House speech
Bernie Sanders interview with Iowa Press Bernie Sanders’s Liberty University speech is the most important moment of the 2016 race
The War on Poverty affects everyone—and it's time to make everyone listen.
Siri surprises White House press by answering a reporter's question
Siri is taking over America. | http://www.dailydot.com/tags/white-house/ | dclm-gs1-254330001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.018456 | <urn:uuid:13216413-153c-4272-a237-2d205a7069fa> | en | 0.893733 | PIX 2015
Bye-bye camera shake
Started Mar 15, 2013 | Discussions thread
Shop cameras & lenses ▾
ForumParentFirstPreviousNextNext unread
Flat view
Senior MemberPosts: 2,033Gear list
Bye-bye camera shake
Mar 15, 2013
Handheld camera shake is unavoidable. No matter how calm you are, how slowly you breathe, or how you grip the camera -- you can't win. Even with shake reduction. Because our bodies naturally produce tremors -vibrations -- all the time. When you use telephoto lenses, camera shake becomes a real problem. This leads many of us to use tripods or monopods. But what if you just don't want to use one? Here's a three-part solution.
1. High shutter speed. Many of our cameras allow VERY high shutter speeds. 1/1000, 1/2000, even 1/4000 of a second. At 1/2000, that bird or plane you're tracking just can't move very far in that small amount of time. So, you've eliminated subject blur. And, that same 1/2000 ... and definitely 1/4000... will eliminate handheld camera shake.
2. High ISO setting. On many cameras, you can choose the shutter speed, as above... and select the aperture, like a telephoto's f/5.6 or so. But you can also put the Auto-ISO setting on a wide range... like 100 to 1600. And yes, if the camera chooses an ISO like 800 or 1600, there will be more noise in the picture than at ISO 100. But does it matter?
3. Reduce the image. We have very large images to work with. 10... 14... 16... 18 megapixels, and more. Which means that, for practical use for printing and web display, we can often REDUCE the image by 50%, or more. This reduction eliminates a LOT of the high-ISO digital noise that you see at 100%.
Look the pictures below at full size. Look at the sky in the first image below (a 100% unsharpened crop from a 16 MP original). Then compare the sky in the next two... one at 50%, the smallest only 25% of the original's size. I took the picture an hour before sunset, and a breeze was moving the leaves. Not so bad!
-- hide signature --
ForumParentFirstPreviousNextNext unread
Flat view
ForumParentFirstPreviousNextNext unread
Keyboard shortcuts:
Color scheme? Blue / Yellow | http://www.dpreview.com/forums/post/51041480 | dclm-gs1-254490001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.465194 | <urn:uuid:6072ec42-53ce-4f23-860f-a58b60bc1060> | en | 0.961682 | How do the Federal Reserve's open market operations work to affect the economy?
Asked on
1 Answer | Add Yours
pohnpei397's profile pic
Posted on (Answer #1)
Open market operations work by affecting the supply of money that is available in the United States. This is one of the most important ways in which the Federal Reserve (the Fed) can carry out monetary policy.
Open market operations are the process in which the Fed buys and sells government securities. By doing so, it can inject money into the economy or it can take money out of the economy. When the economy is growing relatively slowly (as it is now) or when it is not growing at all, the Fed wants to inject money. If there is more money in the economy, there can be more lending and borrowing. This can lead to economic growth. That is why the Fed is currently buying large amounts of government securities. When it buys the securities, it gives money to the banks that had owned the securities. Thus, the banks have more money than they previously had and therefore can make more loans. If the Fed were concerned about inflation, it could do the opposite; it could sell securities, thus taking money away from the banks.
Open market operations work, then, by affecting the amount of money that is in the economy.
We’ve answered 396,032 questions. We can answer yours, too.
Ask a question | http://www.enotes.com/homework-help/federal-reserve-with-open-market-operations-how-do-439187 | dclm-gs1-254620001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.029386 | <urn:uuid:79ad4d2e-0468-4244-99f1-1a21d49cdaad> | en | 0.965001 | HARRISBURG, Pa.—A far-reaching bill that would raise taxes to boost spending on Pennsylvania's transportation system by about $2 billion a year was left in limbo Saturday night as the Republican-controlled House of Representatives adjourned for the day without taking action on the measure.
The surprise adjournment after an hour-long floor session culminated a day of closed-door meetings in the House, which had been expected to begin debating dozens of proposed amendments to the transportation bill, while lobbyists, activists, reporters and a few tourists milled about in the Capitol rotunda through the day.
Meanwhile, the Senate adjourned after the Appropriations Committee advanced a nearly $28.4 billion state budget bill that requires approval by both chambers before the Sunday night deadline. House Majority Leader Mike Turzai said he expects lawmakers also will be in session at least through Monday to dispose of legislation necessary to implement the budget bill.
House Republican leaders acknowledged that they lacked the votes to pass the transportation legislation, but claimed that a majority of GOP caucus members were on board and sought to scold Democrats for not acting in a bipartisan spirit and putting up more votes.
"They're not returning phone calls. They're not returning phone calls of our leader," said Rep. Mike Vereb, R-Montgomery.
Mike Hanna, the House Democratic whip, said Democrats have tried repeatedly to get their ideas into the chamber's transportation legislation, but have been rejected. He said Democrats prefer a $2.5 billion alternative that the Senate approved earlier in June with more money for mass transit funding.
"It cannot be a situation where they keep handing their ideas to us and saying, 'you have to put up votes for this," the Clinton County lawmaker said.
Republicans outnumber Democrats in the House, 111 to 92.
The transportation bill that would phase out a cap on a wholesale tax on motor fuels over five years to help generate a $2 billion annual increase for highways, bridges, mass transit and other transportation programs. The Senate-passed alternative also would increase the oil company franchise tax. Both versions also would increase an assortment of motorist fees and fines.
Corbett, who campaigned on a no-new-taxes pledge, opened the door to increasing the wholesale tax by making it the centerpiece of the $1.8 billion plan he advanced in February. Senate leaders have made transportation funding a top priority, but a consensus in the more conservative House has been elusive.
Meanwhile, Senate Republicans worked into the wee hours of Saturday morning to win a key vote on a bill to privatize wine and liquor sales over Democratic objections, but whether it was enough to win over House leaders who favored a more aggressive approach remained unclear. The bill remained in the Senate on Saturday night.
The Senate bill would retain state ownership of the lucrative wholesale business of shipping liquor and wine, but allow the state's 1,100 retail beer distributors to buy permits to sell wine and liquor and allow certain other food stores to buy permits to sell wine.
The two issues are indirectly linked: Senate Republicans have made a transportation bill a top priority while House GOP leaders helped lead efforts to privatize the state-controlled liquor and wine system. Several Republican senators said some support for the wine and liquor plan was driven by a desire to encourage House passage of a transportation funding bill.
Republicans have all but abandoned efforts to pass legislation sought by Corbett that makes major changes to public employee pension laws.
Also circulating were proposals that would increase business tax deductions, allow small games of chance at bars and help Corbett make a legal case to Attorney General Kathleen Kane for his contract to hire a British company to manage the $3.5 billion Pennsylvania Lottery. | http://www.eveningsun.com/statenews/ci_23566248/pa-lawmakers-head-capitol-6th-straight-day | dclm-gs1-254680001 | false | false | {
"keywords": "p gene"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.188544 | <urn:uuid:f4be141d-7a64-4ec8-803c-84cf931493ba> | en | 0.929198 | What does it mean if a forecast calls for a 60% chance of rain?
Add your answer...
1 Answer
It means there is a 60% chance that a given location within a forecast area will receive measurable rain. Technically, this probability of precipitation is defined as the likelihood (expressed as a percent) of a measurable amount (at least 0.01 inch) of liquid precipitation during a specified time period at any given point in the forecast area. For more, read our pages on understanding weather forecasts and FAQ about forecasts. more
Thanks for your feedback!
Related Videos
| http://www.experts123.com/q/what-does-it-mean-if-a-forecast-calls-for-a-60-chance-of-rain.html | dclm-gs1-254720001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.026325 | <urn:uuid:cc73f08c-47cb-4bdb-9659-710f5c74cb08> | en | 0.838783 | Japanes beautiful bbw having big hot tits fucks with a guyVanessa Lee getting well strokedRin Aoki has some amazingly big boobs with huge round nipplesHitomi Matsumoto 145cm R CupFuuka Takanashi gets wet as he uses his tongue on her pussyMiu Satsuki sucking on a sex toy while her big boobs fondledMiu Satsuki massive boobs groped by two horny guysYuiamp180s giant tits hang because she bends over to take cockRiana Natsukawa slides a dick into her tight pussy to fuck itBBW JAPANESE MAIDYuiamp180s giant tits hang because she bends over to take cockKumiko Hayama Asian babe licks her big tits and nipplesBritish BBW granny gets her panties and her ass fuckedYui does a 69 with a horny man then jerks off 2 menRin Aoki has some amazingly big boobs with huge round nipplesBig Boobed Asian BBW FuckedAmateur boobs groped by strangers in the elevatorUnknown Model Asian tramp?s boyfriend buries his head in her huge titsRea Aoyama squeezes her tits together to show off cleavageRin Aoki pushes the nipples inside her boobs as much as she canRin Aoki with big boobs tied in ropes has cunt and tits stimulateRika Momoi Asian doll shows off huge tits for a close uppnst-soapBBW Asian with a big assJAPANESE NATURAL BOOBS MITSUMI NANAOYuiamp180s giant titties are held in hands of a horny manCUTE CHUBBY ASIAN BOUND AND CREAMPIEDJapanese Double Dynamite Plumper Hip Pleasure Vol.4Japanese AV Modelamp180s big tits are played with and nipples pinchedMecumi sucks dick and gets it all wet for some hardcore sexKelly has huge boobsMujer gorda aplasta a hombre
Yui licks her nipples because her tits are so big they can reachVanessa Lee taking hard strokesYuiamp180s giant boobs shake while she rides cock and gets fuckedRika Momoi Asian doll shows off huge tits and is fondledYuiamp180s big tits are squeezed and played with and she loves itHitomi Matsumoto voluptuous gets fingers in her fat fuck holeAnn Takahashi - Busty Chubby Hairy Sweet Jap MaidYui licks her nipples because her tits are so big they can reachMiu Satsuki takes a huge black cock in her mouthBbw japanese roleplayChunky Asian whore gets doggy fucked by black dickOver 9000 Porn Movies Only at Sexy Asian Jade HsuMecumiamp180s wet cunt is ready for sex with a man and his hard cockBBW Asian 5Nana Aoyama busty babe teasing her slaves hard cockAzusa Nagasawa climbs onto this stud and slides his cock insideJapanese AV Model has pink nipples bitten and suck and gets cockRin Aoki with cock in vagina has huge boobies full of oilthick asian kya tropic takes a BBC up the assYu is one Asian chubby lady with huge melons that is screwed wellPine Miyazaki Chubby chick with huge hooters gets licked by her dateHinata Komine Asian has huge boobs taken out of dress and touchedJapanese AV Model has her tits painfully punished with showerUnknown Model Presses her huge Asian tits against glass for funBBW Asian 2Naho Hazuki shows her boobs while her wet pussy is touchedEren Jo Big Boobs Japanese vol.8JAPANESE NATURAL BOOBS MITSUMI NANAOKumiko Hayama Asian gets mini vibrators on oiled cunt and boobs
Russian Guy fucks busty Asian Girlfriend cute coupleBBW Asian 5Fuko 2Chunky Asian whore gets doggy fucked by black dickRin Aoki has huge melons tied in strong ropes that cause pain2 BIG Japanese ladies dominate and fuckJapanese amateur MILF lactation and blowjob cumjapanese bbwBeautiful asian BBW loves to fuckErika Kirihara cute Japanese housewife sucking his hard cockJapanese FetishChihiro Asou flashes her white cotton panties to the cameraMartial Arts Instructor Gets Tekoki From Big BBW FighterUnknown Model gets her big Asian tits fondled by her date in her roomKarlie Montana and Charlie Laine lesbiansYuiamp180s giant tits hang because she bends over to take cockMiu Satsuki curvy ass is licked while she wears a body stockingTyung Lee taking hard strokesNot Olivia - Asian hottie known as...Riana Natsukawa boyfriend loves oral sex before fucking her hardAsian slut takes fat dick inside herpnst-soapChichi Asada plays with her big tits before being touchedRen Kikukawa Hot Asian maid shows off her lovely big tits and hot figureRinka Aiuchi sucks a hard dick in her stockingsMR.X SERIESsex and zen-1992-PART2 chineseVISIT UNDERTAKER1008XVIDEOS.COMthai glamour handjob BBW cougarSuzuka Arinaga gives a blowjob then uses her big tits to fuckMR.X SERIESsex and zen-1992-PART2 chineseVISIT UNDERTAKER1008XVIDEOS.COMBBW Asian 1Filipino Girlfriend Becums BBC WhorePretty Busty Japanese MILF039s Cunt FuckedBrooke Haven - sharing is caring
Categories: Amateur | Anal | Asian | Ass | Ass Fucking | Ass Licking | BDSM | Babe | Bath | Big Cocks | Big Tits | Blonde | Blowjob | Brunette | Bukkake | Close Up | Coed | Cougar | Cowgirl | Creampie | Cuckold | Cum On Face | Cumshot | Deepthroat | Double Penetration | Ebony | European | Face | Face Sitting | Fatty | Femdom | Fetish | Fingering | Fisting | Foot Fetish | Footjob | Girlfriend | Glasses | Gonzo | Granny | Groupsex | Hairy | Handjob | Hardcore | High Heels | Homemade | Housewife | Indian | Interracial | Kissing | Kitchen | Latex | Latina | Lesbian | Lingerie | Massage | Masturbating | Mature | Milf | Mom | Nipples | Nurse | Office | Oiled | Oldman | Outdoor | Panties | Pantyhose | Party | Pissing | Pool | Pornstar | Pregnant | Public | Pussy | Pussy Lick | Reality | Redhead | SSBBW | Saggy Tits | Schoolgirl | Shaved | Shower | Skinny | Skirt | Spanking | Sport | Spreading | Squirt | Stockings | Strapon | Striptease | Swingers | Tattoo | Teacher | Teen | Threesome | Tiny Tits | Titjob | Toys | Ugly | Uniform | Vintage | Voyeur | Wet | Wife |
Please Visit 100% Trusted Free Porn Sites: | http://www.fattymgp.com/movies/asian/ | dclm-gs1-254760001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.034988 | <urn:uuid:dc167f3b-73f5-477f-9074-f391fae0d019> | en | 0.947292 | federalcto.com The Blog of a Federal CTO
Breach Directory Doc – First draft
I just posted an incomplete, and rough document here:
Going forward, this link will always have the latest, published version of the doc. For more information about the overall project, have a look here:
Filed under: Uncategorized No Comments
Your Directory Has Been Breached – landing page
(2012-05-30 - 13:00 ET)
First up, here is Bob's initial post on the topic:
(2012-05-30 - 16:15 ET)
(2012-06-05 - 18:00 ET)
Think there’s no cold war?
Meant to mention
US Government Smartcards; CAC, PIV and PIV-I
Recently, I had the pleasure of trying to get some government certified smart cards for some of the technical people at Quest, and I can't believe how much of a headache and hassle it was. I actually don't work for Quest Software, but a subsidiary (Quest Software Public Sector) which is focused on the public sector space. And while most Quest employees don't have a need for government-issued or government approved smart cards, our company does. And while I knew that non-government employees can get a relatively new (a little over a year old) flavor of the PIV card called PIV-I, I was amazed at how difficult the process was to navigate. Thankfully, we have some pretty good and persistent purchasing folks, but the process is still pretty arduous for an organization that has been working with the government for years.
I won't get into all the details, but if you're interested, feel free to contact me offline.
In any case, I find myself constantly having to explain what the different is between a smart card, a CAC, a PIV card, and now a PIV-I card. A smart card is pretty straight forward - it's a generic term, and all the other cards fall into this category. You can find a lot more details on them here at Wikipedia. In any case, the thing that makes a smart card a CAC (which means Common Access Card, so please don't say, "CAC Card" as it is redundant) is that it is used by the US DoD (Department of Defense). If you want to do any work on government systems in the military, you will most likely need one of these.
Like their military counterparts, employees within civilian agencies also need smart cards. Of course, they opted for a similar, but not the same, standard. That standard is a PIV card (Personal Identification Verification). The cards are slightly different from CACs, and have varying information printed on them, depending on the issuing agency. Plus, they use a different set of CA (Certificate Authority) servers than the ones that CACs use, as the DoD have their own servers.
Finally, and this is the confusing thing, there are PIV-I cards. PIV-I stands for PIV-Interoperable. There are some great docs about PIV and PIV-I at www.idmanagment.gov which is a site run by GSA but I'll save you the trouble of wadding through a lot of documentation. The PIV-I FAQ here states:
2.2 What is the difference between a PIV-I Card and a PIV Card?
The term “PIV Card” may only be used to describe an identity card that is fully conformant with Federal PIV standards (i.e., FIPS 201 and related documentation). Only a Federal entity is capable of fully meeting these standards and issuing a PIV Card. A PIV-I Card meets the PIV technical specifications of NIST SP 800-73 and is issued in a manner that may be trusted by Federal Government Relying Parties, but does not meet all of the requirements of FIPS 201.
What does this mean? A Federal entity (aka employee) uses a PIV card, and a trusted, non-government entity has to use a PIV-I card.
So there you go. In summary:
• CAC is for Department of Defense users
• PIV is for civilian users working for the Federal government
• PIV-I is for non-Federal entities that need to access government systems
1. A card is inserted into the reader
4. The user enters the PIN tied to the card
7. The user is allowed to log in
sudo /opt/quest/bin/vastool smartcard configure \
sudo /opt/quest/bin/vastool smartcard test \
sudo /opt/quest/bin/vastool smartcard configure macos
require-smartcard = true
Here is the chat session:
Graeme: Welcome to Gogo. My name is Graeme.
Graeme: Hi, Dmitry!
Dmitry Kagansky: hi
Dmitry Kagansky: please cancel the monthly charge
Dmitry Kagansky: you could point that out in your FAQ
Dmitry Kagansky: this is a real nuisance
Dmitry Kagansky: or chat with one of you guys every time
Dmitry Kagansky: that's just lovely
Graeme: What other questions can I answer for you?
Dmitry Kagansky: no others
Dmitry Kagansky: thank you
Graeme: Thank you for choosing Gogo. Fly classy.
Graeme has disconnected.
VDI – nothing like watching the lightbulb go on!
I was a conference for a Federal agency this week, and had a fantastic experience with a (prospective) customer. We were talking about this and that, but the conversation worked it's way around to mobile computing. And while agencies are announcing "mobile initiatives" left and right, the reality is that everyone is still really concerned about what BYOD (Bring Your Own Device) means.
My friend, Joe Baguley, has been going on about "the consumerisation of IT" for a while (and he's English, so it's an "s" and not a "z" in consumerisation) as have others, but the Feds work differently. It's not purely about savings, and things are a bit more measured. And that's one of the reasons that the Blackberry continues to hold on, and the iPad has made no movement yet. When the OS cannot be locked down through a central server, and policies cannot be set on applications and data, the device has a slim chance of making it in the Federal space.
But Quest have an interesting solution to the problem; one that took 5 minutes to demonstrate, and turn on the lightbulb for a senior-level manager at this agency. It was vWorkspace. He had his iPad with him (running a beta of iOS 5, in fact - good to know it looks like it works there, too!), and we started talking about how he can control data and access. Thankfully, I had a demo account on a set of servers that a colleague had up and running (Rob Mallicoat - many thanks!), and he had a network connection on the iPad. Within 5 minutes, I was able to download the vWorkspace iPad app, configure the settings, and voila! I was showing him Visio running on an iPad in no time.
And the thing is, I tell people about it time and again, but until you actually see it working, you don't realize how cool it is. Even the sales guy in the booth lit up when he saw how easy it was, and what it did. That got this manager interested, and proved one of the core problems with VDI; users need to touch it and see it for themselves. It's not enough to give them docs and white papers, and even web demos don't cut it.
But that's not enough; what's unique is how Quest does it. We don't care if you have some apps and desktops on VMware, and others on Hyper-V. You could even be running Terminal Services! We combine all of that, and give you a single interface. As a user, you don't know (and shouldn't care) how an app or a desktop is delivered. We even have a slick, "local VDI" option, thanks to MokaFive.
That's what got the manager really excited - he realized he didn't have to be tied to a single VDI option or vendor, and he can even provide multiple environments all through 1 app, delivered to his users' desktops. Plus, add the fact that it can all be remote means he could even give out iPads, but keep all the data in his data centers.
So if you have an iPad or Android device, ping a Quest person, and see if they can get you access to a demo system. Or ping me if you're with a Federal agency. Because this is something you simply need to try, and not just watch or read about.
You are now chatting with NFL Game Pass
NFL Game Pass: Hello, how may I help you?
Dmitry Kagansky: xxxxxxxxxx
Dmitry Kagansky: ok - then 2 questions
Dmitry Kagansky: you, or one of your colleagues
Dmitry Kagansky: terrific - when will the manager contact me
Dmitry Kagansky: who will contact me?
Dmitry Kagansky: how will I be contacted?
Dmitry Kagansky: and by whom?
NFL Game Pass: The first contact is typically via email.
Dmitry Kagansky: fantastic
Dmitry Kagansky: now, i didn't get contacted last time
Dmitry Kagansky: or ms anonymous employee
Dmitry Kagansky: i look forward to the email
Dmitry Kagansky: cheers
You are now chatting with NFL Audio Pass
NFL Audio Pass: Hello, how may we help you?
NFL Audio Pass: can we have your user name
Dmitry Kagansky: Please cancel this subscription.
NFL Audio Pass: can we have your user name please
Dmitry Kagansky: xxxxxxxx
Dmitry Kagansky: or yyyyyyyy
NFL Audio Pass: one moment
Dmitry Kagansky: and I moved back in sept of 2009
Dmitry Kagansky: you should not have charged it
NFL Audio Pass: it expired on 5/2010
Dmitry Kagansky: right
NFL Audio Pass: Ufortunately i do not have that information
Dmitry Kagansky: exactly
Dmitry Kagansky: as it was unauthorized
Dmitry Kagansky: last i checked, may came before august
Dmitry Kagansky: please do
Dmitry Kagansky: you have it
Dmitry Kagansky: xxxxxxxx@gmail.com
Dmitry Kagansky: what is your contact information?
Dmitry Kagansky: and the reference or case number?
Dmitry Kagansky: what is the reference or case number, please
NFL Audio Pass: one moment please
NFL Audio Pass: Your account will be noted also
NFL Audio Pass: Thank you for contacting NFL support
NFL Audio Pass has left the chat conversation
Click Here to Leave a Message
| http://www.federalcto.com/ | dclm-gs1-254770001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.025613 | <urn:uuid:0d066a4c-4825-4d34-b772-fc4ea8ba5532> | en | 0.950131 |
I understand, report it. Cancel
Skullgirls funding held by Paypal
By Mike Williams
Skullgirls funding held by Paypal
Tue 23 Apr 2013 1:32am GMT / 9:32pm EDT / 6:32pm PDT
Crowdfunding meets Paypal and the results aren't pretty
Earlier this morning Skullgirls developer Lab Zero Games was faced with the inability to pay its employees, despite an IndieGoGo funding campaign that totaled $829,049. The problem stemmed from PayPal, the money-transfer service used for most of the backer contributions. PayPal froze Lab Zero's account because it feared a large number of chargebacks if backers didn't get their favorite characters in the final DLC roster.
"Paypal's freeze on our account is making it so that I can't pay people today," wrote Lab Zero chief executive officer Peter Batholow on NeoGAF. "I am pretty f***ing pissed. I sent them all the documentation they asked for last night, hoping it would be resolved today, but didn't hear anything back. I also immediately filed a complaint with the [Consumer Financial Protection Bureau] because this whole thing seems decidedly non-kosher."
PayPal wanted Lab Zero to take on the risk if a large number of backers requested chargebacks, but Bartholow declined. Bartholow said he spoke to developers at inXile - who successfully funded Wasteland 2 and Torment: Tides of Numenera through Kickstarter - and they said that Amazon Payments did not have the same issues as PayPal.
PayPal later unfroze the account, but decided to hold $35,000 as collateral. Fan voting for the the final DLC characters is still ongoing on the Skullgirls Facebook page, and the uncertainty is still heavy on PayPal's mind.
From Recommendations by Taboola
Sam Van Tilburgh Chief Discovery Officer, 22 Cans
8 11 1.4
We have exactly the same problem at 22cans, like-for-like - and PayPal is refusing to be of any help. They have the money in their account, we are unable to get access to it.
Posted:2 years ago
Iain Stanford Experienced Software Engineer, Tinderstone
41 199 4.9
Its reasons like this as to why I have always refused to ever use Paypal.
Posted:2 years ago
Thomas Dolby Project Manager / Lead Programmer, Ai Solve
369 352 1.0
I'm never going to use PayPal for any large amount of money, I hear too many of these stories.
Posted:2 years ago
Tyler Moore Game Designer & Unity Developer
52 14 0.3
Goes to show, if there's a pile of money, everyone will try to dip their hands in it.
Posted:2 years ago
Andrew Goodchild Studying development, Train2Game
1,276 430 0.3
I presume this is why Kickstarter use Amazon?
Posted:2 years ago
Anthony Chan Analyst, CPPIB
127 133 1.0
I am not sure why anybody would use Paypal for a funding structure - and this is not a knock against Paypal. Paypal is extremely vigilant on behalf of buyers. Because credit cards allow chargebacks if consumers claim they purchased something online that was not to their expectation, and Paypal honors this... It makes sense what they are asking of Lab Zero.
The worst part is Lab Zero from the sounds of the article cannot guarantee the product will be of everyone's expectation. Nor can they cannot guarantee refunds since they do not have that cash flow... Which is also fair on Lab Zero.
Just doesn't make sense using Paypal at all in this situation.... Paypal was never a funding conduit for venture capitalism.
Posted:2 years ago
James Berg Games User Researcher, EA Canada
258 339 1.3
Paypal always focuses on buyer protection, and always have. The onus is always on the seller or provider of service to prove that the goods sold were as-described, etc.
Posted:2 years ago
Ruben Monteiro Engineer
106 258 2.4
Yes, I'm sure Paypal does this to protect the buyer. How considerate of them.
Posted:2 years ago
Paul Jace Merchandiser
1,098 1,769 1.6
A number of years ago a similiar situation happened with a person who was doing a fundrasier for charity to support victims of some type of natural disaster. They raised atleast $80,000 but paypal wouldn't let them use the money to help the victims because they thought(wrongly) it was a scam. So everyone's money was refunded and the victims of the natural disaster got no relief support from him.
Posted:2 years ago
Tim Carter Designer - Writer - Producer
608 346 0.6
Anthony Chan you're clueless.
Crowdfunding isn't "venture capitalism". Crowdfunding is DONATING! For the very reason that what is being done is high risk.
If a person DONATES and they don't understand this, then they're an idiot!
Edited 1 times. Last edit by Tim Carter on 15th May 2013 5:23pm
Posted:2 years ago
Login or register to post
Take part in the GamesIndustry community
Register now | http://www.gamesindustry.biz/articles/2013-04-23-skullgirls-funding-held-by-paypal | dclm-gs1-254910001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.019663 | <urn:uuid:e2820586-5dd0-4c4b-9b9f-11f106171e55> | en | 0.937084 | Back to Home
The Lemonade Diet
-- The Master Cleanser --
by Stanley Burroughs
When to Use It
How Long and Often?
for serious conditions.
How to Make Lemonade
An ideal formula involves freshly extracted juice from the sugar cane (readily available in India,
but not generally in the United States at the present time):
Blend a part of the lemon skin and pulp with the lemonade in a blender for further cleansing and laxative effect. (Note: commercially procured lemons may have had their skins dyed with yellow coloring and may have been subjected to poisonous insect sprays - be sure to peel off the outer skin if you cannot get uncolored, organically grown lemons.) The properties in the lemon skin also act as a hemostatic to prevent excess bleeding and to
prevent clotting internally should there be any such prevailing condition. (Don't worry - normal conditions will continue during the menstrual periods.)
cleansing period.
Special Instructions for the Diabetic:
DIABETES is the result of a deficiency diet consisting in part of white sugar and white flour. The lemonade with molasses is an ideal way to correct this deficiency. FOLLOW THE DIRECTIONS CAREFULLY FOR BEST RESULTS. The molasses supplies the necessary elements for the pancreas to produce insulin. As the necessary elements are supplied to the pancreas, the amount of insulin taken may also be gradually reduced -- as an example.
explained in the following pages.
How Much Does One Drink?
The lemonade is already a food in liquid form.
to reduce. Extra water may be taken as desired.
Helping the Cleansing Along
Another Cleansing Aid: Internal Salt Water Bathing
then the herb laxative tea must be taken night and morning.
How to Break the Lemonade Diet
You are now ready to eat normally.
Drink several 8,oz. glasses of orange juice during the day - with extra water, if needed. Some time during the afternoon prepare a vegetable soup (no canned soup) as follows:
Recipe for Vegetable Soup
salt in the September 1977 issue of National Geographic magazine.
and tends to develop toxins throughout the body.
where it can cause intense pain and suffering.)
several more days until the system is ready for food.
Recap of the steps to be taken in the diet.
Be careful to read the entire instructions so that the diet will
be of the best benefit to you.
The Night Before starting the diet take the laxative tea.
In the morning take the salt water (or) laxative tea. This should be done each night and morning during the diet - rare exception - if diarrhea develops. When diarrhea is ended then continue above directions.
Now the lemonade formula (see How to Make Lemonade. For diabetic people, see Special Instruction).
About Lemon
Its oxygen builds vitality.
Its carbon acts as a motor stimulant.
Its sodium encourages tissue building.
Its magnesium acts as a blood alkalizer.
Its chlorine cleanses the blood plasmas
Its silicon aids the thyroid for deeper breathing.
About Maple Syrup:
The maple syrup is a balanced form of positive and negative sugar and must be used, not some "substitute.
"There are three grades of maple syrup. Grade A is the first run - mild in taste, sweet and with less minerals than the other grades. It is more expensive and less desirable but it may be used. Grade B is the second run with more minerals plus more maple taste. It is more suitable for the diet and is less expensive. Grade C is the third run with even more minerals and still stronger taste of maple and slightly less pleasant for most people, although acceptable in the diet. It is lower in price. As Grade C is less expensive it can be used as an excellent sweetening agent in preparing foods. The strong maple flavor blends very well.
Some uninformed operators of the sugaring of the maple syrup do use formaldehyde pellets, run through polyethylene tubing but there are many more that don't. Search out and demand the kind not using formaldehyde. The Maple River Company in Youngstown, New York does not use it. This is the kind I recommend.
Dozens of letters weekly, from around the world highly praise the many superior benefits of the lemonade diet. Thus, we must conclude that since it does so much for so many it is truly The Master Cleanser. The following is a quote from one of the letters: "I tried the lemonade diet with exceptionally beneficial results. I would like to order at least six at whatever your wholesale price would be - I know I will need many more as I do push the books. I believe they are the best in their field."
What About the Use of Honey?
Honey must not be used at any time internally. It is manufactured from the nectar picked up from the flowers by the bees - good enough in itself, perhaps - then predigested, vomited and stored for their own future use with a preservative added. It is deficient in calcium and has many detrimental effects for the human being.
According to one authority, honey is "a magical and mystical word in Healthfoodland. It is one of the most over promoted, overpriced product being sold to gullible health foodists. The great value attributed to honey is delusive ... honey is only a little less empty and more dangerous than sugar."
Just as with alcohol, honey, being predigested, enters the blood directly, raising the sugar content very rapidly above normal. To correct this, the pancreas must produce insulin immediately or possible death can occur. More insulin than necessary is likely to be produced, and the blood sugar level then drops below normal. This can produce blackout spells and even death if it goes too low. When blood sugar is below normal, a person will feel depressed. The regular use of honey can create constant imbalances, which in turn will adversely affect the normal function of the liver, pancreas and spleen. Hypoglycemia and hyperglycemia are the results of the use of unbalanced sugars. The balanced sugar in maple syrup and sugar cane juice causes no dangerous side effects. All natural fruits and vegetables have balanced sugars in them. Artificial, synthetic, and refined sugars have no place in a natural diet.
Should I Take "Supplements"?
Some people want to take vitamin pills or food supplements while on the diet. This frequently fails to produce the desired result. There are many reasons. As the lymphatic glands become clogged, they are no longer able to assimilate and digest even the best of foods. As we cleanse our bodies and free our cells and glands of toxins that clog and paralyze our assimilation, we free our various organs and processes to do their proper jobs. Note Page 20. All the necessary vitamins and minerals are in the lemonade, and therefore we do not need an additional supply in most cases.
Vitamin pills and supplements do not grow on trees as such but rather come to us in fruits, berries, vegetables and plants. Man will never take a group of natural or synthetic foods; process and combine them in a variety of products, and come up with anything equal or better than the original. They have lost much of their basic life and energy by combining them according to a man made concept. Many dangerous side effects can occur because of improper and unequal balances present. Stay with the natural laws of balance. First one must decided if God is right or if man is right. If God is right then man and his ideas of processing -tearing apart and rearranging - are likely to be wrong.
Later, as we consume a more complete variety of foods, we find our sources of vitamins and minerals complete and in forms that are easily assimilated - it should not be necessary to return to these supplements even if one is accustomed to taking them. The sources of good food are steadily being enlarged as people become more educated concerning them. Search these sources and rely on them for your total nutritional needs.
What About the Use of Vitamins
Vitamins and minerals have always been a necessary part of natural living. Not satisfied with God's plan, man has attempted to improve the situation by separating them from fresh live foods, then processing and combining them to conform to his concept of what they should be. Not satisfied with the finished product, attempts were made to produce them synthetically. It was big business - and we became a world of "pill pushers," whether they were needed or not. More often they were not needed. No one really knew if the pills were needed, or how many - people just took them because they might have a deficiency!
Just how these vitamins and minerals should be balanced and formulated led to many differences of opinion. A large variety of experts, in processing and manufacturing of pills, disagree as to how the many billions of pills should be made. They all have different formulas and claim theirs are the best even though much is lost in the processing. However, even without any clear consensus as to their worth and use,
they were manufactured and processed; therefore they must be sold with no thought as to possible side effects from overdosing or imbalances. Millions of dollars are made by the producers and the sellers with little regard for the true needs of the consumer.
In reality, the whole process could have been completely avoided. Our Creator has already done a better job of making sure we receive all the needed vitamins and minerals in a perfectly balanced form. Only the finest of natural foods in their original package are good enough for bringing complete energy and life to build and retain a healthy body. Any time man attempts to improve on God's formulas and plans, the result is bound to be a failure.
The simple rules to complete nutrition include all the vitamins and minerals needed by all mankind and all animals. Our Creator has given the right food for the right animal for complete nutrition. This is also true for man. When these foods are properly prepared and eaten, there is nothing more that man can do to prepare a better food.
As we eat the correct foods without excesses, the body will produce ALL the needed vitamins. Foods grown properly, in complete, mineral- rich soil, will have all the minerals in them. Thus, we have no need for vitamin-enriched foods, created synthetically by man, nor for extra minerals.
All refined and devitalized foods must be completely eliminated from our diet. If refined and devitalized foods are eaten, then and only then does man have any need for additional supplements. Just how much and what combination, even with long and complicated tests, will probably never be determined, so this form of unnatural nutrition will always be lacking. Such a plan is a very poor substitute for the right way.
How Do I Get My Protein?
Often the question is asked about the need for amino acids, and animal protein foods. The need is highly exaggerated as only 16% of our body is protein. The answer to the question is very simple. We first need to understand that pure protein is primarily nitrogen, with oxygen, hydrogen and some carbon. We all know we get a large share of our oxygen and hydrogen needs from the air along with some carbon. There is four times the amount of nitrogen in the same air as there is oxygen, hydrogen and carbon combined. Since we are able to utilize and assimilate a large amount of our needs of these elements into our bodies we are able to assimilate and build the nitrogen also into our bodies as protein. This is done by natural bacteria action which is capable of converting it to our use.
From the combination of the best of foods and clean air we are able to create our own amino acids, just as well as the animals do. We never try to feed amino acids to the animals. Thus we are able to eliminate the need for toxic dead animal flesh and have no further need to worry about our constant source of protein. Eat only the best variety of fruits, berries, nuts, vegetables, seeds and sprouted seeds for a further complete source of protein.
People who smoke cannot pick up the nitrogen from the air so easily, but will still get enough from proper food without the use of animal flesh. For your well being, however, elimination of smoking is a must.
Many people believe that eating meat gives them strength. If this is so, then why are the strongest animals in the world vegetarians? Did you ever stop to think that the animals you do eat are vegetarian? Where did they get their strength? All the meat-eating animals find it necessary to sleep 16 to 18 hours daily because of excess toxins. The meat eating animals live a very short life. God has supplied such a bountiful supply of fresh, wholesome food that there is never a need to kill an animal for its more toxic flesh in our modern civilization.
Burroughs, S. (1976). The Master Cleanser (14th ed.) Moana Lane Reno, NV: Burroughs Books.
To Get "The Master Cleanser" by Stanley Burroughs
Make Check or Money Order Payable
To: Burroughs Books
Visa/MasterCard accepted.
Please include expiration data.
Burroughs Books
941 W. Moana Lane
Reno, NV 89509
"The Master Cleanser" $5.95
Shipping & Handling -- Add $1.50
Plus .50 for each additional book shipped
Back to Home
"Fasting For Health" -- my research paper about fasting written in English | http://www.geocities.co.jp/Beautycare-Venus/2032/english/master_cleanser.html | dclm-gs1-254930001 | false | true | {
"keywords": "l protein, f protein"
} | false | null | false |
0.14208 | <urn:uuid:773523ae-0f6f-4500-8725-199683c739f1> | en | 0.960258 | Huffpost Politics
Andrew Reinbach Headshot
Republicans: Penny-Wise, Pound-Foolish
Posted: Updated:
If your ship sinks and you're swimming to shore, you don't stop because you'll be too wet when you get there.
But that's what the Republican's new-found anxiety about deficit spending amounts to. Because whatever conservative economists say, you spend your way out of a recession, and deal with the long-term debt problems later. The alternative is a deeper recession.
So when you consider the Republican leadership's recent sneer at extending unemployment benefits, you have to wonder: What is the Republican leadership thinking?
That's because unless Congress reverses course, we're heading straight for economic disaster, and if anything bad happens to the economy, the country is out of tricks.
The economy's already stalled, and cutting off benefits to 5 million people by October -- and choking consumer spending as a result -- will do us no favors. In this pass, anything that takes money out of the hands of companies -- and that's what taking it away from consumers means -- only aggravates matters.
In fairness to the GOP, Harry Reid did rebuff Olympia Snowe when she urged him to send up a stand-alone bill to extend the benefits. And the $30 billion unemployment measure was part of a $200 billion grab bag bill that included plenty of tax breaks for business and financial aid to the states -- that last intended to keep first responders employed. Nobody's hands are clean this election year.
Still, this train wreck was created by the Republican leadership, and they'll be blamed for it this November. By that time, the nation will have begun feeling the inevitable effects of cutting said benefits.
Among the effects: More trouble for the housing market, as people with no money lose their homes. And a housing recovery is considered the key to keeping this economy up, running, and creating any jobs at all.
Hit the hardest: Americans 55 and over.
Among the 6.8 million long-term unemployed 2.14 million, or 31.4%, are 55 and older. As a practical matter, these people are the least-likely to find new jobs. Home ownership in this group is high -- 79.1%--and for most, their house is their main asset.
The 2008 stock market crash hit these Americans hard; retirement accounts lost 32 percent of their value in the crash -- $2.8 trillion -- and while the Dow has come back some in 2010, it's still 4,000 points off its peak. Meanwhile, at age 67, income from retirement accounts and financial assets make up 58 percent of average household income.
That clutch of numbers means that if these people lose their homes, they'll have lost most of their wealth and have little chance of seeing it again. Since Social Security benefits for someone who's 66 years old and earned, say, $95,000 a year are only $1,680 a month, they'll likewise have little chance of living anything like the way they have the past 20-odd years. These people, many of whom have highly-developed job skills and years of business experience, are between the mugger and the wall.
The actual number of people who will lose their homes is unknowable; some may be able to hang on, or get help hanging on from relatives or friends. Some may pull a rabbit out of a hat. But if we assume that 45% do lose their homes, that's 963,000 homes in foreclosure. By comparison, 3.1 million homes have been seized by banks since April 2005.
And since it's a good guess that many of these people are already delinquent -- they've been out of work 99 weeks, after all -- many of those foreclosures are inevitable.
Those million foreclosures aren't a mere spike -- it's a huge negative for an economy that's going sideways at best. Bottom line: Nancy Pelosi wasn't kidding when she said last week that rejecting the bill could send the economy back into recession.
That's because every foreclosure has a ripple effect. There's no handy-dandy number that says for every dollar X of foreclosure there's a Y dollar loss to the economy -- though there should be one. But aside from the depressing effect on consumer spending, foreclosures drag down the values of surrounding homes, and lower property tax revenues for state and local governments.
That's bad news for the states, 46 of which expect budget shortfalls for the fiscal year ending next June, and totaling $112 billion, according to the Center on Budget and Policy Priorities, a Washington-based think tank. And it's bad news for America, since as a result, state spending cuts are inevitable, and state spending is 12 percent of U.S. GDP.
Meanwhile, extending those benefits would have stimulated the economy. Mark Zandi of, for instance, estimates that every dollar paid in unemployment benefits has a multiplier effect in economic stimulus of 1.64. By comparison, Mr. Zandi calculates that cutting the corporate tax rate has only a 0.30 multiplier effect.
I like to think that the Republican leadership, whatever else I may think of them, are smart guys, with plenty of smart, informed people telling them what's what. So aside from any questions of simple right or ethical conduct, much less self-interest, the question I have is: If they know all this -- why do they hate America? | http://www.huffingtonpost.com/andrew-reinbach/republicans-penny-wise-po_b_627262.html | dclm-gs1-255130001 | false | false | {
"keywords": "spike"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.071944 | <urn:uuid:bb9e384d-8bb3-4e95-9091-f74ec59a6d49> | en | 0.983775 |
Law Report: Payment of lesser sum did not settle claim
LAW REPORT: 12 December 1996
Ferguson v Davies; Court of Appeal (Lord Justice Evans, Lord Justice Henry, Lord Justice Aldous) 21 November 1996
Acceptance by the plaintiff of a lesser sum from the defendant than the amount claimed could not constitute accord and satisfaction so as to compromise the action between them unless the plaintiff received some additional benefit by way of consideration.
The Court of Appeal allowed an appeal by the plaintiff, Michael Ferguson, against the decision of Judge Crane, sitting in Northampton County Court on 19 July 1994, dismissing his claim for money due under a contract with the defendant, Steven Clive Davies.
The plaintiff in person; Terry Lynch (J. Garrard & Allen, Olney, Bucks) for the defendant.
Lord Justice Henry said the plaintiff, wishing to dispose of some specialist records, tapes and discs, agreed with the defendant, who dealt in such items, that the defendant would provide in exchange other specialist items sought by the plaintiff to the wholesale value of pounds 600 by a certain date, failing which the defendant would pay pounds 1,700 in cash. In fact the defendant only delivered goods to the value of pounds 143.50 and made a single payment of pounds 5.
The plaintiff claimed there was due to him approximately pounds 1,550.
However, he originally limited his claim to pounds 486.50, perhaps to keep it within the small claims jurisdiction. His claim was set out on the County Court's N1 default summons.
The defendant completed from N9B, a form of defence and counterclaim to be filled in if he disputed all or part of the claim. In answer to the question "How much of the claim do you dispute?" he ticked the box "I admit the amount of . . ." and inserted pounds 150. In answer to the question "Do you dispute the claim because you have already paid it?" he ticked "Yes" and wrote that he had paid pounds 450 to the plaintiff. He then added that he had sent a cheque for pounds 150.
He sent the cheque to the court with a letter saying the cheque was in settlement of the plaintiff's account, and that he did not dispute that he owed him money but disputed the total amount claimed. He wrote to the plaintiff in similar terms, concluding "I hope that this will now resolve the matter."
The plaintiff cashed the cheque but replied that he was continuing with the action until he received full payment. He got leave to amend his claim upwards to pounds 1,745.79.
The judge found for the plaintiff on the contractual issues, holding that a further pounds 1,400 was due from the defendant. He also found that the plaintiff had not intended to accept the pounds 150 in full settlement, but nevertheless held that his doing so had compromised his claim by a binding accord and satisfaction.
It was clear that the judge did not address his mind to the fact that the sending of the cheque for pounds 150 was an unqualified admission of liability, nor to the significance of such an admission.
An open admission of money due was something quite different from an offer of a sum in compromise. It was manifest that the formal admission on form N9B was not made without prejudice as part of an offer to compromise, but was properly before the court on the question of liability.
The judge erred in law in that he did not consider the legal significance of the fact that the defendant had unequivocally admitted liability for the sum paid by cheque, and was not giving the plaintiff any additional benefit on top of that. Therefore there was in law no consideration for the accord suggested.
Nor did the judge pay regard to the scheme of the County Court Rules governing cases where an admission was coupled with an assertion that the remainder of the claim had been paid. Against that background, it was wrong to conclude that the cashing of the cheque, sent as a result of a formal and unqualified admission on the pleadings, constituted "a clear and unequivocal acceptance that no further sum was due" because of a side letter seeking to impose a term for which there was no consideration once admission had been made.
Had he directed himself properly, he would inevitably have decided that there was no binding accord.
Paul Magrath, Barrister | http://www.independent.co.uk/news/people/law-report-payment-of-lesser-sum-did-not-settle-claim-1314168.html | dclm-gs1-255240001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.048852 | <urn:uuid:f9d9a6b1-969b-49b9-b9e9-ea613671402f> | en | 0.95265 | On the surface, refinancing a mortgage to consolidate other debts is a tempting option. However, there are potential drawbacks you need to account for in order to make refinancing and debt consolidation work for you.
The obvious appeal is that mortgage rates are usually lower than interest rates on other forms of debt. If you have equity in your home, refinancing can let you borrow against some of that equity to pay off other debts, such as credit card debt and personal loans. According to the Federal Reserve, when 30-year mortgage rates were at 4.20 percent recently, credit cards were being charged an average of 13.14 percent. So the potential to lower the interest rate on your debt is clear. In addition, debt consolidation can simplify your finances by replacing multiple payments with a single mortgage payment.
So what are the downsides of refinancing to consolidate debt? For one thing, it raises the stakes. While credit card debt and other obligations generally cannot result in any claims against your home, mortgage debt directly puts your house at risk. Another concern is that by converting relatively short-term consumer debt into mortgage debt, you could be lengthening the period of your indebtedness.
To help you focus on whether the benefits of refinancing to consolidate debt outweigh the potential problems, here is a checklist of issues you should examine:
1. Have you looked at both 15-year and 30-year options? If you have a substantial amount of equity to work with, it probably means you are several years into your mortgage. If so, you should at least consider refinancing to a 15-year loan as a way of getting an even lower refinance rate.
2. Have you factored in closing costs and prepayment penalties? The interest rate comparison is the most compelling part of refinancing, but you have to make sure there is enough of an interest rate gap to cover the costs involved in refinancing, including any prepayment penalties on your existing mortgage and other loans.
3. Have you compared mortgage quotes? Just because refinance rates are generally lower than your existing interest rates, do not assume all refinance rates are the same. Shopping around for mortgage quotes can help you get the most out of this strategy.
4. Can you readily meet the new payment schedule? Once you have figured out what the principal and terms of your new loan would be, take a good hard look at the payment schedule that would result, because this is where the risk is. It is generally safer to default on other forms of debt than on a mortgage, so make sure you are not jeopardizing your home by rolling other debts into your mortgage.
5. Is the interest cost really cheaper? You may be lowering your interest rate, but you should check a full amortization schedule to make sure refinancing won't cost you more interest expense in the long run by lengthening your repayment period.
6. Have you mastered your budget issues? Refinancing should not be a means of simply taking on more debt. It should be part of a broader strategy to help you live within your means.
The bottom line is that refinancing to consolidate debts can be a good idea; but like any financial technique, the idea is only as good as the numbers behind it.
Related Articles
1. Investing Basics
Investing $100 a Month in Stocks for 30 Years
2. Budgeting
Key Questions to Ask Before Moving in Together
3. Savings
Passing Down Values and Money to the Next Generation
4. Savings
The Top Seven 529 Plans for 2015
5. Budgeting
How to Save Money on Your Disney Vacation
6. Credit & Loans
Questions To Ask Your Mortgage Lender
7. Investing
The 7 Best Peer-To-Peer Lending Websites
8. Personal Finance
Dissecting the Simple Interest Formula
9. Budgeting
Top 7 Money Saving Tips for Eating Out
10. Credit & Loans
Your Credit Score: More Important Than You Know
2. Under what circumstances might a syndicated loan be arranged?
3. How risky is a syndicated loan for the lender?
You May Also Like
Trading Center
You are using adblocking software
so you'll never miss a feature! | http://www.investopedia.com/partner/shoprate/articles/personal-finance/070214/refinancing-and-debtconsolidation-checklist.asp | dclm-gs1-255320001 | false | false | {
"keywords": "ns gene"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.024215 | <urn:uuid:c9213fee-d46f-4995-99ff-ab1d67ecaef8> | en | 0.86343 | Open Source
Open source news, solutions, and analysis for IT professionals
No fly zone
hp data center
HP goes after Cisco, Arista with open source OS
Allies with Broadcom, Intel and VMware on OpenSwitch NOS.
aws amazon web services
Amazon launches managed Elasticsearch service
Amazon announced a new service Thursday that's designed to make it easier to spin up and operate the popular Elasticsearch open-source search and analytics engine.
java in a cup
Insider: Oracle has lost interest in Java
New sources are stepping up questions about Oracle's stewardship of the Java platform.
Mirantis OpenStack 7.0 released
Mirantis remains one of the leading bug fixers of OpenStack Kilo.
satya nadella sundar pichai
Microsoft ends patent disputes with Google
jim zemlin
Open source creates software worth billions of dollars
A Linux Foundation report estimates the total economic value of development costs of Linux Foundation Collaborative Projects to be around $5 billion.
Microsoft Linux
Microsoft launches its big data service running on Linux
Welcome to Satya Nadella's Microsoft. Gone are the days when Microsoft treated Linux like a cancer.
The Dutch government is determined to speed up ODF adoption
During the recent ODF Plugfest event, the Dutch govt. also announced plans to join the OASIS ODF technical committee.
Enterprise software
Anaconda's Python-based analytics hit the enterprise with new subscription plans
big data warehouse center storage
Hadoop eats data analytics
Hadoop is slowly eating conventional analytics
Nginx Web server goes dynamic, adds monitoring
lets encrypt logo
A sea change in HTTPS web encryption is coming and it's free
Things are moving fast with HTTPS improvements lately. The goal of HTTPS everywhere is about to make a huge leap forward.
Mac OS X Software Defined Radio
How to get started with Software Defined Radio on Mac OS X
Explore the exciting world of Software Defined Radio (SDR) on Mac OS X.
The challenges of IT reform using open source software
Doug Cutting, the Chief Architect at Cloudera walks us through the challenges of IT reform, the fear of open source software, and how Cloudera fits in.
GitLab one-ups GitHub with open source enterprise code hosting
Why is open source software more secure?
In today's open source roundup: A redditor wants to know why open source software is more secure. Plus: Mozilla releases Firefox 41. And Fedora 23 beta released.
Open source illustration
Box, LinkedIn and WhatsApp share open source advice
Open-source code powers many of today's most popular apps and platforms, and it's critical for companies to choose the appropriate frameworks for their specific needs, but other equally important factors also exist, according to...
Load More | http://www.itworld.com/category/open-source-tools/ | dclm-gs1-255360001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.293141 | <urn:uuid:a139ba27-a4fb-4129-82c0-9c6432575712> | en | 0.961092 | Home / News / Article
September 15 2010
Raising Taxes is Not the Solution to the Budget Problem
Hadley Heath
President Obama's debt commission met this summer and painted a bleak picture of the national budget. The bipartisan group called our current situation fiscal "cancer" and warned that it will "destroy the country from within." Americans are right to be concerned with our huge national debt. What is the solution? Erskine Bowles, President Clinton's Chief of Staff, put it simply: "We've got to cut spending or increase revenues or do some combination of that."
Bowles is right. Note that he said "increase revenues," and not "increase tax rates." He probably went with this phraseology because it sounds better-after all, who wants to talk about raising taxes? But the difference goes beyond semantics. Raising tax rates isn't the answer to the budget problem, because it would pull more resources out of the already-suffering private sector. Increasing revenues can happen even without a change in tax rates, if the economy begins growing again.
Unfortunately, many in Congress seem focused on raising taxes rather than increasing revenues as the key to closing the deficit. The Bush tax cuts are set to expire at the end of this year, and Democratic leaders want to blame the Bush tax cuts for today's budget crisis. According to the Congressional Budget Office, the Fed would miss out on $115 billion in tax revenues in 2011 if the Bush tax cuts were to stay in place, and increasing amounts after that.
Yet the reality is more complicated than that. Assumptions about how much could be raised with higher tax rates ignore how tax rates affect behavior and the economy more broadly.
Basically, income tax revenues rest on two main variables: the amount of taxable income and the tax rate.
Mathematically, the higher the two variables are, the greater their product will be. But in reality, these two variables aren't independent: tax rates affect the size of the tax base. When individuals decide how much to work, they consider how much money the government will take from their additional earnings. If the government takes away too much, people have less reason to work harder. This dynamic means that tax rates actually affect behavior.
This is particularly important to consider today, given our current economic predicament. The U.S. is suffering not just from a historic deficit, but a sluggish economy that's failing to produce jobs. Higher rates of taxation discourage hard work, savings, investment, and entrepreneurship - the foundations of economic growth that will create a larger tax base.
Additionally, rescinding the Bush tax cuts fails on the terms offered by proponents of tax increases. Remember I mentioned that the CBO predicts that ending the Bush tax cuts would bring in $115 billion in 2011? The federal deficit is expected to be $980 billion in 2011, so raising the tax rates, even if you accept the CBO's estimate, will only close about 12 percent of the deficit. The data shows that it is spending -not a lack of revenue-that has led to the current crisis. Federal spending is expected to be about $2 trillion more in 2011 than it was in 2001 when the Bush tax cuts were passed. That means that in 2011, again, even if the estimated figure of additional revenue is correct, government spending will have about 17 times more impact on the debt than revenues from the Bush tax cuts.
Ironically, extending the Bush tax cuts might allow the federal government to see more money in revenues than the alternative. How? Lower rates of taxation mean more money is in the hands of taxpayers. These taxpayers see the rewards of their work and are therefore encouraged to engage in economically productive behavior. People work harder, and employers hire more workers, invest in new equipment, and work to grow their businesses. These behaviors expand the tax base, thus increasing tax revenue.
When the economy is thriving, government revenues increase because the government gets a slice of that economic success. And that slice should be enough. The real problem is that Congress is currently caught in a cycle of overspending and trying to catch up with the outflow.
Trying to raise taxes to cover a huge spending bill is not the answer. Instead we should carefully consider the impact taxes have on behavior, and how the combination of lower tax rates and lower spending could lower the national debt and restore a growing economy.
Follow us | http://www.iwf.org/news/2432770/Raising-Taxes-is-Not-the-Solution-to-the-Budget-Problem | dclm-gs1-255370001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.177776 | <urn:uuid:7f25982d-09d8-47eb-9bf6-7bb2b306322b> | en | 0.957283 | My Top 5: Diego Bustos
Five golf gems of Latin America
By: Thomas Dunne
Diego Bustos is a senior sports anchor for CNN en Español. Originally from Argentina, Bustos took up the game in an unusual way—by starring in his own television show. From 2006 until earlier this year, he hosted CNN's "Vive el Golf," a documentary golf-travel series that followed his adventures from Tierra del Fuego to St. Andrews and beyond. The show is now hosted by Lorena Ochoa. Bustos, along with his continued work at CNN, recently launched a Spanish-language website called As the number suggests, it offers a comprehensive look at the game, from travel to instruction to news from the Tours.
We caught up with the Atlanta-based Bustos to learn more about his extensive travels throughout Central and South America. Here are five of his favorite courses:
5. La Reunion (Fuego Maya Course) Antigua, Guatemala
"La Reunion [above] is a Pete Dye design surrounded by volcanoes. They moved more than two million cubic meters of earth to build it. On No. 10, they built the hole along the edge of a huge canyon. You could easily spend six hours playing that golf course because you constantly want to stop and take pictures. Oh, and the volcano closest to the course is a live one—it erupts two or three times a day. When you're having drinks in the evening after the round, you can look out and see lava coming down. Very nice place. And it's ten minutes from Antigua [a Spanish colonial city and UNESCO World Heritage site that's also famed for its coffee], so there's lots to do in the area."
4. La Paz Golf Club La Paz, Bolivia
"La Paz is the highest golf course in the world with grass. It's something like 3,300 meters above sea level. Your drives are just eternal at that elevation. There's a par-three there called "Ojo Lunar"—the Moon Hole [pictured below]. It's called this because the whole topography…it's like being on the moon. Don't hit your ball in there—you won't want to go after it. Another cool thing is that the indigenous women are the greenskeepers. They're these big, round cholitas in native dress and bowler hats. And they play golf…with wooden clubs!"
La Paz
3. Ushuaia Golf Club Ushuaia, Argentina
"I made some very good friends at Ushuaia, the most southerly golf course in the world. It's nine holes in a valley, with a twisting river that crosses it and snow-capped mountains all around. The setting is just unbelievable. They made that golf course absolutely from scratch. I interviewed an older gentleman who was the first one who began picking up sticks and rocks to build the fairways. With the amount of snow they get, the contours of the fairway actually shift from year to year. Tierra del Fuego is literally the end of the world, so you can imagine—it's almost always windy there. That adds to the challenge of the course."
2. El Rincon de Cajica Cajica, Colombia
"Once upon a time, El Rincon [near Bogota] was considered one of the top 100 courses of the world. It's a private club, but with an open mind toward visitors. It's an older course—Robert Trent Jones, Sr. designed it in the '60s—that has hosted many international events. I think Arnold Palmer even played there. [Ed. note: He did.] It's sort of a combination of the tree-lined layouts you see in Argentina and what I call the American 'tricky way'—when you see a perspective of the green, the best way to get there can be quite deceptive. Very challenging course."
1. Olivos Golf Club Buenos Aires, Argentina
"Olivos is a must. As the home of the Argentine Masters, it's got all the history, and the layout is just outstanding. It's beautifully maintained with lots of old trees. Some holes appear easy at first, but that's an illusion—the design is quite sophisticated. Even if you don't know the history of the place, Olivos has an aura."
Experience Colleton River!
The Landings Club
Follow Links Magazine | http://www.linksmagazine.com/golf_travel/diego-bustos-five-golf-gems-of-latin-america | dclm-gs1-255500001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.479534 | <urn:uuid:3ce412f9-d847-447a-bc18-3bb379cdad04> | en | 0.875084 | You are here
The Workout for Every Guy - The Skinny Guy
Day 2
1) Bulgarian Split Squat
Sets: 4 Reps: 6 (each leg)
2) Bench Press
Sets: 4 Reps: 5
3) Dumbbell Row
Sets: 4 Reps: 6, 6, 6, 20 (each side)/p>
Perform three sets of six, then reduce the load by 20%, and complete one set of 20 reps.
4) Off-Bench Side Plank
Sets: 3 Reps: Hold for 20 seconds (each side).
Go back to the Skinny Guy's Workout > | http://www.mensfitness.com/styleandgrooming/grooming/workout-every-guy-skinny-guy?page=3 | dclm-gs1-255590001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.024726 | <urn:uuid:f4835f37-24d4-4edc-8286-cfd0a8aa1d00> | en | 0.956157 | Addressing A Government Relations Problem: An Expert Perspective
Thursday, February 1, 2007 - 01:00
Editor: What are the typical circumstances under which a company may need to retain outside counsel for help with government affairs?
Harding: Generally, we have seen problems arise in three broad categories: procurement, public policy, and regulatory compliance. In the procurement area, a company may be seeking to conduct business with the government, or need assistance solving problems that have arisen in connection with its existing government business. With respect to policy, there are circumstances under which policy decisions are made without regard to the practical impact on private enterprise, or circumstances where businesses have an opportunity to influence policy that affects them by participating in hearings or similar forums. In the regulatory area, as government regulation has become increasingly pervasive and agencies have become more aggressive, companies are often in a position of facing compliance issues.
Gruskin: Sometimes our clients find dealing with the government is a necessary evil, while other times it is an excellent way of increasing business. The government does not think or act like a co-party in a commercial matter, however, and in any situation where the interests of business and the government collide, outside expertise in the government process may be required to achieve a resolution.
Editor: When those types of issues arise, what can you do to help?
Harding: We provide two fundamental services to our clients. First, by virtue of our knowledge and experience, having worked in government and with government entities, we can identify the right people, at the right levels of government, to address a problem. As we all know, government at all levels is not getting smaller - in fact, over the years governments have grown larger and more complex, and one of the keys to success is being able to cut through the fog of a vast bureaucracy to get to a place where it's possible to achieve the client's goal. The longstanding and credible relationships our attorneys have with government officials and staff provide us with the ability to establish the best approach when determining how to help our clients in this area.
Gruskin: Just as important is our experience creating and implementing substantive strategies for addressing the underlying issues. Sophisticated business owners know that government problems don't get solved because "somebody knows somebody." Rather, government problems get solved because the right substantive, persuasive arguments are effectively made to government officials with the ability to make decisions. In every government matter, we start with the understanding that government decision-making is significantly different from commercial decision-making. Our job is to work with the client to craft a strategy that recognizes those differences, and which is aimed at reconciling the government's public interest with the client's private interests.
Editor: What is the greatest challenge for clients facing government issues?
Gruskin: The most significant challenge is maintaining perspective. Things that make sense in a commercial context don't necessarily make sense in a government context, and that can create an understandably high level of frustration for business leaders who are more accustomed to an arms-length commercial process driven by economic considerations. Government decision-making and transactions can be painfully slow and inconclusive, and the economic aspects of the issues which drive a business deal may not be determinative of the outcome of a government-related matter. When you add an overlay of political considerations, and the potential involvement of community activists, the media, or other interest groups, participating in a government decision-making process can be a daunting challenge for a business.
Harding: One of the ways we deal with this is to keenly focus on the practical aspects of achieving a result. The ability to realistically assess the likely outcome of a government matter - and keeping our clients informed so they can make sound business decisions - is an essential part of the service we provide to our clients in this area.
Editor: There is a brand new administration in New York state government, and a relatively new administration in New Jersey do you see changes in how the government conducts business?
Harding: Absolutely. It's significant that the very first actions of the Spitzer administration in Albany were to issue orders covering ethics in the executive branch of government, and both Governor Spitzer and Governor Corzine emphasized reforming the business of government in their campaigns. When you consider the background and track record of these political leaders, it's clear that they sincerely want to reinvent the way government business is conducted, and we view that as a very positive development for our clients. As the emphasis shifts to substance, notwithstanding excellent contacts, it is more important than ever that businesses be able to address government issues comprehensively on the merits.
Gruskin: In fact, in today's environment, believing that government problems can be solved simply based upon "who you know" is nave and will ultimately lead to failure - the reality is that "what you say" is much more important, and success depends upon the ability to develop a comprehensive strategy to substantively present positions. Our approach to government relations matters contemplates fiercely advocating our clients' positions on a substantive basis consistent with a strategy developed to take into account the various governmental interests.
Editor: Is the firm's government relations practice focused on certain jurisdictions?
Harding: One of the great strengths of our firm is that we have more than 20 offices throughout the United States, and accordingly have a presence in many states. Based upon the nature of the work that we do for our clients, however, we anticipate that the initial focus of our government relations group will be in New York, New Jersey, and Pennsylvania. Our attorneys have also been active in government matters in Delaware, Georgia, Texas, New Mexico, and on the West Coast, and we accordingly expect that we will be handling government relations matters in those jurisdictions as well.
Editor: How do you approach staffing government relations matters?
Gruskin: Our government relations practice is multi-disciplinary - attorneys from various practice groups will be participating in handling government matters. The firm's general practice includes many areas in which attorneys have significant experience working with government agencies on regulatory, finance, corporate, securities, real estate, land use and other types of matters. Those attorneys have developed an expertise in working with government officials, and that experience provides tremendous depth and resources. In addition, by virtue of representing a wide variety of government agencies, or having served in various governmental capacities, many of our attorneys have developed a "hands on" familiarity with the way government works. Depending upon the nature of the assignment, we will assemble teams of specialists to work with our clients and other third-party professionals (such as public relations consultants or legislative lobbyists) to develop the best possible strategy for handling the matter.
Editor: Do you have any advice for corporate counsel confronted with a government problem for the first time?
Harding: A significant mistake a company can make when confronted with a government issue is to respond too quickly, and, in the course of responding, make the problem worse. The full extent of a problem with a government agency is not always apparent in the first instance, and these types of problems are often multi-faceted, involving potential legal liability, the possible loss of other, unrelated government business, and the prospect of adverse publicity. Accordingly, it's critical that clients have a full understanding of all aspects of the problem, and that the initial response be very carefully thought out.
Gruskin: In our experience, the keys to successfully resolving a government relations problem are patience, perseverance and persuasion. From the moment the problem arises, the client has to understand that the government relations problems are significantly different from commercial problems. Probably the single most important item to keep in mind is that in order to effectively resolve a government issue, it is crucial that corporate counsel objectively view the problem from the standpoint of the government to gain a full understanding of the political, legal, and policy considerations which drive the government's actions.
Editor: Finally, is there anything in particular corporate counsel should be aware of to prevent government relations problems from occurring?
Harding: Because government agencies are subject to public scrutiny by interest groups and the media, corporate counsel should assume that the government will be unforgiving with respect to any lapses in meeting contractual or regulatory requirements. In addition, government transactions open the door to scrutiny of the company's business activities by agency staff and government auditors. Accordingly, when companies enter into relationships with government entities, to the extent that corporate counsel can impress upon company executives that strict compliance with contractual and regulatory requirements must be a high priority, future problems may be avoided.
Please email the interviewees at or with questions about this interview. | http://www.metrocorpcounsel.com/articles/7869/addressing-government-relations-problem-expert-perspective | dclm-gs1-255620001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.028071 | <urn:uuid:5c6c38ff-6bc0-4538-b00d-034154c3884b> | en | 0.818747 | Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw
Comment on
Are you sure that's the code you ran? It should work. And it works for me.
>perl superclass hello make a window
use Object::Tiny qw(dummy);
can be written as
use Object::Tiny;
but not as
use Object::Tiny qw( ); or
use Object::Tiny ( );
You would get the error you showed if you did one of the latter two.
Also, if you have no members, you can use
$ui = 'UI'; instead of $ui = UI->new();, and
$ui = 'UI::Graphical'; instead of $ui = UI::Graphical->new();.
However, you'll probably need some members, so you might as well continue the way you are going.
In reply to Re^3: Eliminating conditional code for GUI and text-mode operation by ikegami
in thread Eliminating conditional code for GUI and text-mode operation by gnosti
and: <code> code here </code>
• Please read these before you post! —
For: Use:
& &
< <
> >
[ [
] ]
• Log In?
What's my password?
Create A New User
and the web crawler heard nothing...
How do I use this? | Other CB clients
Other Users?
As of 2015-10-06 15:39 GMT
Find Nodes?
Voting Booth?
Does Humor Belong in Programming?
Results (154 votes), past polls | http://www.perlmonks.org/?parent=655830;node_id=3333 | dclm-gs1-256160001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.067164 | <urn:uuid:430e8e77-e5d8-45d9-b563-82b202e5943a> | en | 0.939421 | POPSUGAR Celebrity
14 Tricks to Turn You Into a Packing Ninja
Aug 12 2015 - 11:00am
Roll your clothes.
Roll up your clothes when packing so they take up less space.
Pack an unwrinkle spray.
You'll definitely have some wrinkled clothing when you're traveling, so pack this wrinkle-release spray (which you can make yourself [2]!) to straighten your clothing with just a few spritzes.
Add plastic wrap to toiletries.
Place valuables in your carry-on bag.
If you don't want to run the risk of losing your valuables — tech products, jewelry, money, etc. — then put them in your carry-on bag, and don't pack them in baggage that you plan on checking.
Bring these single-use packets.
Create these single-use packets [3] if you're going on a short trip instead of packing big tubes of toiletries.
Find a hiding spot for your money.
Bring a stain stick.
A stain stick is a must when you're traveling, because you might not be able to immediately get back to your hotel to remove the stain before it sets in. The fact that you can make this stain stick yourself [4] and put it into a small chapstick container is just a bonus.
Remove a quarter of what you've packed.
Stuff clothing into purses.
Use a shower cap for your shoes.
Place a belt in the collar of a shirt.
To prevent the collar of a dress shirt from getting flattened in your luggage, roll up a belt and put it in the collar of the shirt before packing.
Assume you will lose your luggage.
Use a compression bag.
Increase your suitcase space with a compression bag, which traps your luggage in an air-tight seal. It will leave extra room for other things!
Customize a packing checklist with a few clicks.
Source URL | http://www.popsugar.com/smart-living/Packing-Hacks-32316251/print | dclm-gs1-256250001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.026866 | <urn:uuid:93eac007-2f93-42ba-a275-e9cee132ad72> | en | 0.918053 | Return to the Purplemath home page The Purplemath Forums
Helping students gain understanding
and self-confidence in algebra
powered by FreeFind
Find a Greenbrae, NV Calculus Tutor
Subject: ZIP:
21 Subjects: including calculus, geometry, GRE, algebra 1
San Francisco, CA
Thomas F. ...The problem is that people learn best in different ways, at different speeds. That's where I help. As a tutor, my primary duty is to tailor an individual learning experience that works best for my student.
11 Subjects: including calculus, English, geometry, algebra 1
Novato, CA
Dayv O. ...Invariably as I find out where a student needs improvement I use computer generated block diagram models and graphs as part of the teaching lessons. A thing I say is "hey, math can do that." If "math can do that" then "I can teach that" to you or whomever I am teaching.All of the following topic...
San Francisco, CA
12 Subjects: including calculus, Spanish, chemistry, algebra 1
San Rafael, CA
Annie P. ...I enjoy helping others learn. It gives me great satisfaction when I thoroughly understand a concept and I love it when I can help someone else to understand too. I also have experience teaching ballet to young girls.
5 Subjects: including calculus, chemistry, statistics, trigonometry
Berkeley, CA
Feedback | Error? | http://www.purplemath.com/greenbrae_nv_calculus_tutors.php | dclm-gs1-256300001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.051287 | <urn:uuid:d275aac7-a330-4ad0-ba19-d9d8fcb372d7> | en | 0.93529 | Return to the Purplemath home page The Purplemath Forums
Helping students gain understanding
and self-confidence in algebra
powered by FreeFind
Find a Temple City Prealgebra Tutor
Subject: ZIP:
Li C. ...Please feel free to contact me if your child need help with Chinese and Japanese, I will try my best to help your child. I have finished several college-level math classes, such as college algebra, trigonometry, precalculus, and so on. I have clear ideas and concepts how to apply calculation ru...
4 Subjects: including prealgebra, Japanese, Chinese, algebra 1
San Gabriel, CA
Mark N. ...I try to reduce their anxiety by breaking down problems into smaller parts. I show them the logic and elegance of math and how one can always check to see if their answer is correct (the beauty of mathematics). I am most capable of tutoring in precalculus. I find many students have a certain apprehension towards math.
30 Subjects: including prealgebra, reading, writing, chemistry
Pasadena, CA
Daniel R. ...Through my informal tutoring experience, I have helped students raise their test scores on the SAT and ACT exams, pass AP exams, and gain more confidence in their approach to studying. I love tutoring because it allows me to share my enthusiasm and unique approach to learning that helped me grad...
24 Subjects: including prealgebra, Spanish, English, writing
Glendora, CA
Carly C. ...It was a bit tough for me in the beginning because they were unable to add, multiply, subtract, and divide with numbers with two digits. After the first few weeks teaching them how to do it, while still teaching the concept of their homework and what they were learning in class, they mastered it...
Los Angeles, CA
YOONSUK O. ...I enjoy taking complicating material and simplifying it down for easier understanding. I will make the tutoring session worthwhile. I have a Major in Microbiology.
4 Subjects: including prealgebra, biology, algebra 1, microbiology
Hacienda Heights, CA
Feedback | Error? | http://www.purplemath.com/temple_city_prealgebra_tutors.php | dclm-gs1-256310001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.12554 | <urn:uuid:9d45b79f-d746-42fb-97ec-2b667e70d0fc> | en | 0.937517 | Ask a doctor
How to Straighten Wisdom Teeth?
Doctor Answers 1
Extracting the wisdom teeth would be preferable
In most cases, wisdom teeth are an unnecessary nuisance and removing them is the best treatment option. While there are a few instances that indicate keeping a wisdom tooth, it would be better for you to have them extracted to prevent complications in the future. Talk to your dentist to see what is best for you.
West Des Moines Dentist
11088 Hickman Road
Clive, Iowa 50325
| http://www.realself.com/question/straighten-wisdom-molar-teeth | dclm-gs1-256360001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.025415 | <urn:uuid:6abe8259-af57-454f-8c4d-f24cd5b79caa> | en | 0.817936 | NewsApp (Free)
Read news as it happens
Download NewsApp
Available on
Rediff News All News
Hizbut Tahrir » News » Hizbut Tahrir
News for Hizbut Tahrir
• News
How Hizbut Tahrir tried to infiltrate Pak army
Hizbut Tahrir hand suspected in Bangladesh coup plot
Terror outsourcing flummoxes agencies
Bodh Gaya blasts: A grim shape of things to come
The attack on the Mahabodhi temple is a precursor before Pakistan-based terror outfits launch a major ‘war’ in support of Myanmar’s Rohingya Muslims, reports Vicky Nanjappa.......
Gaya blasts: The Bangladesh link and Darbhanga danger
Web results for Hizbut Tahrir
Suspected militant commander arrested in Bangladesh
Detective Branch of the police led by sub inspector Abul Khayer Mollah arrested Tanjib Ahmed alias Ashraful, 20, son of Abdul Aziz of Shahid... ...
Dhaka: Bangladeshi intelligence agencies have unearthed an Islamist plot to blow up over 100 Navy and Coast Guard bases and oil refineries in... ...
Related Tags
1. gujarat
2. bjp
3. india
4. lok sabha
5. supreme court
6. upa
7. bharatiya janata party
8. congress
9. new delhi
10. united progressive alliance
11. ahmedabad
12. sonia gandhi
13. nda
14. rahul gandhi
15. rajnath singh
16. nitin gadkari
17. delhi
18. manmohan singh
19. bihar
20. national democratic alliance
21. jd-u
22. nitish kumar
23. rashtriya swayamsevak sangh
24. uttar pradesh
25. photo
26. advani
27. central bureau of investigation
28. rss
29. janata dal-united
30. ips
Top Coverage News
Coming to India and making
| http://www.rediff.com/tags/hizbut-tahrir | dclm-gs1-256400001 | false | false | {
"keywords": "blast"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.044291 | <urn:uuid:44576d7d-1c46-4526-980b-2579ad8b5894> | en | 0.971377 | Roctober Magazine
Hilo Hattie
By Jake Austen
(From Roctober #35, 2003)
Hilo Hattie
The other day I sat on a train next to two young African American women discussing "The Rock" (the wrestling champ/action movie star who has Pacific Islander and African American heritage). Their conversation came to an interesting (and gender specific) conclusion. "It's a shame," one noted, "that you can't get those nice Hawaiian shirts he wears in girls' sizes." "You can!" I rudely interrupted, and proceeded to give them info (which they received with semi-interest) on how to order on-line from the Aloha Shirt monolith that is Hilo Hattie's.
Were Hilo Hattie merely the largest manufacturer of "Aloha Wear" in the world perhaps I'd be hesitant to give them free publicity. But the company certainly doesn't need it, having entered the 21st century with a bang by opening a mainland store (behind Anaheim's Orange Curtain) and by becoming the "Official Hawaiian and Resort Fashion Provider" for the now cancelled "Baywatch Hawaii." When you're putting leis on Mickey Mouse and David Hasselhoff you don't need my humble praises. However, my loyalty to the Hilo Hattie corporation is grounded not in their zillions of dollars in sales or their racks of well made shirts, but rather in their legendary source of "the Aloha Spirit." For unlike Big Boy, the Keebler Elves or the Pillsbury Doughboy, yes Virginia, there really is a Hilo Hattie!
Clarissa "Clara" Haili, was born on October 28, 1901. A natural comedienne, part-time school teacher Clara performed as a hula dancer and vocalist with Louise Akeo's Royal Hawaiian Girls' Glee Club. On a tour of Canada she introduced a song that had been discarded by Harry Owens' Royal Hawaiian Orchestra after Owens dismissed it as being too lowbrow for the famed Royal Hawaiian Hotel. After phenomenal response, the song would become not only Clara's calling card, but eventually her legal name.
"When Hilo Hattie Does the Hula Hop" is a funny "hapa haole" (which translates as "half-white," referring to Hawaiian tunes with English lyrics) song written by Don McDiarmid, Sr. when he was a member of Owens' band. Though he would eventually become a successful composer, orchestra leader and the founder of Hula Records, in 1935 McDiarmid didn't have the juice to make his boss add the tune to his repertoire.
Two years later, when McDiarmid's own band was playing the Monarch room at the Royal Hawaiian, Clara was also there performing with the Girls' Glee Club. She insisted on dancing and singing "Hilo Hattie" despite the composer's trepidation (he too thought it was too "common" for the room) and proceeded to tear up the joint, eventually being called back for five encores. Soon Clara would adapt "Hilo Hattie" as her name and her signature look would make her one of the primary ambassadors of Hawaiian culture in the decades leading up to statehood.
Though the hula is often associated with scantily clad, slim wahinisfor much of her career Hattie's vibe was more matriarchal...though she more invoked a funny aunt than a mom. In an oversized mu'umu'u with a floppy lau hala (pandanus leaf) hat tied on her head, and barefoot, she somehow diffused many of the undercurrents of sexual conquest and fertility colonists often project on "native" women. She developed a wholesome, warm persona that made her a beloved icon throughout the islands. Her international fame came when she joined the cast of Hawaii Calls, a radio show first broadcast on July 3, 1935 from the Moana Hotel in Waikiki. Hosted by Webley Edwards, the show was broadcast to over 600 radio stations and Armed Forces Radio and was heard by millions in North America, Australia, New Zealand, South America and Africa.
Opening with a haunting Conch-shell trumpet blowing in the distance as surf softly hits the beach, the show invoked the magic of the islands to listeners everywhere, and was probably the single most influential source for the popularity of Hawaiian music at the time. Though there was some music performed in the Hawaiian language, the show was primarily hapa-haole music. Slack key guitar, Hawaiian percussion and songs like "Sweet Leilani" and "My Little Grass Shack" were introduced to the general public on Hawaii Calls and soon Hilo Hattie was a beloved broker of the Aloha Spirit to people the world over.
Upon gaining Island and mainland prominence, Hilo Hattie was everywhere. She emceed the prominent Queen's Surf luau, did work for Easter Seals Of Hawai'i, performed at various California County Fairs (including San Diego in 1952 and Orange County from 1961-1968), and in the late 1950s appeared on the Harry Owens And His Royal Hawaiians TV show. Despite his initial rejection of her namesake tune, Hattie would be a member of the controversial Owens' group for years. Descriptions of Owens' temperament may invoke visions of an Island Buddy Rich, and his claim of inventing the Mai Tai is disputed by many in the Trader Vic camp. However, (on camera, at least) he had nothing but nice things to say about Hilo Hattie. He described her over the TV waves as a woman "whose voice is like a breeze from Polynesia."
Outside of her radio work, Hilo Hattie's first prominent mainland appearance was in the 1942 Technicolor film "Song of the Islands" opposite Betty Grable and Victor Mature. The film is a celebration of Western cowboy influence on Hawaiian ranching, a luxurious travelogue and one of the only pieces of Irish-Hawaiian unity propaganda I know of. Hattie is featured as Palola, Grable's childhood nurse. She sings "Hawaiian War Chant," "Cockeyed Mayor of Kaunakakai," and generally is degraded as she chases a man who's hot for a svelter wahini. Humor concerning her family's cannibalism abound. Watch for the inevitable St. Patrick's Day luau.
Collectors of Hawaiian music treasure Hilo Hattie's singles. Over the course of her musical career Hilo Hattie recorded for Decca, RCA and a number of other labels, and her songs include "South Sea Sadie," "Princess Pupule Has Plenty Papayas," "Pidgin English Hula," "My Hawaii" "Ukulele Lady" (also recorded rather well by Ethel Merman) and the inevitable "Santa's Hula." Though she was in many ways a novelty act, throughout the 1930s, 1940s and 1950s she recorded with many of the best musicians in the Hawaiian scene.
Several events in the 1960s added to the legend of Hilo Hattie. On the negative side, "Hilo Hattie" was apparently a code name for a covert military operation that helped lay the groundwork for the Viet Nam war. On the positive side, in 1961 Hilo Hattie kissed Elvis!
Though not nearly as extensive as her role in "Song Of The Islands," Hattie's appearance in "Blue Hawaii" is nonetheless, extremely satisfying. The film opens with Chad's (Elvis) girlfriend (a Hawaiian/French halfbreed, to temper the King's miscegenation a bit) driving to meet his plane. She runs into Waihila (Hilo Hattie) at the airport, where Waihila is apparently a greeter, the equivalent of the women who draped you with leis were you to arrive on Fantasy Island. Hattie is striking in a huge red mu'umu'u, 50 pounds of leis and her signature floppy hat. What's most impressive is that she looks almost exactly the same as she did in the 1930s, with just a little wear around the edges. As the plane's hatch opens, "Chad" is making out with the stewardess, enraging the girlfriend and annoying a fat man trying to get off the plane. Hilo Hattie, in true Aloha Spirit, solves everyone's problem by giving island advice to the girlfriend, ("Be patient...some boys need time to get adjusted") and giving the fat dude a warm island greeting. In between she manages to kiss The King, who seems as excited to see her as he is his lady. Hilo Hattie doesn't appear again in the movie (she wasn't invited to the wedding?) but does garner 10th billing and got the most out of her cameo. That's what I call Taking Care of Business In A Flash!
As the 1960s turned to the 1970s Hilo Hattie managed to work her way into the last frontier of Hawaiian popular culture left for her to conquer: she appeared on "Hawaii 5-0"! In 1968 she helped get the legendary show afloat by portraying a suspect's mom who gets grilled by McGarrett in the second episode, "Strangers in Our Own Land," which actually dealt with colonial exploitation of Island natives. In 1970 in the episode, "The Late John Louisiana," she played Mrs. Pruitt, a suspect's neighbor. Interestingly enough, for a woman whose name would one day be synonymous with Hawaiian shirts, this episode prominently features the now derided early 70s Aloha Shirt style, with contrasting collar and cuffs.
The 1970s would prove to be the decade in which Hilo Hattie would gain immortality by both passing from the mortal world to the heavenly and by making the transformation from human being to corporate entity. In 1978 she was the first winner of the Sidney Grayson Award, for lifetime achievement at the Na Hoku Hanohano Awards. The "Hokus" are Hawaii's version of the Grammys. The next year, at age 77, Hilo Hattie died. However, before leaving the earthly paradise of the islands for otherworldly paradise, she cut a deal that would make her name live on as long as tourists dig pineapples. Kaluna Hawaii Sportswear, already a million dollar business, expanded that year by purchasing a manufacturing plant in Hilo. At the same time, in a move that doubtlessly brought the Island Spirit to their side, they bought the rights to Hilo Hattie's name and took it as their company's new moniker.
Founded by Jim Romig in 1963, Kaluna Hawaii Sportswear was a successful business, catering to thrifty tourists with the alluring promise, "Home of the $3.95 Aloha Shirt." Since taking on her name, the company, has provided Hilo Hattie scholarships to the University of Hawaii in Hawaiian studies and music. The real honor they have given her, though, is assuring that her name will be on the lips and her store part of the trips of every tourist passing through the isles. At their main store on Oahu you are not only greeted with complimentary juice and a shell lei, but also with the largest Aloha Shirt in the world, a floral fabric monstrosity that would fit someone about halfway in size between Andre The Giant and Godzilla. At that point one would be satisfied without even entering the store, but once you step in you get to see literally hundreds of different styles of Aloha shirts made out of some of the most amazing textile designs you've ever seen. Though there are a number of high-end silk shirts by other designers, the heart of the collection is the Hilo Hattie line, mostly all cotton, some with real carved coconut buttons, priced between $30 and $40. Every island theme you can think of is incorporated in the designs, so you can wear ukuleles, palm trees, grass shacks, hula girls, cocktails, island maps, conch shells, surfboards, and hibiscus flowers to your heart's delight. The best part, however, is that the Hilo patterns are available in all sizes, and in mu'umu'us, mini-dresses, and long dresses. Thus the fashionable traveling couple can wear the always-classy matching outfits! If only they hadn't gotten out at the next stop I could have told the girls on the train that tidbit, intimating that it might be possible if they ever date "The Rock" to wear matching duds! Better yet, I should have told them the tale of the woman whose voice was a breeze from Polynesia. If her charms can't sway you, then you are not the type of person I want to eavesdrop on and harass on public transportation!
If you want to stay in the hula groove check and | http://www.roctober.com/roctober/hilohattie.html | dclm-gs1-256420001 | false | false | {
"keywords": "mouse"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.029933 | <urn:uuid:c2bb0983-ac78-4a5e-9172-c3db04246656> | en | 0.95413 | Chula Vistans decided quite a bit in the June primary. The only candidate race left is for a council seat between Larry Breitfelder and Patricia Aguilar.
Breitfelder, who got 35 percent of the June vote, is president of the Chula Vista Taxpayers Association and an Otay Water District director. He is a UCSD graduate with advanced degrees from elsewhere. Breitfelder advocates “instilling a more customer-friendly culture at City Hall, adjusting fees and barriers to starting or maintaining existing businesses.”
Aguilar is a retired financial planner with a background in architecture and urban planning. She has served on the city’s Design Review Board, Planning Commission, Bayfront Citizens Advisory Committee and Redevelopment Advisory Committee and has led community groups. She was briefly a council candidate in 2008 and is the wife of Southwestern College trustee Nick Aguilar. Her priorities include budget reforms and economic sustainability, and a commitment from a major university for a presence in Chula Vista.
The overarching issue in this race, in our view, is the one voters resolved in June. They decisively brought back Mayor Cheryl Cox for a second term. As an elected mayor, Cox, though just one vote on a five-member council, is the city’s top leader. She deserves a chance to pursue her goals with at least some support on the council.
Aguilar has a history of publicly being at odds with the mayor on major city policies, Breitfelder considerably less so.
Breitfelder would be a much better fit. We endorse Larry Breitfelder for Chula Vista City Council. | http://www.sandiegouniontribune.com/news/2010/oct/08/breitfelder-for-chula-vista-council/ | dclm-gs1-256490001 | false | false | {
"keywords": "candida"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.035661 | <urn:uuid:7b46aa7b-efc3-4840-93d4-b650e6a86508> | en | 0.981994 | Huffman and Savant click on 'Desperate Housewives'
In this undated publicity image released by ABC, Doug Savant, and Felicity Huffman star as Tom and Lynette Scavo in a scene from the ABC series, "Desperate Housewives." (AP Photo/ABC, Ron Tom)
— Marriage can be a hard job. This, Tom and Lynette Scavo have reminded us for seven years as husband and wife on "Desperate Housewives."
On the other hand, marriage can be a great gig. That's what it's been for Doug Savant and Felicity Huffman, who are wed in holy matrimony as the Scavos on the ABC hit.
"It's a good marriage," states Huffman. "It's got its ups and downs, but it keeps moving forward."
"It is by no means perfect," says Savant. "But I like what it represents on television. I like what it represents in America."
America - or a large chunk of its TV audience, anyway - has embraced the Scavo marriage since "Desperate Housewives" premiered in fall 2004. Lynette and Tom stood out among their wacky neighbors on Wisteria Lane, TV's go-to address for sexy suburban angst.
Their marriage has weathered many challenges in this melange of melodrama, whodunit and dark comedy. Now, as "Housewives" (airing Sunday at 9 p.m. EDT) builds to its season finale on May 15, Tom has bloomed into a big-shot businessman who thinks Lynette is threatened by his success, while Lynette chafes at being slighted by a man she feels she doesn't know anymore.
"Tom's the heavy-hitting CEO and he's got the power in the relationship," says Huffman. "That's a new thing, and I find that as we act these scenes, it informs our off-screen time. Suddenly, we are a little at odds with each other, a little short with each other, in a way we didn't used to be. You're meaner," she says to Savant and chuckles.
Can this marriage be saved?
Savant laughs too.
"We've lived together at work for seven years," he explains as the pair shares lunch recently with a reporter, "so there's an ease and a comfort and a familiarity."
"We don't socialize away from the set at all," Huffman says. "But we have developed a connection that is loving and deep and continues to grow with each episode. If something new isn't demanded in a scene, Doug and I will turn to each other and go, `How is this episode different, how is the relationship moving forward?' And we'll find something fresh to bring to it. I feel like I have to do background work so I can endorse it as a real-life wife."
"I'm much lazier than Felicity," Savant cuts in. "She asks the questions. But together we answer them."
In real life, they indeed are married. Savant's wife is Laura Leighton, best-known as a fellow "Melrose Place" alum and currently appearing on ABC Family's "Pretty Little Liars." Huffman's husband is William H. Macy, whose screen credits include "Fargo" and who is now starring in the Showtime drama series "Shameless."
A two-actor marriage brings its own challenges. For any actor, says Huffman, "it's a black-and-white world: You're either working or your career is over. And when you're married to an actor, you're living with someone else whose career is over. Or that's what happens after every job."
"I think we can both say this," Savant offers - "It's ALWAYS better when your spouse is working."
"That's true," agrees Huffman. "And it's always better when WE'RE working."
Blond and willowy, Huffman, 48, decided to make acting her life's work as a girl when, growing up in Woody Creek, Colo., she saw Franco Zeffirelli's film of "Romeo and Juliet" with an older sister planted beside her, hiding her eyes during the racy parts (the only way their mother would permit her to see it).
She eventually won praise on the New York stage, especially in plays by David Mamet. In 1998, she found critical acclaim on TV in "SportsNight," Aaron Sorkin's brainy comedy, which lasted for two seasons.
When the "Desperate Housewives" project came along, Huffman loved its script, "but I just assumed this would be another one of my pilots that tanked - probably because I was in it." Its smash success came "as a complete shock."
Soon after, he was transported by Timothy Hutton's performance in "Ordinary People," then by John Hurt in the title role of "The Elephant Man."
"I went for a long time not getting jobs," he recalls. For a time, he switched to selling real estate.
Then he went back to acting school and decided, "There is no job too small. If it's on television, it's not too good for me."
Gradually, he got more episodic work. Then he scored "Housewives."
But he was always mindful that the series title had the word "housewives," not "husbands." And these housewives were explicitly "desperate." To him, the message was clear.
"I'm going, `Oh, God, I really want this marriage to work. My job is dependent on it being successful!'" He laughs gratefully. "I've worked my ass off on this marriage!"
ABC is owned by The Walt Disney Co.
The Associated Press | http://www.sandiegouniontribune.com/news/2011/may/05/huffman-and-savant-click-on-desperate-housewives/ | dclm-gs1-256510001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.151049 | <urn:uuid:490dae3b-362e-46fa-a949-b3fb1e2d6c8a> | en | 0.975298 | Krasnaya Polyana -- , Russia - They called it the Battle Royale. Kaillie Humphries and Elana Meyers spent part of the summer training alongside each other, getting ready to spend this winter battling each other.
They could not share the Olympic gold medal.
It belongs to Humphries.
It's the second straight Olympic title for Humphries and Moyse, and it wasn't decided until the final moment of the competition - then only by a tenth of a second.
"We knew it was going to be this way," Humphries said after becoming the first female bobsledder to drive to back-to-back Olympic golds.
Not long afterward, all three U.S. teams - including Lolo Jones and Jazmine Fenlator, who were 11th in USA-3 - were arm in arm, celebrating that two medals are U.S.-bound. | http://www.sfgate.com/sports/article/In-women-s-bobsled-Canadian-rivals-top-U-S-team-5249900.php | dclm-gs1-256580001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.01949 | <urn:uuid:1a61ecf8-6157-4c84-8046-f5553c688914> | en | 0.966342 | "Dissident" Meanings in Shostakovich's Music
by Allan B. Ho
Richard Taruskin has suggested ("Casting a Great Composer as a Fictional Hero," New York Times, 5 March 2000) that the "dissident" meanings attributed to Shostakovich's works were fabricated by the composer, late in life, to revise his own historical image, or are merely the result of speculation and "fantasizing" by members of a Shostakovich "cult". In doing so, he ignores the numerous testimonies of people who knew the composer personally and understood these hidden meanings long ago, not just in hindsight.
As Margarita Mazo states, "Those of us who were 'in the know' were always searching for the second layer of meaning in Shostakovich's works." (DSCH Journal 12, p. 72. Emphasis added.) Kurt Sanderling adds: "For us contemporaries who knew and worked with Shostakovich, it has never been difficult to interpret his works along with their double meanings. For us, it was all very clear." ("Performers on Shostakovich: Kurt Sanderling", DSCH Journal 6, p. 12. Emphasis added.)
Shostakovich told his longtime friend Flora Litvinova that "without the authorities...'contort[ing] us... warp[ing] our lives'... without 'Party guidance', he would have been 'stronger and sharper' in his work and could have 'revealed his ideas openly instead of having to resort to camouflage...'" (Wilson, Shostakovich: A Life Remembered, p. 426.) At the same time, he believed his music was still crystal clear to those "who had ears to listen." (Op. cit., p. 317.) As for those without ears, who "did not understand what he was trying to say in his music without having to be told," Shostakovich believed "there was just no hope." (Maxim Shostakovich, "Shostakovich Symposium", Shostakovich Reconsidered, p. 389.)
Consider the following works and testimonies...
The Fifth Symphony
(1937; an example of "forced rejoicing" in the USSR during the Terror)
(1) Mstislav Rostropovich, the dedicatee of Shostakovich's cello concertos and a close friend of the composer, confirms that the rejoicing in the finale is forced:
The applause went on for an entire hour. People were in uproar, and ran up and down through the streets of Leningrad till the small hours, embracing and congratulating each other on having been there. They had understood the message that forms the "lower bottom", the outer hull, of the Fifth Symphony: the message of sorrow, suffering and isolation; stretched on the rack of the Inquisition, the victim still tries to smile in his pain. The shrill repetitions of the A at the end of the symphony are to me like a spear-point jabbing in the wounds of a person on the rack. The hearers of the first performance could identify with that person. Anybody who thinks the finale is glorification is an idiot.... (Juliane Ribke, "From a Conversation with Mstislav Rostropovich," notes to Deutsche Grammophon 410 509-2. Emphasis added.)
(2) conductor Kurt Sanderling -- Yevgeny Mravinsky's assistant for twenty years with the Leningrad Philharmonic (which premiered many of Shostakovich's works) -- states:
In the Fifth Symphony, with the so called "Triumph" at the end -- we understood what he was saying. And it was not the "Triumph" of the mighty, those in power. There was no need for further explanation. ("Performers on Shostakovich: Kurt Sanderling," p. 12.)
(3) Alexander Fadeyev, who was present at the work's premiere, noted in his diary that "The end does not sound like an outcome (and ever less like a triumph or victory), but like a punishment or revenge of someone." (Solomon Volkov, St. Petersburg: A Cultural History, p. 425.)
(4) Russian musicologist Inna Barsova explains how Shostakovich would often "defend the truth of the music with untruthful words about it." ("Between 'Social Demands' and the 'Music of Grand Passions' [The years 1934--37 in the life of Dmitry Shostakovich]," paper, University of Michigan, 28 January 1994).) Galina Vishnevskaya, the wife of Rostropovich and a close friend of the composer, elaborates:
Before the Fifth Symphony was allowed to be performed, it was heard by the Party aktiv in Leningrad. A few dozen nincompoops together to judge a genius: to make objections, to lecture him, and in general to teach him how to write music. He had to save his newborn from their talons. But how? He tried to deceive them in the most rudimentary way, and succeeded! All he had to do was use other words to describe the huge complex of human passions and suffering that is so apparent in his music -- he described his music to the Party as joyous and optimistic -- and the entire pack dashed off, satisfied. (Vishnevskaya, Galina, p. 212.)
(5) The finale also includes a quotation from Shostakovich's song "Rebirth," the words of which corroborate the hidden meaning of the work. Curiously, Laurel Fay, in her recent book Shostakovich: A Life, does not even mention this quotation, which was acknowledged by Elizabeth Wilson, Gerard McBurney, and others at least six years ago:
The four notes that set the first three words of that poem ["A barbarian painter with his somnolent brush / Blackens the genius's painting, / Slapping over it senselessly / His own lawless picture"] form the kernel of the initial march theme, while a whole later section makes reference to the lilting accompaniment to the poem's final quatrain, "Thus delusions fall off / My tormented soul / And it reveals to me visions / Of my former pure days". (Wilson, p. 127.)
Here the "barbarian painter" is, of course, Stalin, who repeatedly defaced the works of Shostakovich and his colleagues, forcing them to conform to the dictates of socialist realism. Shostakovich also predicts (correctly) that these old delusions will eventually fall off, revealing the original work and its true meaning.
The Seventh Symphony
(1941; a work not just about the Nazis, but also about Stalin)
(1) Maxim Shostakovich, the composer's son, states:
Critics felt it described the tragedy of the war; but it was not just about the war....My father always said, "I think long; I write fast" -- the time preceding the war was probably the inspiration of Symphony No. 7, the tragedy of a nation. There were negative evil forces -- in Germany and in the USSR; the USSR had its own fascism and its own "Hitler." The Seventh Symphony is not just military... ("Six Lectures on the Shostakovich Symphonies," Shostakovich Reconsidered, pp. 410-11.)
(2) Rostislav Dubinsky, a member of the Borodin Quartet and a friend of the composer, notes that "Soviet musicologists conveniently forgot that the first movement of the Seventh Symphony already existed a year before the war, back when Stalin was still Hitler's faithful friend." (Dubinsky, Stormy Applause, p. 155.)
(3) Lev Lebedinsky, a longtime friend of the composer and a collaborator on several works, adds:
The "Leningrad" Symphony [...was] planned and begun before Hitler's attack on Russia in 1941. The tune of the notorious march in the first movement was conceived by Shostakovich as the "Stalin" theme (all who were close to the composer knew this). After the war had started, Shostakovich declared it to be the "Hitler" theme. Later, when the work was published, he renamed it the "Evil" theme -- justly, since both Hitler and Stalin met the specification. ("Code, Quotation, and Collage: Some Musical Allusions in the Works of Dmitry Shostakovich", Shostakovich Reconsidered, p. 482.)
(4) Flora Litvinova, the composer's neighbor when the Seventh Symphony was composed, documented in contemporaneous notes what the composer himself said about the work:
"Fascism, yes, but music, real music, is never literally bound to one theme. Fascism is not just National Socialism; this music is about terror, slavery, the bondage of spirit". Later, when Dmitry Dmitryevich got used to me and started to trust me, he told me straight out that the Seventh (as well as the Fifth) were not just about fascism, but also about our system, about any tyranny and totalitarianism in general. (Wilson, pp. 158-59; Shostakovich Reconsidered, p. 488.)
(5) Russian musicologist Vladimir Zak concurs: the Seventh Symphony is not only about "a foreign fascism -- German -- but also (and this is so very unbearable) of our own native fascism. This is the reason why many listeners seem to hear in the 'invasion theme' not only the aggressors drawing near and defacing the Russian land, but also the trampling of the boots of the NKVD..." (Shostakovich's Idioms," Shostakovich Reconsidered, p. 500.)
(6) The Symphony was begun before the Nazi invasion (22 June 1941) and thus could not have been inspired solely by it:
[the] Seventh Symphony was included in the program for the Leningrad Philharmonic's 1941--42 season, that is, before the German invasion. That could have been done only with the composer's consent and indicates that Shostakovich had a clear idea of his Seventh Symphony and was sure that he would complete it by the fall season. (Volkov, St. Petersburg, p. 427; Sofiya Khentova, Shostakovich. zhizn' i tvorchestvo [Shostakovich. Life and Work] (Leningrad: Sovetsky Kompozitor, 1986), Vol. 1, p. 543.)
Yuly Vainkop, who kept close track of the composer's activities, reported in May 1941 that "In the near future, D. Shostakovich, apparently, will finish his Seventh Symphony (the completion of which was postponed by the composer because of his work on the orchestration of Musorgsky's opera Boris Godunov [finished in 1940]." (Khentova, op. cit., p. 526. When contacted in November 1995, Khentova confirmed the accuracy of Vainkop's statement.) In addition, Aleksandr Sherel' claims to have seen a sketch of the "invasion theme" dated 26 June 1939. (Shostakovich Reconsidered, pp. 157-58.)
The Ninth Symphony
(1945; a light work intended to deflate Stalin's ego after World War II)
(1) Stalin wanted a largescale, heroic symphony with chorus to celebrate his victory in World War II. Shostakovich provided just the opposite. According to Isaak Glikman, the composer feared that "on the crest of this victory, Stalin would consolidate his tyranny, consolidate his despotism, and his inhumanity." (The War Symphonies: Shostakovich Against Stalin [video, 1998].)
(2) composer Dmitry Tolstoy recalls:
When he first showed it, some people asked, "Is he serious about all this?" And many Communist zealots and ideologues said: "What, is he making fun of our victory? What is this?" This kind of melody. A kind of street whistling. Too light, I would say, for a symphony. Shostakovich did [in this work] what is called giving the "finger in the pocket." (The War Symphonies: Shostakovich Against Stalin [video, 1998].)
(3) conductor Yevgeny Mravinsky, who premiered many of Shostakovich's works, told his orchestra (re the finale): "You have the wrong sound. I need the sound of the trampling of steel-shod boots." (Wilson, p. 315.) Violinist Yakov Milkis adds, "We knew he wasn't referring to ordinary soldiers, but to KGB forces." (Ibid, p. 315.)
From Jewish Folk Poetry
(1948; written in support of beleaguered Jews at a time of growing anti-Semitism in the USSR)
(1) Manashir Yakubov, curator of the Shostakovich family archive, says this work was "a direct response to growing official anti-semitism." (Shostakovich 1906-1975, booklet for the Rostropovich/London Symphony cycle [1998], p. 11.)
(2) Natalya Vovsi-Mikhoels, the daughter of slain Jewish leader Solomon Mikhoels, recalls how, after the "presenter" declared about "Lullaby" [one of the songs] that "it all took place in Tsarist Russia...people barely restrained themselves from laughing [because they understood the contemporary references]. For a long time after that Dmitri Dmitriyevich liked to repeat, 'It all took place in Tsarist Russia, it all took place in Tsarist Russia.'" (Wilson, p. 230.)
(3) Nina Dorliak, one of the singers at the first (private) performance, recalls worrying that her "colleagues might balk at the idea of singing [this] 'unacceptable' music." (Wilson, p. 236.)
(4) musicologist Daniil Zhitomirsky, who was present at the above performance, wrote in his diary that it was "very good" that the performance scheduled for the Composer's Union in late 1948 was canceled. He "feared that new attacks would take place. Anti-Semitism was already gaining ground higher up." (Shostakovich Reconsidered, p. 471.) In another article, he notes: "But it [the scheduled performance] was not to be. First came casual warnings, followed by unexplained delays -- then, finally -- explicit prohibition decreed from above." ("Shostakovich: the Public and the Private.")
(5) Russian musicologist Abraam Gozenpud notes: "Shostakovich first showed his cycle From Jewish Folk Poetry at the Moscow Union of Composers early in 1953, just after the news bulletin in the press had appeared denouncing the [Jewish] Doctors....The performance of this cycle at that time was an act of civic courage." (Wilson, p. 238.)
(6) musicologist Joachim Braun, the leading authority on the Jewish aspect of Shostakovich's music, also comments on the dissident aspect of this work in two articles: "The Double Meaning of Jewish Elements in Dmitri Shostakovich's Music," Musical Quarterly 71, No. 1 (1985), 68-80; "Shostakovich's Vocal Cycle From Jewish Folk Poetry," in Malcolm H. Brown, ed., Russian and Soviet Music: Essays for Boris Schwarz (1984), pp. 259-86.
Braun notes that "the Jewish subject matter was, by its mere existence, provocative. At a time when Jewish culture was under fire, the performance of such a work would have been dangerous." (Musical Quarterly, p. 75.) He goes on to comment on "the more or less obvious dissidence of the text" which he describes as starting a new trend in Soviet music "notable for its anti-establishment...overtones" and use of "Aesopian language" (ibid, p. 78-79), notes that the use of Jewish elements "may be interpreted as hidden dissidence [and] is in fact a hidden language of resistance communicated to the aware listener of its subtle meaning," (ibid, pp. 78-79) and praises the cycle as "one of Shostakovich's most beautiful and richly symbolic compositions, a masterpiece of the composer's secret language of dissent" (Russian and Soviet Music, p. 260).
Why, then, does Laurel Fay, in her recent book, quote Braun describing From Jewish Folk Poetry as, in part, "stylized urban folk art," but remain silent about the dissident aspects of the work mentioned repeatedly above and even alluded to in Braun's title "The Double Meaning of Jewish Elements in Dmitri Shostakovich's Music"? Why does Fay mention Shostakovich's statement "I envy him" while visiting the family home of the murdered Solomon Mikhoels, but remain silent on his words that show his awareness of what was happening to Jews. Vovsi-Mikhoels reports that the composer, during his visit to the family home, also stated "'This' had started with the Jews but would end with the entire intelligentsia." (Ibid, p. 261.) This statement appears in a book edited by Malcolm Hamrick Brown, to which Fay herself was a contributor.
(1948-1960s; a musical satire of Soviet officials and their policies regarding music)
(1) according to Rostropovich, this anti-Stalin satire, which viciously parodies the officially sanctioned music as well as the officials themselves (Stalin, Zhdanov, Shepilov, Khrennikov, and others) "proves how he [Shostakovich] really thought," refuting Soviet books that say "what a good Communist Shostakovich was." (John Rockwell, 'Rostropovich to Conduct Premiere of Unpublished Shostakovich Work', New York Times [11 January 1989], p. C17.)
(2) Vissarion Shebalin, a close friend, recognized the danger of composing such a work and advised Shostakovich to destroy all trace of Rayok: "You could be shot for such things." (Wilson, p. 296.)
The Eleventh Symphony
(1957; inspired by both the Hungarian Uprising in 1956 and the events of 1905)
Shostakovich links the tragedies of the past and present by quoting the music of several revolutionary songs, which, in turn, call to mind texts apropos for 1956-7. The first movement quotes the prison song 'Listen', the original text of which reads: 'The autumn night is as black as treason, black as the tyrant's conscience. Blacker than that night a terrible vision rises from the fog -- prison.' The finale quotes a famous revolutionary song with the words: 'Rage, you tyrants -- Mock us, threaten us with prison and chains. We are strong in spirit, if weak in body. Shame, shame on you tyrants!'
(1) Lev Lebedinsky points out:
What we heard in this music was not the police firing on the crowd in front of the Winter Palace in 1905, but the Soviet tanks roaring in the streets of Budapest. This was so clear to those "who had ears to listen", that his son, with whom he wasn't in the habit of sharing his deepest thoughts, whispered to Dmitri Dmitriyevich during the dress rehearsal, "Papa, what if they hang you for this?" (Wilson, p. 317; Volkov, St. Petersburg, pp. 461--62.)
(2) Manashir Yakubov confirms that "from its very earliest performances, [some] viewed the symphony as an allegorical reflection of contemporary bloody events in Hungary (1956), where the Soviet Union had acted as 'policeman of Europe' and executioner of a democratic movement." (Yakubov, op. cit., p. 57. Emphasis added.)
(3) Igor Belsky recalls the composer saying, "Don't forget that I wrote that symphony [the Eleventh] in the aftermath of the Hungarian Uprising." (Wilson, p. 320.)
(4) Irina Shostakovich, the composer's widow, confirms that Shostakovich had the events of the Hungarian Uprising in 1956 "in mind" when he wrote this work. (DSCH Journal 12, p. 72.)
(1960; a commentary on present as well as past ideologies)
Vishnevskaya recognized how the texts referred to contemporary as well as past events. It was she who suggested to the composer that the song cycle be called "Pictures of the Past" because otherwise the authorities would never approve verses such as "Our Posterity," which, though written in 1910, was also "an indictment of the current Soviet regime and its insane ideology." "Throw them that bone and they might sanction it. Yesterday is part of the past, too; the public will see it that way." Shostakovich responded: "Beautifully thought out, Galya! Beautifully thought out. Under 'Satires' we'll put 'Pictures of the Past' in parentheses, like a kind of fig leaf. We'll cover up the embarrassing parts for them." (Vishnevskaya, Galina, pp. 268--29.)
The Eighth Quartet
(1960; an autobiographical work, the composer portraying himself as a victim of fascism)
(1) a letter from Shostakovich to Isaak Glikman (16 July 1960) corroborates that this work was not about the victims of fascism and war in Dresden, but an autobiographical work in which the composer himself is the victim:
When I die, it's hardly likely that someone will write a quartet dedicated to my memory. So I decided to write it myself. One could write on the frontispiece, "Dedicated to the author of this quartet".
The main theme is the monogram D, Es, C, H, that is -- my initials. The quartet makes use of themes from my works and the revolutionary song "Tormented by Grievous Bondage." My own themes are the following: from the First Symphony, the Eighth Symphony, the Piano Trio, the Cello Concerto and Lady Macbeth, Wagner's Funeral March from Götterdämmerung and the second theme from the first movement of Tchaikovsky's Sixth Symphony are also hinted at. And I forgot -- there's also a theme from my Tenth Symphony. Quite something -- this little miscellany! (Wilson, p. 340; from Glikman, p. 159.)
(2) Rostislav Dubinsky, a member of the Borodin Quartet and a longtime friend, recalls that "when, at the first performance at the Composers' House, the chairman announced the quartet and started talking about the war and the heroism of the Soviet people and the Communist Party, Shostakovich jumped up and shouted, 'No, no... that is, you see, I, I, myself, personally, so to speak, am protesting against any sort of Fascism.'"(Dubinsky, Stormy Applause: p. 282.) The composer also confided that the Eighth Quartet "is myself."
(3) Lebedinsky adds:
The composer dedicated the Quartet to the victims of fascism to disguise his intentions, although, as he considered himself a victim of a fascist regime, the dedication was apt. In fact he intended it to be a summation of everything he had written before. It was his farewell to life. He associated joining the Party with a moral, as well as physical death. On the day of his return from a trip to Dresden, where he had completed the Quartet and purchased a large number of sleeping pills, he played the Quartet to me on the piano and told me with tears in his eyes that it was his last work. He hinted at his intention to commit suicide. Perhaps subconsciously he hoped that I would save him. I managed to remove the pills from his jacket pocket and gave them to his son Maxim, explaining to him the true meaning of the Quartet. (Wilson, p. 340. The abbreviated references to the "Dies irae" at the end of the third and fifth movements, sometimes juxtaposed to DSCH, may also allude to the composer's anticipated death.)
(4) Maxim Shostakovich confirms the special, personal significance of this work to his father:
My father cried twice in his life: when his mother died and when he came to say they've made him join the Party. [...T]his was sobbing, not just tears, but sobbing. It was in the 1960s that they made him join the Party. There was simply no other way for him at that time. [. . .] The powers-that-be put a lot of pressure on Shostakovich to give some kind of title to the Eighth Quartet in order to explain its pessimism. Something about Dresden, or the destruction of Dresden at the end of World War II. And, of course, only a stupid person could not understand the combination in that quartet of his musical signature ('DSCH'), along with the tune of a well-known Russian prison song ("Tortured by grievous bondage"). And the knocks on the door by the KGB, you can also hear them there. ("Shostakovich Symposium," Shostakovich Reconsidered, p. 390.)
The Twelfth Symphony
(1961; originally to be a satire of Lenin)
(1) Lebedinsky confirms that the Twelfth Symphony was originally to be a satire of Lenin:
In 1961 Shostakovich made another attempt to express his true attitude to what was going on in his country. He decided that his Twelfth Symphony was to be a satire of Lenin. When he told me this I tried to talk him out of it. It was too dangerous and nobody would understand anyway. He brushed off my advice with, "He who has ears will hear" (a favourite Shostakovich expression). [... Shostakovich later] explained: "I wrote the symphony, and then I realized that you had been right. They'd crucify me for it because my conception was an obvious caricature of Lenin. Therefore I sat down and wrote another one in three or four days. And it's terrible!" (Wilson, p. 346.)
(2) Sofiya Khentova, Shostakovich's authorized Soviet biographer, confirms that sketches of the earlier version of the Twelfth, satirizing Lenin, exist in the Shostakovich family archive and include "a parodying waltz based on material from the fourth song, 'Misunderstanding,' of the vocal cycle Satires. The waltz motif coincides with the song's text, 'he did not understand the new poetry.'" (Wilson, p. 344.)
The Thirteenth Symphony
(1962; another work in honor of Jews at a time of increased anti-Semitism)
(1) Manashir Yakubov states: "Evtushenko's poem inspired Shostakovich to compose a fierce protest against Nazi atrocities, and a passionate denunciation of anti-semitism and chauvinism in general." (Op. cit., p. 64.) He views it as another "direct response to growing official anti-semitism [in the USSR]." (Op. cit., p. 11.)
(2) Kiril Kondrashin, who premiered this work, reports Shostakovich's strong views on anti-Semitism. When the Russian soloist Vitaly Gromadsky asked Shostakovich "why are you writing about anti-Semitism when there isn't any?" Shostakovich, almost shouting, told Gromadsky, "No there is, there is anti-semitism in the Soviet Union. It is an outrageous thing, and we must fight it. We must shout about it from the roof-tops." (Wilson, pp. 358--59.)
Michelangelo Verses
(1974; a commentary on Solzhenitsyn's exile from the USSR)
(1) Manashir Yakubov states:
As always with Shostakovich, a work on "eternal themes" proved to be excitingly relevant for the audience and painfully topical for the authorities. Three central movements of the cycle echoed events in Soviet social and artistic life that were uncomfortably close: the persecution of dissidents, the exile of Solzhenitsyn and forced expulsion of Rostropovich and Vishnevskaya from the Soviet Union. (Op. cit., p. 72. Emphasis added.)
(2) Irina Shostakovich confirms that in this work there is a "parallel between Dante's expulsion from Italy and Solzhenitsyn's exile from the Soviet Union." (DSCH Journal , p. 72.)
(1) As can be seen above, the "fantasizing" members of the Shostakovich "cult" disparaged by Richard Taruskin include the composer's immediate family, longtime friends and colleagues, and authorized Soviet biographer, the curator of the Shostakovich family archive, and noted Russian musicologists: that is, people who knew the composer and have "ears to listen."
(2) It is curious that the "dissidence" in Shostakovich's music is now openly acknowledged in Russian journals, such as Muzykal'naya Akademiya (formerly Sovetskaya Muzyka), yet remains largely ignored in the Western writings of Taruskin and Fay. For example, Mark Aranovsky's article about Shostakovich "The Dissident" (Muzykal'naya Akademiya 4 (1997), pp. 2-3; translated in DSCH Journal 12, pp. 24-26) is not even mentioned in Fay's recent book, even though she cites 22 other articles from the same special Shostakovich issue (Muzykal'naya Akademiya 4 [1997]), including another piece by Aranovsky. Why does Fay remain silent on passages such as the following?
The victory of Shostakovich is even more amazing and extraordinary because, after all, it was his art (and we understand it more clearly now), which, over the course of many years, remained practically the only artistic event which, socially and substantively, actively resisted the totalitarian regime. Without risking exaggeration, we can say that dissidence was the unifying integral feature of the entire artistic output of this great musician. And, if we understand this, we must also note that the history of "dissidence" among the Soviet intelligentsia finds its roots decades ago, and in fact began long before the time when this term itself appeared.
His music became an emblem of spiritual experience and of hope for the future. It can be said, without exaggeration, that Shostakovich was the authentic conscience of his time...
Back to Was He A Dissident? Back to The Shostakovich Debate. Back to Shostakovichiana. | http://www.siue.edu/~aho/musov/deb/dw.html | dclm-gs1-256630001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.026675 | <urn:uuid:3812b22e-c533-40a0-9c78-1163502b798c> | en | 0.940611 | IFC Films
Change of Plans
Change of Plans
Comments (0)
Change of Plans, Danièle Thompson’s skillfully executed comedy of manners, is either deeply profound or insupportably shallow—most likely the latter. The film features 11 carefully delineated major characters, a complex flash-forward structure, and touches on the essential questions of what makes romantic and familial relationships work and fail, the lies and sacrifices necessary to sustain these relationships, and the way that fate intervenes to alter people’s not-so-carefully laid plans. Yet, given the fact that the movie confines itself almost exclusively to the cloistered world of the haute bourgeoisie (a group whose narrow perspective Thompson pokes light but affectionate fun at), has almost no interest or awareness of the outside world and finally has little to say about the way human relationships function, except that they’re utterly subject to unexpected bouts of cosmic intervention, one gets the feeling that all the director’s expertly rendered plot manipulations and excess of incident and character serve largely as a smokescreen to cover up the essential inconsequentiality of the work.
But being forced to constantly eat scallops is one thing, adulterous attraction quite another, and, as the dinner party progresses, the characters’ concerns move from the shallow to the slightly less shallow: The attempts of a lawyer to recruit ML to his firm, the question of whether or not a gynecologist will work up the courage to leave her husband, and, in the film’s weakest narrative strand, the inability of the host’s sister to forgive their father for a past transgression. It’s all very carefully handled, Thompson able to keep several conversations afloat at once, expertly cutting between one-, two-, and three-shots at the dinner table with consummate ease. Yet, for all the urgency of these issues in the characters’ lives, it’s hard for the viewer to involve himself in their importance, probably because there are simply too many characters to follow, but also because their concerns seem so helplessly narcissistic. With the exception of a doctor’s anguish over one dying cancer patient and his success with another and the spontaneous free play of the various Parisian musicians glimpsed throughout the film (the movie takes place on Street Music Night) whose centrifugal energy stands in marked contrast to the internalized ruts of the characters, we’re locked eternally in with our dull bunch, hermetically sealed against the problems of the world.
In the end, Change of Plans is little more than a skillful juggling act—albeit a highly skillful one—whose intricacies becomes more apparent once the complexities of the structure are revealed. About a third of the way through, the film lurches forward in time a year, registering with a minor shock the significant changes in the characters’ lives. After this Almodóvarian leap (and the Spanish director seems a model in Thompson’s understanding of how time and fate force narratively interesting changes in her characters), the filmmaker cuts back and forth between the initial present of the party and a year later, allowing the flash-forwards to affect our understanding of the earlier dinner. The complexity of the plotting reaches a head when, in a “future” sequence, one character suspects his wife of having an affair with another character and the latter turns out to be the husband of the initial character’s business associate, but since that associate is pregnant with her husband’s child, he won’t reveal the results of his findings, even though it centrally effects the pair’s business pursuits. If that sounds overly complicated, it is, and if, in Thompson’s handling, it comes off with remarkable clarity, it still feels like so much empty exercise. So does the rest of the film, in which the characters’ self-absorption is mirrored by that of the director. Within her chosen milieu, Thompson knows just what she’s doing, it’s just that her lack of interest in anything outside her preferred realm of privileged narcissism reveals the ultimate failure of vision behind a superficially talented filmmaker.
IFC Films
100 min
Danièle Thompson
Danièle Thompson, Christopher Thompson
From our partners | http://www.slantmagazine.com/film/review/change-of-plans | dclm-gs1-256640001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.04572 | <urn:uuid:307653c4-508e-4ce1-beab-bebfe1c9c7e2> | en | 0.967296 | skip navigation
Angel on the Amazon
Angel on the Amazon(1948)
TCM Messageboards
Post your comments here
Remind Me
TCMDb Archive MaterialsView all archives (0)
Angel on the... - NOT AVAILABLE
Crying Boy
1. Total votes: vote now!
2. Rank: (why vote?)
powered by AFI
In the depths of the Amazon jungle, as Christine Ridgeway searches for a black panther, one of her hunting party's jeeps breaks down and she is forced to radio the Manaos Airport to request a replacement carburetor. When the plane carrying her carburetor reaches the jungle, it crashes. None of the passengers, including pilot Jim Warburton and his friend, physician Karen Adams, are hurt, and the group decides to wait at the plane until morning. They are awakened, however, by the war drums of the head-hunting natives and it is only the sudden appearance of Christine and her guide, Paulo, which saves them from the head-hunters. As Christine leads the plane's passengers through the jungle, Jim grows fascinated by her and asks Paulo to explain why she has come to the jungle. By the next morning, Christine has mysteriously disappeared from the camp, but Paulo, acting on instructions from Christine, guides the plane's passengers to their hotel in Rio. In Rio, Karen and Jim are attending a horse race when they notice Christine in the audience. Jim asks her to dinner that evening, and afterward they decide to go dancing. Jim's romantic notions are dispelled, however, after a middle-aged man leaves Christine a note saying, "Be happy, dearest," and she immediately becomes agitated and wants to leave. The next morning, Christine meets Jim and Karen at a nearby restaurant, but as soon as she sees the middle-aged man again, she collapses at the table. While Karen looks after Christine, Jim follows the man, who identifies himself as Don Sebastian Ortega, an old friend of Christine's parents. Ortega explains that many years before, he guided Christine's newlywed parents, Anthony Ridgeway and his bride, through the Amazon, and remarks upon how much Christine looks like her mother. Ortega tells Jim that, on their trip through the jungle, Anthony was attacked by a black panther, and his young bride was forced to stab the animal to death. Intrigued, Jim returns to America and visits Anthony, now a fifty-year-old man, in Pasadena, California. Anthony tells him that Christine is not his daughter but his wife, whose aging process was halted due to the shock of killing the panther. He further reveals he and Christine have a daughter, Judy, and that on Judy's twentieth birthday party, her fiancé Johnny admitted to being in love with the ever-youthful Christine, a revelation that caused Judy to drive her car off a cliff to her death. After their daughter's death, Anthony and Christine grew apart and decided to separate. Jim discovers that Christine is now at a sanitarium in Santa Barbara and goes there to find Karen caring for her. Karen explains that the shock of seeing Ortega after all these years caused her to begin aging again. Now looking her age, Christine visits her daughter's grave, where she meets Anthony, and the two are reunited. | http://www.tcm.com/tcmdb/title/67364/Angel-on-the-Amazon/full-synopsis.html | dclm-gs1-256900001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.018163 | <urn:uuid:c0935961-12b7-460e-b89d-cd164f55e3c5> | en | 0.972995 | Laurent Blanc faces tough task as France woe continues against Belarus
France's new manager problems mounted at the Stade de France, with injuries, suspensions and a fourth straight defeat
Laurent Blanc
France's coach, Laurent Blanc, oversaw another poor performance by Les Bleus against Belarus. Photograph: Charles Platiau/Reuters
France continue to be European football's greatest source of merriment after a miserable Friday evening in Paris when Laurent Blanc's competitive bow as head coach ended in a 1-0 humiliation by Belarus in their opening Euro 2012 qualifier.
That was a fourth consecutive defeat for the national team, a sequence that has not happened since 1937, but this was hardly surprising given what France have offered since Thierry Henry's handball in the second leg of their World Cup play-off against the Republic of Ireland in November.
Now they face a difficult trip to Sarajevo to face Bosnia and Herzegovina on Tuesday. Lose that one and qualification for the finals will still be possible in a group that also includes Luxembourg, Romania and Albania, but it will hardly be the shiny new world demanded by fans following their shambolic World Cup in South Africa.
"We're in a difficult situation and we need to fight, which is exactly what we will do," Blanc said after the Belarus defeat. "When you're young, you make mistakes. Our problem is we cannot afford to make any."
Blanc's deeper problem is the malaise inherited from his predecessor, Raymond Domenech, and the squad the eccentric coach fell out with in comic manner in South Africa, which ended in a player strike and led to the suspensions of Jérémy Toulalan (one match), Patrice Evra (five), Franck Ribéry (three) and Nicolas Anelka (an international career-ending 18).
Having replaced Domenech, Blanc made a decision that may have done little for building a fresh team spirit: demanding that the 23-man World Cup squad be suspended for the friendly against Norway last month, which France lost.
Now Blanc also has injury and on-field-related suspensions to deal with ahead of Tuesday's match. Without the suspended playmaker Yoann Gourcuff and Arsenal's injured Samir Nasri against Belarus, the coach was forced to field an inexperienced team that entered to applause at the Stade de France but exited to jeers after Sergei Kislyak's 86th-minute winner.
The only established performers were Arsenal's Bacary Sagna, Abou Diaby and Gaël Clichy, and Florent Malouda of Chelsea, who led the team in Evra's absence. With only Toualan of the "World Cup four" available for selection against Bosnia and Herzegovina, and Louis Saha and fellow forward Loïc Rémy injured against Belarus, Blanc is facing a stiff test of his managerial smarts.
"Nothing works in our favour at the moment with all those injuries: it's difficult to find anything positive in a defeat but there were things in our game that I liked," he said.
But after the insipid 90 minutes that had the Stade de France howling at their team, Yuri Zhevnov, the Belarus captain and goalkeeper, gave a more worrying verdict: "I didn't have so much work to do. This is a new beginning for the French team, and our coach kept telling us they might be vulnerable. He was right." | http://www.theguardian.com/football/2010/sep/04/laurent-blanc-france-belarus | dclm-gs1-257030001 | false | false | {
"keywords": "a sequence"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.222667 | <urn:uuid:3cda3cb4-e76c-4b89-9b0e-427a1b4e4eae> | en | 0.965474 | As thousands of students scramble for university places, Donald MacLeod explains the system that finds the courses with vacancies
What is Clearing?
It's the service run by the Universities and Colleges Admissions Service (Ucas) to match students without places with courses that still have vacancies.
Who uses Clearing?
Mostly students who have not gained the A-level or Highers grades they needed to meet conditional offers from their chosen university or college. Clearing can also be used to make a late application.
How many students are involved?
Despite the hullabaloo, numbers have been falling from 54,401 in 1997 to 50,650 in 1998 and 48,239 last year, although this was partly accounted for by an increase in late registrations in the wake of controversy over tuition fees. People, especially mature students, seem to have waited to see what their financial position would be before applying. An increasing number of people apply very late in the day, often directly to one college or university, rather than going through the year-long applications process.
How is it going this year?
By 11am on Thursday morning, 1,347 had found a course compared with around 2,500 at the same time in 1999. The numbers eligible for clearing were also down on last year, at 84,000 compared with 90,080. Far more students have got their first choice - this year conditional offers to a total of 190,793 people were confirmed. Many more will be able to negotiate entry to their first or second choice if they have missed the grades by a small margin. Institutions may well prefer to take a student they already know a bit about from their application.
Who is eligible for Clearing?
Any applicant not holding an offer from a university or college. You must turn down any existing offer before Ucas will allow you into Clearing.
What do applicants need to do?
If you are eligible for Clearing, you don't need to ask Ucas for details. They will send you a Clearing entry form (CEF) and instructions booklet automatically. Then it is up to students to take advice from teachers and career advisers and start contacting the universities and colleges about the courses that interest them. Ucas recommends that you telephone, e-mail or call in person and keep your CEF handy - you will probably be asked for your number and exam results.
Is it a race?
Every year Clearing seems to become more frenetic. Yesterday morning the Ucas website registered 129,613 full searches. Young people hit the phones to universities and colleges as soon as they get their exam results - that is why there has been such a furore in Scotland where delayed Highers results could mean English and Welsh applicants get a head start in chasing the best courses.
Will all the best courses will be snapped up by the first weekend after the A-level results?
Definitely not. A lot of informal offers are made at this stage. Student rings university A. "Would you take me to study X with my grades?" "Yes," says the admissions tutor. Student rings university B, college C - possibly 10 or a dozen institutions to find the best offer. The upshot is that days and weeks pass before the true situation becomes clear.
What do I do when a university or college offers me a place?
If an institution is happy that you meet its requirements, it will probably ask you to send it your CEF. Ucas advises: "Don't be hasty. When someone asks for your CEF, they are, effectively, making you an offer. Make sure they are genuinely interested in your application. If you are sure the course is for you, fill in your CEF and send it off - or better still, take it there yourself. The best way to find out more about a university or college, its accommodation and social life, is to make a visit."
Can I shop around?
Yes, but remember that your CEF can only be sent to one institution at a time. The university or college will insist that you send the original form, not a photocopy or fax. So if you're not convinced its course is for you, politely explain and carry on telephoning.
How do I know if I've got a place?
When it has received your CEF, a university or college will write to you either to offer you a place or send back your form. If you decline the offer, or you do not get one, your CEF will be returned and you can keep looking. If you accept the offer, the university or college will confirm your place to Ucas and it will send you an official letter.
How long does Clearing last?
You can get a place until the start of the academic term in September or even October but the majority of students get sorted out fairly quickly.
Useful links
Special report: Clearing 2000 | http://www.theguardian.com/world/2000/aug/17/qanda.donaldmacleod | dclm-gs1-257070001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.026392 | <urn:uuid:cca71c2e-425f-45fb-b839-162b63cdd31f> | en | 0.878076 | The Coruscant Tapestry Measures 30 Feet and Recounts the Entire Star Wars Saga
By: Michael Hines - Published: • References: nineteeneightyeight & technabob
Hopefully some museum will recognize the value of the Coruscant Tapestry and will buy it from Gallery1988. The Los Angeles-based pop culture art gallery is currently displaying Aled Lewis' amazing work of art and has it listed for sale at a cool $20,000. The tapestry measures 30 feet long and 13 inches tall, and it recounts the entire Star Wars film saga.
What makes the Coruscant Tapestry even nerdier is the fact that the action is transcribed in Aurebesh, a language unique to the Star Wars universe. Lewis was inspired by the Bayeux Tapestry, an iconic work of medieval art that chronicled the Norman conquest of England in 1066. While $20,000 may seem like a lot to pay for a work of Star Wars art, you have to take into account the uniqueness of this piece and the fact that Lewis created the whole thing by hand. It's worth every penny. Stats for Medieval Sci-Fi Art Trending: Older & Mild
Traction: 859 clicks in 85 w
Interest: 0.8 minutes
Concept: Coruscant Tapestry
Related: 61 examples / 47 photos
Segment: Males, 18-35
Comparison Set: 22 similar articles, including: intergalactic artistic shirts, meticulous lego movie remakes, and geeky sci-fi hangers. | http://www.trendhunter.com/trends/coruscant-tapestry | dclm-gs1-257230001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.06435 | <urn:uuid:85de7e28-d0f1-4346-aa2c-ee9f39f478fd> | en | 0.823888 | First: Mid: Last: City: State:
Ginger Amberg
Locate anyone today, including Ginger Amberg, right here at Our easy-to-use website provides access to billions of public records data, so you can find exactly who you're searching for. Find out where Ginger Amberg is living, get a phone number, and more!
If you're not positive that you've found the right Ginger, just perform a more detailed search. You can locate Ginger Amberg faster by adding in any additional details you have, like past addresses or other known names. Profiles may include such personal information as phone numbers, email addresses, names of family members, and more. displays search results in a very user-friendly format that makes finding the right Ginger Amberg faster and easier. All our information is systematically organized into different sections - name/aliases, age, location, and possible relatives - helping you scan easily and quickly locate the right Ginger. Once you pinpoint the right one, you can examine the details page to get more information.
Name/AKAsAgeLocationPossible Relatives
1. Amberg, Ginger T
Associated names:
Sanford, FL
TRAMMELL, VIRGINIA A (age 52) View Details | http://www.usa-people-search.com/names/p/Ginger-Amberg | dclm-gs1-257330001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.02156 | <urn:uuid:bac0383c-02ef-44f3-9d2d-07714fda1c13> | en | 0.93848 | New Coalition Urges Changes in US Anti-Terror Law
An unlikely alliance of liberal and conservative groups is joining forces to urge Congress to make some changes in the sweeping anti-terrorism law known as the Patriot Act.
Congress passed the Patriot Act not long after the terrorist attacks that shook the nation and the world on September 11, 2001.
The act made it easier for law enforcement agencies to monitor terrorist suspects and removed bureaucratic barriers that had limited the sharing of information between criminal investigators and intelligence agencies.
At the same time, the Patriot Act sparked criticism from both the political left and right that the new monitoring powers were too intrusive.
Now, an unusual coalition of liberal and conservative groups is urging Congress to make some changes in the Patriot Act when it comes up for renewal in the House and Senate later this year. Several parts of the law related to surveillance powers are due to expire at the end of the year unless extended by Congress.
Bob Barr
Bob Barr is a former Republican congressman from Georgia. He voted for the Patriot Act in 2001 but now supports changes that would limit the ability of federal agents to gather personal information in the pursuit of terrorist suspects.
"The problem is that some of its provisions, those that we are discussing here today, go beyond number one, what is necessary to successfully fight acts of terrorism," he said, "and, secondly, if allowed to continue, will do great and irreparable harm to the 4th Amendment [prohibits unreasonable search and seizure] to the Constitution of the United States of America, which is the underpinning of the basic notion of privacy in our system of government."
Mr. Barr is chairman of a new group called Patriots To Restore Checks and Balances. Other conservative groups involved in the effort include the Citizens Committee for the Right to Keep and Bear Arms and the American Conservative Union.
Traditionally liberal groups are also involved.
"It permits zealous or ideologically motivated government agents to co-opt the definition of domestic terrorism in the Patriot Act to permit the use of special invasive measures against public demonstrators," said Laura Murphy, who is with the American Civil Liberties Union, an organization that has long criticized parts of the Patriot Act. "Terrorism laws must target terrorists, not critics of government policy."
The coalition to change the Patriot Act has written to President Bush asking that he be open to their suggestions to change the law.
Alberto Gonzales
Attorney General Alberto Gonzales recently praised the Patriot Act as an important tool in the war on terrorism. He also said the administration would be willing to consider some minor changes to the Patriot Act.
"If some have suggestions for improvements that will make America safer, I would be interested in hearing those," he said. "But mindful of the tragedy of September 11th, I will not support changes that would make America more vulnerable to terrorist attacks."
The new secretary for Homeland Security, Michael Chertoff, recently said that the government must do a better job of respecting civil liberties as it goes after suspected terrorists.
During a speech in Washington, Secretary Chertoff described the war on terrorism as more of a marathon than a sprint.
"We will earn the public trust when we demonstrate that the information we do collect and the measures we do implement are tailored to the goals of preserving security and do not creep beyond that mission," he said. "Our ultimate goal is a time when security measures are a comfortable, convenient part of our routine, a time when people go about their daily lives mindful of risks but not encumbered by fear."
Discussions between the White House and Congress on renewing the Patriot Act are likely to begin soon, with congressional votes expected before the end of the year.
This forum has been closed.
Featured Videos
Russia’s Syria Involvement Raising Concerns in Europei
Luis Ramirez
October 02, 2015 4:45 PM
Video Russia’s Syria Involvement Raising Concerns in Europe
Video First Self-Driving Truck Debuts on European Highways
Video Nano-tech Filter Cleans Dirty Water
Video Demand Rising for Organic Produce in Cambodia
Video Migrant Influx Costs Europe, But Economy Could Benefit
Video Botanists Grow Furniture, with Pruning Shears
Video New Fabric Helps Fight Dust-Related Allergies
Video Burkina Faso's Economy Deeply Affected by Political Turmoil
Video Fleeing Violence, Some Syrians Find Refuge in Irbil
Video Nigeria’s Wecyclers Work for Reusable Future in Lagos
Video Sketch Artist Helps Catch Criminals, Gives a Face to Deceased
Video Thailand Set to Build China-like Internet Firewall
Video Croatian Town’s War History Evokes Empathy for Migrants
Video Long Drought Affecting California’s Sequoias
VOA Blogs | http://www.voanews.com/content/a-13-2005-03-23-voa72/309417.html | dclm-gs1-257370001 | false | false | {
"keywords": "surveillance"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.084387 | <urn:uuid:30790894-624f-4fb9-a613-3b13e053ca69> | en | 0.847474 | Browse Dictionary by Letter
Dictionary Suite
strong-willed having a strong will; resolute; determined. [2 definitions]
strontium a highly reactive chemical element of the alkaline-earth group that has thirty-eight protons in each nucleus, that occurs naturally only in compounds, and that has highly toxic radioactive isotopes that are by-products of some types of nuclear fission reactions. (symbol: Sr)
strop a pliable strip, usu. of leather, on which a razor is sharpened. [2 definitions]
strophe the movement from right to left of the chorus in classical Greek drama, or the part of the choral ode sung during this movement. (Cf. antistrophe.) [2 definitions]
strove past tense of strive.
struck past tense and past participle of strike. [2 definitions]
structural of or pertaining to construction or structures. [2 definitions]
structuralize to include as part of a structure.
structureless combined form of structure.
strumpet formerly, a harlot; whore.
strung past tense and past participle of string. | http://www.wordsmyth.net/?mode=browse&as_word=structure | dclm-gs1-257450001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.306343 | <urn:uuid:abd213a4-8cf4-48dc-a9b7-f64ce14bf7f2> | en | 0.931012 | Re: Precambrian geology (2)
Tue, 20 Apr 1999 23:12:49 EDT
> << On day four, the clouded atmosphere is
> in the expanse) to someone on earth. >>
> Paul wrote: Since your theory is allegedly built upon the witness of
Scripture, why are you accepting this concordistic reinterpretation which
rejects the clear
fourth day?
>> Bert wrote: Why are you suggesting that some of the past interpretations
sacred? Where this interpreters given a special revelation? There are
no sacred interpretations given by men and the inclusion of
"reinterpretation" is unwarranted as is the objection to this
final analysis this is all that really matters. >>
Since there was only one interpretation of the fourth day until 1500 AD or
later, it is historically justified to speak of the "clouded atmosphere
clearing up" interpretation as a "reinterpretation". Further those who hold
to this interpretation usually imply or even state that they are trying to
harmonize Genesis with modern science; so calling this interpretation
"concordistic" is also justified. I am not suggesting that the historical
interpretation of the fourth day is sacred; but, I do suggest that the
historical interpretation fits the historical and grammatical context of Gen
1, while the concordistic interpretation is imposed upon the text. If, like
Ray Zimmer, someone likes the latter interpretation for subjective reasons
problem with it. | http://www2.asa3.org/archive/asa/199904/0377.html | dclm-gs1-257520001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.041442 | <urn:uuid:0bc37ed4-f9e8-4e8b-9ee7-00053e554cbc> | en | 0.947384 | Invading the Ivory Tower: How to Define and Perform Civic Science | MIT Center for Civic Media
Invading the Ivory Tower: How to Define and Perform Civic Science
My project changed several times over. Initially, I planned to combine my science background with the class curriculum and my ostensible status as a journalist to write a news series on civic science projects. However, the more I researched this subject, the more I realized that I needed to back up quite a bit before I could attempt such an undertaking.
First, a little background. Many modern policy issues explicitly involve science, but we increasingly find that debate focusing on the facts of the science itself, rather than finding policy solutions to our science-related problems. This state is what some call the ‘knowledge war’ – a stark battle between scientists, whose community tends to be somewhat removed from general public; and the rest of the population, which has a uneven connection to and understanding of the scientific process. And without knowledge of basic scientific facts, or an appreciation for how scientific ideas are analyzed, people will have trouble (1) keeping up with important science-related issues, (2) assessing the validity of new information, and of course (3) participating meaningfully in the political process.
So what's the solution? According to some, it's civic science, defined here by political theorist Karin Backstrand:
"The notion of civic science, which is rather vague and elusive, serves as an umbrella for various attempts to increase public participation in the production and use of scientiªc knowledge. Civic science alludes to a changing relationship between science, expert knowledge and citizens in democratic societies. In this perspective, citizens and the public have a stake in the science-politics interface, which can no longer be viewed as an exclusive domain for scientiªc experts and policy-makers only."
Unfortunately, it seems that we don’t know exactly how to define civic science outside of the lofty goals that we’ve set for it. This is kind of like the problem we had in the first week of class when we attempted to define civic media without appealing to the ideal. We know that civic science must relate somehow to scientific knowledge, as well as the far-flung expert community that produces it. We know it necessarily involves some component of citizen engagement. And we know that civic science is meant to serve as some kind of peace treaty in the so-called knowledge war. From all this, I realized that before we can have a discussion on civic science, we should have a better idea of what it is and what makes it good. Based on recommendations of successful projects through formal interviews with civic science thinkers, as well as my own research, I set out to explore three examples that might provide insight into the common features of genuine, effective civic science.
The three that I looked at were:
* Seafloor Explorer, a citizen science project in which ordinary people can help categorize animal life on the bottom of the northeast continental shelf
* Safecast, an independent organization that puts Geiger detectors in the hands of ordinary citizens to create better maps of radiation levels (and first brought to my attention by our TA, Becky!)
* SMART, a student-run program that emerged from a larger initiative to combat teen pregnancy rates in Minnesota high schools LINK
I distilled these traits into five 'principles of civic science':
1. Civic science needs to pull people from diverse backgrounds.
2. Civic science needs to involve real discussion of scientific concepts.
3. Civic science needs to maintain a connection to a larger purpose.
4. Civic science needs a low and level barrier to entry.
5. Civic science needs to leave participants with something more.
Here's the link to my presentation slides and here's the paper itself. Thanks to all for an educational, unusual semester. | https://civic.mit.edu/blog/ahr/invading-the-ivory-tower-how-to-define-and-perform-civic-science | dclm-gs1-257640001 | false | false | {
"keywords": "m gene"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.369452 | <urn:uuid:25f79c66-5e5f-4563-9b95-fb97afbf882a> | en | 0.918748 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
In statistics, the midhinge is the average of the first and third quartiles and is thus a measure of location. Equivalently, it is the 25% trimmed mid-range or 25% midsummary; it is an L-estimator.
The midhinge is complemented by the H-spread, or interquartile range, which is the difference of the third and first quartiles and which is a measure of statistical dispersion, in sense that if one knows the midhinge and the interquartile range, one can find the first and third quartiles.
The use of the term "hinge" for the lower or upper quartiles derives from John Tukey's work on exploratory data analysis,[1] and "midhinge" is a fairly modern term dating from around that time. The midhinge is slightly simpler to calculate than the trimean, which originated in the same context and equals the average of the median and the midhinge.
See also[edit]
1. ^ Tukey, J.W. (1977) Exploratory Data Analysis, Addison-Wesley. ISBN 0-201-07616-0
External links[edit] | https://en.wikipedia.org/wiki/Midhinge | dclm-gs1-257740001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.42513 | <urn:uuid:d1b477df-8b8f-4a91-9eb3-d445c9ca12c9> | en | 0.964915 | Shared publicly -
Shayne Dickinson's profile photoKhali Ahmee's profile photoChritopher Kenny's profile photoMichael Jelacic's profile photo
Android. Attention. Maybe Facebook really is where the cool kids hang out. :)
10 million new users in 10 days, 1 Billion from Facebook... and I still don't get the point of it. Starting to think I might be yelling at kids to get off of my lawn soon...
I wonder how many people will stop using it once they start heavily advertising on it.
I'm not a kewl kid. That explains why I don't use Instagram or FB.
Thank goodness.
There obviously aren't quite as many people leaving Instagram as Mashable would have us believe.
So Instagram doesn't work with ICS? I get an incompability error
even after the facebook hijacking announcement pretty impressive..
Ron Ng
Wonder what percent were Android downloads?
I like Photoshop, it allows me to add thousands of different filters and my personal data stays out of Zucks hands.
+Maria John don't worry about facebook, if you use the app on your phone that i gave you, you can share anything to google+ with no problems.
instagram: myspace glitter for the new generation
it's really crazy as app is useless
What is that? Some kinda camera thingiemajiger?
FS Rain
I think that google+ is more than enough to share phoros, thoughts and anything digitally possible already..
That's insane! Didn't know there was that many hipsters in the world =P
i LOVE instagram!!!!!!!!!!!!!!!!!!! lol my username is em904dancer (FOLLOW ME) :)
My valuation of Instagram: $10 million. That's being generous. Facebook could have recreated that app and functionality at a cost of less than 5 million easily. So why the 100 TIMES overvaluation. This bizarre move by Zuckerberg makes me think there's no way I'd invest in shares of his company. If he's going to make more dipshit moves like this one.
It is now apparent that Kodak wouldn't be going out of business if they just made their digital cameras take pictures like it's the 70's.
Not surprised as it led the global news reports pushing off such annoying news as the 2012 elections.
Installed it on MyTouch4G, deleted it, reinstalled it. Growing weary of it again & going back to Flickr. More a community there.
so that's why Facebook bought Instagram for $1 billion. Do we really love photos that much? Or it's a sign of the forthcoming technology bubble.
(Facebook thanks all of you loyal Android users for the phenomenal success....)
Deleted this soon as I heard facebook bought it.
I still think it's funny how the app became available for us Android users just days before the #Instagram takeover.
I have it and it's okay. But it's not really worth the big hype. It's a small social photography app. Not really a big deal, but I know since FB bought it up it's about to explode.
Or has exploded enough... But hey, it's an app... which I can't get on Blackberry!
Almost deleted it after I heard Facebook bought it but I realized it doesn't matter because I only use it to view pictures, not to share them. Lightbox is better for that.
i prefer Pixlr-O-Matic....
Fb huh.....there went the neighborhood....deleting
I like the availability to choose.
^Agreed. There are a ton of great photo sharing apps out there.
I've seen an increase in spam follower since they released the app to #android phones.
Instagram doesn't have the best filters or photo editing features. They know that, that's why you find them recommending a few other editing apps on their blog. Initially I was disappointed in instagram when I first installed it, but then its simplicity and network richness became a draw for me. I found myself wanting to take more pictures with it. I didn't want to post my pictures up every time and "pollute" peoples streams. But instagram provided a way to allow for people who want to see my pictures see my pictures. It kinda made me feel less guilty taking random pictures. I guess fb thought instagram had a strong enough branding and following that its worth $1B. Those are pretty priceless attributes, just look at twitter. The question now becomes "how are they going to monetise it"?
Is it worth installing?...this app doesn't really make a whole lot of sense to me.
+Robin J Phillips so what are you doing on Google+? In a rational world no one would pay attention to Instagram because someone like Google or Apple could just build photo filters into the standard camera app and they would be out of business in a year or two. But because of the current reality distortion zone anything goes, be prepared for more crazy acquisitions, then the return of and the sock puppet.
Not surprised. Everyone was worried the FB buyout would kill IG, but instead, it generated interest far more than it turned anybody off.
I hope it crashes and burns! Screw andy app that supports Twitter!
Camera360 FTW. I haven't found a better photo app.
Would anyone like to guess what percentage of those 10 million new users are already Facebook uses though? I would think 90% would be conservative, maybe 95% or even higher? And how many would actually leave Facebook because there is a new picture sharing social network? And how do you even do a decent job placing ads around photos anyway? So is Facebook paying $1B for an app that could be reproduced with a man-year or so of engineering time, or paying for a few tens of millions of users that it already owns? Either way it doesn't make any sense (just like the Chewbacca defense).
It took me a while to 'get' it, and I still can't see the huge draw, but the community participation in instagram is terribly implemented. Essentially the way to go seems to be to use hashtags to get your pictures exposed to others, and to find things and users that interest you. Its actually not terrible in terms of a community, even though the app isn't so hot. I'm really trying to like it, and I'm getting there. Its starting to get fun. Hashtags made all the difference in the world though. I think it was initially just popular because it meant iphone users could easily post to facebook... then after they used it for a while as a crutch to facebook posting, it became fun. Android users don't get that initiation since our phones post easily to facebook in stock form.
+Ryan O'Neill That's a really good point Ryan - so it's popular because Apple hates Facebook and this is an end run around the Twitter/Apple love fest?
Grrr this pissed me off because I have an instagram!!!
So it takes low resolution photos and adds a filter. Cool. That's fucking retarded. Any program can do that. MSPAINT CAN DO THAT... actually mspaint can't do that, but it certainly fucking could, if it wanted to.
Lol @ all those who don't "get" why Instagram is so popular. It's Twitter w/pictures. In fact I guarantee the next major iteration will see Reposts... It is pointless if you're not following anyone, or if nobody is following you. But find someone you love. See what they're lives LOOK like. Kim Kardashian is taking pictures of her feet and shit. Rihanna has some KILLER instagram flicks candid of her blowing smoke out of her face... Cmon' you know people eat that up.
+Dante Orpilla Well in your defense, I think we all lie awake at night wondering about Kim Kardashian's feet. I've always guessed them about an 8.5 but wide.
So it's like Facebook, or Google+, you YouTube with its limitation being shitty iphone photos with a 2 dollar digital filter.
Eul Cam
The power of the #Android
And over the next 10 days maybe they'll have 10 million users that will realize they don't want their pictures to look like old crappy Polaroids?
Most amazing software ever! Once you see your dog in sepia you will never look at life the same way again
Interesting valuation. Based on users?
Now it will never post to Google+ after its latest acquisition!
it is because they made it available for android users....
It's not crazy or surprising. The Android user base is huge. In fact, the number ought to have been higher.
Add a comment... | https://plus.google.com/+TechCrunch/posts/JvxHDF2HwdV | dclm-gs1-257850001 | false | false | {
"keywords": "engineering"
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.066067 | <urn:uuid:8d4641e9-259f-4373-accf-5407128e8d1f> | en | 0.82836 | Delivering personalized experiences online.
Cxense enables the world’s leading media, e-commerce and consumer brands to take control of their audience data to deliver more engaging and personalized user experiences. Businesses using Cxense’s advanced real-time analytics, data management (DMP), advertising, search and personalization technology gain more engaged users, increased digital revenue and higher sales conversions. Cxense technology powers more than 6,000 sites worldwide; securely maintaining approximately one billion unique user profiles on behalf of their customers. Cxense is headquartered in Oslo, Norway, with offices worldwide.
Our Vision
To understand better than anyone what people want, and to enable our customers to use that insight to engage and monetize their audience.
Follow us on LinkedIn , Twitter , Facebook , Google+ | https://www.cxense.com/about/ | dclm-gs1-257960001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.019607 | <urn:uuid:e0620fa6-3c1e-40ac-b989-a937cb53db88> | en | 0.987185 | The sun is just peaking over the horizon as we make our way back to the lobby to get the lifts, Cat will have to stay on the first floor tonight, and I on the twelfth, though I can't bring myself to leave her, not now, not again.
I feel that maybe Cat and I may get some time to talk to each other but she is whisked away from me by Euphemia. "Why can't I talk to her?" I ask Erwin, as he comes to stand next to me. He sighs, and rubs the bald patch on his head sleepily.
"You will have plenty of time to speak to her, I am sure of it. Now go to bed, you are on air at two" his voice is still, calm, and there is a slight smile on his lips as he speaks to me. I walk to my room, without another word, but I am determined to see Cat.
I toss and turn in bed for a while, but when I have no luck falling asleep, I decide on going to see Cat, the first place I think to check is the roof, this is where she came when she was nervous before the games, what's stopping her being there now. I get onto the roof, and see nothing, other than darkness, even the lights from the street seems to be gone.
I sigh and walk back to my room for a while, but then I decide to sneak out to the lift and go to the first floor to see Cat. I get to my door and turn on the handle, but I have no luck. My door has been locked from the outside, at first I suspect Erwin, but in reality it could be anyone. I have a strong gut feeling that the capitol want to monitor my every move, starting now.
I walk back to my bed sombrely, and pretend to sleep, until Bernadette wakes me, saying we have a "Busy, busy, busy day!"
I have five minutes to eat something before the prep team come to get me and all I have to say is "They loved you!" and they hear nothing more from me, no questions are asked. I can remain silent for the next few hours.
When Harley makes his appearance, he shoos them away and dresses me in a black lacy dress, and black shoes it's the comfiest I have felt for days, I feel more like myself while I am wearing this. He adjusts my make-up, making my face look as young and innocent as it had last night.
We talk idly, but I am too scared to ask him about anything of real importance. Because after my door was locked, I have a feeling that I am being watched constantly, I wonder if Cat is experiencing the same thing.
The interview takes place down the hall from where I am, meaning Cat has to take the lift she is already seated in the sofa when I get there. It's the same seat from last night, but now it is surrounded by red and pink roses. There are only a few cameras to record this event, and much to my liking no live audience. When Sinjin sees me he gives me a warm hug "Well done, Jadelyn, how are you feeling?" he asks.
"Okay" I say with a small smile, it's a false one, but it's the best they can hope for "I am a little nervous about the interview though" I say with a shrug. A little nervous is an understatement, I don't know what to say or do, anything could spark something in the capitol, one false move and it could e game over.
"Don't be. We are going to have a great time" he smiles.
"I don't really like talking about myself" I admit.
"Don't worry, nothing you say will be wrong" he says, trying to calm my nerves. If only he was right, if only Cat and I could speak freely. For all Cat and I know, President Wood, may already have something planned for us, as we speak.
Then there's Cat, looking amazing in a royal blue dress pulling me off to the side "I hardly get to see you" she says "Felicia seems keen on keeping us apart"- I am guessing 'Felicia' is Cat's mentor- well actually they are more keen on keeping us alive, but there are too many people around for us to get into that.
"Yeah" I say "Everything seems so much more reserved and responsible than it did before" I say with a shrug.
"Well" she shrugs and smiles "There's this and then we can go home, and then they can't keep watching us all the time" she says.
I purse my lips "Yeah, and you'll be in District 1 and I'll be in District 12 and we won't even see each other" I say, it pains me to say this.
Cat nods "Yeah, I know, I'll be in 1 and you'll be in 12" she says, sadness takes over her voice and eyes. "But at least we will have the Victory tour, and we will be able to make visits right?" she asks "I mean, that is if you want to" she adds. I can't believe that after everything, she would question me wanting to see her. I have no time to reply to Cat because they are ready for us.
We sit somewhat formally on the seat, though Sinjin seems all too keen on us cuddling up together, he keeps telling us to make ourselves more comfortable. "Go ahead" he says "I don't mind, it looked sweet" he says.
I smile at him, but still Cat and I remain sitting the way we were, we sit close just not as close as we could be, I never let go of her hand though I keep it locked in mine safely. Someone counts backwards and then we are live on the air.
Sinjin as usual helps a great deal, he is friendly, and makes jokes. He has the same easy relationship with Cat as he has from the start, she answers most of the questions, occasionally I have to speak, but I usually redirect the questions back to, Cat- she's better at this stuff than me.
But soon Sinjin starts asking questions of much more importance "So, Jade" he begins "When did you first realise that you had feelings for Cat? I mean, after all, you instigated the first kiss" he says. He has a huge smile on his face, as he asks me this question.
I sit and think for a moment before I answer " I think" I start "It was pretty much straight away, from the first day I saw her really" I say, and I see Erwin give a sigh of relief, and I know I have done something right.
"Ahh" says Sinjin "Love at first sight" he smiles before turning his attention to Cat "So then Cat" he says looking at the small girl who sits beside me clutching onto my hand. "When did you realise you loved Jade?"
"I think it was when I found her laying near the bushes, and I had to help her" she says her voice is soft, and seems to be lost in thought as she remembers the day she saved me "All I know is that day and every day since then, I would do anything to keep her alive and safe from harm, I can't lose her" she says. And once again Erwin sighs and so does Felicia and I know we have both done something right. Sinjin lays a hand on his chest, showing we have moved him.
I turn to face Cat and I smile at her, my grip on her hand tightens. I don't ever want to lose her, I won't lose her. Cat mentioning harm brings Sinjin on to all the ways we did get hurt, from burns, to stings, to wounds. And then we get onto the mutts, and my scar and my metal plate in my leg.
It's only when Sinjin mentions it that Cat says anything "What scar? What plate?" she asks looking at me from head to toe. And I know I have been lucky to escape with only a metal plate and a scar, I don't know how the doctors managed it, all I know is they did. "It's my fault" she says, I can see the sadness growing in her eyes "It's my fault because I used that tourniquet" she says.
"Cat, it could be worse, I could have lost my leg or my life… All it is is a metal plate I had put in my leg to replace some of the bone that was damaged" I say with a shrug.
"That's true" says Sinjin "Without that tourniquet she would have died" Cat buries her head in the crook of my neck, and she stays there for a while, sobbing quietly into my skin I warp my arms around her and hold her close to me. Sinjin backs off of her for a while until we come to the berries.
"Cat, I must ask you this, I know you have had a shock but. The moment you pulled out those berries, what was going through your mind?" he asks.
Cat takes a while to collect her thoughts, and then she starts to speak, and this is it, this is the moment of truth, the moment where it is said that we challenged the capitol or where we are both so madly in love we can't help what we did "I don't know" she says and her voice is only just audible "I just can't imagine life without her. I never want to live without her" she says, and that's all it needs.
"Anything to add to that Jade?" he asks.
I shake my head "No, she's good for both of us" I know we have both done right, I can see the relief on Erwin's and Felicia's faces. Not only that, but you can feel the anxiety lift from the room. That's where the interview ends. And Cat and I are sent away to prepare for when the train reaches its destinations.
Cat and I are sent a joint room, before we have to say bye to each other- well until the victory tour. I can feel the train slowing. I grip onto Cat's hand, never wanting to let go. I can feel the tears building in my eyes as we pull into the station, of District 1.
You can hear the crowd buzzing outside. All of them screaming for Cat and I, I know now that if I got off here, they would love it. If Cat and I got off the train together at the same stop, the whole of Panem would soon know, and that would be proof right?
If Cat and I decided to stay with each other, if we decided to leave everything behind, so we could be with each other, that would prove our love, and then President Wood, would have no choice but to believe it.
She stands and looks down at me, as I sit on the chair staring up into her eyes. "It'll be okay, Jade" she says "I'll visit whenever I can" she kisses me lightly on the lips; her hands are placed on either side of my face.
She tries to pull away from the short lived kiss but I pull her back towards, me. The kiss becomes more passionate, but still, it is far too short for my liking. She pulls away once again, and gives me a weak smile "Bye, Jade" she says, her voice is only just above a whisper "I love you" she says.
I look back up at her "I love you too" I say, my voice cracks slightly.
She grabs onto my hand one last time, giving it a quick squeeze. I never want her to let go of me, I never want her to leave my side. Just as I am about to open my mouth to object to her leaving, Felicia grabs her elbow and pulls her away from me. She steps off of the train, and the crowd is deafening, even though I am hidden by the metal of the train, I can hear everything. I can hear all of them shouting at her to gain her attention to get pictures, of their District 1 Victor.
I can hear people questioning where I am. It doesn't matter where I am, it matters where I should be, and the answer to that question is I should be out there with Cat, clutching onto her and never having to let go.
The train zooms away, and heads off to District 12, though I can't wait to see Taylor or my mum, and I most definitely can't wait to be back within 12 I can't help but feel like Cat should be joining me. If I'm not in 1 she should be in 12 or vice versa. Cat and I should be together.
Erwin walks into the room and takes the seat next to me. I can feel tears threatening to spill over my eyes, and trickle down my face. He wraps his arm around my shoulder "How are you feeling?" he asks softly.
I shrug at him, not really knowing how to answer the question. I miss her already, and I want to know she is safe. Who am I kidding? Of course she's safe, she's back home in District 1, with food money, and a roof over her head. But I'm on my way back to 12, to live my own life away from her.
"Everything will be fine" he says softly, pulling me slightly closer to him. "There are phones, and trains, nothing is stopping you seeing or speaking to each other" he says "Besides you have the victory tour coming up soon, and then you'll be together again"
The Victory tour, that's the next time I know for certain that I'll be seeing Cat, and I am already counting down the days.
A/N: Here is the final chapter; I hope you have enjoyed reading this as much as I have enjoyed writing it. Thank you to everyone who has read this fic, and a huge thank you to everyone who has reviewed, you have kept me motivated to write this story. Please read and review I appreciate all comments and opinions (good or bad)
P.S. I just want to say another huge thank you. I really hope you have enjoyed this story. | https://www.fanfiction.net/s/8499477/22/Attraction | dclm-gs1-258010001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.799244 | <urn:uuid:331f14d1-c2ff-474f-99db-820ee1f1acea> | en | 0.942375 | Pratt vs Howe Truss
Hi, I have to build a Popsicle Stick bridge for Physics class. I really don't have much knowledge on bridges as most of this was to be researched. I did a lot of research but I'm having trouble deciding between these two trusses.
Length: 55 cm
Height: 4 cm
Width: 8 cm
So my main problem is the type of truss to use, Howe or Pratt. The load will be focused in the center.
2. Relevant equations
3. The attempt at a solution
I used a Bridge Designer program to determine the force/weight distribution for each truss. Pratt is on the top, Howe is on the bottom:
The main differences are that the Pratt truss has no force on the ends and the compression members are vertical. The Howe truss has no force on the center and the tension members are vertical instead.
Here's why I can't decide between the two:
- The Pratt truss uses vertical compression members. Since the height restriction is 4cm, wouldn't this allow the bridge using a Pratt truss to be stronger against compression? (Compression is inversely proportional to length, according to the research I've done)
- The Howe truss has no net force in the center, where the load will be placed. Does this automatically make it better than the Pratt?
2. jcsd
3. PhanthomJay
PhanthomJay 6,296
Science Advisor
Homework Helper
Gold Member
It appears that you have inadvertently applied your load at the top of the truss instead of at the bottom, because that's the only way you're going to get a zero force in the center vertical chord for the Howe, and as compressive force of 150 for the Pratt (the way you have shown the load, those chord forces would be reversed). Beyond that, if your numbers are correct, I'm not sure which is better, it depends a lot on your l/r ratios for the compressive members. Off hand, you've got to weigh the 300 max tensile,225 max horiz chord compression, and 106 max compression of the diagonals, of the Howe, with the 187 max tensile and 250 max compression of the horiz chords, of the Pratt. And even for the zero force members, you're still going to use the same size popsicle stick in those members, so the zero's don't gain you anything. I'd vote for the Pratt, but it could be a wash either way. Just a thought, so don't take it for gospel. I'll let you be the engineer.
4. Thanks for your help.
The weight is going to be loaded on the top of the bridge in the center. Does that change anything?
5. PhanthomJay
PhanthomJay 6,296
Science Advisor
Homework Helper
Gold Member
If the loading is as the top , your internal force diagrams as shown are correct.
6. How about the deflection (vertical movement) at mid span. Does one indicate less deflection than the other? Also noticed that the maximum forces in Howe truss are less than the maximum in the Pratt. On a much larger scale, would the truss with the lower maximum forces result in in a lighter truss members, thereby reducing fabrication and erection costs?...
Have something to add?
Similar discussions for: Pratt vs Howe Truss | https://www.physicsforums.com/threads/pratt-vs-howe-truss.202744/ | dclm-gs1-258100001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.036198 | <urn:uuid:aa4f58d9-8b42-47d4-ad04-6bee47f56d4a> | en | 0.887154 | Malware taking a bit(coin) more than we bargained for
Amir Fouda Microsoft
download slides (PDF)
Social and technological change often creates new opportunities for positive change. Unfortunately, it also means more opportunities for crime. So, when a new system of currency gains acceptance and widespread adoption in a computer-mediated population, it is only a matter of time before malware authors attempt to exploit it. As of half way through 2011, we started seeing another means of financial profiteering being perpetrated by the malware authors; they started targeting Bitcoins.
Bitcoin mining and stealing functionality has been discovered in a number of the most notable and prevalent malware families, including Alureon, Sirefef and Kelihos. Notably, Bitcoin being open-sourced software means that Windows users are not the only target. Cross-platform attacks have already been seen, with OS X threats such as MacOS_X/DevilRobber.A emerging on the scene in October 2011.
The very nature of the way Bitcoin operates also has telling implications. Bitcoin mining is a legitimate part of the system, allowing Bitcoin clients to compete with other clients in performing complex calculations using the computer's processing power, aiding in the flow of transfers and thus generating Bitcoins for the winning miner. The potential for botmasters is clear: the more computers and resources they can control in this distributed computing technique, the more they are likely to profit.
This paper examines the various malware families that target this currency, provides an analysis of how these families target Bitcoins, and details the methods they use to steal and mine this increasingly popular digital currency. This paper will also give an insight into how malware authors and cybercriminals may exploit the Bitcoin system for their own financial gain, and details what the future holds for this form of exploitation.
VB Conferences
VB2016 (Denver)
VB2015 (Prague)
VB2014 (Seattle)
VB2013 (Berlin)
VB2012 (Dallas)
VB2011 (Barcelona)
VB2010 (Vancouver)
VB2009 (Geneva)
VB2008 (Ottawa)
VB2007 (Vienna)
VB2006 (Montréal)
VB2005 (Dublin)
VB2004 (Chicago)
VB2003 (Toronto)
VB2002 (New Orleans)
VB2001 (Prague)
VB2000 (Orlando)
VB99 (Vancouver)
VB98 (Munich)
VB97 (San Francisco)
VB96 (Brighton)
VB95 (Boston)
VB94 (Jersey)
VB93 (Amsterdam)
VB92 (Edinburgh)
VB91 (Jersey)
| https://www.virusbtn.com/conference/vb2012/abstracts/Fouda.xml | dclm-gs1-258160001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.058072 | <urn:uuid:56c3c9dd-3a3c-4e2a-ad54-aa99f61e7103> | en | 0.977733 | Yahoo TV
Please enable Javascript
Here’s how to turn it on:
Andy Cohen has definitely made the best of his programming executive level job at Bravo Media. Aside from becoming the face of the network and hosting its popular late night show, "Watch What Happens Live," he was instrumental in developing and producing the network's flagship "Real Housewives" franchise.
The same franchise, by the way, that he famously put a fork in when he announced in 2011 that the network wouldn't be extending the series. But, did he really mean it?
"Well, I mean, I always say 'never say never,'" Cohen, who's currently promoting the paperback release of his autobiography, "Most Talkative," told TheWrap.
"But, I think we're pretty good and I still do think we are pretty good. I mean, we've got six going and it's great," the 44-year-old continued.
Also read: Bravo's 'Kathy' Talk Show Canceled
And, that's true. Even if a "Real Housewives" city isn't bringing in the ratings, it still drives headlines and buzz. Not to mention, the network still mines the series for spinoffs.
As of now, there are four "Real Housewives" spinoffs either airing or in development, which include "Vanderpump Rules" starring Beverly Hills' Lisa Vanderpump, "The Kandi Factory" with Atlanta's Kandi Burruss, and a newly announced project with Atlanta castmember Phaedra Parks with the working title, "Rich People Problems."
Plus, former Atlanta castmember Kim Zolciak's series, "Don't Be Tardy…" returns for its second season on Tuesday at 9/8c.
TheWrap spoke with Cohen about what the cable channel looks for in "Real Housewives" spinoffs, the status of Bethenny Frankel's show and how he handles viewer opinion.
TheWrap: What makes for a good "Real Housewives" spinoff? Andy Cohen: Phaedra does a lot of other things outside of the "Housewives" show. Kandi is a songwriter. Lisa has restaurants. So, these are other things that the women do in their real lives that lend themselves to seeing more of them. I think that the women just living their lives, that's what they do on the "Housewives." The shows that we've picked up have been because the women have other things going on. Kim's show started with her getting married, which is really the natural way to, it lends itself well to another series, you know?
Speaking of Kim, was there any anger over her leaving "The Real Housewives of Atlanta"? Well, no. It was mutual. It was something that we all did together. I mean the natural evolution was it was time for her to go and we figured out how to make it work for everybody.
Did you get any flack from viewers over Bravo's choice to continue on with her spinoff after the way she departed from "The Real Housewives of Atlanta"? Not really. I think it's pretty cool. It seemed to happen as it should and it was a great season of Atlanta after she left. So, I think the reunion kind of tied it up really nicely.
What can we expect from Season 2 of "Don't Be Tardy…"? Just that it's really fun and funny and surprising. And then [Zolciak's husband, Kroy Biermann] takes a much more active role than he has in the past. So, he's more involved. And the part that's not funny or fun is the part about, you know what's going on with Kim and her mom.
Is Bethenny Frankel's show dead in the water? Oh, no, look, she's got a really full plate right now and I don't know what she has time for. But, she and I are always talking about working together again and I hope we do. I don't think it's out of the question. She's about to launch this huge other show.
The talk show. Ellen DeGeneres is an executive producer, but, still, have you given Bethenny any hosting advice? She doesn't need any of my advice. | https://www.yahoo.com/tv/s/bravos-andy-cohen-makes-real-housewives-spinoff-bethennys-221351236.html?nf=1 | dclm-gs1-258190001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.986957 | <urn:uuid:2c9a9bb3-d989-45ca-950c-2e974e1c3281> | en | 0.970478 | How BIG was Noah's Ark?
Submit questions - New Articles
How big was Noah's ark? Let us start by defining a cubit. A Biblical cubit is considered the length between the elbow of an adult and their fingertip, which is calculated to being 18 U.S. inches (roughly). Quite a few scholars who study the Hebrew Bible believe a cubit was somewhere in between 17.5 to 21.5 inches long. If we conservatively assume that a cubit was 18 inches (U.S.), we can conclude that the ark was about 450 feet (U.S.) long, 75 feet (U.S.) wide, and 45 feet (U.S.) high.
The interesting thing about Noah's ark its construction was on a 1:6 ratio. Naval architecture reveals that this is the most stable ratio for an ocean-going vessel. It could have easily survived even big ocean waves and would be next to impossible to capsize. The amount of water the ship would displace, given a draught of 15 cubits, exceeds 22,000 tons.
How many animals did it carry?
How many total animals did God want carried in the ark? Many who refuse to believe in what the Bible says state that the ship's capacity would be nowhere big enough to handle the millions of different animals it was supposedly required to carry. The truth, however, is far different from the rhetoric of those who are against God and his word!
How many clean and unclean animals would Noah's Ark have to take on board? What the Bible (Leviticus 11, Deuteronomy 14) considers clean (fit for human consumption) and unclean (not fit to eat) animals is easy to identify based on the characteristics of a particular creature. For example, warm-blooded mammals that have split hooves and chews the cud is clean to eat (e.g. Bison, Cattle, Deer, Goats, Sheep, etc.). Those that do not have these characteristics are not clean and good for man (e.g. Pigs, Lions, Tigers, Boars, etc.)
What did RAINBOWS symbolize after the flood?
Why was Noah's lifespan so long?
How LONG did it take to build the ship?
What does the INSIDE of the Ark look like?
Those who are against God say that Noah had to take SEVEN pair of clean animals and SEVEN pair of the birds (Genesis 7:2-3) with him. Is this assumption true? The answer to the question is in Leviticus 11 and Deuteronomy 14. When properly understood, Noah took on seven (7) individual animals and birds (not seven pairs) of each kind that were clean. Since these types of animals would later be used for food, it would be important to have extra breeding stock. There was three pair of clean animals and clean birds plus a seventh. The seventh one was to be offered as a sacrifice at the end of the flood (Genesis 8:20). If an animal were unclean, which the vast majorities were, then only one pair came aboard the great ship.
Contrary to what many believe and what "documentaries" concerning the ark claim, the ship would have EASILY been big enough to carry all the required animals. Only air breathing, land dwelling animals would have to be placed on the ark itself (Genesis 7:22). In the book The Genesis Flood, it states that animals such as fish, starfishes, sea urchins, mussels, clams, corals, jellyfish, sponges, and many others could have survived outside Noah's ship.
The number of animals saved
Space needed for the animals
Why drown a billion people?
One honest, basic question is why was there a need for Noah's ark in the first place? What caused God, Who is the very definition of love, to take the extreme measure of DROWNING roughly one BILLION people at the same time? The Bible itself gives us the answer.
In the roughly 1,500 years from Adam's creation man had grown corrupt and brutal. The consequences of their selfishness, lust, greed and disobedience, compounded by the fact they lived exceptionally long life spans, led to a preoccupation with evil. God, who saw the cavalcade of suffering and pain man endured, with no end in sight due, mercifully ended their ongoing self-torture. Yet the Eternal was also merciful by having Noah's ark built to save a righteous man and his family so that humanity could have a new start after the flood.
Additional Study Materials
Did a race of GIANTS exist before the deluge?
Did DINOSAURS exist before the flood?
How did the deluge lead to HALLOWEEN?
© The Bible Study Site | http://www.biblestudy.org/basicart/was-noah-ark-big-enough-to-hold-all-animals.html | dclm-gs1-258230001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.140203 | <urn:uuid:42635a81-f6bf-49f5-9555-5f63d7b00f5d> | en | 0.952958 | Category Archives: Uncategorized
Tons of Small Classes
When I do Clean Code Training or if I discuss the topic with coworkers one argument comes up over and over again:
“But if I have split all my code in those tiny methods and classes, how will I find anything? I’ll have to navigate through dozens of files!”
The problem with this argument is: It is not that wrong. And I have certainly seen code where I had to navigate a dozen classes very carefully in order to understand what is going on.
If you look at it from an abstract point of view it looks like it even has to be this way. If you want to completely understand a piece of code it’s certainly best, to have it all in one piece on the monitor. You can go from top to bottom, line by line. If you have lots of little methods and classes, you in addition to that have to navigate through all that classes and methods, keeping track on from where you called this piece of code. Obviously these are additional tasks that just make your work harder!?
I still insist this argument is wrong. The mistake is the premise that the task at hand is to understand all the code.
It is very limited what you can keep in your brains working memory at any given time. So for any non trivial program the task to completely understand it is not feasible.
The real task at hand is to
1. limit the amount of code you have to understand
2. make it as easy to understand as possible
The key to that is abstraction!
Let me ask you a question: How often do you use a HashMap or what ever the equivalent in your preferred programming language is used? Probably many times a week, right? But how often do you actually look into the source code of a HashMap? Probably next to never! We just know what a Map does and that a HashMap is one very good general purpose implementation of it. That’s all we need to know about it. We just use it. We just know how it behaves. We just understand what is going on when it get’s called.
If your abstractions, i.e. your methods and classes are just like that, you don’t need to look at their source code most of the time. You just read the name and you know what it does. You probably don’t know how it does it. At least not in detail. But you don’t need to. If you know what it does, you know enough to decide, if you need to step into that class or not, for what ever you try to achieve right now.
Of course if what your classes and methods do isn’t as obvious as a get on a HashMap you still have room for improvement.
Logging Antipatterns
As we hopefully all agree good logging is a great asset. Yet I come across aweful styles of logging (and sometimes produce them myself). So I guess it is time for a small Antipattern collection.
No Logging at All
Exception Handler without any code are an obvious example of this, but reading a configuration file without giving a hint which whan you are reading and what you found in it also belongs in this category
Wrong Log Level
logging the discovery that you can’t connect to the database of the application in DEBUG level, or logging entry and exit points of method with ERROR level are typical examples. Always remember: Once in production the log level will probably risen to WARN or ERROR and you gonna still want to see the important messages, don’t you?
Catch Log Throw
In a catch block the exception gets logged and then thrown again, possibly wrapped in a new exception. When this anti pattern is used in many places the result is a log file that contains every stacktrace in a dozen repetitions and variations. A nightmare when you try to understand what is going on.
Logging to stderr or stdout
System.out.println and ex.printStacktrace() are easy and fast to write, but their result will probably disappear in /dev/null once your application is running on a production server.
Complex Logging Statements
When the message for logging gets constructed in a convoluted way with lots of function calls, there is a serious risk that you end up with a NullPointerException instead of a proper logging entry. This is especially true when we try to log inside a catch block. After all something went wrong in the first place, so NULL values a everywhere
The Cost of Modularity
Lego is such a great thing because it is made of simple components. When you build something out of it you can take it apart and build something different out of it. It is fun. If a piece breaks you can take the model apart, replace the broken piece and reassemble the whole thing. Great.
Of course this modularity comes at a price. Building the model of a fighter jet from Lego is much more difficult then building it from a plastic construction kit. Also the result of any Lego based attempt will look a little ‘bricky’. On the other hand, try to build a ship out of your fighter jet construction kit.
So there are benefits to modularity and there are benefits to sacrificing this modularity.
This is pretty obvious, isn’t it?
Yet in software development modularity is required almost every time, without considering the cost of modularity.
Also in software development modularity is sacrificed to budget and time pressure immediately, often before testing and documentation, also without considering modularity. | http://blog.schauderhaft.de/category/uncategorized/page/2/ | dclm-gs1-258350001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.030921 | <urn:uuid:e0b78933-15f9-4e4d-b05a-c5da67055285> | en | 0.947423 | HOME > Chowhound > General Topics >
Jul 8, 2008 12:26 PM
Cheese Platter suggestions
I'm bringing a cheese platter to a spa gathering for about 10 women in a few weeks. I thought it might be fun to ask Chowhounds what cheeses you suggest. I'm thinking about 3-4 cheeses max since there are others bringing food. Since I am the one bringing the cheese, I will pull rank and decide not to include "stinky" cheeses like goat cheese (not goat's milk cheeses just "goat cheese" specifically) or bleu that I am not very fond of. I know there are 'hounds who will be disappointed in that...sorry! I will accompany it with some kind of cracker or bread product (suggestions welcome) and would like one cheese that goes well with fig preserves.
Open to all suggestions of cheeses, toppings, and crackers/breads/etc except for the stinky cheeses noted above. Thanks...
1. Click to Upload a photo (10 MB limit)
1. "and would like one cheese that goes well with fig preserves."
unfortunately i love to pair figs with either goat or bleu :) however, manchego can be a nice alternative.
question - are you specifically set on using preserves? it's fig season, so it's the perfect time to use fresh ones instead...
1 Reply
1. re: goodhealthgourmet
Oooh, definitely some Manchego. Also, mimolette is quite popular. It has an interesting story too, although some might dispute it. Purportedly, it was Napoleon's favorite cheese. Or atleast the one that he fed to his troops. It resembles a cantaloupe and the bumpy exterior is devloped by foraging cheese mites. It's a hard cheese, nutty and fairly mild.
2. I think a triple creme would do nicely: Pierre Robert or Brillat Savarin. If you can find it, Brin d'Amour, aka Fleur de Macquis, is always a hit. It's a sheeps milk Corsican cheese coated in wild herbs. I would also recommend Piave, a semi hard Italian cheese that I think makes a better cheese platter choice that reggiano. And rounding off, Manchego and Mimolette are both great suggestions. Or you could try a farmhouse cheddar or aged gouda.
1 Reply
1. re: almansa
I agree with almansa's recommendation of Piave. I usually get the Piave Vecchio - the aged Piave. It's a beautiful, nutty and rich cheese with a great tooth and a bit of crystalization. Nice complement to creamy cheeses. Less salty than reggiano.
2. I'm a stinky cheese lover, but I do know that everyone loves Parrano (there's even an Extra-aged Parrano that's extra strong, but I digress). Your friends might like rose jam with their soft cheeses (just gently simmer some organic rose petals in simple syrup until thickened; fragrant roses like Mr. Lincoln, Chrysler Imperial, etc., are better than non-fragrant ones).
2 Replies
1. re: Claudette
Ooooh, that rose jam sounds lovely. I've never had that before but would really like to try it.
1. re: lynnlato
It is lovely, but cut the petals with kitchen scissors into little pieces first.
2. Spread fig jam on brie and top w/sliced almonds. Bake 15 min
Remove pits from medjool dates and insert shard of best parmesan
1. anything with a vein of truffle in it. i think i had a moliterno with something like that. | http://chowhound.chow.com/topics/536655 | dclm-gs1-258460001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
0.049161 | <urn:uuid:96081f8f-79a5-47ee-ae8c-69b99ef94d1b> | en | 0.920273 | Main Page
From SingleHop Dropzone API
Revision as of 10:02, 14 June 2012 by Marc Bollinger (Talk | contribs)
Jump to: navigation, search
Welcome to SingleHop's Dropzone API Wiki
SingleHop offers a Application Programming Interface (API) for LEAP. We created these APIs so that our customers could build applications that can interact and exchange data with the SingleHop's server management, ticketing and billing systems. You can use our API to create internal tools that can manage your account data, open support tickets, and manage your servers. If you represent a company that resells hosting services you can use our API to build a portal that your own customers can use to access and maintain their accounts.
The API consists of 8 modules that can be accessed.
1. Billing
2. Order
3. Server
4. Service
5. Solution
6. Support
7. Tandem
8. User
Instructions on how to access the Dropzone API can be found on the API Basics page.
Personal tools | http://dropzonewiki.singlehop.com/index.php?title=Main_Page&oldid=420 | dclm-gs1-258540001 | false | false | {
"keywords": ""
} | false | {
"score": 0,
"triggered_passage": -1
} | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.